Conf Year | Article | Title | Authors |
2017 | View | “Hour of Code”: A Case Study |
Du, Wimmer, Rada
|
2018 | View | Software Concepts Emphasized In Introductory Programming Textbooks
|
McMaster, Rague, Sambasivam, Wolthuis
|
2017 | View | A Comparison of Key Concepts in
Data Analytics and Data Science
|
McMaster, Wolthuis, Rague, Sambasivam
|
2016 | View | Java vs. Python Coverage of Introductory Programming Concepts: A Textbook Analysis |
McMaster, Sambasivam, Rague, Wolthuis
|
2023 | View | Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python
|
Akter , Rodriguez-Cardenas, Rahman, Wu, Rahman , Shahriar
|
2023 | View | Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python
|
Akter , Rodriguez-Cardenas, Rahman, Wu, Rahman , Shahriar
|
2024 | View | Career Readiness of Recent Graduates in the Era of Digital Transformation: Insights from Multi-Level Focus Groups |
Kim, Jones, Lang, Raider, Sheikh, Simione
|
2023 | View | Cybersecurity the Future of Non-Profit Rural Organizations: A Pilot Study |
Sharma , Breese, Ramljak
|
2017 | View | A System Architecture for Anonymity of Student Opinion Surveys |
Ardalan, Ardalan, Rao, Alexander
|
2022 | View | A University’s Computing Excellence Scholarship: Chronicling the Journey’s First Year
|
Terwilliger, Zhang, Ray, Herath
|
2020 | View | Investigating Student Behavior in an Interdisciplinary Computing Capstone Course |
Watson, Besmer, Banks, Ray, Derksen
|
2024 | View | Evaluating Stress and Driving Performance Using VR and Physiological Data: A Case Study |
Razzak, Li, Sokhadze, He
|
2024 | View | An Analysis of the Scope of Cybersecurity Education for Computer Information Systems Students
|
Ream III, Yates
|
2023 | View | The Design of Complementary Information Security and Cybersecurity Courses |
Ream III, Yates
|
2024 | View | A Comparative Analysis of Oversampling Methods for Predicting Credit Card Default with Logistic Regression |
Tourt, Booker, Rebman Jr., Jin
|
2024 | View | A Comparison of Large Language Models for Oncology Clinical Text Summarization |
Izuchukwu , Wimmer, Rebman Jr.
|
2024 | View | An Entrepreneurial and Experiental Learning Project to Intergrate Business Concepts to an Introductory IS/IT Course |
Rebman Jr., Wimmer, Levkoff
|
2024 | View | RAG Chatbot for Healthcare related prompts using Amazon Bedrock |
Richard-Ojo, Wimmer, Rebman Jr.
|
2023 | View | Data Analytics Position Description Analysis: Skills Review and Implications for Data Analytics Curricula |
Booker, Rebman Jr., Wimmer, Levkoff, Powell, Breese
|
2023 | View | Network Intrusion Detection system with Machine learning Intrusion Detection System with Machine Learning As a Service |
Kangethe , Wimmer, Rebman Jr.
|
2023 | View | Using Textual Analytics to Process Information Overload of Cyber Security Subreddits |
Omakwu , Wimmer, Rebman Jr.
|
2022 | View | An Industry Survey of Analytics Spreadsheet Tools Adoption: Microsoft Excel vs Google Sheets |
Rebman Jr., Wimmer, Booker, Levkoff, McMurtrey, Powell
|
2020 | View | Pandemic Shift: Impact of COVID-19 on IS/Microsoft Office Specialist Excel Certification Exam Classes: Remote Testing and Lessons Learned |
Rebman Jr., White, Booker, Wimmer, Powell
|
2018 | View | A Nationwide Exploratory Study on Faculty Opinions on Student Preparation, Performance, and Evaluations |
Rebman Jr., Wimmer, Booker
|
2017 | View | Building Excel Expertise: A Guide in Best Practices |
Tastle, Mead, Rebman Jr., Marks, Phillips
|
2022 | View | Measuring Learners’ Cognitive Load When Engaged with an Algorithm Visualization Tool |
Fathi, Teresco, Regan
|
2016 | View | Aardvark Design: The Impact of IT Infrastructure on Application Development and Deployment |
Held, Rein, Stofel, Valentine, Havelka
|
2024 | View | Fear and Loathing in Self Driving Cars |
Reinicke, Spencer
|
2017 | View | ViNEL: A Virtual Networking Lab for Cyber Defense Education |
Reinicke, Baker, Toothman
|
2016 | View | How to Teach Emotional Intelligence Skills |
Connolly, Reinicke
|
2015 | View | How secure is education in Information Technology? A method for evaluating security education in IT |
Grover, Reinicke, Cummings
|
2022 | View | IS2020 Model Curriculum: Understanding the Curricular Gaps for ACBSP Accredited Programs |
Podeschi, Reynolds, Voss
|
2021 | View | MWC3: An example of an Intercollegiate Regional Computing Conference |
Reynolds, Fleenor
|
2018 | View | Effective Internships: A Study Combining Curriculum Development, Student Performance, and Program Assessment |
Reynolds, Ferguson, Leidig, Hornik
|
2017 | View | Be Careful What You Wish For: The Continued Limiting of Computing Majors |
Reynolds, Ferguson, Linville
|
2016 | View | Programming in the IS Curriculum: Are Requirements Changing for the Right Reason? |
Reynolds, Adams, Ferguson, Leidig
|
2016 | View | The Personality of a Computing Major: |
Reynolds, Adams, Ferguson, Leidig
|
2015 | View | A Tale of Two Curricula: The Case for |
Reynolds, Ferguson, Leidig
|
2015 | View | Expanding Participation in Computing: |
Leidig, Ferguson, Reynolds
|
2020 | View | Plugin-based Tool for Secure Mobile Application Development |
Shahriar, Zhang, Valero, Sneha, Riad, Islam, Ahamed
|
2023 | View | Pragmatic Due Diligence - in the World of AI |
Rice
|
2022 | View | Exploring The Strategies Collegiate Cybersecurity Instructors Need To Maximize Engagement Of Generation Z Cybersecurity Learners |
Sambasivam, Rice
|
2015 | View | A Comparison Study in Open Source Learning Management Software |
Lester, Rice
|
2015 | View | Developing Project Based Learning, Integrated Courses from Two Different Colleges at an Institution of Higher Education: An Overview of the Processes, Challenges, and Lessons Learned |
Rice, Lester
|
2024 | View | RAG Chatbot for Healthcare related prompts using Amazon Bedrock |
Richard-Ojo, Wimmer, Rebman Jr.
