Keyword | Conf Year | Article | Title | Authors |
T-shaped knowledge and skills | 2018 | View | Dotting i’s and Crossing T’s: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course |
Yates, Frydenberg, Waguespack, McDermott, OConnell, Chen, Babb
|
Tableau | 2022 | View | An Examination of Tableau as a Supplement to Excel to Enhance Data Literacy Skills
|
Sena, Ariyachandra
|
Tableau | 2017 | View | Harnessing Business Analytics: Analyzing Data Analytics Programs in U.S. Business Schools |
Parks, Ceccucci, McCarthy
|
Tableau | 2015 | View | Progression of a Data Visualization Assignment |
Adkins
|
Tabletop exercise | 2021 | View | Backdoors & Breaches: Using a Tabletop Exercise Game to Teach Cybersecurity Incident Response |
Young, Farshadkhah
|
tabletop exercises | 2024 | View | Strengthening Incident Response: Lessons from Cybersecurity Tabletop Exercises for Rural Critical Infrastructure |
Haddouch, Clouse, Wright, Floyd, Valgenti, Perry, Gallagher
|
Tacit knowledge | 2023 | View | Teaching Systems Analysis – Best Practices and a Look Into the Future |
Gebauer, Sibona, Topi, Spurrier, Javadi, Tanner
|
Tacit knowledge | 2016 | View | Grounding IS Design Education in the First Principles of a Designerly Way of Knowing |
Waguespack, Babb
|
Taint tracking | 2023 | View | Teaching DevOps Security Education with Hands-on Labware: Automated Detection of Security Weakness in Python
|
Akter , Rodriguez-Cardenas, Rahman, Wu, Rahman , Shahriar
|
talent | 2023 | View | Analysis of Basketball Game-Related Statistics: Exploring the Statistics that Discriminate Winning Teams and Efficient Players in the Basketball Africa League |
Njunge, Ng'etich
|
TAM | 2020 | View | Mobile Technology in Higher Education:: an Extended Technology Acceptance Perspective
|
Pires, Halawi
|
TAM | 2016 | View | Parental Perceptions and Recommendations of Computing Majors: A Technology Acceptance Model Approach |
Powell, Wimmer
|
Target | 2024 | View | Digital Forensics in Action: A Case Study of
Tracing Cybercriminals Behind Job Offer Spear Phishing Scams in Academic Institutions
|
Ihekweazu, Adelowo, Aghado
|
Task Choice | 2019 | View | First Tasks: an Activity to Help Students Understand Themselves and How to Improve Team Management in Information Systems Projects |
Thomas
|
task value | 2017 | View | A Predictive Study of Learners’ Perceived Performance in Higher Education Online Learning Environments |
Alanazi, Niileksela, Lee, Frey, Nong
|
Task-Value | 2021 | View | The Role of Task Value and Online Learning Strategies in an Introductory Computer Programming Course |
Menon
|
Taxonomies | 2019 | View | eXtensible Computing Curriculum Reporting Language (XCCRL) |
Babb, Sharp, Waguespack, Abdullat, Dana
|
Teaching | 2024 | View | Preparing Posthumanist Perspectives on AI-Human Collaboration in Developing Cyber Ethics Curricula |
Straight, Lowery, Poehlman, Yowika
|
Teaching | 2023 | View | Cheating Better with ChatGPT: A Framework for Teaching Students When to Use ChatGPT and other Generative AI Bots
|
Firth, Derendinger, Triche
|
Teaching | 2020 | View | An Investigation On Student Perceptions of Self-Regulated Learning In An Introductory Computer Programming Course. |
Menon
|
Teaching | 2020 | View | Changeover From Professor to Professor Emerita: Challenges and Opportunities |
Duncan
|
Teaching | 2016 | View | Expanding the Classroom: Twitter as a Teaching and Learning Enhancement Tool |
Mangle
|
Teaching Activity | 2019 | View | First Tasks: an Activity to Help Students Understand Themselves and How to Improve Team Management in Information Systems Projects |
Thomas
|
Teaching case | 2024 | View | Countering the “Plagiarism Slot Machine”: Protecting Creators and Businesses from AI Copyright Infringement
|
Ladwig, Schwieger, Mitra
|
Teaching case | 2024 | View | Exploring Signals Hacking with Flipper Zero (FZ) |
Vega, Velez, Stoker
|
Teaching case | 2024 | View | Kibbles & Bytes: Developing a Database for an Animal Shelter Silent Auction |
Schwieger
|
Teaching case | 2024 | View | Online Maps and Route-Finding – Lots of Ways to Fail, Yet Still a Great Success!
