ISEDJ

Information Systems Education Journal

Volume 8 - 2010

Table of Contents

   8(1)    Critical Thinking Measurement in ICTShannon, Schneider, and Bennett
   8(2)    Co-“Lab”oration: A New Paradigm for Building a Management Information Systems CourseBreimer, Cotler, and Yoder
   8(3)   Relational Model Distilled to Support Data Modeling in IS 2002Waguespack
   8(4)    Factors That Influence Transfer of Learning from the Online Environment Everett
   8(5)   


Scaling Large-size Undergraduate Classes at a Top Research University via eLearning Strategies: A Facilitated Model of Instruction using a Web 2.0 ParadigmConn, Boyer, Hu, and Wilkinson
   8(6)   Educating Information Systems Students on Business Process Management (BPM) through Digital Gaming Metaphors of Virtual RealityLawler and Joseph
   8(7)    Value Chain Approach for Attracting, Educating, and Transitioning Students to the IT ProfessionBeard, Schwieger, and Surendran
   8(8)   Integrating Soft Skill Competencies Through Project-based Learning Across the Information Systems CurriculumWoodward, Sendall, and Ceccucci
   8(9)    Integrating Enterprise Systems Concepts in the B-School — A Regional University PerspectiveHunt, Regan, Everett, Green, Hunt, and Becka
   8(10)   


From Computer Literacy to Web 2.0 Literacy: Teaching and Learning Information Technology Concepts Using Web 2.0 ToolsFrydenberg and Press
   8(11)    Analysis of an Anti-Phishing Lab ActivityWerner and Courte
   8(12)   Factors Affecting Women’s Decisions to Pursue an IS Degree: A Case StudySerapiglia and Lenox
   8(13)    Analysis of Career Tracks in the Design of IS Curricula in the U.S.Hwang and Soe
   8(14)   Developing the Cyber Defenders of Tomorrow With Regional Collegiate Cyber Defense Competitions (CCDC)Carlin, Manson, and Zhu
   8(15)   


Contributions of Traditional Web 1.0 Tools e.g. Email and Web 2.0 Tools e.g. Weblog Towards Knowledge ManagementDehinbo
   8(16)    Course Evaluation in Sweden - When, How, What and WhyCronholm
   8(17)   Best Practices: A Cure for the New Prep Headache?Burns and Steinbach
   8(18)   IS Project Management Course ProjectFrank
   8(19)    Myth Busting: Using Data Mining to Refute Link between Transfer Students and Retention RiskMcAleer and Szakas
   8(20)   

Measuring Faculty Instructional PerformanceTastle
   8(21)    XBRL: Beyond Basic XMLVanLengen
   8(22)    Business Students' Learning with Online Discussion Forums: The Case of a Virtual Classroom CommunityZhu
   8(23)   Generalized Thurstonian Paired Comparison Multicriteria Heuristic Model for Peer Evaluation of Individual Performance on IS Team ProjectsScher
   8(24)   Building an Integrated Student Information System in a K-12 School SystemSteenkamp and Basal
   8(25)   

Database Design and Development Case: NanoTEK NetworksBallenger
   8(26)   Identifying Influencers in High School Student ICT Career ChoiceBabin, Grant, and Sawal
   8(27)    Interdisciplinary Introductory Course in BioinformaticsKortsarts, Morris, and Utell
   8(28)    Got Web 2.0? A Review of Web 2.0 Tools for the Information Systems CurriculumSendall, Ceccucci, and Peslak
   8(29)   Enhancing the Value of the Capstone Experience Course Schwieger and Surendran
   8(30)   


Developing Oral and Written Communication Skills in Undergraduate Computer Science and Information Systems CurriculumKortsarts, Fischbach, et al
   8(31)   Doctoral Program of Management in Information Technology at SixSteenkamp
   8(32)    Determining the Effectiveness of Various Delivery Methods in an Information Technology/Information Systems CurriculumDavis, Kovacs, Scarpino, and Turchek
   8(33)   Piltdown Man or Inconvenient Truth? A Two-year Study of Student Perceptions about ComputingBattig
   8(34)   New Look at Security Education: YouTube as YouToolWerner and Frank
   8(35)   


