NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 465 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Luce, Thom – Information Systems Education Journal, 2020
This paper reviews the evolution of a senior level, live-client project development capstone class in the Analytics and Information Systems department of an AACSB accredited College of Business. The paper traces changes in methodologies and technologies leading to the current Scrum based approach, using ASP.NET Model-View-Controller, MVC, as the…
Descriptors: Capstone Experiences, College Seniors, Information Systems, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Clark, Ulku; Stoker, Geoff; Vetter, Ron – Information Systems Education Journal, 2020
The rising number and cost of cybersecurity attacks justifies continued strong interest in the National Security Agency (NSA) and Department of Homeland Security (DHS) jointly sponsored program for National Centers of Academic Excellence in Cyber Defense (CAE-CD). After briefly outlining the current state of the cybersecurity challenge, this…
Descriptors: Educational Change, Information Security, Public Agencies, National Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hulshult, Andrea; Woods, David M. – Information Systems Education Journal, 2020
Agile is emerging as a new paradigm for organizations across a variety of industry sectors because Agile helps teams manage and adapt quickly to change. In order to provide our students with workforce ready skills and better performance in group projects, a regional campus Computer and Information Technology (CIT) department began implementing…
Descriptors: Information Technology, Educational Technology, Technology Uses in Education, Teamwork
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bhatnagar, Neelima; Pry, Michael – Information Systems Education Journal, 2020
This paper describes a study designed to collect student perceptions of personal social media risks and their knowledge of the use of privacy and security settings in social media applications. A paper-based survey was administered to 107 students at a regional campus of a major university in western Pennsylvania, representing 10 classes and 18…
Descriptors: Undergraduate Students, Student Attitudes, Privacy, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim; Elnoshokaty, Ahmed – Information Systems Education Journal, 2020
People starting cybersecurity careers have three main avenues for achieving entry-level job qualifications: learning in-demand skills, earning industry certifications, and graduating with a college degree. Though people can pursue skills, certificates, and degrees together, financial and time constraints often make people focus their efforts to…
Descriptors: Information Security, Computer Security, Employment Opportunities, Employment Qualifications
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Whitney, Michael – Information Systems Education Journal, 2020
Curb cuts and automatic doors are a commonplace in the physical world as they provide access to our buildings for persons with disabilities. In the world of the web, millions of individuals have the legal right to rely on electronic curb cuts so they too can access the web. To this end, a new generation of information systems graduates must…
Descriptors: Accessibility (for Disabled), Design, Web Sites, College Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ward, Yaprak Dalat; Ward, James G.; Lester, Li-Jen; Tao, Minghao – Information Systems Education Journal, 2019
This study explored the use of a web-based tool, VoiceThread, as it relates to enhancing active learning and learner engagement in two online business courses. VoiceThread was integrated into various learner-centered activities supporting learner-learner, learner-content and learner-instructor interactions as part of an online course improvement…
Descriptors: College Students, Business Administration Education, Online Courses, Educational Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Adkins, Joni K.; Tu, Cindy – Information Systems Education Journal, 2019
This paper outlines the content of a Master of Science in Information System degree and the development and deployment of the first two iterations of the capstone course. Research shows that a capstone course can be valuable for both students and future employers. The steps taken to prepare for the course and set up the capstone course are…
Descriptors: Masters Programs, Graduate Students, Information Science Education, Capstone Experiences
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Leon, Steven; Xiong, Jason – Information Systems Education Journal, 2019
Business school students in Computer Information Systems (CIS) majors are empowered to meet the demands of Information Technology with both technical skills and business expertise. Competition from other college majors makes recruiting CIS majors in business schools challenging. This research improves the effectiveness of CIS recruitment programs…
Descriptors: College Students, Student Recruitment, Information Systems, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sharp, Jason H. – Information Systems Education Journal, 2019
With the recent renewed interest in programming, online learning environments like Codecademy have become quite popular, boasting some 25 million members worldwide. The purpose of this paper is to describe the author's experience using Codecademy Interactive Lessons as an instructional supplement in an introductory Python programming course. The…
Descriptors: Programming Languages, Teaching Methods, Outcomes of Education, Introductory Courses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brown, Randy – Information Systems Education Journal, 2019
Information Security has been a challenge since humans began keeping information. With the advent of computerized data and computer networks, that challenge has increased dramatically. Not only are more breaches occurring, but public knowledge about those breaches is now commonplace adding to virtual hysteria concerning data and information…
Descriptors: Computer Security, Information Security, Professional Personnel, Specialists
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Javadi, Elahe; Gebauer, Judith; Novotny, Nancy L. – Information Systems Education Journal, 2019
Upward and downward social comparison mechanisms may positively affect student performance in course-related work. However, research is not conclusive about whether the negative effects that can also be caused by comparison outweigh the benefits. In this research project, we combined social comparison with detailed informational feedback on a…
Descriptors: Feedback (Response), Computer Mediated Communication, Goal Orientation, Concept Formation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sorkin, Sylvia; Braman, James; Yancy, Barbara – Information Systems Education Journal, 2019
This paper describes the results of a four-year follow-up of need-based scholarship awardees at a community college as they made progress toward their goal of associate's degrees and/or bachelor's degrees in Science, Technology, Engineering, and Mathematics (STEM) fields. From 2014 through 2018, through National Science Foundation funding,…
Descriptors: Undergraduate Students, STEM Education, Scholarships, Community Colleges
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim; Gomillion, David L. – Information Systems Education Journal, 2019
Simulated environments can provide a convenient, effective way to teach skills. Simulations have been used for decades to teach skills such as piloting aircraft. As technology has improved, it has become feasible to simulate many other tasks. Recent advances in virtual and augmented reality provide new avenues for expanding training using…
Descriptors: Computer Simulation, Teaching Methods, Transfer of Training, Introductory Courses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lester, Li-Jen; Dalat-Ward, Yaprak – Information Systems Education Journal, 2019
Cyberethics in IT remains a hot-button issue for higher education institutions and governments worldwide as high numbers of violations continue to surface globally. Since unethical behavior in IT knows no boundaries and college students are a growing portion of the population of cybercitizens studies in cyberethics is a necessity. By reinforcing…
Descriptors: Professionalism, Ethics, Information Technology, College Students
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  31