| 5(1) | Establishing an Assessment Process for a Computing Program | Aasheim, Gowan, and Reichgelt
|
| 5(2) | MySpace.com – A Social Networking Site and Social Contract Theory | Snyder, Carpenter, and Slauson
|
| 5(3) | Modern Data Structures: Experiences with a Flexible Approach to a Data Structures Course | Stillman and Peslak
|
| 5(4) | Learning Communities in Information Systems Education: Developing the Reflective Practitioner | Saulnier, Brooks, Ceccucci, and White
|
| 5(5) | Virtual Laboratory Intrusion Detection Experience for Information Systems Professionals | Harvey, Johnson, and Turchek |
| 5(6) | Integrating a Project Component into the Introductory Computer Science and Information Systems Curriculum | Kortsarts and Rufinus
|
| 5(7) | Evaluation of a Virtual Lab Environment for Teaching Web Application Development | Liegle and Meso
|
| 5(8) | Coordinated Topic Presentations for Information Systems Core Curriculum and Discrete Mathematics Courses | Harvey, Wu, Turchek, and Longenecker
|
| 5(9) | Development, Extension, and Application: A Review of the Technology Acceptance Model | Sharp
|
5(10)
| Iconic Computer Interface as Cultural Artifact: Its Role in Maintaining the “Status Quo” | Bone
|
| 5(11) | Redesigning an Information System Security Curriculum through Application of Traditional Pedagogy and Modern Business Trends. | Woodward and Young
|
| 5(12) | Building an International Resource Center Web Site -- A Capstone Senior Project Course Experience | Kellersberger and Hashemi
|
| 5(13) | Unwired: Student Use of Technology in the Ubiquitous Computing World | DeGagne and Wolk
|
| 5(14) | Forecasting Computer Crime Complaints | Omar, Kwanbunbumpen, and Alijani
|
| 5(15) | Standardization of Internet Retail E-Business Solutions | Kesthong, Wei, Liu, and Koong
|
| 5(16) | Development of Chain Management Model for the Apparel Retail E-Business | Pfitscher and Wei (
|
| 5(17) | Issue-Contingent Ethical Views—A Comparison Using Pathfinder Associative Networks | Kreie, Alt, Cronan, and Leonard
|
| 5(18) | Disconnect of the Non-Computer Information Systems Major to the Information Systems Literacy Course | Baugh
|
5(19)
| Inserting Requirements Traceability into the Capstone Sequence | Roggio
|
| 5(20) | Perspective on the Use of Modeling Diagrams in Computer Science and Information Systems Curricula | Naugler and Surendran
|
| 5(21) | Modeling Information and Business Systems Architectures—a Team Project | Steenkamp, Schiller, Allour, et al
|
| 5(22) | Experience Designing and Teaching a Hands-on Project-based Networking Technologies Course for IS and IT | Krishnamoorthy
|
| 5(23) | Ethics in the Pedagogy of Information Systems | Joseph
|
| 5(24) | Incorporating Real World Projects and Emerging Technologies into One MIS Capstone Course | Janicki, Fischetti, and Burns
|
| 5(25) | Development of Assessment Portfolios for IS Majors | Todorova and Mills
|
| 5(26) | Ethics and Moral Intensity: An Analysis of Information Technology and General Education Students | Peslak
|
| 5(27) | Integrating a Service-Oriented Paradigm into Introductory IS Courses | Lim and Jong
|
| 5(28) | Teaching Scalability Issues in Large Scale Database Application Development | Anderson, Jafar, and Abdullat
|
| 5(29) | Career Track Design in IS Curriculum: A Case Study | Soe and Hwang
|
5(30)
| Capstone Project Experiences: Integrating Computer Science and the Liberal Arts | Miles and Kelm
|
| 5(31) | Value of a Project-based Approach to Teaching Electronic Commerce in MBA Programs, | Kakish and McCord
|
| 5(32) |
Paper Removed by Request of the Authors (2014) | |
| 5(33) | Bridging the Academic / Industrial Chasm for the Millennial Generation | Beard, Schwieger, and Surendran
|
| 5(34) | Research Design for Assessing Attitudes in Technology Acceptance: Chinese Americans and Internet Banking | Gibson
|
| 5(35) | Development of a Comprehensive Assessment Plan: One Campus’ Experience | White and McCarthy
|
| 5(36) | Getting A Hook On Phishing | Frank and Werner |
| 5(37) | “Child is Father to the Man”: Social Software in the IS 2007 Curriculum? | Saulnier
|
| 5(38) | Examination of Initiation, Organization, Participation, Leadership, and Control of Successful Open Source Software Development Projects | Conlon
|
| 5(39) | Thinking Globally: Incorporating an International Component in Information Security Curricula | White and Long
|
| 5(40) | Information Systems Analyst National Assessment Exam: Factors for Success | Segall, Gollhardt, and Morrell
|