Publication Date
| In 2015 | 0 |
| Since 2014 | 5 |
| Since 2011 (last 5 years) | 19 |
| Since 2006 (last 10 years) | 47 |
| Since 1996 (last 20 years) | 47 |
Descriptor
Source
| Journal of Information… | 47 |
Author
| Aasheim, Cheryl L. | 1 |
| Akbulut-Bailey, Asli | 1 |
| Alshare, Khaled A. | 1 |
| Bai, Xue | 1 |
| Baird, Aaron | 1 |
| Ballou, Deborah J. | 1 |
| Benander, Alan C. | 1 |
| Benander, Barbara A. | 1 |
| Bunch, John M. | 1 |
| Cao, Qidong | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 47 |
| Reports - Research | 30 |
| Reports - Evaluative | 10 |
| Reports - Descriptive | 7 |
| Tests/Questionnaires | 3 |
Education Level
| Higher Education | 45 |
| Postsecondary Education | 36 |
| Two Year Colleges | 2 |
Showing 1 to 15 of 47 results
He, Wu; Yen, Cherng-Jyh – Journal of Information Systems Education, 2014
More and more information technology (IT) programs are offering distance learning courses to their students. However, to date, there are a very limited number of published articles in the IT education literature that compare how different methods of delivering distance course relate to undergraduate students' learning outcomes in IT software…
Descriptors: Programming, Computer Software, Computer Science Education, Participant Satisfaction
Isaias, Pedro; Issa, Tomayess; Pena, Nuno – Journal of Information Systems Education, 2014
When developing and working with various types of devices from a supercomputer to an iPod Mini, it is essential to consider the issues of Human Computer Interaction (HCI) and Usability. Developers and designers must incorporate HCI, Usability and user satisfaction in their design plans to ensure that systems are easy to learn, effective,…
Descriptors: Thinking Skills, Information Systems, Skill Development, Units of Study
Paullet, Karen; Pinchot, Jamie – Journal of Information Systems Education, 2014
This exploratory study of 168 undergraduate students examined the perceptions of college students about cyberbullying. The study focused on students' knowledge of the topic, opinions about cyberbullying, and personal experiences they may have had as either a victim or a witness of cyberbullying. Reporting of cyberbullying incidents was also…
Descriptors: College Students, Bullying, Information Security, Undergraduate Students
Rivituso, Jack – Journal of Information Systems Education, 2014
This interpretive phenomenological analysis explored the lived experiences and the psychological impact of victimization from cyberbullying among college students. Two theories, Bandura's Theory of Triadic Reciprocal Determinism and the General Strain Theory, guided the primary research questions used for this exploration. Each of these…
Descriptors: Internet, Bullying, Victims, Phenomenology
Mok, Heng Ngee – Journal of Information Systems Education, 2014
The flipped classroom has been gaining popularity in recent years. In theory, flipping the classroom appears sound: passive learning activities such as unidirectional lectures are pushed to outside class hours in the form of videos, and precious class time is spent on active learning activities. Yet the courses for information systems (IS)…
Descriptors: Teaching Methods, Video Technology, Active Learning, Homework
Dunaway, Mary M. – Journal of Information Systems Education, 2013
In university settings, dysfunction in teamwork often challenges problem-based learning in IS projects. Researchers of IS Education have largely overlooked Team Emotional Intelligence (TEI), which offers a collective cognitive skill that may benefit the student learning experience. Hypothesized are four dimensions of emotional intelligence (EI)…
Descriptors: College Students, Teamwork, Emotional Intelligence, Gender Differences
Simkin, Mark G. – Journal of Information Systems Education, 2013
Playing TV game shows such as "Jeopardy" or "Survivor" in the classroom can be fun. But does it improve student understanding of course concepts? To find out, the author conducted eight experimental trials in five separate undergraduate information systems classes. Although he found limited improvement in student learning, the…
Descriptors: Teaching Methods, Educational Games, Concept Formation, Instructional Effectiveness
Ilvonen, Ilona – Journal of Information Systems Education, 2013
Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…
Descriptors: Information Security, Teaching Methods, Course Evaluation, Student Attitudes
Whelan, Eoin; Firth, David – Journal of Information Systems Education, 2012
A significant challenge facing the IS discipline worldwide is the reversal of the low numbers of students currently enrolling in IS courses. While there is a growing body of literature which offers various insights into the IS enrollment crisis, almost all of this work is either from U.S. scholars or based on findings from U.S. universities. This…
Descriptors: Introductory Courses, Educational Change, Futures (of Society), Business Administration Education
Dalal, Nikunj – Journal of Information Systems Education, 2012
We describe the use of rapid game prototyping as a pedagogic technique to experientially explore and learn requirements discovery, modeling, and specification in systems analysis and design courses. Students have a natural interest in gaming that transcends age, gender, and background. Rapid digital game creation is used to build computer games…
Descriptors: Teaching Methods, Systems Analysis, Design, Computer Games
Baird, Aaron; Riggins, Frederick J. – Journal of Information Systems Education, 2012
An increasing number of information systems projects in industry are managed using hybrid project management methodologies, but this shift in project management methods is not fully represented in our CIS curriculums. CIS capstone courses often include an applied project that is managed with traditional project management methods (plan first,…
Descriptors: Best Practices, Student Projects, Information Systems, Program Administration
Akbulut-Bailey, Asli – Journal of Information Systems Education, 2012
Over the last decade, enrollment in Information Systems (IS) and related programs has dropped worldwide and still remains low despite positive job market predictions. Given the significant negative consequences of low enrollments on both academia and industry, the IS community has focused its efforts on mechanisms to increase enrollments. This…
Descriptors: Self Efficacy, Student Attitudes, Information Systems, Labor Market
Aasheim, Cheryl L.; Rutner, Paige S.; Li, Lixin; Williams, Susan R. – Journal of Information Systems Education, 2012
This paper examines student attitudes towards a number of behaviors which range from acceptable means of seeking help on assignments to unacceptable behaviors such as copying from another student or paying someone to complete an assignment. Attitudes regarding such behaviors are compared based on the type of assignment (programming assignment,…
Descriptors: Internet, Feedback (Response), Information Systems, Student Surveys
Dishaw, Mark; Eierman, Michael A.; Iversen, Jakob H.; Philip, George C. – Journal of Information Systems Education, 2011
Businesses and other organizations are relying increasingly on virtual teams to perform a range of business activities. A key challenge in utilizing virtual teams is to support collaboration among team members who are separated by distance and/or time. In this paper we use a research model based on a combination of the Technology Acceptance Model…
Descriptors: Information Systems, Electronic Mail, Computer Software Evaluation, Computer Software
Costain, Gay; McKenna, Brad – Journal of Information Systems Education, 2011
This paper describes a role-play exercise used in a second-year tertiary Systems Analysis and Design course, and the quantitative and qualitative analysis of the students' responses to a survey that solicited their perceptions of that role-play experience. The role-play involved students in eliciting user requirements from customers during a Joint…
Descriptors: Student Attitudes, Systems Analysis, Experiential Learning, Role Playing

Peer reviewed
Direct link
