Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 6 |
Descriptor
| Program Administration | 6 |
| Database Management Systems | 3 |
| Case Method (Teaching… | 2 |
| Databases | 2 |
| Emergency Programs | 2 |
| Information Security | 2 |
| Information Systems | 2 |
| Job Skills | 2 |
| Programming | 2 |
| Business | 1 |
| College Programs | 1 |
| More ▼ | |
Author
| Akujobi, Innocent | 1 |
| Christian, Nicholas | 1 |
| Faaizah Shahbodin | 1 |
| Fustos, Janos | 1 |
| Haga, Wayne | 1 |
| Jahari Abdul Wahab | 1 |
| Jones, Kiku | 1 |
| Korzaan, Melinda | 1 |
| Lang, Guido | 1 |
| Leonard, Lori N. K. | 1 |
| Maurer, Chris | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 5 |
| Reports - Research | 4 |
| Reports - Descriptive | 2 |
| Speeches/Meeting Papers | 1 |
Education Level
| Higher Education | 2 |
| Elementary Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Rosziati Ibrahim; Mizani Mohamad Madon; Zhiang Yue Lee; Piraviendran A/L Rajendran; Jahari Abdul Wahab; Faaizah Shahbodin – International Society for Technology, Education, and Science, 2023
This paper discusses the steps involve in project development for developing the mobile application, namely Blood Bank Application and developing the convertor for software testing. The project development is important for Computer Science students for them to learn the important steps in developing the application and testing the reliability of…
Descriptors: Program Administration, Educational Technology, Computer Software, Testing
Shields, Julie – Communique, 2018
While working in the Social and Emotional Support Services (SESS) for Montgomery County Public Schools in Maryland (MCPS), the author initiated a project to collect data on services to students with emotional needs. During the 2016-2017 school year, MCPS was the 17th largest school district in the country with nearly 160,000 students speaking 150…
Descriptors: Technology Uses in Education, Program Administration, Database Management Systems, Psychological Needs
Leonard, Lori N. K.; Jones, Kiku; Lang, Guido – Information Systems Education Journal, 2019
Information systems (IS) curriculum review is a continuous process. Universities seek to offer content that they believe will be most beneficial to students as they begin their career. However, that content may or may not satisfy employer needs. This paper, which is part of a larger study, seeks to determine if required course content matches the…
Descriptors: Information Systems, Employer Attitudes, Curriculum Evaluation, Education Work Relationship
Christian, Nicholas; Akujobi, Innocent; Saha, Munmun; Korzaan, Melinda – Information Systems Education Journal, 2018
Advanced Competition Simulations (ACS), a massive multiplayer online (MMO) strategy gaming company, has petabytes of customer data at their data center in Brentwood, Tennessee that could assist executives with decision making, but they currently do not have business intelligence software or a business intelligence and analytics (BIA) team. As is…
Descriptors: Computer Games, Computer Simulation, Business, Intelligence
Morris, Gerard; Fustos, Janos; Haga, Wayne – Information Systems Education Journal, 2018
One definition of a network administrator describes a person who works with computer infrastructures with an emphasis on networking. To determine the specific skills required of a network administrator by employers, data was collected from 698 nationwide job advertisements on Dice.com. The data collection focused on technical skills rather than…
Descriptors: Skill Analysis, Job Skills, Database Management Systems, Information Networks
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors

Peer reviewed
Direct link
