NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Samuel C. Yang – Journal of Information Systems Education, 2024
Amid the ever-increasing number of cyberthreats, cybersecurity degree programs represent a potential growth area for business schools. This study examines undergraduate cybersecurity programs offered by AACSB-accredited business schools in the US. It surveyed 503 AACSB-accredited schools and identified 72 cybersecurity programs. Using the IS2020…
Descriptors: Computer Security, Information Security, Business Administration Education, Business Schools
Peer reviewed Peer reviewed
Direct linkDirect link
Chenoweth, Tim; Corral, Karen; Scott, Kit – Journal of Information Systems Education, 2016
This study evaluates two content delivery options for teaching a programming language to determine whether an asynchronous format can achieve the same learning efficacy as a traditional lecture (face-to-face) format. We use media synchronicity theory as a guide to choose media capabilities to incorporate into an asynchronous tutorial used…
Descriptors: Feedback (Response), Programming, Programming Languages, Electronic Learning
Peer reviewed Peer reviewed
Direct linkDirect link
He, Wu; Yen, Cherng-Jyh – Journal of Information Systems Education, 2014
More and more information technology (IT) programs are offering distance learning courses to their students. However, to date, there are a very limited number of published articles in the IT education literature that compare how different methods of delivering distance course relate to undergraduate students' learning outcomes in IT software…
Descriptors: Programming, Computer Software, Computer Science Education, Participant Satisfaction
Peer reviewed Peer reviewed
Direct linkDirect link
Simkin, Mark G. – Journal of Information Systems Education, 2008
Data-validation routines enable computer applications to test data to ensure their accuracy, completeness, and conformance to industry or proprietary standards. This paper presents five programming cases that require students to validate five different types of data: (1) simple user data entries, (2) UPC codes, (3) passwords, (4) ISBN numbers, and…
Descriptors: Computers, Computer Oriented Programs, Programming, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Yue, Kwok-Bun; De Silva, Dilhar; Kim, Dan; Aktepe, Mirac; Nagle, Stewart; Boerger, Chris; Jain, Anubha; Verma, Sunny – Journal of Information Systems Education, 2009
This paper describes our experience of using Content Management Software (CMS), specifically Joomla, to build a real world domain-specific social network site (SNS) as a capstone project for graduate information systems and computer science students. As Web 2.0 technologies become increasingly important in driving business application development,…
Descriptors: Computer Software, Information Systems, Social Networks, Graduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Yue, Kwok-Bun – Journal of Information Systems Education, 2010
Mashups, Web applications integrating data and functionality from other Web sources to provide a new service, have quickly become ubiquitous. Because of their role as a focal point in three important trends (Web 2.0, situational software applications, and end user development), mashups are a crucial emerging technology for information systems…
Descriptors: Peer Evaluation, Information Systems, Programming, Comparative Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Newby, Michael; Nguyen, ThuyUyen – Journal of Information Systems Education, 2007
Programming assignments are used to assess a student's understanding of the theoretical aspect of programming and their ability to put that theory into practice. When assigning programs for students to complete, it is necessary to make sure that the problem is well specified, realistic, yet is able to be completed in a relatively short period of…
Descriptors: Assignments, Problem Solving, Programming, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Fellers, Jack W. – Journal of Information Systems Education, 2008
The first meeting of any course and its many activities sets in motion the establishment of a course climate and addressing student expectations. How can students be actively and collaboratively engaged, in a non-threatening environment, having their curiosity aroused, and begin to learn about the course all during the first class meeting? This…
Descriptors: Interpersonal Communication, Systems Development, Interviews, Cooperative Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Matos, Victor; Grasser, Rebecca – Journal of Information Systems Education, 2007
This paper presents an example of integrating IT skills using an interesting real life problem. We describe how the reverse- and forward-engineering of the USA National Do Not Call registry was used in our capstone course to illustrate the fusion of different (but interdependent) issues and techniques learned in the IT program. The purpose of the…
Descriptors: Information Technology, Engineering, Ethics, Learning Experience
Peer reviewed Peer reviewed
Direct linkDirect link
Ballenger, Robert M. – Journal of Information Systems Education, 2007
This case provides a real-world semester long project-oriented case study for students enrolled in an electronic commerce course that has a significant development component. The case provides the technical framework in the form of functional requirements for students to design and build a fully functional transaction processing e-commerce Web…
Descriptors: Programming, Databases, Case Method (Teaching Technique), College Students