Journal of Information Systems Education

Journal publishing applications-oriented and research articles covering information systems education and training topics.

Articles from Vol. 19, No. 3, Fall

An on Demand Text-to-Speech Agent
This Teaching Tip provides a Microsoft .NET 2.0 framework application that uses Microsoft Agent[R] for on demand text- to speech (TTS) capability. One opens the program, then pastes selected text into a textbox to have Microsoft Agent[R] Merlin...
Controlling Curriculum Redesign with a Process Improvement Model
1. INTRODUCTION An academic curriculum can be viewed as a process that transforms students (Grundy, 1987). The components of this process include courses, instructors, teaching materials and methods. In theory, when viewed from this perspective,...
Enabling Customization through Web Development: An Iterative Study of the Dell Computer Corporation Website
1. INTRODUCTION The need for integration of education, practice, and information technology is growing (Lu, Yu, and Liu, 2003). Instructors in Management information systems (MIS) and other disciplines are often encouraged to find ways to assist...
Engaging Students with Constructivist Participatory Examinations in Asynchronous Learning Networks
1. INTRODUCTION AND MOTIVATION Examinations are regarded as a standard way to measure the mastery or achievement of education, and well designed examinations are a vital part of education assessment (Lowel, 1926). It has perplexed educators to find...
Exploring the Importance of Mentoring for New Scholars: A Social Exchange Perspective
1. INTRODUCTION Mentoring can take many forms. In some cases, a senior member of the organization is assigned to "show the ropes" to a new employee or junior faculty member; in other settings, it can be a senior faculty member that a younger, junior...
Five Data Validation Cases
Data-validation routines enable computer applications to test data to ensure their accuracy, completeness, and conformance to industry or proprietary standards. This paper presents five programming cases that require students to validate five...
Gender Differences and Intra-Gender Differences Amongst Management Information Systems Students
1. INTRODUCTION The goal of this paper is to contribute to our understanding of women's underrepresentation in MIS by investigating if male and female students in MIS courses differ in social psychological variables, such as values, beliefs, and...
Learning Experience with Virtual Worlds
1. VIRTUAL WORLDS Virtual worlds within the scope of this article are understood as immersive, three-dimensional, multi-media, multi-person simulation environments, where each participant adopts an alter ego and interacts with other participants...
Learning Human Aspects of Collaborative Software Development
Collaboration has become increasingly widespread in the software industry as systems have become larger and more complex, adding human complexity to the technological complexity already involved in developing software systems. To deal with ...
Mapping the MIS Curriculum Based on Critical Skills of New Graduates: An Empirical Examination of IT Professionals
1. INTRODUCTION Information technology (IT) and information system (IS) professionals constitute one of the greatest cadres of knowledge workers in modern organizations today. Knowledge workers in general make up over half the US workforce (Laudon...
Online Education Forum-Part Three a Quality Online Educational Experience
1. INTRODUCTION 1.1 Unforgiving Environment Many faculty and administrators struggle with the elusive issue of what it means to achieve quality in online education (Hirschheim, 2005; Porter, Griffiths, and Hedberg, 2003; Schell, 2004; Sullivan,...
The Recovery Care and Treatment Center: A Database Design and Development Case
1. CASE INFORMATION 1.1 Case Background Established in 1979, the RCTC is an addiction treatment and recovery agency located in a Midwestern state in the USA. The mission of the organization is to help individuals recover from alcohol and drug...