Creating e-Commerce Start-ups with Information Systems Students: Lessons Learned from New Venture Successes and FailuresAbrahams
   8(36)    Modular Approach to Delivering an Introductory MIS CourseBraun, Crable, and Sena
   8(37)    Information Systems Education: What’s missing?Rosenthal
   8(38)    Enterprise Integration: An Experiential Learning ModelCameron and Purao
   8(39)   Peer Tutoring in Programming: Lessons LearnedGerhardt and Olan
   8(40)   


Increasing Active Learning and End-Client Interaction in the Systems Analysis and Design and Capstone CoursesReinicke and Janicki
   8(41)   Faculty Perceptions on the Goals and Achievements of Information Systems Executive Advisory BoardsSena, Sena, and Crable
   8(42)    Accounting for Systems Analysts in the 21st CenturyGiordano, McAleer, and Szakas
   8(43)    Probability Model for Belady's Anomaly, A.McMaster, Sambasivam, and Anderson
   8(44)   Alive and Kicking: Making the Case for Mainframe EducationMurphy, Sharma, Seay, and McClelland
   8(45)   

Challenges in Delivering Distance EducationChawdhry
   8(46)   Virtual Teams: Preparing Students for Global IT Management: An Empirical Exercise on Three Campuses in Two CountriesWhite, Tastle, and Semeniuta
   8(47)    Emphasizing Business Analysis to Increase IS EnrollmentsKizior and Hidding
   8(48)   Programming Proficiency in One Semester: Lessons LearnedColton and Curtis
   8(49)    Going From Data to Decisions: Preparing Students to Use Enterprise SystemsKreie, Mora-Monge, and Shannon
   8(50)   


Tracking Women and Minorities as They Attain Degrees in Computing and Related FieldsSorkin, Gore, Mento, and Stanton
   8(51)   Student Usage of Instructional Technologies: Differences in Online Learning StylesBallenger and Garvis
   8(52)    Exploration of the Legal and Regulatory Environment of Privacy and Security through Active Research, Guided Study, Blog Creation, and DiscussionPeslak
   8(53)    Website Accessibility for Users with Visual ImpairmentSmith and Lind
   8(54)    Strategies for Increasing IT Enrollment: Recruiting, Retaining and Encouraging the Transfer of Women and Underrepresented Groups to Four-Year CollegesTupper, Leitherer, Sorkin, and Gore
   8(55)   

Two Screens and an Ocean: Collaborating Across Continents and Cultures with Web-based Tools.Frydenberg and Andone
   8(56)   Study of the Programming Languages Used in Information Systems and in Computer Science CurriculaRussell, Russell, Pollacia, and Tastle
   8(57)   Moving Data, Moving Students: Involving Students in Learning About Internet Data Traffic.Reinicke and Yaylacicegi
   8(58)   Computer Literacy and Non-IS majorsThomas and Blackwood
   8(59)   Need, Use, and Best Practices for the Implementation of Learning Management Systems in Organizations and Higher Education InstitutionsDehinbo and Odunaike
   8(60)   

Cyber Forensics and Security as an ABET-CAC Accreditable Program.Wood, Kohun, et al
   8(61)   Object Oriented Approach in Systems Analysis and Design Texts: Consistency Within the IS CurriculumWood, Kohun, and Laverty
   8(62)    Role of the Web Server in a Capstone Web Application CourseUmapathy and Wallace
   8(63)    Integrated Technology Assessment: A Portfolio-based Capstone ExperienceShih, LeClair, and Varden
   8(64)    Using Blackboard's Learning Suite in ABET - CAC Outcomes Assessment and AccreditationLaverty, Wood, and Turchek
   8(65)   


Discovering Adjunct Communication Methods Outside the Classroom: An Exploratory StudySerapiglia, Woratschek, and Louch
   8(66)   Successful Engagement of Undergraduate Information Technology Management Students in a Compulsory Course in Ethical Issues in IT in a Large Class EnvironmentGrant
   8(67)    IS 2002 and ABET Accreditation: Meeting the ABET Program Outcome CriteriaLandry, Daigle, Longenecker, and Pardue
   8(68)    Recommendation for A Professional Focus Area in Data Management for the IS2002 Information Systems Model CurriculumLongenecker, Yarbrough, and Feinstein
   8(69)    Open Source ERP Applications: A Reality Check for Their Possible Adoption and Use in Teaching Business Process IntegrationHuynh and Pinto