


default search action
SIGITE Conference 2005: Newark, NJ, USA
- Robert S. Friedman:

Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005, Newark, NJ, USA, October 20-22, 2005. ACM 2005, ISBN 1-59593-252-6
Curriculum models
- Cheryl Aasheim, Choong Kwon Lee, Han Reichgelt

:
Implementing the IT fundamentals knowledge area. 1-5 - Melissa Jane Dark, Joseph J. Ekstrom, Barry M. Lunt:

Integration of information assurance and security into the IT2005 model curriculum. 7-14 - Reza Kamali, Samuel Liles, Charles Winer, Keyuan Jiang, Barbara Nicolai:

An implementation of the SIGITE model curriculum. 15-17
Extension of the IT curriculum
- Joseph Catanio:

Developing LaSalle's IT graduate certificate program partnered with industry. 19-23 - Michael D. Kane, Jeffrey L. Brewer:

The creation of interdisciplinary biomedical informatics education in an information technology curriculum. 25-29 - Manimegalai M. Subramaniam:

The emergence of IT degree programs: when did it happen? 31-35
Curricular basics and trends
- Soleda Leung, Christopher Johnson:

Computational concepts in IT: a new approach to IT mathematics. 37-42 - Dianne P. Bills, John A. Biles:

The role of programming in IT. 43-49 - L. Donnell Payne:

Integrating wireless devices into the IT curriculum. 51-55
Strategies for laboratory learning
- Ed Crowley:

Open source centric information security lab development. 57-63 - Steven A. Brown, Hilmi A. Lahoud:

An examination of innovative online lab technologies. 65-70 - Abelardo Pardo

, Carlos Delgado Kloos:
Deploying interactive e-labs for a course on operating systems. 71-78
Strategies for teaching wireless computing
- Bruce Hartpence, Lawrence W. Hill:

Wireless carts: an inexpensive education and research platform. 79-82 - Lawrence W. Hill:

Equipment safety in the wireless networking laboratory environment. 83-87 - Bruce Hartpence:

Teaching wireless security for results. 89-93
Support for teaching and learning 1
- Laurie Werner:

Redefining computer literacy in the age of ubiquitous computing. 95-99 - C. Richard G. Helps, Robert B. Jackson, Marshall B. Romney:

Student expectations of computing majors. 101-106 - Judy Backhouse

:
Learning individual group skills for software analysis and design in Africa. 107-112
Strategies for teaching network programming
- Peter H. Lutz:

NetDev: an object-oriented framework enabling network programming for students and researchers. 113-119 - Lakshmi Prayaga:

Building dynamic web applications with ASP.Net and ColdFusion MX 7.0: a comparative approach. 121-124 - Rukshan Athauda

, Nuwan Kodagoda
, Jagath Wickramarathne
, Prasanna Sumathipala, Lakmal Rupasinghe, Aruna Edirisighe, Anjalie Gamage, Dhammika De Silva:
Integrating industrial technologies, tools and practices to the IT curriculum: an innovative course with .NET and java platforms. 125-132
Strategies for incorporating new technologies I
- Jeffrey W. Chastine, Jon A. Preston:

Teaching 2D arrays using real-time video filters. 133-137 - Yanhao Zhu, James Crouch, Mohammad H. N. Tabrizi:

In-process object-oriented database design for .NET. 139-142 - Anne Marchant, Bill Tulloh:

Using pre-release software to SPUR student learning. 143-148
Assessment of IT competencies
- Jack P. Krichen:

Dynamically adjusting to learner's competencies and styles in an online technology course. 149-154 - Harold H. Smith III, Debra L. Smarkusky:

Competency matrices for peer assessment of individuals in team projects. 155-162 - Herbert E. Longenecker Jr., David L. Feinstein:

Development of assessment for undergraduate programs of information technology, and certification for program graduates. 163-166
Strategies for making connections with industry
- Jeffrey L. Brewer:

Project managers: can we make them or just make them better? 167-173 - Jill E. Courte, Cathy Bishop-Clark:

Creating connections: bringing industry and educators together. 175-178 - Janet M. Wagner, Deborah Boisvert

, Jean-Pierre Kuilboer, Jeffrey M. Keisler
, Pratyush Bharati:
Cross-functional concentrations merge IT and business concepts. 179-184
Security
- David W. Valentine:

Practical computer security: a new service course based upon the national strategy to secure cyberspace. 185-189 - Michael G. Bailey:

Malware resistant networking using system diversity. 191-197 - Andy Ju An Wang:

