52 research outputs found

    Lessons Learned from the Trenches: Successful Design of Online IT Courses for High School Students

    Get PDF
    As high schools begin to offer more distance learning courses, universities have an opportunity to establish partnerships to deliver online IT courses. Delivering online courses at the high school level, however, means overcoming obstacles that may not be faced at the university level. In particular, establishing partnerships with high schools requires politically savvy navigations of bureaucratic roadblocks while ensuring the integrity of course content and delivery. This paper provides a primer on establishing relationships with high schools to deliver college-level IT curriculum to high school students in an asynchronous learning environment. We describe the curriculum introduced and discuss some of the challenges faced and the lessons learned

    Common Method Variance in IS Research: Should We Be Concerned?

    Get PDF

    IT: THE LAST BOYS CLUB?

    Get PDF

    Designing a First Year Experience Course for IS Students

    Get PDF
    First Year Experience (FYE) courses target entering students and introduce them to the college environment and expectations for the college classroom. These courses have gained increasing popularity due to their positive impact on retention of students, as well as increased graduation rates. This workshop will describe how to design a FYE course specifically targeting IS students. The IS focused FYE course should improve the retention of students in information technology and information systems. As IS departments face declining enrollment, retaining the students who do select IS majors is of critical importance. Workshop participants will create a basic syllabus for the specially focused FYE course and will complete activities that will prepare them to propose and deliver the course at their university

    A Call to IS Educators to Respond to the Voices of Women in Information Security

    Get PDF
    Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed in previous IT career paths. Research methodology focuses on a qualitative analysis of in-depth interviews with women who are self-described information security professionals. A primary goal of the study is to understand the perceptions of women in information security and determine what IS educators can do to help educate a new generation of students who are diverse, confident, and excited about the real-world aspects of an information security degree. Suggestions for improving the representation of women in information security and their ultimate perception of the field include better recruiting and retention strategies, development of mentors, and changes in presentation of the information security field

    Perspectives on Open Access Opportunities for IS Research Publication: Potential Benefits for Researchers, Educators, and Students

    Get PDF
    Access to current research materials, pedagogical best practices, and relevant knowledge has become problematic as journal subscription costs have increased. Increasing delays in the traditional publication timeline, coupled with high subscription costs, have resulted in a diminished ability for IS faculty and their students to access the most relevant research in a timely manner, an issue felt most acutely in developing nations. As IS educators seeks to increase the dissemination of their work and ensure that students have the most updated knowledge, one option is publishing in open-access (OA) journals. However, a lack of knowledge, inconsistent quality perceptions, the presence of predatory journals, and publication fees have negatively affected IS researchers’ support for OA publishing. This study surveyed 68 IS scholars and found that IS scholars do not publish in OA journals due to concerns about fees, quality, prestige, and impact factors. This study found more similarities than differences between junior- and senior-level IS scholars, with junior faculty members placing more emphasis on the speed of publication than their senior colleagues do. By understanding the underlying reasons that IS faculty are favoring OA options, the study hopes to shed light on the reliance on traditional journal publication models that restrict the distribution of intellectual property. If the OA approach were embraced by more journals, IS faculty members and their students benefit through expeditious access to relevant content to support faculty professional development, instruction, and research

    Exploring the Theoretical Foundations of Microcomputer Playfulness

    Get PDF
    Researchers have defined microcomputer playfulness (MCP) as a situation-specific individual characteristic that represents a type of cognitive playfulness [46]. Further, MCP describes the tendency to interact spontaneously, inventively, and imaginatively with computers. Studies [46] have suggested that MCP should be measured as both a trait and a state variable. The issue over whether MCP is a trait, a state, or a combination of the two, parallels the disagreement in social and applied psychology among situationists and trait theorists. To clarify this and other issues, we synthesize the literature from psychology and human resource management (HRM) to develop a theory of MCP using multiple constructs

    An IS Student’s Worst Nightmare: Programming Courses

    Get PDF
    IS students continue to struggle to complete the programming courses often required in their course of study. In this research-in-progress, we describe how IS educators can learn about the predictors of success in programming courses and translate that knowledge into better advising for their IS students. We plan to administer an open-ended survey to IS educators, asking them what factors they believe predict success in programming principles courses. Based on their responses, we will determine if IS educator perceptions of variables predicting success in programming courses match the realities discussed in previous research. Then we plan to develop a set of guidelines so that IS educators can translate that knowledge into better advising for IS students

    Winners and Losers in the Napster Case

    Get PDF
    In this study, we examine the impact of the Napster decision on RIAA sales. We also present a brief introduction to copyright law and DMCA. We compare RIAA sales to DVD and entertainment software sales, both before and after the Napster decision. Analysis of variance showed no differences in sales growth before Napster; that is, all industries showed similar growth. After Napster, however, RIAA showed significantly lower growth than that experienced by the movie and entertainment software industries

    Learning Outcomes for Cyber Defense Competitions

    Get PDF
    Cyber defense competitions (CDCs) simulate a real-world environment, where the competitors must protect the information assets of a fictional organization. These competitions are becoming popular at the high school and college levels, as well as in industry and governmental settings. However, there is little research to date on the learning outcomes associated with CDCs or the long-term benefits to the participants as they pursue future educational, employment or military goals. For this exploratory research project, we surveyed 11 judges and mentors participating in a well-established high school CDC held in the southeastern United States. Then we developed a set of recommended learning outcomes for CDCs, based on importance of the topic and participant preparedness for future information-security related endeavors. While most previous research has focused on technology issues, we analyzed technological, human, and social topics, to develop a comprehensive set of recommendations for future CDCs
    • …
    corecore