NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chung, Sam – Information Systems Education Journal, 2018
The purpose of this research is to propose how we can encourage non-computing major first-generation-college-bound students to be actively involved in learning data analytics. Non-computing major students have limited opportunities to take a data analytics related course. The computing major programs have the resource limit for offering none-major…
Descriptors: Data Analysis, Workshops, Computer Science Education, Nonmajors
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chipidza, Wallace; Green, Gina; Riemenschneider, Cindy – Information Systems Education Journal, 2016
Research utilizing the Theory of Planned Behavior to understand behavior should first elicit beliefs about the phenomenon from the target population. In order to understand the reasons why students choose to major or not major in Management Information Systems (MIS), we elicited beliefs from 136 students attending university in the United States…
Descriptors: Management Information Systems, Beliefs, Questionnaires, Course Selection (Students)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ferguson, Roger C.; Leidig, Paul M.; Reynolds, John H. – Information Systems Education Journal, 2015
General education is more than a list of required courses a student must take to complete their degree. For most universities, general education is the groundwork for the student's university experience. These courses span multiple disciplines and allow students to experience a wide range of topics on their path to graduation. Programming classes,…
Descriptors: Programming, Programming Languages, General Education, Required Courses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Soares, Andrey – Information Systems Education Journal, 2014
App Inventor has been used successfully to teach introduction to programming course for CS/IS/IT and Non-CS majors. Now, researchers are looking on how to include the tool in the curriculum of more advanced computing courses. This paper presents some Issues, Challenges and Opportunities observed while teaching courses on Mobile Application…
Descriptors: Teaching Methods, Programming, Computer Science Education, Information Systems
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Smarkusky, Debra L.; Toman, Sharon A. – Information Systems Education Journal, 2014
Students in computer science and information technology should be engaged in solving real-world problems received from government and industry as well as those that expose them to various areas of application. In this paper, we discuss interdisciplinary project experiences between majors and non-majors that offered a creative and innovative…
Descriptors: Interdisciplinary Approach, Cooperative Learning, Student Projects, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Battig, Michael; Shariq, Muhammad – Information Systems Education Journal, 2011
Using a previously published study of how students differentiate between computing disciplines, this study attempts to validate the original research and add additional hypotheses regarding the type of institution that the student resides. Using the identical survey instrument from the original study, students in smaller colleges and in different…
Descriptors: Computer Science, Intellectual Disciplines, College Students, Validity
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Thomas, Jennifer D. E.; Blackwood, Martina – Information Systems Education Journal, 2010
This paper presents an investigation of non-Information Systems (IS) major's perceptions and performance when enrolled in a required introductory Computer Information Systems course. Students of various academic backgrounds were taught Excel, Hypertext Markup Language (HTML), JavaScript and computer literacy in a 14-week introductory course, in…
Descriptors: Computer Literacy, Information Systems, Nonmajors, Required Courses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Werner, Laurie A.; Courte, Jill – Information Systems Education Journal, 2010
Despite advances in spam detection software, anti-spam laws, and increasingly sophisticated users, the number of successful phishing scams continues to grow. In addition to monetary losses attributable to phishing, there is also a loss of confidence that stifles use of online services. Using in-class activities in an introductory computer course…
Descriptors: Information Security, Crime, Prevention, Class Activities