|
Witman, Prior, Nickl, Njunge, Ngetich, Chaudhry
|
Teaching case | 2024 | View | Teaching Case: A Business Intelligence Class Project Combining Business Knowledge, Critical Thinking, and Story-Telling for an Online Retail Store
|
Triche, McDiffett, Firth, Clouse
|
Teaching case | 2023 | View | A Comparative Analysis of Large Language Models for Writing Teaching Cases |
Lang, Triantoro, Sharp
|
Teaching case | 2022 | View | A Teaching Case: A Seminar Course in Accessible Computing |
Siegfried, Leune
|
Teaching case | 2017 | View | Data Analytics Projects with Microsoft Excel |
Harris
|
Teaching case | 2015 | View | Information Security Breaches: |
Parks, Adams
|
Teaching case | 2015 | View | Scholar’s Academy Cafeteria Database: A Teaching Case Study |
Parks, Hall
|
teaching cases | 2022 | View | Integrating IS2020 Elective Competencies in Data and Information Courses |
Leidig
|
teaching digital literacy | 2017 | View | Revisiting an Introductory Computer Information Systems Course: An Update to Course Topics and Incorporation of Project-Based Learning |
Cellante, Pinchot
|
Teaching Environment | 2021 | View | A TA-Like Chatbot Application: ATOB |
Chuaphan, Yoon, Chung
|
Teaching Experience | 2019 | View | Cognitive Apprenticeship: Teaching Students How to Think Like an Expert |
Gomillion, George, Scialdone, Becker
|
Teaching extreme events | 2023 | View | WWC: Leveraging Extreme Events in Teaching |
George, Aasi
|
Teaching framework | 2021 | View | An Agile Framework for Teaching with Scrum in the IT Project Management Classroom ** Best JISE Paper (2020) |
Rush, Connolly
|
teaching lab | 2017 | View | The Enhanced Virtual Laboratory: Extending Cyber Security Awareness through a Web-based Laboratory
|
Black, Chapman, Clark
|
teaching material | 2017 | View | Server on a USB Port:
A custom environment for teaching systems administration using the Raspberry Pi Zero |
Black, Green
|
Teaching Methodologies | 2016 | View | Expanding the Classroom: Twitter as a Teaching and Learning Enhancement Tool |
Mangle
|
Teaching Naked | 2015 | View | Maximizing Classroom Interaction by Presenting Course Content with Video Podcasts |
Clouse, Clouse, Lawrence
|
Teaching Pedagogy | 2015 | View | Protecting Privacy in Big Data: A Layered Approach for Curriculum Integration |
Schwieger, Ladwig
|
Teaching resources | 2017 | View | Motivating Students through Educational Software Development |
Felice, Mauco, Leonardi
|
Teaching Strategies | 2023 | View | An Eye Toward the Softer Side of CC2020 Computing Curricula: Professional, Legal, and Ethical Artificial Intelligence Issues |
Ladwig, Schwieger
|
Teaching Strategies | 2021 | View | Incorporating Risk Management and Cyber Insurance Concepts in the MIS and Business Curriculum
|
Schwieger, Ladwig
|
Teaching Strategies | 2017 | View | Reaching and Retaining the Next Generation: Adapting to the Expectations of Gen Z in the Classroom |
Schwieger, Ladwig
|
Teaching tip | 2023 | View | Educating the Next Generation of CSOs: An Exercise in Conversational Role Play with ChatGPT |
Mitra, Schwieger, Roy
|
Team building | 2023 | View | Preparing for Success in CCDC: Observations by a Competitor Turned Coach |
Welu
|
team-based learning | 2022 | View | Project Failure 'not an option' with Active, Team-Based Learning |
Landry
|
team-based learning | 2016 | View | A mindful approach to teaching |
Cotler, DiTursi, Goldstein, Yates, Del Belso
|
team-based learning | 2015 | View | Agile Preparation Within a Traditional Project Management Course |
Landry, McDaniel
|
team-based learning | 2015 | View | Evaluating the Effectiveness of Student Group Work for Mobile Application Development Learning, Productivity, Enjoyment and Confidence in Quality |
Powell, Wimmer
|
Teamwork | 2020 | View | Student Group Satisfaction Perceptions using Agile in a Project-Based Course |
Hulshult
|
Teamwork | 2019 | View | First Tasks: an Activity to Help Students Understand Themselves and How to Improve Team Management in Information Systems Projects |
Thomas
|
Teamwork | 2019 | View | Students’ Perceptions of Challenges and Solutions to Face-to-Face and Online Group Work |
Bakir, Humpherys, Dana
|
Tech Savvy | 2015 | View | Acclimating Students to Technology |
