Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 9 |
Descriptor
Source
Information Systems Education… | 9 |
Author
Englander, Irv | 2 |
Frydenberg, Mark | 2 |
Pepe, James | 2 |
Wong, Wilson | 2 |
Abdullat, Amjad | 1 |
Ahamed, Sheikh | 1 |
Babb, Jeffry S., Jr. | 1 |
Charlebois, Conner | 1 |
David Firth | 1 |
Hentschel, Nicholas | 1 |
Islam, Md Saiful | 1 |
More ▼ |
Publication Type
Journal Articles | 9 |
Reports - Descriptive | 5 |
Reports - Research | 2 |
Tests/Questionnaires | 2 |
Guides - Classroom - Learner | 1 |
Guides - Classroom - Teacher | 1 |
Information Analyses | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 5 |
Location
Massachusetts | 2 |
Asia | 1 |
India | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
David Firth; Tyler Johnson; Shawn F. Clouse; Patricia Akello – Information Systems Education Journal, 2025
As smartphone ownership has steadily increased there has been a rise in individuals that display Problematic Smartphone Use (PSU). Through a comprehensive literature review of PSU it quickly became evident that research into PSU intervention strategies such as Cognitive Behavior Therapy (CBT) and Digital Detox are focused on "collectivist…
Descriptors: Computer Science Education, Social Media, Computer Software, Collectivism
Riad, A. B. M. Kamrul; Islam, Md Saiful; Shahriar, Hossain; Zhang, Chi; Valero, Maria; Sneha, Sweta; Ahamed, Sheikh – Information Systems Education Journal, 2021
Mobile device security has become increasingly important in mobile computing. Since the mobile devices and applications are growing rapidly, the security threats are intensified due to mobile app flaws and lack of security consideration in early stages of software development. The unsecure software development process creates a serious weak path…
Descriptors: Handheld Devices, Computer Security, Computer Software, Computer Science Education
Frydenberg, Mark – Information Systems Education Journal, 2023
The Internet of Things (IoT) is a network of objects that can exchange data with other devices also connected to the Internet. One of the most common consumer examples of IoT is home automation, as a variety of smart devices, including doorbells, lightbulbs, thermostats, and refrigerators are now available which users can control remotely using…
Descriptors: Internet, Computer Software, Automation, Information Technology
Wong, Wilson; Pepe, James; Englander, Irv – Information Systems Education Journal, 2017
Information systems capstone projects aim to prepare students for what they will encounter in the industry after graduation. Corporate application development is often a complex endeavor that requires coordination between related products. For example, software development in the mobile application sector may require a coordinated parallel…
Descriptors: Telecommunications, Handheld Devices, Information Systems, Teaching Methods
Martincic, Cynthia J. – Information Systems Education Journal, 2016
Mobile application development is currently an important component of CS/IS education. Because of the rapid rate of change in the mobile application field, there are many websites that provide instructional material in tutorial format, but it is difficult to find a textbook that includes mobile application programming assignments and exercises.…
Descriptors: Undergraduate Students, Computer Science Education, Introductory Courses, Programming
Wong, Wilson; Pepe, James; Stahl, James; Englander, Irv – Information Systems Education Journal, 2013
A new collaborative capstone model is presented that consists of three synergistic elements: (1) a capstone course component; (2) a business component; and (3) an advanced technical course component geared towards enhancing the student capstone learning experience. The model was fully implemented at Bentley University in spring 2012 with…
Descriptors: Hospitals, Clinics, Models, Teamwork
Charlebois, Conner; Hentschel, Nicholas; Frydenberg, Mark – Information Systems Education Journal, 2014
The Computer Information Systems Learning and Technology Sandbox (CIS Sandbox) opened as a collaborative learning lab during the fall 2011 semester at a New England business university. The facility employs 24 student workers, who, in addition to providing core tutoring services, are encouraged to explore new technologies and take on special…
Descriptors: Entrepreneurship, Business Schools, Information Systems, Information Science Education
Babb, Jeffry S., Jr.; Abdullat, Amjad – Information Systems Education Journal, 2012
Disruptive technologies, such as mobile applications development, will always present a dilemma for Information Systems educators as dominant paradigms in our environment will tend to favor the existing sustaining technologies that we have become known for in our discipline. In light of this friction, we share our approach in investigating and…
Descriptors: Handheld Devices, Computer Oriented Programs, Computer Software, Curriculum Development
Smith, J. A.; Lind, M. R. – Information Systems Education Journal, 2010
In this web accessibility study of homepages of education departments in post-secondary educational institutions, the 1998 US Section 508 Law regarding webpage accessibility for people with disabilities was addressed. Along with the requirements of this legislation, there are growing demands for web accessibility resulting from age-related visual…
Descriptors: Web Sites, Visual Impairments, Educational Technology, Technology Uses in Education