5(1) | Establishing an Assessment Process for a Computing Program | Aasheim, Gowan, and Reichgelt
|
5(2) | MySpace.com – A Social Networking Site and Social Contract Theory | Snyder, Carpenter, and Slauson
|
5(3) | Modern Data Structures: Experiences with a Flexible Approach to a Data Structures Course | Stillman and Peslak
|
5(4) | Learning Communities in Information Systems Education: Developing the Reflective Practitioner | Saulnier, Brooks, Ceccucci, and White
|
5(5) | Virtual Laboratory Intrusion Detection Experience for Information Systems Professionals | Harvey, Johnson, and Turchek |
5(6) | Integrating a Project Component into the Introductory Computer Science and Information Systems Curriculum | Kortsarts and Rufinus
|
5(7) | Evaluation of a Virtual Lab Environment for Teaching Web Application Development | Liegle and Meso
|
5(8) | Coordinated Topic Presentations for Information Systems Core Curriculum and Discrete Mathematics Courses | Harvey, Wu, Turchek, and Longenecker
|
5(9) | Development, Extension, and Application: A Review of the Technology Acceptance Model | Sharp
|
5(10)
| Iconic Computer Interface as Cultural Artifact: Its Role in Maintaining the “Status Quo” | Bone
|
5(11) | Redesigning an Information System Security Curriculum through Application of Traditional Pedagogy and Modern Business Trends. | Woodward and Young
|
5(12) | Building an International Resource Center Web Site -- A Capstone Senior Project Course Experience | Kellersberger and Hashemi
|
5(13) | Unwired: Student Use of Technology in the Ubiquitous Computing World | DeGagne and Wolk
|
5(14) | Forecasting Computer Crime Complaints | Omar, Kwanbunbumpen, and Alijani
|
5(15) | Standardization of Internet Retail E-Business Solutions | Kesthong, Wei, Liu, and Koong
|
5(16) | Development of Chain Management Model for the Apparel Retail E-Business | Pfitscher and Wei (
|
5(17) | Issue-Contingent Ethical Views—A Comparison Using Pathfinder Associative Networks | Kreie, Alt, Cronan, and Leonard
|
5(18) | Disconnect of the Non-Computer Information Systems Major to the Information Systems Literacy Course | Baugh
|
5(19)
| Inserting Requirements Traceability into the Capstone Sequence | Roggio
|
5(20) | Perspective on the Use of Modeling Diagrams in Computer Science and Information Systems Curricula | Naugler and Surendran
|
5(21) | Modeling Information and Business Systems Architectures—a Team Project | Steenkamp, Schiller, Allour, et al
|
5(22) | Experience Designing and Teaching a Hands-on Project-based Networking Technologies Course for IS and IT | Krishnamoorthy
|
5(23) | Ethics in the Pedagogy of Information Systems | Joseph
|
5(24) | Incorporating Real World Projects and Emerging Technologies into One MIS Capstone Course | Janicki, Fischetti, and Burns
|
5(25) | Development of Assessment Portfolios for IS Majors | Todorova and Mills
|
5(26) | Ethics and Moral Intensity: An Analysis of Information Technology and General Education Students | Peslak
|
5(27) | Integrating a Service-Oriented Paradigm into Introductory IS Courses | Lim and Jong
|
5(28) | Teaching Scalability Issues in Large Scale Database Application Development | Anderson, Jafar, and Abdullat
|
5(29) | Career Track Design in IS Curriculum: A Case Study | Soe and Hwang
|
5(30)
| Capstone Project Experiences: Integrating Computer Science and the Liberal Arts | Miles and Kelm
|
5(31) | Value of a Project-based Approach to Teaching Electronic Commerce in MBA Programs, | Kakish and McCord
|
5(32) |
Paper Removed by Request of the Authors (2014) | |
5(33) | Bridging the Academic / Industrial Chasm for the Millennial Generation | Beard, Schwieger, and Surendran
|
5(34) | Research Design for Assessing Attitudes in Technology Acceptance: Chinese Americans and Internet Banking | Gibson
|
5(35) | Development of a Comprehensive Assessment Plan: One Campus’ Experience | White and McCarthy
|
5(36) | Getting A Hook On Phishing | Frank and Werner |
5(37) | “Child is Father to the Man”: Social Software in the IS 2007 Curriculum? | Saulnier
|
5(38) | Examination of Initiation, Organization, Participation, Leadership, and Control of Successful Open Source Software Development Projects | Conlon
|
5(39) | Thinking Globally: Incorporating an International Component in Information Security Curricula | White and Long
|
5(40) | Information Systems Analyst National Assessment Exam: Factors for Success | Segall, Gollhardt, and Morrell
|