Frydenberg, VanderClock
|
Technical Skills | 2024 | View | Career Readiness of Recent Graduates in the Era of Digital Transformation: Insights from Multi-Level Focus Groups |
Kim, Jones, Lang, Raider, Sheikh, Simione
|
Technical Skills | 2018 | View | Information System Curriculum versus Employer Needs: A Gap Analysis |
Leonard, Jones, Lang
|
Technical Skills | 2015 | View | A Topic Analysis of ISECON Conference Proceedings from 1982 through 2014 |
Clark, Athey, Plotnicki, Barnes
|
Technical Writing | 2015 | View | Single Sourcing, Boilerplates, and Re-Purposing: Plagiarism and Technical Writing |
Louch
|
Technology | 2024 | View | Emergent Technologies Production in the US: Exploratory Analysis of Motivations and Adverse Factors |
Toskin, Jocic
|
Technology | 2023 | View | Investigating How Technical Acumen and Student Grit Affect the Performance of Students in Online Learning Environments |
Johnson, Brown, Kelly, Romero
|
Technology | 2017 | View | Diversity in Information Systems: Increasing Opportunities in STEM for Capable Students with Developmental and Intellectual Disabilities |
Lawler, Joseph, Greene
|
Technology | 2016 | View | Developing and Hosting Multimedia Instructional Modules in the Cloud |
Ganesan
|
Technology Acceptance Model | 2024 | View | Investigating the Potential of Virtual Reality
Medium for Collaborative Work: Results from a Series of Pilot Studies
|
Javadi, Gebauer, Jung
|
Technology acceptance model (TAM) | 2024 | View | Education Impact on Trust in Election Technology & Security: Research Proposal |
White, Long
|
Technology acceptance model (TAM) | 2016 | View | Parental Perceptions and Recommendations of Computing Majors: A Technology Acceptance Model Approach |
Powell, Wimmer
|
Technology adoption | 2024 | View | Fear and Loathing in Self Driving Cars |
Reinicke, Spencer
|
Technology adoption | 2024 | View | Future Workforce Evolution - Impact of Artificial Intelligence Across Industries
|
Satpathy, Balachander
|
Technology adoption | 2024 | View | Navigating the AI Landscape: An Analysis of AI Developer Tools Usage, Sentiment, and Trust Among IT Professionals |
Ceccucci, Peslak, Jones
|
Technology adoption | 2024 | View | The Rapid Rise of Generative AI Adoption among College Students
|
Frydenberg, Mentzer, Patterson
|
Technology career | 2023 | View | The Perceptions of Undergraduate Students Associated with a Career in Technology – An Analysis by Academic Year |
Sousa
|
technology change | 2019 | View | Encouraging Lifelong Learning through Tech Explorations |
Marquardson
|
technology integration barriers | 2024 | View | Phenomenological study of Generative AI in Higher Education as Perceived by Academics
|
Linden, Yuan, Mendoza
|
technology issues mediation | 2023 | View | University Student Place Attachment during the Pandemic |
Clouse, Triche, Firth
|
Technology Job Requirements | 2019 | View | Developing an Electronic Resume Analyzer Portal (e-RAP): A Natural Language Processing Approach to Enhance College Graduates Job Readiness |
Green, Liu, Murphy
|
Technology Literacy | 2015 | View | Acclimating Students to Technology |
Frydenberg, VanderClock
|
technology pedagogy | 2019 | View | Experiential Learning in the Technology Disciplines |
Sendall, Stuetzle, Kissel, Hameed
|
Technology Threat Avoidance Theory | 2023 | View | U.S. Healthcare System’s Electronic Health Records Security Threat Avoidance |
Woldeyohannis, Lind
|
technology to enhance student engagement | 2015 | View | Facebook's Impact on Higher Education Classes: An Empirical Study |
Duncan , Barczyk
|
Technology-Savvy Managers | 2024 | View | Training Data-Savvy Managers: An Analysis of Graduate Business Analytics Programs |
Nosrati, Burns, Gao, Sherman
|
Telemedicine | 2024 | View | Predictive Analysis of Patients’ Telemedicine Adoption in the Nashville Metropolitan Area – An Application of UTAUT Model
|
Vegi, Lind
|
Tenure and Promotion | 2020 | View | Development of a Flexible Point-based Promotion and Tenure Document in the Age of Societal Uncertainty |
Schwieger, Dickson, Johnston, McMillan, Stovall
|
term frequency | 2023 | View | Using Textual Analytics to Process Information Overload of Cyber Security Subreddits |
Omakwu , Wimmer, Rebman Jr.
