default search action
SIGITE Conference 2005: Newark, NJ, USA
- Robert S. Friedman:
Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005, Newark, NJ, USA, October 20-22, 2005. ACM 2005, ISBN 1-59593-252-6
Curriculum models
- Cheryl Aasheim, Choong Kwon Lee, Han Reichgelt:
Implementing the IT fundamentals knowledge area. 1-5 - Melissa Jane Dark, Joseph J. Ekstrom, Barry M. Lunt:
Integration of information assurance and security into the IT2005 model curriculum. 7-14 - Reza Kamali, Samuel Liles, Charles Winer, Keyuan Jiang, Barbara Nicolai:
An implementation of the SIGITE model curriculum. 15-17
Extension of the IT curriculum
- Joseph Catanio:
Developing LaSalle's IT graduate certificate program partnered with industry. 19-23 - Michael D. Kane, Jeffrey L. Brewer:
The creation of interdisciplinary biomedical informatics education in an information technology curriculum. 25-29 - Manimegalai M. Subramaniam:
The emergence of IT degree programs: when did it happen? 31-35
Curricular basics and trends
- Soleda Leung, Christopher Johnson:
Computational concepts in IT: a new approach to IT mathematics. 37-42 - Dianne P. Bills, John A. Biles:
The role of programming in IT. 43-49 - L. Donnell Payne:
Integrating wireless devices into the IT curriculum. 51-55
Strategies for laboratory learning
- Ed Crowley:
Open source centric information security lab development. 57-63 - Steven A. Brown, Hilmi A. Lahoud:
An examination of innovative online lab technologies. 65-70 - Abelardo Pardo, Carlos Delgado Kloos:
Deploying interactive e-labs for a course on operating systems. 71-78
Strategies for teaching wireless computing
- Bruce Hartpence, Lawrence W. Hill:
Wireless carts: an inexpensive education and research platform. 79-82 - Lawrence W. Hill:
Equipment safety in the wireless networking laboratory environment. 83-87 - Bruce Hartpence:
Teaching wireless security for results. 89-93
Support for teaching and learning 1
- Laurie Werner:
Redefining computer literacy in the age of ubiquitous computing. 95-99 - C. Richard G. Helps, Robert B. Jackson, Marshall B. Romney:
Student expectations of computing majors. 101-106 - Judy Backhouse:
Learning individual group skills for software analysis and design in Africa. 107-112
Strategies for teaching network programming
- Peter H. Lutz:
NetDev: an object-oriented framework enabling network programming for students and researchers. 113-119 - Lakshmi Prayaga:
Building dynamic web applications with ASP.Net and ColdFusion MX 7.0: a comparative approach. 121-124 - Rukshan I. Athauda, Nuwan Kodagoda, Jagath Wickramaratne, Prasanna Sumathipala, Lakmal Rupasinghe, Aruna Edirisighe, Anjalie Gamage, Dhammika De Silva:
Integrating industrial technologies, tools and practices to the IT curriculum: an innovative course with .NET and java platforms. 125-132
Strategies for incorporating new technologies I
- Jeffrey W. Chastine, Jon A. Preston:
Teaching 2D arrays using real-time video filters. 133-137 - Yanhao Zhu, James Crouch, Mohammad H. N. Tabrizi:
In-process object-oriented database design for .NET. 139-142 - Anne Marchant, Bill Tulloh:
Using pre-release software to SPUR student learning. 143-148
Assessment of IT competencies
- Jack P. Krichen:
Dynamically adjusting to learner's competencies and styles in an online technology course. 149-154 - Harold H. Smith III, Debra L. Smarkusky:
Competency matrices for peer assessment of individuals in team projects. 155-162 - Herbert E. Longenecker Jr., David L. Feinstein:
Development of assessment for undergraduate programs of information technology, and certification for program graduates. 163-166
Strategies for making connections with industry
- Jeffrey L. Brewer:
Project managers: can we make them or just make them better? 167-173 - Jill E. Courte, Cathy Bishop-Clark:
Creating connections: bringing industry and educators together. 175-178 - Janet M. Wagner, Deborah Boisvert, Jean-Pierre Kuilboer, Jeffrey M. Keisler, Pratyush Bharati:
Cross-functional concentrations merge IT and business concepts. 179-184
Security
- David W. Valentine:
Practical computer security: a new service course based upon the national strategy to secure cyberspace. 185-189 - Michael G. Bailey:
Malware resistant networking using system diversity. 191-197 - Andy Ju An Wang:
Web-based interactive courseware for information security. 199-204
Strategies for experimental learning
- Brian H. Cameron, Shaun C. Knight, John F. Semmer:
The IT consulting model: innovative methods for industry partnerships. 205-210 - Ron Fulbright, Richard L. Routh:
