Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 12 |
Since 2006 (last 20 years) | 26 |
Descriptor
Source
Information Systems Education… | 26 |
Author
Baugh, Jeanne M. | 2 |
Frydenberg, Mark | 2 |
McMaster, Kirby | 2 |
Mentzer, Kevin | 2 |
Sambasivam, Samuel | 2 |
Schwieger, Dana | 2 |
Acharya, Sushil | 1 |
Anderson, Nicole | 1 |
Babb, Jeffry | 1 |
Baugh, Jeanne | 1 |
Colton, Don | 1 |
More ▼ |
Publication Type
Journal Articles | 26 |
Reports - Descriptive | 26 |
Tests/Questionnaires | 2 |
Guides - Classroom - Teacher | 1 |
Education Level
Higher Education | 20 |
Postsecondary Education | 20 |
Audience
Teachers | 3 |
Location
Pennsylvania | 2 |
California | 1 |
Hawaii | 1 |
Illinois | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Frydenberg, Mark; Mentzer, Kevin – Information Systems Education Journal, 2021
Project-based learning (PBL) engages students deeply with course concepts and empowers them to drive their own learning through the development of solutions to real-world challenges. By taking ownership of and completing a project that they designed, students develop and demonstrate creativity, critical thinking, and collaboration skills. This…
Descriptors: Learner Engagement, Student Empowerment, Active Learning, Student Projects
Mark Sena; Thilini Ariyachandra – Information Systems Education Journal, 2024
The Titanic disaster is a topic that continues to fascinate. As the importance of analytics continues to grow in industry, data literacy skills have become increasingly important in business education. This project allows students to use the passenger data from the Titanic to build their data literacy skills using an engaging, experiential topic.…
Descriptors: Literacy, Teaching Methods, Experiential Learning, Business Education
Mentzer, Kevin; Galante, Zachary; Frydenberg, Mark – Information Systems Education Journal, 2022
Organizations are keenly interested in data gathering from websites where discussions of products and brands occur. This increasingly means that programmers need an understanding of how to work with website application programming interfaces (APIs) for data acquisition. In this hands-on lab activity, students will learn how to gather data from…
Descriptors: Prediction, Competition, Music, Data Analysis
What! No GUI? -- Teaching a Text Based Command Line Oriented Introduction to Computer Science Course
Goldstein, Ira – Information Systems Education Journal, 2019
Computer Science students need to acquire knowledge about both the hardware and software aspects of computing systems. It is necessary for them to understand how each layer interacts with one another. However, since Graphical User Interfaces have become ubiquitous, the opportunities to interact with the computer via a command prompt as part of…
Descriptors: Computer Science Education, Computer Software, Introductory Courses, Programming
Ladwig, Christine; Schwieger, Dana – Information Systems Education Journal, 2020
This case provides an opportunity for classroom discussion of ethical issues addressed by computing technologists and the Association of Computing Machinery (ACM) Code of Ethics as the authors describe a recent lawsuit brought against Sutter Health. Security issues, data breaches and compliance with industry privacy rules are common concerns for…
Descriptors: Ethics, Coding, Programming Languages, Legislation
Menon, Pratibha; Kovalchick, Lisa – Information Systems Education Journal, 2020
Concept mapping, a tool originally developed to facilitate student learning by organizing and visualizing key concepts and their relationships, can also be used to represent the composition of the knowledge contained in a course. In this paper, the authors describe a specific application of concept mapping to help instructors and students…
Descriptors: Concept Mapping, Introductory Courses, Programming, Computer Science Education
Dawar, Deepak – Information Systems Education Journal, 2022
Learning computer programming is a challenging task for most beginners. Demotivation and learned helplessness are pretty common. A novel instructional technique that leverages the value-expectancy motivational model of student learning was conceptualized by the author to counter the lack of motivation in the introductory class. The result was a…
Descriptors: Teaching Methods, Introductory Courses, Computer Science Education, Assignments
Liu, Xiaoming; Schwieger, Dana – Information Systems Education Journal, 2023
Rapid advancements and emergent technologies add an additional layer of complexity to preparing computer science and information technology higher education students for entering the post pandemic job market. Knowing and predicting employers' technical skill needs is essential for shaping curriculum development to address the emergent skill gap.…
Descriptors: Network Analysis, Employment Opportunities, Information Technology, Computer Science Education
Martincic, Cynthia J. – Information Systems Education Journal, 2016
Mobile application development is currently an important component of CS/IS education. Because of the rapid rate of change in the mobile application field, there are many websites that provide instructional material in tutorial format, but it is difficult to find a textbook that includes mobile application programming assignments and exercises.…
Descriptors: Undergraduate Students, Computer Science Education, Introductory Courses, Programming
Whitney, Michael – Information Systems Education Journal, 2020
Curb cuts and automatic doors are a commonplace in the physical world as they provide access to our buildings for persons with disabilities. In the world of the web, millions of individuals have the legal right to rely on electronic curb cuts so they too can access the web. To this end, a new generation of information systems graduates must…
Descriptors: Accessibility (for Disabled), Design, Web Sites, College Students
Sharp, Jason H. – Information Systems Education Journal, 2019
With the recent renewed interest in programming, online learning environments like Codecademy have become quite popular, boasting some 25 million members worldwide. The purpose of this paper is to describe the author's experience using Codecademy Interactive Lessons as an instructional supplement in an introductory Python programming course. The…
Descriptors: Programming Languages, Teaching Methods, Outcomes of Education, Introductory Courses
Baugh, Jeanne M. – Information Systems Education Journal, 2015
All Computer Information Systems programs require a database course for their majors. This paper describes an approach to such a course in which real world examples, both design projects and actual database application projects are incorporated throughout the semester. Students are expected to apply the traditional database concepts to actual…
Descriptors: Undergraduate Students, Computer Science Education, Information Systems, Databases
Wu, Peter Y.; Manohar, Priyadarshan A.; Acharya, Sushil – Information Systems Education Journal, 2016
It is well known that interesting questions can stimulate thinking and invite participation. Class exercises are designed to make use of questions to engage students in active learning. In a project toward building a community skilled in software verification and validation (SV&V), we critically review and further develop course materials in…
Descriptors: Active Learning, Computer Software, Computer Science Education, Programming
Martin, Nancy L. – Information Systems Education Journal, 2015
This paper describes the development of a hybrid introductory course for students in their first or second year of an information systems technologies degree program at a large Midwestern university. The course combines topics from discrete mathematics and programming logic and design, a unique twist on most introductory courses. The objective of…
Descriptors: Mathematics Instruction, Programming, Introductory Courses, Information Systems
Kortsarts, Yana; Kempner, Yulia – Information Systems Education Journal, 2015
Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…
Descriptors: Introductory Courses, Programming, Computer Science Education, Technology
Previous Page | Next Page ยป
Pages: 1 | 2