NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Marquardson, Jim; Schuetzler, Ryan M. – Journal of Information Systems Education, 2019
Learning by teaching is a pedagogical technique that encourages mastery of a topic by having students teach each other. Student presentations, group discussions, and face-to-face teaching are frequently used to have students teach their peers. In this paper, we describe the use of a novel assignment to implement learning by teaching. In a course…
Descriptors: Peer Teaching, Assignments, Tutorial Programs, Open Educational Resources
Peer reviewed Peer reviewed
Direct linkDirect link
Turner, Scott Alexander; Pérez-Quiñones, Manuel A.; Edwards, Stephen H. – ACM Transactions on Computing Education, 2018
In computer science, students could benefit from exposure to critical programming concepts from multiple perspectives. Peer review is one method to allow students to experience authentic uses of the concepts in an activity that is not itself programming. In this work, we examine how to implement the peer review process in early, object-oriented…
Descriptors: Peer Evaluation, Computer Science Education, Programming, Thinking Skills
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Christopher Sibona; Pourreza, Saba – Information Systems Education Journal, 2018
This study explores the difference between both active learning and lecturing to teach Scrum project management in a university setting. The goal was to understand if one approach results in higher perceived learning over the other. Additionally, lesson ordering was examined to determine student preference of lecturing prior to or after an active…
Descriptors: Active Learning, Lecture Method, Program Administration, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lawrence, Cameron; Fulton, Eric; Evans, Gerald; Firth, David – Information Systems Education Journal, 2014
This case study examines the life of a digital native who has her online accounts hacked, passwords reset, and is locked out of important online resources including her university email account and Facebook. Part one of the case study examines how the hack was perpetrated and the fallout of losing control of one's digital identity. Part two of the…
Descriptors: Case Studies, Information Security, Computer Security, Class Activities
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Törley, Gábor – Acta Didactica Napocensia, 2014
This paper presents the history of algorithm visualization (AV), highlighting teaching-methodology aspects. A combined, two-group pedagogical experiment will be presented as well, which measured the efficiency and the impact on the abstract thinking of AV. According to the results, students, who learned with AV, performed better in the experiment.
Descriptors: Mathematics, Visual Aids, Teaching Methods, Programming
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Serapiglia, Anthony – Information Systems Education Journal, 2014
The following Teaching Case is designed to expose students to three scenarios related to data stored on hard drives, techniques that could be used to retrieve deleted or corrupted data, and a method for a more thorough deletion of data from a hard drive. These issues are often overlooked in current IT curriculum and in our age of digital clutter…
Descriptors: Information Security, Information Storage, Computer Science Education, Class Activities
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Miko, John S. – Information Systems Education Journal, 2014
Search marketing is the process of utilizing search engines to drive traffic to a Web site through both paid and unpaid efforts. One potential paid component of a search marketing strategy is the use of a pay-per-click (PPC) advertising campaign in which advertisers pay search engine hosts only when their advertisement is clicked. This paper…
Descriptors: Marketing, Search Engines, Web Sites, Advertising
Peer reviewed Peer reviewed
Direct linkDirect link
Bliemel, Michael; Ali-Hassan, Hossam – Journal of Information Systems Education, 2014
For several years, we used Intel's flash-based game "IT Manager 3: Unseen Forces" as an experiential learning tool, where students had to act as a manager making real-time prioritization decisions about repairing computer problems, training and upgrading systems with better technologies as well as managing increasing numbers of technical…
Descriptors: Experiential Learning, Educational Games, Management Information Systems, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Russell, Jack; Russell, Barbara; Pollacia, Lissa F.; Tastle, William J. – Information Systems Education Journal, 2010
This paper researches the computer languages taught in the first, second and third programming courses in Computer Information Systems (CIS), Management Information Systems (MIS or IS) curricula as well as in Computer Science (CS) and Information Technology (IT) curricula. Instructors teaching the first course in programming within a four year…
Descriptors: Programming Languages, Information Systems, Computer Science Education, Management Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Surendran, Ken; Ehie, Ike C.; Somarajan, Chellappan – Journal of Information Technology Education, 2005
This paper illustrates an approach used to enhance student learning outcomes in a combined cross-listed Systems Analysis and Design (SA&D) course and examines benefits perceived by students through analysis of assessment and students feedback. The SA&D course is a required course in both the Management Information Systems (MIS) major and the…
Descriptors: Feedback (Response), Required Courses, Design, Student Evaluation