Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
Journal of Information… | 5 |
Author
Simkin, Mark G. | 2 |
Brenda Mak | 1 |
Jin, Leigh | 1 |
Leigh Jin | 1 |
Samuel C. Yang | 1 |
Shahrasbi, Nasser | 1 |
Tai-Yin Chi | 1 |
Zheng, Wei-Jun | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 3 |
Reports - Research | 2 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Audience
Teachers | 2 |
Location
California | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Samuel C. Yang – Journal of Information Systems Education, 2024
Amid the ever-increasing number of cyberthreats, cybersecurity degree programs represent a potential growth area for business schools. This study examines undergraduate cybersecurity programs offered by AACSB-accredited business schools in the US. It surveyed 503 AACSB-accredited schools and identified 72 cybersecurity programs. Using the IS2020…
Descriptors: Computer Security, Information Security, Business Administration Education, Business Schools
Leigh Jin; Tai-Yin Chi; Brenda Mak – Journal of Information Systems Education, 2024
This paper presents the Screencast-Based Assessment Technique (SBAT) for a mobile app development curriculum in the information systems discipline. SBAT was implemented as a midterm take-home exam in which students design and develop an app project based on their own interests, passions, or ambitions. In addition to coding, students must create…
Descriptors: Technology Uses in Education, Computer Oriented Programs, Handheld Devices, Computer Software
Shahrasbi, Nasser; Jin, Leigh; Zheng, Wei-Jun – Journal of Information Systems Education, 2021
The growth in the tech industry in recent years has increased business major students' interest in software programming and app development. However, the traditional way of teaching these courses involves intensive coding exercises and little interaction among students. These methods often discourage the students due to the slow learning curve and…
Descriptors: Design, Computer Oriented Programs, Computer Software, Programming
Simkin, Mark G. – Journal of Information Systems Education, 2008
Data-validation routines enable computer applications to test data to ensure their accuracy, completeness, and conformance to industry or proprietary standards. This paper presents five programming cases that require students to validate five different types of data: (1) simple user data entries, (2) UPC codes, (3) passwords, (4) ISBN numbers, and…
Descriptors: Computers, Computer Oriented Programs, Programming, Information Technology
Simkin, Mark G. – Journal of Information Systems Education, 2007
Most commercial programming applications are considerably more complex than the end-of-chapter exercises found in programming textbooks. This case addresses this problem by requiring the students in entry-level Visual Basic programming classes to create an application that helps users order ski equipment from a retailer. For convenience, the forms…
Descriptors: Programming, Computer Oriented Programs, Computer Science Education, Student Projects