|
term frequency | 2016 | View | Analysis of Student Web Queries |
Jadav, Burke, Dhiman, Kollmer, Tappert
|
term map | 2024 | View | Twenty-Two Years of the Information Systems Education Journal: A Co-occurrence Analysis |
Sharp, Anderson, Lang
|
Test 1 | 2019 | View | A Neural Networks Primer For USMA Cadets |
Alhajjar
|
test-difficulty | 2018 | View | Partial Credit on Multiple-choice Exams: Does It Help or Hurt Students? |
Moss, Matta, Frost, Chimeli
|
testing frequency | 2016 | View | Testing Frequency in an Introductory Computer Programming Course |
Adkins, Linville
|
Text Analytics | 2024 | View | Training a large language model to code qualitative research data: Results from discussions of ethical issues |
Simmonds, Haines
|
Text Analytics | 2023 | View | Using Textual Analytics to Process Information Overload of Cyber Security Subreddits |
Omakwu , Wimmer, Rebman Jr.
|
Text Mining | 2016 | View | An Approach to Harvesting, Cleaning, and Analyzing Data from Twitter Using R |
Hill, Scott
|
Text Summarization | 2024 | View | A Comparison of Large Language Models for Oncology Clinical Text Summarization |
Izuchukwu , Wimmer, Rebman Jr.
|
text tutorial | 2015 | View | The Relative Efficacy of Video and Text Tutorials in Online Computing Education |
Lang
|
Textbook | 2021 | View | The Introduction to Information Systems Course: A Topical Examination |
Slonka, Bhatnagar
|
textbook pricing | 2016 | View | Navigating the Minefield of Self-Publishing E-Textbooks |
Schultz
|
Textbooks | 2016 | View | Java vs. Python Coverage of Introductory Programming Concepts: A Textbook Analysis |
McMaster, Sambasivam, Rague, Wolthuis
|
Textbooks | 2016 | View | Navigating the Minefield of Self-Publishing E-Textbooks |
Schultz
|
The Academic Workplace | 2018 | View | Navigating the Academic “White Water”:
Strategic Issues for Computer Information Systems Education
|
Saulnier
|
thematic analysis | 2023 | View | What’s in a name? Student preferences for cybersecurity-related major titles
|
Draus, Mishra, Slonka, Bromall
|
Theory of planned behavior | 2018 | View | Connecting the Dots: Strategies to Recruit Computer Information Systems Students |
Leon, Xiong
|
Theory of planned behavior | 2015 | View | Salient Beliefs in Majoring in Management Information Systems: An Elicitation Study |
Chipidza, Green, Riemenschneider
|
Theory of reasoned action | 2016 | View | Why Women Choose to Not Major in Information Systems |
Hodges, Corley
|
third person | 2015 | View | Writing in the First Person for Academic and Research Publication |
Shelton
|
Third-party Code Security | 2024 | View | Teaching Software Supply Chain Security |
Li, Yuan, Garcia
|
Thriving Systems Theory | 2015 | View | IS Design Pedagogy: A Special Ontology and Prospects for Curricula |
Waguespack
|
TikTok | 2024 | View | Problematic Smartphone Usage in the TikTok era |
Firth, Johnson, Clouse, Akello
|
TikTok | 2023 | View | Introduction to the ScrimmageSIM Business Simulation: A Hands-on Experience. |
Wagner
|
TikTok | 2023 | View | Social Media Users Only Have Two Clusters: A United States Analysis |
Peslak, Kovalchick, Menon
|
TikTok | 2023 | View | TikTok & The Art of War: A Qualitative Analysis of US Strategic Maneuvering Against Chinese Social Media Company ByteDance |
Pendergrass
|
time management | 2020 | View | Effects of Teaching and Practice of Time Management Skills on Academic Performance in Computer Information Systems Courses |
Humpherys, Lazrig
|
Time to Degree | 2018 | View | Interim Awardee Outcomes after Four Years of a STEM Scholarship Program |
