Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 11 |
Descriptor
Source
Information Systems Education… | 11 |
Author
Acharya, Sushil | 1 |
Adkins, Joni K. | 1 |
Badami, Charles | 1 |
Bekkering, Ernst | 1 |
Courte, Jill | 1 |
Evans, Gerald | 1 |
Firth, David | 1 |
Fulton, Eric | 1 |
Kussmaul, Clif | 1 |
Lawrence, Cameron | 1 |
Linville, Diana R. | 1 |
More ▼ |
Publication Type
Journal Articles | 11 |
Reports - Descriptive | 5 |
Reports - Research | 4 |
Tests/Questionnaires | 4 |
Reports - Evaluative | 2 |
Guides - Classroom - Teacher | 1 |
Education Level
Higher Education | 10 |
Postsecondary Education | 10 |
Audience
Teachers | 3 |
Location
Pennsylvania | 1 |
Vermont | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kussmaul, Clif – Information Systems Education Journal, 2020
This case describes a classroom activity that explores a fictional software product company to help students learn about ways that businesses make money from software, including Free & Open Source Software (FOSS). The activity shows how a company might evolve through different business models, but does not imply that some models are always…
Descriptors: Class Activities, Computer Software, Computer Science Education, Inquiry
Adkins, Joni K.; Linville, Diana R.; Badami, Charles – Information Systems Education Journal, 2020
Online textbooks allow instructors to provide interactive and engaging activities for students. In this paper, we look at how providing an interactive online textbook is utilized and valued in a beginning computer programming course. In addition, we compare the utilization of the online textbook to the student final course grade. Our findings…
Descriptors: Instructional Effectiveness, Introductory Courses, Programming, Computer Science Education
Bekkering, Ernst; Ward, Ted – Information Systems Education Journal, 2020
Student performance in classes can be affected by lack of attendance and attention while in class. This paper examines the effect of student participation on performance in two Computer Science classes. Attendance and attentiveness are automatically recorded by the videoconferencing software used for the classes. Student participation is measured…
Descriptors: Class Activities, Student Participation, Performance Factors, Attendance
Popovich, Karen; Pangborn, Greta – Information Systems Education Journal, 2022
The COVID-19 pandemic in Spring 2020 necessitated a sudden shift to online learning. Faculty at Saint Michael's College, in Colchester, Vermont (USA), had ten days to re-plan their courses as well as potentially learn new pedagogies, adapt to technology for instruction, and help students adjust to the changes. In addition, faculty needed to…
Descriptors: COVID-19, Pandemics, Educational Change, Curriculum Design
Luce, Thom – Information Systems Education Journal, 2020
This paper reviews the evolution of a senior level, live-client project development capstone class in the Analytics and Information Systems department of an AACSB accredited College of Business. The paper traces changes in methodologies and technologies leading to the current Scrum based approach, using ASP.NET Model-View-Controller, MVC, as the…
Descriptors: Capstone Experiences, College Seniors, Information Systems, Computer Software
Wu, Peter Y.; Manohar, Priyadarshan A.; Acharya, Sushil – Information Systems Education Journal, 2016
It is well known that interesting questions can stimulate thinking and invite participation. Class exercises are designed to make use of questions to engage students in active learning. In a project toward building a community skilled in software verification and validation (SV&V), we critically review and further develop course materials in…
Descriptors: Active Learning, Computer Software, Computer Science Education, Programming
Lawrence, Cameron; Fulton, Eric; Evans, Gerald; Firth, David – Information Systems Education Journal, 2014
This case study examines the life of a digital native who has her online accounts hacked, passwords reset, and is locked out of important online resources including her university email account and Facebook. Part one of the case study examines how the hack was perpetrated and the fallout of losing control of one's digital identity. Part two of the…
Descriptors: Case Studies, Information Security, Computer Security, Class Activities
Serapiglia, Anthony – Information Systems Education Journal, 2014
The following Teaching Case is designed to expose students to three scenarios related to data stored on hard drives, techniques that could be used to retrieve deleted or corrupted data, and a method for a more thorough deletion of data from a hard drive. These issues are often overlooked in current IT curriculum and in our age of digital clutter…
Descriptors: Information Security, Information Storage, Computer Science Education, Class Activities
Miko, John S. – Information Systems Education Journal, 2014
Search marketing is the process of utilizing search engines to drive traffic to a Web site through both paid and unpaid efforts. One potential paid component of a search marketing strategy is the use of a pay-per-click (PPC) advertising campaign in which advertisers pay search engine hosts only when their advertisement is clicked. This paper…
Descriptors: Marketing, Search Engines, Web Sites, Advertising
Powell, Loreen M.; Wimmer, Hayden – Information Systems Education Journal, 2015
Computer programming is challenging to teach and difficult for students to learn. Instructors have searched for ways to improve student learning in programming courses. In an attempt to foster hands-on learning and to increase student learning outcomes in a programming course, the authors conducted an exploratory study to examine student created…
Descriptors: Computer Science Education, Programming, Experiential Learning, Visual Aids
Werner, Laurie A.; Courte, Jill – Information Systems Education Journal, 2010
Despite advances in spam detection software, anti-spam laws, and increasingly sophisticated users, the number of successful phishing scams continues to grow. In addition to monetary losses attributable to phishing, there is also a loss of confidence that stifles use of online services. Using in-class activities in an introductory computer course…
Descriptors: Information Security, Crime, Prevention, Class Activities