ISEDJ

Information Systems Education Journal

Volume 5 - 2007

Table of Contents

   5(1)   Establishing an Assessment Process for a Computing ProgramAasheim, Gowan, and Reichgelt
   5(2)    MySpace.com – A Social Networking Site and Social Contract TheorySnyder, Carpenter, and Slauson
   5(3)    Modern Data Structures: Experiences with a Flexible Approach to a Data Structures CourseStillman and Peslak
   5(4)   Learning Communities in Information Systems Education: Developing the Reflective PractitionerSaulnier, Brooks, Ceccucci, and White
   5(5)    Virtual Laboratory Intrusion Detection Experience for Information Systems ProfessionalsHarvey, Johnson, and Turchek
   5(6)   Integrating a Project Component into the Introductory Computer Science and Information Systems CurriculumKortsarts and Rufinus
   5(7)    Evaluation of a Virtual Lab Environment for Teaching Web Application DevelopmentLiegle and Meso
   5(8)   Coordinated Topic Presentations for Information Systems Core Curriculum and Discrete Mathematics CoursesHarvey, Wu, Turchek, and Longenecker
   5(9)   Development, Extension, and Application: A Review of the Technology Acceptance ModelSharp
   5(10)   


Iconic Computer Interface as Cultural Artifact: Its Role in Maintaining the “Status Quo”Bone
   5(11)    Redesigning an Information System Security Curriculum through Application of Traditional Pedagogy and Modern Business Trends.Woodward and Young
   5(12)   Building an International Resource Center Web Site -- A Capstone Senior Project Course ExperienceKellersberger and Hashemi
   5(13)   Unwired: Student Use of Technology in the Ubiquitous Computing WorldDeGagne and Wolk
   5(14)   Forecasting Computer Crime ComplaintsOmar, Kwanbunbumpen, and Alijani
   5(15)   Standardization of Internet Retail E-Business SolutionsKesthong, Wei, Liu, and Koong
   5(16)   Development of Chain Management Model for the Apparel Retail E-BusinessPfitscher and Wei (
   5(17)   Issue-Contingent Ethical Views—A Comparison Using Pathfinder Associative NetworksKreie, Alt, Cronan, and Leonard
   5(18)   Disconnect of the Non-Computer Information Systems Major to the Information Systems Literacy CourseBaugh
   5(19)   


Inserting Requirements Traceability into the Capstone SequenceRoggio
   5(20)    Perspective on the Use of Modeling Diagrams in Computer Science and Information Systems CurriculaNaugler and Surendran
   5(21)    Modeling Information and Business Systems Architectures—a Team ProjectSteenkamp, Schiller, Allour, et al
   5(22)    Experience Designing and Teaching a Hands-on Project-based Networking Technologies Course for IS and ITKrishnamoorthy
   5(23)    Ethics in the Pedagogy of Information SystemsJoseph
   5(24)   Incorporating Real World Projects and Emerging Technologies into One MIS Capstone CourseJanicki, Fischetti, and Burns
   5(25)    Development of Assessment Portfolios for IS MajorsTodorova and Mills
   5(26)    Ethics and Moral Intensity: An Analysis of Information Technology and General Education StudentsPeslak
   5(27)   Integrating a Service-Oriented Paradigm into Introductory IS CoursesLim and Jong
   5(28)    Teaching Scalability Issues in Large Scale Database Application DevelopmentAnderson, Jafar, and Abdullat
   5(29)    Career Track Design in IS Curriculum: A Case StudySoe and Hwang
   5(30)   


Capstone Project Experiences: Integrating Computer Science and the Liberal ArtsMiles and Kelm
   5(31)   Value of a Project-based Approach to Teaching Electronic Commerce in MBA Programs, Kakish and McCord
   5(32)    Paper Removed by Request of the Authors (2014) 
   5(33)    Bridging the Academic / Industrial Chasm for the Millennial GenerationBeard, Schwieger, and Surendran
   5(34)   Research Design for Assessing Attitudes in Technology Acceptance: Chinese Americans and Internet BankingGibson
   5(35)   Development of a Comprehensive Assessment Plan: One Campus’ ExperienceWhite and McCarthy
   5(36)   Getting A Hook On PhishingFrank and Werner
   5(37)    “Child is Father to the Man”: Social Software in the IS 2007 Curriculum?Saulnier
   5(38)   Examination of Initiation, Organization, Participation, Leadership, and Control of Successful Open Source Software Development ProjectsConlon
   5(39)   Thinking Globally: Incorporating an International Component in Information Security CurriculaWhite and Long
   5(40)   Information Systems Analyst National Assessment Exam: Factors for SuccessSegall, Gollhardt, and Morrell