Sorkin, Braman, Yancy
|
Time to Degree | 2017 | View | Long-term Follow-up of STEM Scholarship Students to Degree Attainment |
Sorkin
|
TPACK Model | 2023 | View | Living in the Metaverse:
A Multidisciplinary Course Design and Pedagogy
|
Frydenberg, Yates, Noonan
|
Tracer FIRE | 2020 | View | Novice Cybersecurity Students Encounter TracerFIRE: An Experience Report |
Frost, Stoker
|
Trade Secrets | 2016 | View | The Piranha Solution: Monitoring and |
Ladwig, Schwieger, Clayton
|
Training | 2018 | View | Simulation for Network Education: Transferring Networking Skills Between Simulated to Physical Environments |
Marquardson, Gomillion
|
Training | 2017 | View | The Need to Teach Root Cause Analysis in an Information Security course |
White, Shah
|
Training | 2016 | View | Designing Effective Excel Training Courses for Organizations using the Corporate University Model |
Podeschi
|
training model | 2023 | View | A Pragmatic Approach to Investigating the Digital Existence of Food Bank Users
|
Dalat Ward, Ward, Lester
|
transfer rate | 2018 | View | Interim Awardee Outcomes after Four Years of a STEM Scholarship Program |
Sorkin, Braman, Yancy
|
transfer rate | 2017 | View | Long-term Follow-up of STEM Scholarship Students to Degree Attainment |
Sorkin
|
transfer students | 2019 | View | CIS Cyber Scholars: An NSF Funded Initiative to Broaden Participation of Community College Transfer Students in Computer and IT Careers. |
Igoche, Paullet, Bromall
|
transformative learning | 2020 | View | Reflections from Recent Graduates on a Computer Information Systems Culminating Experience |
Yates, Waguespack, Babb
|
transformer model | 2024 | View | Training a large language model to code qualitative research data: Results from discussions of ethical issues |
Simmonds, Haines
|
Transportation | 2019 | View | Using an Ocean Shipping Game to Teach Transportation Fundamentals to Supply Chain Management Students
|
Scott, Rutner
|
Transportation Patterns | 2024 | View | Assessing the Transformative Influence of Ride-Hailing Applications on Urban Mobility Patterns |
Hossain, Dwyer
|
Trends | 2015 | View | A Topic Analysis of ISECON Conference Proceedings from 1982 through 2014 |
Clark, Athey, Plotnicki, Barnes
|
Trust | 2024 | View | A Proposed Study of Factors Moderating Degree of Trust in LLM and ChatGPT-like Outputs |
Money, Thanetsunthorn
|
TTF | 2017 | View | A Predictive Study of Learners’ Perceived Performance in Higher Education Online Learning Environments |
Alanazi, Niileksela, Lee, Frey, Nong
|
Turnover | 2024 | View | Using Topic Modeling to Discover Reasons for Employee Attrition
|
Lee, Algarra
|
tutorial format | 2015 | View | The Relative Efficacy of Video and Text Tutorials in Online Computing Education |
Lang
|
tutoring | 2024 | View | A Framework to Conduct a National Level Survey Pertaining to Interventions at Universities to Lower the DFW Rates of Entry-Level Coding Courses |
Freburg, Thomas
|
Twitter | 2016 | View | Expanding the Classroom: Twitter as a Teaching and Learning Enhancement Tool |
Mangle
|
Typeface persona | 2024 | View | Understanding the Influence of Typeface Design on Student Engagement in the Online Classroom |
Louch, Ferguson, Bhatnagar
|
typographic design | 2024 | View | Understanding the Influence of Typeface Design on Student Engagement in the Online Classroom |
Louch, Ferguson, Bhatnagar
|
typology | 2021 | View | Preparing for the Future of Work: Towards a Typology of Digital Skills Initiatives |
Lang, Triantoro
|