Web-based interactive courseware for information security. 199-204
Strategies for experimental learning
- Brian H. Cameron, Shaun C. Knight, John F. Semmer:

The IT consulting model: innovative methods for industry partnerships. 205-210 - Ron Fulbright, Richard L. Routh:

IPC incorporated: a student-run IT services company for experiential learning. 211-216 - Lori L. DeLooze:

Creating a microcosm of industry in the classroom. 217-221
Support for teaching and learning 2
- Ken Abernethy, Kevin Treu, George Piegari, Han Reichgelt

:
A learning object repository in support of introductory IT courses. 223-227 - Lori L. DeLooze:

Minimal UML diagrams for a data-driven web site. 229-232 - Ashraf Saad, Deborah Boisvert

:
National science foundation advanced technological education projects and centers of excellence for information technology education: an overview. 233-238
Standards, pedagogy and requirements
- Xiaosong Li, Christine Prasad:

Effectively teaching coding standards in programming. 239-244 - Tom Wulf:

Constructivist approaches for teaching computer programming. 245-248 - Cheryl L. Willis, Susan L. Miertschin:

Mind tools for enhancing thinking and learning skills. 249-254
Methods of IT teaching and learning 1
- Cherie Ann Sherman:

Earning positive evaluations from IT students: effective techniques. 255-259 - Rahat Iqbal

, Peter Every:
Scenario based method for teaching, learning and assessment. 261-266 - Gregory W. Hislop, Randy M. Kaplan, Lee J. Leitner:

Extending an information systems curriculum to address information technology. 267-270 - Jeanna Neefe Matthews

:
Hands-on approach to teaching computer networking using packet traces. 361-367
Strategies for practical & online learning
- Russell E. McMahon:

Teaching information technology using the perry stages. 277-281 - Lee J. Leitner, John W. Cane:

A virtual laboratory environment for online IT education. 283-289 - Joan Oliver, Marta Prim:

Mixed-project-based learning methodology in computer electronic engineering. 291-294 - Lee Toderick, Tijjani Mohammed, Mohammad H. N. Tabrizi:

A consortium of secure remote access Labs for information technology education. 295-299
Lifelong student engagement in IT
- Linda L. Werner, Shannon Campe, Jill Denner:

Middle school girls + games programming = information technology fluency. 301-305 - Lakshmi Prayaga:

Game technology as a tool to actively engage K-12 students in the act of learning. 307-310 - Elizabeth V. Howard:

Promoting communication and inclusiveness in the IT classroom. 311-317
Methods of IT teaching & learning 2
- William Campbell, Robert Cohen:

Using system administrator education in eeveloping an IT eegree in a computer science department. 319-321 - Bryan Higgs, Mihaela Sabin:

Towards using online portfolios in computing courses. 323-328 - Lori L. DeLooze:

He who does not learn history is doomed to repeat it. 329-332
Software development and analysis
- Timothy Burns, Robb Klashner:

A cross-collegiate analysis of software development course content. 333-337 - Luciano Rodrigues Guimarães, Plínio Roberto Souza Vilela:

Comparing software development models using CDM. 339-347 - Joanna DeFranco-Tommarello, Fadi P. Deek:

An on-line tutorial for collaborative problem solving and software development. 349-352
Special session
- C. Richard G. Helps, Barry M. Lunt, David K. Anthony:

ABET accreditation with IT criteria. 353-359
Posters
- Michael G. Bailey, James H. Manookin, Nathan H. Blackham:

Creative learning with practical applications for 802.11 wireless communications. 369-370 - Glenn S. Dardick, Linda K. Lau:

Interdisciplinary minor in digital forensics, security and law. 371 - Deima Elnatour:

Functional-driven heuristic evaluation of administrative portal systems used in institutions of higher education. 373-374 - Jeanna Neefe Matthews

:
Common sense computing: an approach to community outreach with IT. 375-376 - Russell E. McMahon:

Computer history resources. 377-378 - Animesh Patcha, Glenda Scales:

Development of an internet based distance learning program at Virginia Tech. 379-380 - Choong Kwon Lee, Han Reichgelt

:
Skill requirements for IT managers and the IT model curriculum: a critical reflection. 381-382 - Stefan A. Robila

:
Distributed computing and computer security education. 383-384 - Stefan A. Robila

, Carl E. Bredlau:
Writing requirements in computer security. 385-386 - Norman Salt:

A model IT curriculum for ESL students. 387-388 - Angelina Totolo:

An exploration of the theories that explain the failure of information technology adoption in africa. 389-390 - Andrew J. Walters:

Technology management K-12: developing a technology strategic plan for covenant christian school. 391-392

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














