Publication Date
| In 2015 | 0 |
| Since 2014 | 4 |
| Since 2011 (last 5 years) | 42 |
| Since 2006 (last 10 years) | 100 |
| Since 1996 (last 20 years) | 100 |
Descriptor
Source
| Journal of Information… | 100 |
Author
| Vartiainen, Tero | 3 |
| Siponen, Mikko | 2 |
| Stafford, Thomas F. | 2 |
| Totaro, Michael W. | 2 |
| Yue, Kwok-Bun | 2 |
| Aasheim, Cheryl L. | 1 |
| Akbulut-Bailey, Asli | 1 |
| Albrecht, Conan C. | 1 |
| Alrushiedat, Nimer | 1 |
| Apigian, Charles H. | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 100 |
| Reports - Research | 100 |
| Tests/Questionnaires | 3 |
Education Level
| Higher Education | 92 |
| Postsecondary Education | 61 |
| Adult Education | 1 |
| High Schools | 1 |
| Two Year Colleges | 1 |
Audience
| Teachers | 6 |
Showing 1 to 15 of 100 results
He, Wu; Yen, Cherng-Jyh – Journal of Information Systems Education, 2014
More and more information technology (IT) programs are offering distance learning courses to their students. However, to date, there are a very limited number of published articles in the IT education literature that compare how different methods of delivering distance course relate to undergraduate students' learning outcomes in IT software…
Descriptors: Programming, Computer Software, Computer Science Education, Participant Satisfaction
Isaias, Pedro; Issa, Tomayess; Pena, Nuno – Journal of Information Systems Education, 2014
When developing and working with various types of devices from a supercomputer to an iPod Mini, it is essential to consider the issues of Human Computer Interaction (HCI) and Usability. Developers and designers must incorporate HCI, Usability and user satisfaction in their design plans to ensure that systems are easy to learn, effective,…
Descriptors: Thinking Skills, Information Systems, Skill Development, Units of Study
Paullet, Karen; Pinchot, Jamie – Journal of Information Systems Education, 2014
This exploratory study of 168 undergraduate students examined the perceptions of college students about cyberbullying. The study focused on students' knowledge of the topic, opinions about cyberbullying, and personal experiences they may have had as either a victim or a witness of cyberbullying. Reporting of cyberbullying incidents was also…
Descriptors: College Students, Bullying, Information Security, Undergraduate Students
Rivituso, Jack – Journal of Information Systems Education, 2014
This interpretive phenomenological analysis explored the lived experiences and the psychological impact of victimization from cyberbullying among college students. Two theories, Bandura's Theory of Triadic Reciprocal Determinism and the General Strain Theory, guided the primary research questions used for this exploration. Each of these…
Descriptors: Internet, Bullying, Victims, Phenomenology
Dunaway, Mary M. – Journal of Information Systems Education, 2013
In university settings, dysfunction in teamwork often challenges problem-based learning in IS projects. Researchers of IS Education have largely overlooked Team Emotional Intelligence (TEI), which offers a collective cognitive skill that may benefit the student learning experience. Hypothesized are four dimensions of emotional intelligence (EI)…
Descriptors: College Students, Teamwork, Emotional Intelligence, Gender Differences
Dennis, Alan R.; Bhagwatwar, Akshay; Minas, Randall K. – Journal of Information Systems Education, 2013
The importance of testing, especially certification and high-stakes testing, has increased substantially over the past decade. Building on the "serious gaming" literature and the psychology "priming" literature, we developed a computer game designed to improve test-taking performance using psychological priming. The game primed…
Descriptors: Computer Games, Student Motivation, Test Wiseness, Academic Achievement
Chen, Liqiang – Journal of Information Systems Education, 2013
IT (Information Technology) entrepreneurs have been contributing greatly to economic growth and job creation. Despite its importance, IT entrepreneurship remains understudied in business research. Particularly, the study of IT entrepreneurial behavior has been ignored in both Information Systems (IS) and entrepreneurship disciplines. Utilizing the…
Descriptors: Information Technology, Entrepreneurship, Social Cognition, Career Choice
Braender, Lynn M.; Naples, Michele I. – Journal of Information Systems Education, 2013
Practitioners find it difficult to allocate grades to individual students based on their contributions to the team project. They often use classroom observation of teamwork and student peer evaluations to differentiate an individual's grade from the group's grade, which can be subjective and imprecise. We used objective data from student…
Descriptors: Undergraduate Students, Group Activities, Teamwork, Integrated Learning Systems
Yue, Kwok-Bun – Journal of Information Systems Education, 2013
A common problem for university relational database courses is to construct effective databases for instructions and assignments. Highly simplified "toy" databases are easily available for teaching, learning, and practicing. However, they do not reflect the complexity and practical considerations that students encounter in real-world…
Descriptors: Databases, Computer Science Education, Courses, College Instruction
Ractham, Peter; Chen, Charlie – Journal of Information Systems Education, 2013
Social technology is proliferating and influencing different aspects of society. However, very few studies have examined the use of such a technology for a case-based learning pedagogy. This preliminary study investigates the use of social technology as a case-based learning tool to improve the effectiveness of case-based learning in the…
Descriptors: Case Method (Teaching Technique), Educational Technology, Social Networks, College Students
Dekhane, Sonal; Xu, Xin; Tsoi, Mai Yin – Journal of Information Systems Education, 2013
This paper describes a project designed to promote problem solving and critical thinking skills in a general education, computing course at an open access institution. A visual programming tool, GameSalad, was used to enable students to create educational apps for mobile platforms. The students worked on a game development project for the entire…
Descriptors: Computer Oriented Programs, Telecommunications, Handheld Devices, Technology Uses in Education
Zhang, Sonya – Journal of Information Systems Education, 2013
The use of classroom blogs in higher education serves to engage and motivate students as well as to help them build a professional online profile and connect with fellow classmates. Although many studies have focused on the implementation and benefits of blogging in education, few have investigated best practices in design, which can have a…
Descriptors: Electronic Publishing, Web Sites, Student Journals, Success
Alrushiedat, Nimer; Olfman, Lorne – Journal of Information Systems Education, 2013
This research was conducted as a field experiment that explored the potential benefits of anchoring in asynchronous online discussions for business statistics classes required for information systems majors. These classes are usually taught using traditional methods with emphasis on lecturing, knowledge reproduction, and treatment of students as…
Descriptors: Blended Learning, Asynchronous Communication, Computer Uses in Education, Educational Technology
Zhang, Xihui; Zhang, Chi; Stafford, Thomas F.; Zhang, Ping – Journal of Information Systems Education, 2013
Introductory programming courses are typically required for undergraduate students majoring in Information Systems. Instructors use different approaches to teaching this course: some lecturing and assigning programming exercises, others only assigning programming exercises without lectures. This research compares the effects of these two teaching…
Descriptors: Information Science Education, Undergraduate Students, College Faculty, Introductory Courses
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary – Journal of Information Systems Education, 2012
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept…
Descriptors: Internet, Privacy, Computer Security, Information Security

Peer reviewed
Direct link