|
2023 | View | An Introduction to Intelligent Process Automation |
Mentzer, Richards
|
2022 | View | Enhancing Learning in Business Education |
Fullick-Jagiela, Kelly, Paros, Awudu, Riello
|
2015 | View | Salient Beliefs in Majoring in Management Information Systems: An Elicitation Study |
Chipidza, Green, Riemenschneider
|
2019 | View | Are Professional Science Master’s (PSM) Programs Beneficial for Graduates?
An Evaluation of PSM Programs
|
Rivenbark, Cummings, Kline, Patterson
|
2017 | View | Mobile Forensics Hands-On Workshop |
Fryling, Rivituso
|
2015 | View | Teaching Information Systems Courses in China: Challenges, Opportunities, and Lessons for US Educators |
Fryling, Rivituso
|
2015 | View | Student Success - Interweaving Skills for Success in Computer Introductory Courses |
Hashemi, Robbins
|
2023 | View | Truth or Media: Fallacies of Perceived Cyber Attribution |
Abegaz, Payne, Robertson
|
2023 | View | Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python
|
Akter , Rodriguez-Cardenas, Rahman, Wu, Rahman , Shahriar
|
2023 | View | Data-Driven Curriculum Design: Aligning Job Market Needs and Educational Content through Job Ad Analytics |
Müller, Felby, Bille, Mathiasen, Roesen, Nielsen
|
2024 | View | Improving Public Speaking through Virtual Reality |
Gouws, Case, Rogalski
|
2024 | View | The Virtual Stage: Metaverse Integration in Effective Speaking Courses |
Patterson, Temple, Anderson, Rogalski, Mentzer
|
2023 | View | Investigating How Technical Acumen and Student Grit Affect the Performance of Students in Online Learning Environments |
Johnson, Brown, Kelly, Romero
|
2016 | View | Case Study: Water Level Detection System |
Scott, Rosen
|
2022 | View | Using GitLab for Education program for a collaborative Cyber Infrastructure among Cybersecurity educators, learners, and researchers across the Pennsylvania State University Commonwealth Campuses |
Landmesser, Breese, Roshanaei, Gardner
|
2016 | View | Teaching an Old Dog New Tricks: |
Rossmiller, Lawrence, Clouse, Looney
|
2023 | View | Educating the Next Generation of CSOs: An Exercise in Conversational Role Play with ChatGPT |
Mitra, Schwieger, Roy
|
2015 | View | Strategies and Approaches for Teaching Storage and Data Management – Faculty Perspectives, Insights & Suggestions |
Conway, Kline, Pickard, Royster, Woods, Zullo
|
2024 | View | Unlocking Generative AI Potential in Entrepreneurs: An Experiential Learning Approach. |
Triantoro, Rua, Lang
|
2017 | View | University Micro-Credentials and the Need
for Agile IS Skill Development Programs |
Rubleske, Cata
|
2023 | View | Fostering Student Identities in Introduction to Programming |
Schmalz, Connolly, Rush
|
2023 | View | Navigating PMI’s New Body of Knowledge in IS Project Management |
Rush, Connolly
|
2022 | View | What needs updated and when? Project Management Education Implications of the Seventh Edition PMBOK Update |
Rush
|
2021 | View | An Agile Framework for Teaching with Scrum in the IT Project Management Classroom ** Best JISE Paper (2020) |
Rush, Connolly
|
2019 | View | Emotional Intelligence and Alpha Skills for IT Project Management |
Connolly, Rush
|
2018 | View | Cooperative Learning Activities for Introduction to MIS |
Connolly, Rush
|
2015 | View | Keep I.T. SIMple! How to Make Teaching Easy and Student Learning Limitless (yes, it’s possible!) |
Broadway, Russell
|
2018 | View | Principles of Program Revision for Computing Degrees: A Data-Driven 360 Degree Program Review Model |
Peltsverger, Li, Rutherfoord
|
2021 | View | Use of Artificial Intelligence to Grade Student Discussion Boards: An Exploratory Case Study |
Rutner, Scott
|
2019 | View | Using an Ocean Shipping Game to Teach Transportation Fundamentals to Supply Chain Management Students
|
Scott, Rutner
|