NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 21 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ahmadzadeh, Marzieh; Mahmoudabadi, Elham; Khodadadi, Farzad – Journal of Information Technology Education, 2011
Anecdotal evidence shows that in computer programming courses plagiarism is a widespread problem. With the growing number of students in such courses, manual plagiarism detection is impractical. This requires instructors to use one of the many available plagiarism detection tools. Prior to choosing one of such tools, a metric that assures the…
Descriptors: Foreign Countries, Plagiarism, Programming Languages, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Wabwoba, Franklin; Mwakondo, Fullgence M. – Journal of Information Technology Education, 2011
Every year, the Joint Admission Board (JAB) is tasked to determine those students who are expected to join various Kenyan public universities under the government sponsorship scheme. This exercise is usually extensive because of the large number of qualified students compared to the very limited number of slots at various institutions and the…
Descriptors: Foreign Countries, Developing Nations, Courses, Student Placement
Peer reviewed Peer reviewed
Direct linkDirect link
Huynh, Minh Q.; Chu, Hung W. – Journal of Information Technology Education, 2011
The field of supply chain management has changed greatly and rapidly. With the advent of enterprise systems, supply chains are now operating with up-to-the-minute information. The value of the information flow is marked by speed, accessibility, accuracy, and most of all relevancy. As it continually evolves, the supply chain management curriculum…
Descriptors: Organizational Objectives, Information Transfer, Educational Technology, Knowledge Management
Peer reviewed Peer reviewed
Direct linkDirect link
Ajayi, A. O.; Olajubu, E. A.; Bello, S. A.; Soriyan, H. A.; Obamuyide, A. V. – Journal of Information Technology Education, 2011
This study presents a cost effective, reliable, and convenient mobile web-based system to facilitate the dissemination of course information to students, to support interaction that goes beyond the classroom. The system employed the Really Simple Syndication (RSS) technology and was developed using Rapid Application Development (RAD) methodology.…
Descriptors: Foreign Countries, Higher Education, Electronic Learning, Integrated Learning Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Ryan, Jenna; Porter, Marjorie; Miller, Rebecca – Journal of Information Technology Education, 2010
Current literature on libraries is abundant with articles about the uses and the potential of new interactive communication technology, including Web 2.0 tools. Recently, the advent and use of virtual worlds have received top billing in these works. Many library institutions are exploring these virtual environments; this exploration and the…
Descriptors: Academic Libraries, Virtual Classrooms, Social Environment, Library Automation
Peer reviewed Peer reviewed
Direct linkDirect link
Goel, Sanjay; Kathuria, Vanshi – Journal of Information Technology Education, 2010
The majority of an engineer's time in the software industry is spent working with other programmers. Agile methods of software development like eXtreme Programming strongly rely upon practices like daily meetings and pair programming. Hence, the need to learn the skill of working collaboratively is of primary importance for software developers.…
Descriptors: Computer Science Education, Programming, Teaching Methods, Introductory Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Tan, Grace; Venables, Anne – Journal of Information Technology Education, 2010
There exists a wealth of computing education literature devoted to interventions designed to overcome novices' difficulties in learning to write computer programs. However, various studies have shown that the majority of students at the end of a semester of instruction are still unable to write a simple computer program, despite the best efforts…
Descriptors: Action Research, Program Effectiveness, Workshops, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Lafifi, Yacine; Touil, Ghassen – Journal of Information Technology Education, 2010
Several researchers have studied the impact of collaboration between the learners on their cognitive levels, but few studies have been carried out on the impact of collaboration between the teachers. The aim of our research is to study the effects on the knowledge levels of learners of collaborative construction of learning objects created by the…
Descriptors: Distance Education, Online Courses, Cooperative Learning, Program Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Long, Ju – Journal of Information Technology Education, 2009
Open Source Software (OSS) is a major force in today's Information Technology (IT) landscape. Companies are increasingly using OSS in mission-critical applications. The transparency of the OSS technology itself with openly available source codes makes it ideal for students to participate in the OSS project development. OSS can provide unique…
Descriptors: Personnel Selection, Career Development, Job Skills, Evaluation Criteria
Peer reviewed Peer reviewed
Direct linkDirect link
Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher – Journal of Information Technology Education, 2009
Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…
Descriptors: Workstations, Educational Technology, Computer System Design, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Scott, Elsje – Journal of Information Technology Education, 2008
The Computing Curricula (2005) place Information Systems (IS) at the intersection of exact sciences (e.g. General Systems Theory), technology (e.g. Computer Science), and behavioral sciences (e.g. Sociology). This presents particular challenges for teaching and learning, as future IS professionals need to be equipped with a wide range of…
Descriptors: Experiential Learning, Information Systems, Systems Development, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
King, Michael A. – Journal of Information Technology Education, 2009
Business intelligence derived from data warehousing and data mining has become one of the most strategic management tools today, providing organizations with long-term competitive advantages. Business school curriculums and popular database textbooks cover data warehousing, but the examples and problem sets typically are small and unrealistic. The…
Descriptors: Strategic Planning, Problem Sets, Corporations, Statistics
Peer reviewed Peer reviewed
Direct linkDirect link
Kamthan, Pankaj – Journal of Information Technology Education, 2007
Open Source Software (OSS) has introduced a new dimension in software community. As the development and use of OSS becomes prominent, the question of its integration in education arises. In this paper, the following practices fundamental to projects and processes in software engineering are examined from an OSS perspective: project management;…
Descriptors: Engineering, Computer Software, Quality Control, Computer Science
Peer reviewed Peer reviewed
Direct linkDirect link
Peslak, Alan – Journal of Information Technology Education, 2005
Researchers have suggested that up to 50 % of the effort in development of information systems is devoted to user interface development (Douglas, Tremaine, Leventhal, Wills, & Manaris, 2002; Myers & Rosson, 1992). Yet little study has been performed on the inclusion of important interface and human-computer interaction topics into a current…
Descriptors: Assignments, Student Attitudes, Information Systems, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Hentea, Mariana; Dhillon, Harpal S.; Dhillon, Manpreet – Journal of Information Technology Education, 2006
Despite a variety of Information Security Assurance (ISA) curricula and diverse educational models, universities often fail to provide their graduates with skills demanded by employers. There is a big discrepancy between the levels of skills expected by employers and those the graduates have after completing their studies. The authors compare the…
Descriptors: Models, Job Skills, Educational Objectives, Relevance (Education)
Previous Page | Next Page ยป
Pages: 1  |  2