Publication Date
In 2024 | 0 |
Since 2023 | 0 |
Since 2020 (last 5 years) | 0 |
Since 2015 (last 10 years) | 1 |
Since 2005 (last 20 years) | 8 |
Descriptor
Source
Journal of Information… | 8 |
Author
Ali, Azad | 1 |
Bruno, Vince | 1 |
Cheong, Christopher | 1 |
Cheong, France | 1 |
Day, David J. | 1 |
Edgington, Theresa M. | 1 |
Lallie, Harjinder Singh | 1 |
Lawson, Phillip | 1 |
Li, Chengcheng | 1 |
Miliszewska, Iwona | 1 |
Panovics, Janos | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Descriptive | 8 |
Education Level
Higher Education | 8 |
Postsecondary Education | 8 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Ali, Azad; Smith, David – Journal of Information Technology Education: Innovations in Practice, 2014
A department of computer science (CS) has faced a peculiar situation regarding their selection of introductory programming course. This course is a required course for the students enrolled in the CS program and is a prerequisite to their other advanced programming courses. At the same time, the course can be considered a general education course…
Descriptors: Introductory Courses, Programming, Computer Science Education, General Education
Venables, Anne; Tan, Grace; Miliszewska, Iwona – Journal of Information Technology Education: Innovations in Practice, 2013
To succeed within the increasingly global context of their work environment, today's IT professional needs to be equipped with both cutting-edge technical skills and a strong repertoire of "soft" skills. An important and often unrecognized soft skill is an appreciation of how various IT issues impact upon different peoples and what…
Descriptors: Foreign Countries, Cultural Awareness, Information Technology, Computer Science Education
Cheong, Christopher; Bruno, Vince; Cheong, France – Journal of Information Technology Education: Innovations in Practice, 2012
An important aspect of education is to promote higher-order thinking skills to learners. However, in the lecture environment, learners are passively engaged and it is unlikely for higher-order thinking to occur. Although interventions such as "clickers" can be used to increase engagement in lectures, this does not necessarily promote…
Descriptors: Foreign Countries, Instructional Design, Handheld Devices, Computer Software
Vedder, Richard G. – Journal of Information Technology Education: Innovations in Practice, 2012
In October 2012, Microsoft will release the commercial version of its next operating system, presently called "Windows 8." This version represents a significant departure from the past. Microsoft wants this operating system to meet user needs regardless of physical platform (e.g., desktop, notebook, tablet, mobile phone). As part of this mission,…
Descriptors: Computer Interfaces, Information Technology, Internet, Vendors
Panovics, Janos – Journal of Information Technology Education: Innovations in Practice, 2012
The theory and practice of search algorithms related to state-space represented problems form the major part of the introductory course of Artificial Intelligence at most of the universities and colleges offering a degree in the area of computer science. Students usually meet these algorithms only in some imperative or object-oriented language…
Descriptors: Foreign Countries, Programming, Artificial Intelligence, Programming Languages
Edgington, Theresa M. – Journal of Information Technology Education: Innovations in Practice, 2011
Text analytics refers to the process of analyzing unstructured data from documented sources, including open-ended surveys, blogs, and other types of web dialog. Text analytics has enveloped the concept of text mining, an analysis approach influenced heavily from data mining. While text mining has been covered extensively in various computer…
Descriptors: Feedback (Response), Constructivism (Learning), Web Sites, Class Activities
Lallie, Harjinder Singh; Lawson, Phillip; Day, David J. – Journal of Information Technology Education: Innovations in Practice, 2011
Identifying academic misdemeanours and actual applied effort in student assessments involving practical work can be problematic. For instance, it can be difficult to assess the actual effort that a student applied, the sequence and method applied, and whether there was any form of collusion or collaboration. In this paper we propose a system of…
Descriptors: Foreign Countries, Evidence, Computer Software, Academic Achievement