Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Business | 5 |
Computer Software | 5 |
Open Source Technology | 5 |
Case Studies | 2 |
College Faculty | 2 |
Comparative Analysis | 2 |
Computer Science Education | 2 |
Content Analysis | 2 |
Correlation | 2 |
Evaluation Methods | 2 |
Foreign Countries | 2 |
More ▼ |
Source
ProQuest LLC | 2 |
International Association for… | 1 |
International Journal of… | 1 |
Journal of Information… | 1 |
Author
Henry, Ngatchu | 1 |
Lee, Sang-Heui | 1 |
Nyinkeu, Ngatchu Damen | 1 |
Palka, Sean | 1 |
Spurrier, Gary | 1 |
Thaddeus, Kabuin | 1 |
Topi, Heikki | 1 |
Publication Type
Dissertations/Theses -… | 2 |
Journal Articles | 2 |
Collected Works - Proceedings | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Location
Africa | 1 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Topi, Heikki; Spurrier, Gary – Journal of Information Systems Education, 2019
Current academic and industry discussions regarding systems development project approaches increasingly focus on agile development and/or DevOps, as these approaches are seen as more modern, streamlined, flexible, and, therefore, effective as compared to traditional plan-driven approaches. This extends to the current pedagogy for teaching systems…
Descriptors: Information Systems, Teaching Methods, Computer Software, Information Science Education
Palka, Sean – ProQuest LLC, 2015
This research details a methodology designed for creating content in support of various phishing prevention tasks including live exercises and detection algorithm research. Our system uses probabilistic context-free grammars (PCFG) and variable interpolation as part of a multi-pass method to create diverse and consistent phishing email content on…
Descriptors: Prevention, Information Security, Grammar, Electronic Mail
Nyinkeu, Ngatchu Damen; Thaddeus, Kabuin; Henry, Ngatchu – International Journal of Technology in Teaching and Learning, 2016
In an era when its is increasingly encouraged to share source-codes, the training of students, particularly information technology students, faces several challenges in communicating aspects of academic honesty -- precisely authenticity of authorship. The genuineness of this issue has implications primarily in the integral formation of students…
Descriptors: Open Source Technology, Ethics, Pedagogical Content Knowledge, Plagiarism
Lee, Sang-Heui – ProQuest LLC, 2010
Although there have been a number of studies on large scale implementation of proprietary enterprise information systems (EIS), open-source software (OSS) for EIS has received limited attention in spite of its potential as a disruptive innovation. Cost saving is the main driver for adopting OSS among the other possible benefits including security…
Descriptors: Information Systems, Open Source Technology, Computer Software, Computer Software Evaluation
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers