Journal of Information Technology Education

Articles from Vol. 6, Annual

A Framework towards Assessing the Merits of Inviting It Professionals to the Classroom
Introduction Many IS professional society curriculum reports stress the fact that IS students must be exposed to broad business and real world perspectives. For instance, the 2002 ACM/AIS/AITP Information Systems undergraduate curriculum report...
A 'Hands On' Strategy for Teaching Genetic Algorithms to Undergraduates
Introduction The study of data structures and their algorithms is fundamental in most undergraduate information technology and computer science programs and this can be simply evidenced by nearly 42,000 Google hits on the term "data structures course"....
A Methodical Formative Evaluation of Computer Literacy Course: What and How to Teach
Introduction Evaluation is the process of gathering information that will facilitate improving a program (formative) or that will help determining its value (summative). Many experts have analyzed the difference between formative and summative evaluation....
An Action Research Approach to the Design, Development and Evaluation of an Interactive E-Learning Tutorial in a Cognitive Domain
Introduction This article describes and discusses Relations, an interactive e-learning application that teaches mathematical skills in a cognitive domain. Relations is a supplementary computer-aided lesson that supports learning in a complex section...
An Examination of the Introductory MIS Course
Introduction The introductory management information system (MIS) course is a business core course for all business majors at most business schools (Ives et al., 2002). It is a common phenomenon for this course to have multiple sections taught by...
Are We There Yet?
Introduction Can we put a stake in the ground? Not in the telecommunications industry. Changes in technology and government regulation continue to transform the telecommunications industry at an unprecedented rate. Voice communication was once the...
A Scalable and Portable Structure for Conducting Successful Year-Long Undergraduate Software Team Projects
Introduction Producing industry ready graduates who are able to perform successfully in the workplace is a very important goal for tertiary educators. Factors of importance to employers, as described by Nunan (1999), extend beyond technical capabilities...
Barriers for Students' Learning of Holistic Systems Development
Introduction In the 1980s it was put forward that integration of the application and problem domain, i.e. the users' area and IT system's tasks respectively, requires that the systems developer possesses particular competences. Until that point...
Beyond Access: An Analysis of the Influence of the E-Rate Program in Bridging the Digital Divide in American Schools
Introduction E-Rate--more precisely, education rate--was enacted as part of the Telecommunications Act of 1996 and a new aspect of universal service programs in the U.S. (Bertot, 2000). The goal of E-Rate is to provide connectivity to network services...
Community of Inquiry in an Online Undergraduate Information Technology Course
Introduction Within the Community of Inquiry theoretical framework (Garrison, Anderson, & Archer, 2000), a successful higher education experience is held to be supported by the presence and interaction of the elements of cognitive, social and...
Designing CBT Systems with Errors in Mind: Avoidance, Seeding, and Tolerance
Introduction Users make errors when working with computers. Errors consume anywhere between 25 and 50 percent of the typical user's time (Arnold & Roe, 1987; Carroll & Meij, 1998) and are considered detrimental because they are stressful...
Embedding Critical Thinking in IS Curricula
Introduction Critical thinking is seen by some (Fagin, Harper, Baird, Hadfield & Sward, 2006) as "the cornerstone of academic maturity and a trademark of a well-educated person." The IS 2002 curriculum requires "an embedded problem solving and...
Faculty Integration of Technology into Instruction and Students' Perceptions of Computer Technology to Improve Student Learning
Introduction Technology permeates all sectors of our lives. Educators have been under pressure to reform school through technology (Becker, 2001; Mehlinger, 1996; Sheingold & Hadley, 1990). Over the past decade, educational stakeholders including...
First Year Courses in IT: A Bloom Rating
Introduction This paper builds on previous work by Oliver, Dobele, Greber and Roberts (2004a, 2004b) that examined the cognitive difficulty of two streams of three courses in an IT degree: a programming stream and a data communications and networking...
Information Technology Team Projects in Higher Education: An International Viewpoint
Background The earlier work of educational research was based on the teaching of associationist (Herbart, 1776-1841) and functionalist (Dewey, 1859-1952) theory (see Clark, 1999 for an overview of these theorists and their theories). Associations...
Is It Fully 'On' or Partly 'Off'? the Case of Fully-on-Line Provision of Transnational Education
Introduction Distance education is an increasingly common educational alternative as well as a key contributor to the newly competitive landscape in higher education. The distance learning market has become highly competitive, and universities are...
