default search action
SIGITE Conference 2007: Destin, Florida, USA
- Bob Sweeney, David L. Feinstein, Joseph J. Ekstrom:
Proceedings of the 8th Conference on Information Technology Education, SIGITE 2007, Destin, Florida, USA, October 18-20, 2007. ACM 2007, ISBN 978-1-59593-920-3
Curriculum issues in IT education 1
- C. Richard G. Helps:
Dancing on quicksand gracefully: instructional design for rapidly evolving technology courses. 1-8 - Keith A. Morneau, Sue Talley:
Architecture: an emerging core competence for IT professionals. 9-12 - Charles W. Reynolds, Bryan S. Goda:
The affective dimension of pervasive themes in the information technology curriculum. 13-20
Curriculum issues in IT education 2
- Tsun Chow, Alan Chmura, Kurt Linberg:
Curriculum design for a PhD specialization in IT education. 21-26 - Sandra Gorka, Jacob R. Miller, Brandon J. Howe:
Developing realistic capstone projects in conjunction with industry. 27-32
High performance computing in IT education
- Michael D. Kane, John A. Springer:
Integrating bioinformatics, distributed data management, and distributed computing for applied training in high performance computing. 33-36 - Marjorie Darrah, Frances L. Van Scoy, Patrick Plunkett:
Enabling collaboration in high performance computing. 37-40
Technology impacts in teaching 1
- Mihaela Sabin, Bryan Higgs:
Teaching and learning in live online classrooms. 41-48 - S. Jeff Cold, George D. Hickman:
Literature review and experience with whole classroom peer tutoring for IT students. 49-52 - Chi-Hong Leung, Yuen-Yan Chan:
Knowledge management system for electronic learning of IT skills. 53-58 - Anthony Chan, Mark Frydenberg, Mark J. W. Lee:
Facilitating cross-cultural learning through collaborative skypecasting. 59-66
Networking instruction 1
- Paul B. Albee, Laura A. Campbell, Martin A. Murray, Christopher M. Tongen, Jennifer L. Wolfe:
A student-managed networking laboratory. 67-74 - John Gerdes Jr., Scott R. Tilley:
A conceptual overview of the virtual networking laboratory. 75-82 - William D. Armitage, Alessio Gaspar, Matthew Rideout:
Remotely accessible sandboxed environment with application to a laboratory course in networking. 83-90
Programming instruction in IT
- Alessio Gaspar, Sarah Langevin:
Restoring "coding with intention" in introductory programming courses. 91-98 - Dianne P. Bills, Roxanne L. Canosa:
Sharing introductory programming curriculum across disciplines. 99-106
Technology impacts in teaching 2
- Michael G. Bailey:
A web systems laboratory using portable hard drives. 107-112 - Lee Toderick, Philip J. Lunsford II:
Using VPN technology to remove physical barriers in linux lab experiments. 113-118 - Ed Van Sickle, Efrem Mallach, Brian H. Cameron, Derrek B. Dunn, Denetra Rook, Frank M. Groom, Ronnie Rollins:
Storage technologies: an education opportunity. 119-126
Learning and teaching in IT 1
- Jack P. Krichen:
Investigating learning styles in the online educational environment. 127-134 - SeungEun Cha, DaiYoung Kwon, Won-Gyu Lee:
Using puzzles: problem-solving and abstraction. 135-140 - Rebecca H. Rutherfoord, James K. Rutherfoord:
Universal instructional design for learning how to apply in a virtual world. 141-146 - Jack Purdum:
Class size and its impact on information technology instruction. 147-150
Accreditation and management of IT programs
- George S. Nezlek, Paul M. Leidig:
The quest for an administrative nexus for information technology programs. 151-154 - Larry Booth, Jon Preston, Junfeng Qu:
Continuous program improvement: a project to automate record-keeping for accreditation. 155-160 - Cheryl Aasheim, Art Gowan, Han Reichgelt:
An IT program assessment process. 161-166
Learning and teaching in IT 2
- Stephen J. Zilora, Lisa M. Hermsen:
Take a WAC at writing in your course. 167-174 - Susan L. Miertschin, Cheryl L. Willis:
Using concept maps to navigate complex learning environments. 175-184 - Jill E. Courte:
Comparing student acceptance and performance of online activities to classroom activities. 185-190
Facing outward
- Russell E. McMahon:
Researching your institution's computer past. 191-194 - Marjorie Darrah, Rebecca Giorcelli, Tracie M. Dodson:
A comprehensive program for expanding pathways to IT careers. 195-200 - Russell E. McMahon:
An Examination of information technology related users groups. 201-206
Ethics and service learning
- Linda D. Webster, Edward J. Mirielli:
Student reflections on an academic service learning experience in a computer science classroom. 207-212 - Chi-Hong Leung, Yuen-Yan Chan:
A natural language processing approach to automatic plagiarism detection. 213-218 - Elizabeth V. Howard:
Students respond to IT ethics. 219-224
Networking instruction 2
- Raheel A. Malik, Raymond A. Hansen, James E. Goldman, Anthony H. Smith:
Laboratory modules for conducting comparative analysis of 802.11 frames. 225-232 - Brandon Wagner, Stephen A. Renshaw, Kent Broadbent:
A multi-part lab exercise for analyzing the effect of peer-to-peer software on a university network. 233-238 - Lawrence W. Hill:
An inexpensive method to shield wireless devices during hardware forensic investigation in a laboratory setting. 239-244
Information assurance and security instruction in IT
- Steven Rigby, Melissa Jane Dark, Joseph J. Ekstrom, Marcus K. Rogers:
Preparing IAS graduates to recognize and manage complexity. 245-252 - Mário A. M. Guimarães, Meg Murray:
Using animation courseware in the teaching of database security. 253-258 - Yin Pan:
Security auditing course development. 259-266
Poster session
- Gary B. Randolph:
Developing a foundational course in information systems. 267-268 - Lisa M. Frye:
Wireless sensor networks: learning and teaching. 269-270 - Dongqing Yuan, Jiling Zhong:
Building a CISCO-feel linux router to enable students learn and configure dynamic routing protocols. 271-272 - Laurie J. Patterson:
Color/font/text size: developing standards for video podcast. 273-274 - P. Mani Joseph, Jibulal Nair, I. S. Smiju, Barry M. Lunt:
Information technology education in india. 275-276
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.