NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ahmadzadeh, Marzieh; Mahmoudabadi, Elham; Khodadadi, Farzad – Journal of Information Technology Education, 2011
Anecdotal evidence shows that in computer programming courses plagiarism is a widespread problem. With the growing number of students in such courses, manual plagiarism detection is impractical. This requires instructors to use one of the many available plagiarism detection tools. Prior to choosing one of such tools, a metric that assures the…
Descriptors: Foreign Countries, Plagiarism, Programming Languages, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Huynh, Minh Q.; Chu, Hung W. – Journal of Information Technology Education, 2011
The field of supply chain management has changed greatly and rapidly. With the advent of enterprise systems, supply chains are now operating with up-to-the-minute information. The value of the information flow is marked by speed, accessibility, accuracy, and most of all relevancy. As it continually evolves, the supply chain management curriculum…
Descriptors: Organizational Objectives, Information Transfer, Educational Technology, Knowledge Management
Peer reviewed Peer reviewed
Direct linkDirect link
Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher – Journal of Information Technology Education, 2009
Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…
Descriptors: Workstations, Educational Technology, Computer System Design, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Hentea, Mariana; Dhillon, Harpal S.; Dhillon, Manpreet – Journal of Information Technology Education, 2006
Despite a variety of Information Security Assurance (ISA) curricula and diverse educational models, universities often fail to provide their graduates with skills demanded by employers. There is a big discrepancy between the levels of skills expected by employers and those the graduates have after completing their studies. The authors compare the…
Descriptors: Models, Job Skills, Educational Objectives, Relevance (Education)