Just for Fun: Using Programming Games in Software Programming Training and Education-A Field Study of IBM Robocode Community
Introduction Improving learning effectiveness has always been a constant challenge in software education and training. One of the primary tasks educators face is to motivate learners to perform to their best abilities. One method of motivating learners...
Knowledge Structures of Entering Computer Networking Students and Their Instructors
Introduction Students come to their learning experiences with a variety of ideas gained from their previous experiences. The ideas, skills, and abilities that students bring with them are referred to as prior knowledge (Jonassen & Gabrowski,...
Know Your Discipline: Teaching the Philosophy of Computer Science
Background Computer science is a relatively young discipline. Its birth can be traced to the 1940s, when wider academic interest in automatic computing was triggered by the construction of the first fully electronic, digital, Turing-complete computer,...
Learning with Security
Introduction Internet-based higher education is characterized by studies that are flexible and to a great extent independent of time and space, but very dependent on a well-functioning and reliable IT infrastructure. The students often work on their...
On the Prospects and Concerns of Integrating Open Source Software Environment in Software Engineering Education
Introduction The steady rise of Open Source Software (OSS) (Raymond, 1999) over the last few decades has made a noticeable impact on many sectors of society where software has a role to play. Indeed, the current information technology movement could...
Python and Roles of Variables in Introductory Programming: Experiences from Three Educational Institutions
Introduction Undergraduate programming courses often have high drop-out rates and students have poorly developed programming skills. There has been a continual debate within programming education circles as to how to best solve these problems. The...
Reinforce Networking Theory with OPNET Simulation
Introduction The explosive growth of the Internet in recent years has created a need for scientists and engineers, who can maintain, tune, debug, and innovate the networking infrastructure. Mastery of these technologies involves both theory and...
Roles of Variables in Teaching
Introduction Learning to program is not easy. Recent experimental studies into students' programming ability have shown that university students in many countries have similar difficulties in writing (McCracken et al., 2001), tracing (Lister et...
Student Performance Shows Slight Improvement When Open Notes Are Used during Information Systems Exams
Introduction Students often ask about the use of reference aids during exams in most disciplines. These aids are most commonly notes they have taken, textbooks, handouts, or perhaps access to information stored on computers and/or the Internet....
Teaching Database Modeling and Design: Areas of Confusion and Helpful Hints
Introduction Database design has been an integral part of MIS curricula for decades. This field is wellestablished, with an abundant supply of research papers and textbooks, many of which have undergone several revisions. Yet, lack of clarity and...
The Delphi Method for Graduate Research
Introduction It continues to be an exciting time to be a researcher in the information systems discipline; there seems to be a plethora of interesting and pressing research topics suitable for research at the masters or PhD level. Researchers may...
The Lifelong Learning Iceberg of Information Systems Academics-A Study of On-Going Formal and Informal Learning by Academics
Introduction UNESCO adopted Lifelong Learning as a master concept in 1970 (Tight, 1998) as the culmination of efforts by many people to have recognised the relationship between investment in education of whole populations and economic and social...
To Txt or Not to Txt: That's the Puzzle
Introduction Promoting classroom interaction has been shown to enhance learning (Anderson, 2002; Markett, Sanchez, Weber, & Tangney, 2006). However, encouraging participation and deploying learning activities in large classes that range in size...
Using the Information Orientation Maturity Model to Increase the Effectiveness of the Core MBA IS Course
Introduction When Harvard Business Review published Nicolas Carr's article, "IT Doesn't Matter," (2003) a debate was launched in which many gallons of ink and reams of paper were consumed. Our purpose here is not to rehash the debate, but to reference...
Web-Based Learning Environment: A Theory-Based Design Process for Development and Evaluation
Introduction As an increasingly powerful, interactive, and dynamic medium for delivering information, the World Wide Web (Web) in combination with information technology (e.g., LAN, WAN, Internet, etc.) has found many applications. One popular application...
What Exactly Do You Want Me to Do? Analysis of a Criterion Referenced Assessment Project
Initial Literature Review The distinction is sometimes made in the literature, as it is in the university's policy description, between criterion-referenced and norm-referenced assessment (Brooker & Smith, 1996; Carlson, MacDonald, Gorely, Hanrahan,...

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.