IPC incorporated: a student-run IT services company for experiential learning. 211-216 - Lori L. DeLooze:
Creating a microcosm of industry in the classroom. 217-221
Support for teaching and learning 2
- Ken Abernethy, Kevin Treu, George Piegari, Han Reichgelt:
A learning object repository in support of introductory IT courses. 223-227 - Lori L. DeLooze:
Minimal UML diagrams for a data-driven web site. 229-232 - Ashraf Saad, Deborah Boisvert:
National science foundation advanced technological education projects and centers of excellence for information technology education: an overview. 233-238
Standards, pedagogy and requirements
- Xiaosong Li, Christine Prasad:
Effectively teaching coding standards in programming. 239-244 - Tom Wulf:
Constructivist approaches for teaching computer programming. 245-248 - Cheryl L. Willis, Susan L. Miertschin:
Mind tools for enhancing thinking and learning skills. 249-254
Methods of IT teaching and learning 1
- Cherie Ann Sherman:
Earning positive evaluations from IT students: effective techniques. 255-259 - Rahat Iqbal, Peter Every:
Scenario based method for teaching, learning and assessment. 261-266 - Gregory W. Hislop, Randy M. Kaplan, Lee J. Leitner:
Extending an information systems curriculum to address information technology. 267-270 - Jeanna Neefe Matthews:
Hands-on approach to teaching computer networking using packet traces. 361-367
Strategies for practical & online learning
- Russell E. McMahon:
Teaching information technology using the perry stages. 277-281 - Lee J. Leitner, John W. Cane:
A virtual laboratory environment for online IT education. 283-289 - Joan Oliver, Marta Prim:
Mixed-project-based learning methodology in computer electronic engineering. 291-294 - Lee Toderick, Tijjani Mohammed, Mohammad H. N. Tabrizi:
A consortium of secure remote access Labs for information technology education. 295-299
Lifelong student engagement in IT
- Linda L. Werner, Shannon Campe, Jill Denner:
Middle school girls + games programming = information technology fluency. 301-305 - Lakshmi Prayaga:
Game technology as a tool to actively engage K-12 students in the act of learning. 307-310 - Elizabeth V. Howard:
Promoting communication and inclusiveness in the IT classroom. 311-317
Methods of IT teaching & learning 2
- William Campbell, Robert Cohen:
Using system administrator education in eeveloping an IT eegree in a computer science department. 319-321 - Bryan Higgs, Mihaela Sabin:
Towards using online portfolios in computing courses. 323-328 - Lori L. DeLooze:
He who does not learn history is doomed to repeat it. 329-332
Software development and analysis
- Timothy Burns, Robb Klashner:
A cross-collegiate analysis of software development course content. 333-337 - Luciano Rodrigues Guimarães, Plínio Roberto Souza Vilela:
Comparing software development models using CDM. 339-347 - Joanna DeFranco-Tommarello, Fadi P. Deek:
An on-line tutorial for collaborative problem solving and software development. 349-352
Special session
- C. Richard G. Helps, Barry M. Lunt, David K. Anthony:
ABET accreditation with IT criteria. 353-359
Posters
- Michael G. Bailey, James H. Manookin, Nathan H. Blackham:
Creative learning with practical applications for 802.11 wireless communications. 369-370 - Glenn S. Dardick, Linda K. Lau:
Interdisciplinary minor in digital forensics, security and law. 371 - Deima Elnatour:
Functional-driven heuristic evaluation of administrative portal systems used in institutions of higher education. 373-374 - Jeanna Neefe Matthews:
Common sense computing: an approach to community outreach with IT. 375-376 - Russell E. McMahon:
Computer history resources. 377-378 - Animesh Patcha, Glenda Scales:
Development of an internet based distance learning program at Virginia Tech. 379-380 - Choong Kwon Lee, Han Reichgelt:
Skill requirements for IT managers and the IT model curriculum: a critical reflection. 381-382 - Stefan A. Robila:
Distributed computing and computer security education. 383-384 - Stefan A. Robila, Carl Bredlau:
Writing requirements in computer security. 385-386 - Norman Salt:
A model IT curriculum for ESL students. 387-388 - Angelina Totolo:
An exploration of the theories that explain the failure of information technology adoption in africa. 389-390 - Andrew J. Walters:
Technology management K-12: developing a technology strategic plan for covenant christian school. 391-392
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.