


default search action
SIGITE Conference 2007: Destin, Florida, USA
- Bob Sweeney, David L. Feinstein, Joseph J. Ekstrom:

Proceedings of the 8th Conference on Information Technology Education, SIGITE 2007, Destin, Florida, USA, October 18-20, 2007. ACM 2007, ISBN 978-1-59593-920-3
Curriculum issues in IT education 1
- C. Richard G. Helps:

Dancing on quicksand gracefully: instructional design for rapidly evolving technology courses. 1-8 - Keith A. Morneau, Sue Talley:

Architecture: an emerging core competence for IT professionals. 9-12 - Charles W. Reynolds, Bryan S. Goda:

The affective dimension of pervasive themes in the information technology curriculum. 13-20
Curriculum issues in IT education 2
- Tsun Chow, Alan Chmura, Kurt Linberg:

Curriculum design for a PhD specialization in IT education. 21-26 - Sandra Gorka, Jacob R. Miller, Brandon J. Howe:

Developing realistic capstone projects in conjunction with industry. 27-32
High performance computing in IT education
- Michael D. Kane, John A. Springer:

Integrating bioinformatics, distributed data management, and distributed computing for applied training in high performance computing. 33-36 - Marjorie Darrah

, Frances L. Van Scoy, Patrick Plunkett:
Enabling collaboration in high performance computing. 37-40
Technology impacts in teaching 1
- Mihaela Sabin, Bryan Higgs:

Teaching and learning in live online classrooms. 41-48 - S. Jeff Cold, George D. Hickman:

Literature review and experience with whole classroom peer tutoring for IT students. 49-52 - Chi-Hong Leung, Yuen-Yan Chan:

Knowledge management system for electronic learning of IT skills. 53-58 - Anthony Chan

, Mark Frydenberg, Mark J. W. Lee:
Facilitating cross-cultural learning through collaborative skypecasting. 59-66
Networking instruction 1
- Paul B. Albee, Laura A. Campbell, Martin A. Murray, Christopher M. Tongen, Jennifer L. Wolfe:

A student-managed networking laboratory. 67-74 - John Gerdes Jr., Scott R. Tilley:

A conceptual overview of the virtual networking laboratory. 75-82 - William D. Armitage, Alessio Gaspar

, Matthew Rideout:
Remotely accessible sandboxed environment with application to a laboratory course in networking. 83-90
Programming instruction in IT
- Alessio Gaspar

, Sarah Langevin:
Restoring "coding with intention" in introductory programming courses. 91-98 - Dianne P. Bills, Roxanne L. Canosa:

Sharing introductory programming curriculum across disciplines. 99-106
Technology impacts in teaching 2
- Michael G. Bailey:

A web systems laboratory using portable hard drives. 107-112 - Lee Toderick, Philip J. Lunsford II:

Using VPN technology to remove physical barriers in linux lab experiments. 113-118 - Ed Van Sickle, Efrem Mallach, Brian H. Cameron, Derrek B. Dunn, Denetra Rook, Frank M. Groom, Ronnie Rollins:

Storage technologies: an education opportunity. 119-126
Learning and teaching in IT 1
- Jack P. Krichen:

Investigating learning styles in the online educational environment. 127-134 - SeungEun Cha, DaiYoung Kwon, Won-Gyu Lee:

Using puzzles: problem-solving and abstraction. 135-140 - Rebecca H. Rutherfoord, James K. Rutherfoord:

Universal instructional design for learning how to apply in a virtual world. 141-146 - Jack Purdum:

Class size and its impact on information technology instruction. 147-150
Accreditation and management of IT programs
- George S. Nezlek, Paul M. Leidig:

The quest for an administrative nexus for information technology programs. 151-154 - Larry Booth, Jon Preston, Junfeng Qu

:
Continuous program improvement: a project to automate record-keeping for accreditation. 155-160 - Cheryl Aasheim, Art Gowan, Han Reichgelt

:
An IT program assessment process. 161-166
Learning and teaching in IT 2
- Stephen J. Zilora, Lisa M. Hermsen:

Take a WAC at writing in your course. 167-174 - Susan L. Miertschin, Cheryl L. Willis:

Using concept maps to navigate complex learning environments. 175-184 - Jill E. Courte:

Comparing student acceptance and performance of online activities to classroom activities. 185-190
Facing outward
- Russell E. McMahon:

Researching your institution's computer past. 191-194 - Marjorie Darrah

, Rebecca Giorcelli, Tracie M. Dodson
:
A comprehensive program for expanding pathways to IT careers. 195-200 - Russell E. McMahon:

An Examination of information technology related users groups. 201-206
Ethics and service learning
- Linda D. Webster, Edward J. Mirielli:

Student reflections on an academic service learning experience in a computer science classroom. 207-212 - Chi-Hong Leung, Yuen-Yan Chan:

A natural language processing approach to automatic plagiarism detection. 213-218 - Elizabeth V. Howard:

Students respond to IT ethics. 219-224
Networking instruction 2
- Raheel A. Malik, Raymond A. Hansen, James E. Goldman, Anthony H. Smith:

Laboratory modules for conducting comparative analysis of 802.11 frames. 225-232 - Brandon Wagner, Stephen A. Renshaw, Kent Broadbent:

A multi-part lab exercise for analyzing the effect of peer-to-peer software on a university network. 233-238 - Lawrence W. Hill:

An inexpensive method to shield wireless devices during hardware forensic investigation in a laboratory setting. 239-244
Information assurance and security instruction in IT
- Steven Rigby, Melissa Jane Dark, Joseph J. Ekstrom, Marcus K. Rogers

:
Preparing IAS graduates to recognize and manage complexity. 245-252 - Mário A. M. Guimarães, Meg Murray:

Using animation courseware in the teaching of database security. 253-258 - Yin Pan:

Security auditing course development. 259-266
Poster session
- Gary B. Randolph:

Developing a foundational course in information systems. 267-268 - Lisa M. Frye:

Wireless sensor networks: learning and teaching. 269-270 - Dongqing Yuan, Jiling Zhong:

Building a CISCO-feel linux router to enable students learn and configure dynamic routing protocols. 271-272 - Laurie J. Patterson:

Color/font/text size: developing standards for video podcast. 273-274 - P. Mani Joseph, Jibulal Nair, I. S. Smiju

, Barry M. Lunt:
Information technology education in india. 275-276

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














