Abstract is missing.
- Academic IT and adjacent disciplines 2010Joseph J. Ekstrom, Barry M. Lunt. 1-8 [doi]
- The impact of multiple computing and digital arts degrees on undergraduate recruitmentAmber Settle, Liz Friedman, Mary Jo Davidson. 9-14 [doi]
- A teaching pedagogy for networking/system administration courses: freshman through senior yearsMark Stockman, John Nyland. 15-20 [doi]
- Improving the general monitoring systemChristopher M. Tongen, Michael Stinson. 21-24 [doi]
- Small service is true service while it lasts: integrating web services into IT educationRandy W. Connolly. 25-29 [doi]
- Who cares about web services?: a student perspective on web technology educationRyan W. Kazmerik. 30-32 [doi]
- The IT thesis project: a slow beginningChristopher Cole, Joseph J. Ekstrom. 33-36 [doi]
- Technology acceptance in learning settings from a student perspective: a theoretical frameworkChi Zhang. 37-42 [doi]
- Using VMware VCenter lab manager in undergraduate education for system administration and network securityXinli Wang, Guy C. Hembroff, Rick Yedica. 43-52 [doi]
- Feasibility of virtual security laboratory for three-tiered distance educationYoung B. Choi, Shinyoung Lim, Tae-Hwan Oh. 53-58 [doi]
- Implementing a virtual community of interest at Capella UniversityTsun Chow, Alan Chmura. 59-64 [doi]
- Comparing a well designed webcast with traditional learningMichail N. Giannakos, Panayiotis Vlamos. 65-68 [doi]
- Integrating the google wave platform with eclipse for collaborative, real-time code creationBethany A. Waldmann, Devon J. Lehman. 69-72 [doi]
- Adaptive educational hypermedia systems in technology enhanced learning: a literature reviewCatherine Mulwa, Séamus Lawless, Mary Sharp, Inmaculada Arnedillo Sánchez, Vincent Wade. 73-84 [doi]
- Information technology curriculum and practical opportunities in automationJohnny L. Welch. 85-88 [doi]
- Real world experiences in a software engineering courseRandy M. Kaplan, Joo Tan. 89-94 [doi]
- Let's go! magical spoons: a high school learning program for information coding fundamentalsMizue Kayama, Takao Futagami, Atsushi Konno, Takeharu Tasaki, Cortland Starrett. 95-104 [doi]
- Cloud in cloud: approaches and implementationsPeng Li, Lee Toderick. 105-110 [doi]
- Creating laboratories for undergraduate courses in mobile phone forensicsRichard P. Mislan. 111-116 [doi]
- TLS man-in-the-middle laboratory exercise for network security educationJoshua Lewis, Phil Lunsford. 117-120 [doi]
- Overcoming gender segregation in service learning projects: a case from Saudi ArabiaHend S. Al-Khalifa. 121-124 [doi]
- An analysis of the common body of knowledge of software assuranceSusan Uzubell, Samuel Liles, Keyuan Jiang. 125-130 [doi]
- Privacy and ethical concerns in internet securityRebecca H. Rutherfoord, James K. Rutherfoord. 131-134 [doi]
- Centering resonance analysis: a potential tool for IT program assessmentCheryl L. Willis, Susan L. Miertschin. 135-142 [doi]
- Developing a community definition and teaching modules for computational thinking: accomplishments and challengesAshley Ater-Kranov, Robert Bryant, Genevieve Orr, Scott Wallace, Mo Zhang. 143-148 [doi]
- 802.11 networks performance evaluation using OPNETVictor Kulgachev, Hetal Jasani. 149-152 [doi]
- Engaging students in information storage management coursesVladan M. Jovanovic, Timur Mirzoev, Lee Toderick, Rick Homkes, Mark Stockman. 153-154 [doi]
- Design and implement a networking curriculum in light of ACM IT curriculum recommendations and bloom's taxonomyDongqing Yuan, Jiling Zhong. 155-156 [doi]
- Software assurance in academiaSusan Uzubell, Samuel Liles, Keyuan Jiang. 157-158 [doi]
- Teaching a fundamental programming course via a Chinese/American faculty exchange agreementHanqian Wu, Charles Winer. 159-162 [doi]
- Choosing a first programming languageRandy M. Kaplan. 163-164 [doi]
- Redesigning and revitalizing two networking courses in an undergraduate information technology degree programKam Fui Lau. 165-170 [doi]