NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)7
Audience
What Works Clearinghouse Rating
Showing all 9 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Huynh, Minh; Ghimire, Prashant – Journal of Information Technology Education: Innovations in Practice, 2015
As mobile devices become prevalent, there is always a need for apps. How hard is it to develop an app, especially a cross-platform app? The paper shares an experience in a project that involved the development of a student services web app that can be run on cross-platform mobile devices. The paper first describes the background of the project,…
Descriptors: Handheld Devices, Computer Oriented Programs, Computer Software, Open Source Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Henson, Kerry; Kamal, Mustafa – American Journal of Business Education, 2010
The power of outsourcing basic computing technology such as computer programming, database design, customer service operations and system development, to mention a few have changed the conditions of employment in IT. Many of the projects that went off-shore did not perform well due to failure to consider important factors in business dimensions.
Descriptors: Business Administration, Business Administration Education, Outsourcing, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Wagner, William P.; Pant, Vik – Journal of Information Systems Education, 2010
One of the areas where demand has remained strong for MIS students is in the area of database management. Since the early days, this topic has been a mainstay in the MIS curriculum. Students of database management today typically learn about relational databases, SQL, normalization, and how to design and implement various kinds of database…
Descriptors: College Instruction, Computer Science Education, Information Technology, Business Administration Education
Peer reviewed Peer reviewed
Direct linkDirect link
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Peer reviewed Peer reviewed
Direct linkDirect link
Steiger, David M. – Journal of Information Systems Education, 2008
This case focuses on learning by applying the four integrating mechanisms of Nonaka's knowledge creation theory: socialization, externalization, combination and internalization. In general, such knowledge creation and internalization (i.e., learning) is critical to database students since they will be expected to apply their specialized database…
Descriptors: Constructivism (Learning), Epistemology, Information Technology, Databases
Pfeiffer, Jay; Klein, Steven; Levesque, Karen – Online Submission, 2009
The American Recovery and Reinvestment Act (ARRA) provides several funding opportunities that can assist states in designing, developing, and implementing statewide education longitudinal data systems. These new and enhanced information systems will enable states to track student progress within and across the secondary and postsecondary education…
Descriptors: Information Systems, Education Work Relationship, Secondary Education, Postsecondary Education
Peer reviewed Peer reviewed
Direct linkDirect link
King, Michael A. – Journal of Information Technology Education, 2009
Business intelligence derived from data warehousing and data mining has become one of the most strategic management tools today, providing organizations with long-term competitive advantages. Business school curriculums and popular database textbooks cover data warehousing, but the examples and problem sets typically are small and unrealistic. The…
Descriptors: Strategic Planning, Problem Sets, Corporations, Statistics
Osman, Tom – Adults Learning, 2004
Allan Ridley has many interesting qualities, not least his determination. Though he is totally blind, he doesn't let that stop him pursuing his interests, whether he is water skiing or learning database design. When asked to tutor blind learner Allan Ridley, the author had to give a lot of thought to making the curriculum accessible. This article…
Descriptors: Instructional Design, Database Design, Disability Discrimination, Databases
Ren, Zhanying; Liu, Shijie – Online Submission, 2005
According to the requirement of modern teaching theory and technology, based on software engineering, database theory, the technique of net information security and system integration, a net testing system on local network was designed and realized. The system benefits for dividing of testing & teaching and settles the problems of random…
Descriptors: Educational Technology, Databases, Information Technology, Computer Networks