NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Gerit Wagner; Laureen Thurner – Journal of Information Systems Education, 2025
Git, as the leading version-control system, is frequently employed by software developers, digital product managers, and knowledge workers. Information systems (IS) students aspiring to fill software engineering, management, or research positions would therefore benefit from familiarity with Git. However, teaching Git effectively can be…
Descriptors: Computer Science Education, Information Systems, Teaching Methods, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Saulnier, Bruce; Ceccucci, Wendy; Sendall, Patricia; Peslak, Alan – Journal of Information Systems Education, 2019
This paper invites Computer Information System (CIS) program stakeholders to consider several strategic issues. They include: Curriculum & Pedagogy, Business Model & Value Proposition, Increasingly Diverse Student Body, and Student Success & Completion. These strategic issues are those in which faculty have the ability to provide the…
Descriptors: Computer Science Education, Information Systems, Strategic Planning, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Lending, Diane; May, Jeffrey – Journal of Information Systems Education, 2013
Activity diagrams are used in Systems Analysis and Design classes as a visual tool to model the business processes of "as-is" and "to-be" systems. This paper presents the idea of using these same activity diagrams in the classroom to model the actual processes (practices and techniques) of Systems Analysis and Design. This tip…
Descriptors: Visual Aids, Systems Analysis, Computer Science Education, College Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Knapp, Kenneth J.; Maurer, Christopher; Plachkinova, Miloslava – Journal of Information Systems Education, 2017
Much has been published about developing a cybersecurity curriculum for institutes of higher learning (IHL). Now that a growing number of IHLs globally offer such programs, a need exists on how to guide, maintain, and improve the relevancy of existing curricula. Just as cybersecurity professionals must be hone their skills continually to keep with…
Descriptors: Information Security, Computer Security, Computer Science Education, Certification
Peer reviewed Peer reviewed
Direct linkDirect link
Steenkamp, Annette Lerine; Alawdah, Amal; Almasri, Osama; Gai, Keke; Khattab, Nidal; Swaby, Carval; Abaas, Ramy – Journal of Information Systems Education, 2013
A graduate course in enterprise architecture had a team project component in which a real-world business case, provided by an industry sponsor, formed the basis of the project charter and the architecture statement of work. The paper aims to share the team project experience on developing the architecture specifications based on the business case…
Descriptors: Computer Science Education, Graduate Students, Group Activities, Student Projects
Peer reviewed Peer reviewed
Direct linkDirect link
Tan, Wee-Kek; Tan, Chuan-Hoo – Journal of Information Systems Education, 2010
Acquiring the knowledge to assemble an integrated Information System (IS) development process that is tailored to the specific needs of a project has become increasingly important. It is therefore necessary for educators to impart to students this crucial skill. However, Situational Method Engineering (SME) is an inherently complex process that…
Descriptors: Information Systems, Teaching Methods, Student Projects, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Dishaw, Mark; Eierman, Michael A.; Iversen, Jakob H.; Philip, George C. – Journal of Information Systems Education, 2011
Businesses and other organizations are relying increasingly on virtual teams to perform a range of business activities. A key challenge in utilizing virtual teams is to support collaboration among team members who are separated by distance and/or time. In this paper we use a research model based on a combination of the Technology Acceptance Model…
Descriptors: Information Systems, Electronic Mail, Computer Software Evaluation, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Zhao, Jensen J.; Zhao, Sherry Y. – Journal of Information Systems Education, 2010
As the entry-level information technology jobs could be easily outsourced offshore, the demand for U.S. employees who are innovative and productive in information technology (IT) project design, development, and management is growing among U.S. companies. This controlled experiment presents how a model of integrating students' intelligence…
Descriptors: Student Attitudes, Intelligence Quotient, Gender Differences, Creativity
Peer reviewed Peer reviewed
Direct linkDirect link
Zhang, Sonya Xuesong; Olfman, Lorne; Ractham, Peter – Journal of Information Systems Education, 2007
An educational ePortfolio usually contains work that a student has collected, reflected, designed, and published to demonstrate personal learning and growth over time. However, previous studies have shown that traditional ePortfolio systems lack flexibility, peer review, and group collaboration. Without these features, ePortfolios do not have the…
Descriptors: Socialization, Cooperation, Learning Experience, Internet