Abstract is missing.
- Dancing on quicksand gracefully: instructional design for rapidly evolving technology coursesC. Richard G. Helps. 1-8 [doi]
- Architecture: an emerging core competence for IT professionalsKeith A. Morneau, Sue Talley. 9-12 [doi]
- The affective dimension of pervasive themes in the information technology curriculumCharles W. Reynolds, Bryan S. Goda. 13-20 [doi]
- Curriculum design for a PhD specialization in IT educationTsun Chow, Alan Chmura, Kurt Linberg. 21-26 [doi]
- Developing realistic capstone projects in conjunction with industrySandra Gorka, Jacob R. Miller, Brandon J. Howe. 27-32 [doi]
- Integrating bioinformatics, distributed data management, and distributed computing for applied training in high performance computingMichael D. Kane, John A. Springer. 33-36 [doi]
- Enabling collaboration in high performance computingMarjorie Darrah, Frances L. Van Scoy, Patrick Plunkett. 37-40 [doi]
- Teaching and learning in live online classroomsMihaela Sabin, Bryan Higgs. 41-48 [doi]
- Literature review and experience with whole classroom peer tutoring for IT studentsS. Jeff Cold, George D. Hickman. 49-52 [doi]
- Knowledge management system for electronic learning of IT skillsChi-Hong Leung, Yuen-Yan Chan. 53-58 [doi]
- Facilitating cross-cultural learning through collaborative skypecastingAnthony Chan, Mark Frydenberg, Mark J. W. Lee. 59-66 [doi]
- A student-managed networking laboratoryPaul B. Albee, Laura A. Campbell, Martin A. Murray, Christopher M. Tongen, Jennifer L. Wolfe. 67-74 [doi]
- A conceptual overview of the virtual networking laboratoryJohn Gerdes Jr., Scott R. Tilley. 75-82 [doi]
- Remotely accessible sandboxed environment with application to a laboratory course in networkingWilliam D. Armitage, Alessio Gaspar, Matthew Rideout. 83-90 [doi]
- Restoring coding with intention in introductory programming coursesAlessio Gaspar, Sarah Langevin. 91-98 [doi]
- Sharing introductory programming curriculum across disciplinesDianne P. Bills, Roxanne L. Canosa. 99-106 [doi]
- A web systems laboratory using portable hard drivesMichael G. Bailey. 107-112 [doi]
- Using VPN technology to remove physical barriers in linux lab experimentsLee Toderick, Philip J. Lunsford II. 113-118 [doi]
- Storage technologies: an education opportunityEd Van Sickle, Efrem Mallach, Brian Cameron, Derrek B. Dunn, Denetra Rook, Frank Groom, Ronnie Rollins. 119-126 [doi]
- Investigating learning styles in the online educational environmentJack P. Krichen. 127-134 [doi]
- Using puzzles: problem-solving and abstractionSeungEun Cha, DaiYoung Kwon, WonGyu Lee. 135-140 [doi]
- Universal instructional design for learning how to apply in a virtual worldRebecca H. Rutherfoord, James K. Rutherfoord. 141-146 [doi]
- Class size and its impact on information technology instructionJack Purdum. 147-150 [doi]
- The quest for an administrative nexus for information technology programsGeorge S. Nezlek, Paul M. Leidig. 151-154 [doi]
- Continuous program improvement: a project to automate record-keeping for accreditationLarry Booth, Jon Preston, Junfeng Qu. 155-160 [doi]
- An IT program assessment processCheryl Aasheim, Art Gowan, Han Reichgelt. 161-166 [doi]
- Take a WAC at writing in your courseStephen J. Zilora, Lisa M. Hermsen. 167-174 [doi]
- Using concept maps to navigate complex learning environmentsSusan L. Miertschin, Cheryl L. Willis. 175-184 [doi]
- Comparing student acceptance and performance of online activities to classroom activitiesJill E. Courte. 185-190 [doi]
- Researching your institution s computer pastRussell E. McMahon. 191-194 [doi]
- A comprehensive program for expanding pathways to IT careersMarjorie Darrah, Rebecca Giorcelli, Tracie Dodson. 195-200 [doi]
- An Examination of information technology related users groupsRussell E. McMahon. 201-206 [doi]
- Student reflections on an academic service learning experience in a computer science classroomLinda D. Webster, Edward J. Mirielli. 207-212 [doi]
- A natural language processing approach to automatic plagiarism detectionChi-Hong Leung, Yuen-Yan Chan. 213-218 [doi]
- Students respond to IT ethicsElizabeth V. Howard. 219-224 [doi]
- Laboratory modules for conducting comparative analysis of 802.11 framesRaheel A. Malik, Raymond A. Hansen, James E. Goldman, Anthony H. Smith. 225-232 [doi]
- A multi-part lab exercise for analyzing the effect of peer-to-peer software on a university networkBrandon Wagner, Stephen Renshaw, Kent Broadbent. 233-238 [doi]
- An inexpensive method to shield wireless devices during hardware forensic investigation in a laboratory settingLawrence W. Hill. 239-244 [doi]
- Preparing IAS graduates to recognize and manage complexitySteven Rigby, Melissa Jane Dark, Joseph J. Ekstrom, Marcus Rogers. 245-252 [doi]
- Using animation courseware in the teaching of database securityMario Guimaraes, Meg Murray. 253-258 [doi]
- Security auditing course developmentYin Pan. 259-266 [doi]
- Developing a foundational course in information systemsGary B. Randolph. 267-268 [doi]
- Wireless sensor networks: learning and teachingLisa M. Frye. 269-270 [doi]
- Building a CISCO-feel linux router to enable students learn and configure dynamic routing protocolsDongqing Yuan, Jiling Zhong. 271-272 [doi]
- Color/font/text size: developing standards for video podcastLaurie J. Patterson. 273-274 [doi]
- Information technology education in indiaP. Mani Joseph, Jibulal Nair, I. S. Smiju, Barry M. Lunt. 275-276 [doi]