NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Edwards, Richard; Carmichael, Patrick – Discourse: Studies in the Cultural Politics of Education, 2012
There is a long tradition in education of examination of the hidden curriculum, those elements which are implicit or tacit to the formal goals of education. This article draws upon that tradition to open up for investigation the hidden curriculum and assumptions about students and knowledge that are embedded in the coding undertaken to facilitate…
Descriptors: Information Technology, Semantics, Case Method (Teaching Technique), Hidden Curriculum
Peer reviewed Peer reviewed
Direct linkDirect link
King, Michael A. – Journal of Information Technology Education, 2009
Business intelligence derived from data warehousing and data mining has become one of the most strategic management tools today, providing organizations with long-term competitive advantages. Business school curriculums and popular database textbooks cover data warehousing, but the examples and problem sets typically are small and unrealistic. The…
Descriptors: Strategic Planning, Problem Sets, Corporations, Statistics
Peer reviewed Peer reviewed
Direct linkDirect link
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Matos, Victor; Grasser, Rebecca – Journal of Information Systems Education, 2007
This paper presents an example of integrating IT skills using an interesting real life problem. We describe how the reverse- and forward-engineering of the USA National Do Not Call registry was used in our capstone course to illustrate the fusion of different (but interdependent) issues and techniques learned in the IT program. The purpose of the…
Descriptors: Information Technology, Engineering, Ethics, Learning Experience
Peer reviewed Peer reviewed
Direct linkDirect link
Ballenger, Robert M. – Journal of Information Systems Education, 2007
This case provides a real-world semester long project-oriented case study for students enrolled in an electronic commerce course that has a significant development component. The case provides the technical framework in the form of functional requirements for students to design and build a fully functional transaction processing e-commerce Web…
Descriptors: Programming, Databases, Case Method (Teaching Technique), College Students