Abstract is missing.
- Management, structures and tools to scale up personal advising in large programming coursesJaakko Kurhila, Arto Vihavainen. 3-8 [doi]
- Rethinking advising: developing a proactive culture to improve retentionAmber Settle, John Glatz. 9-14 [doi]
- How did mathemathematics and accounting get so many women majors?: what can IT disciplines learn?Ruth A. Guthrie, Elaine K. Yakura, Louise L. Soe. 15-20 [doi]
- Learning in the GNU/Linux communityDonald Davis, Iffat Jabeen. 21-26 [doi]
- Free and open source software development of IT systemsMihaela Sabin. 27-32 [doi]
- Physics in motion: an interdisciplinary projectDebra L. Smarkusky, Stanley J. Stancavage, Ryan E. Eagan, Preston E. Propert, Raymond F. Plociniak, Andrew M. Nichols. 33-38 [doi]
- Recruiting and retaining women in information technologyCynthia K. Riemenschneider, Theresa A. Steinbach, Janet S. Renwick. 39-40 [doi]
- Free and open source software in computing educationStephen Jacobs, Clif Kussmaul, Mihaela Sabin. 41-42 [doi]
- Engaging high school students in computer science via challenging applicationsGiuseppe Maggiore, Andrea Torsello, Flavio Sartoretto. 43-48 [doi]
- A novel junior transition course for students of applied information technologyPelin Aksoy. 49-54 [doi]
- Introductory computing course content: educator and student perspectivesJoseph V. Elarde, Fatt-Fei Chong. 55-60 [doi]
- Computational thinking in a game design courseAmber Settle. 61-66 [doi]
- Motivations and informing frameworks of game degree programs in the United Kingdom and the United StatesMonica McGill. 67-72 [doi]
- Engaging game design students using peer evaluationAmber Settle, Charles Wilcox, Chad Settle. 73-78 [doi]
- Applying CPR to the teaching of IT ethicsRick Homkes, Robert A. Strikwerda. 79-82 [doi]
- A student's perspective on the importance of teaching social issues in the IT curriculumFahad Zaidi. 83-86 [doi]
- Integrating mobile web development into IT curriculumHend S. Al-Khalifa, Nora I. Al-Rajebah. 87-90 [doi]
- Teaching web development at a distanceYe Diana Wang. 91-96 [doi]
- Community empowering service-learning courses through 21st century technologiesSusan Feather-Gannon, James Lawler, Pauline Mosley, Jean F. Coppola. 97-98 [doi]
- CSTA national standards and their impact on the future of K-12 computer educationAnita Verno, Brian Fuschetto, Frances P. Trees. 99-100 [doi]
- Bringing together a low-cost networking learning environmentSteve R. Cosgrove. 101-106 [doi]
- Developing IP telephony laboratory and curriculum with private cloud computingDongqing Yuan, Lewandowski Cody, Jiling Zhong. 107-112 [doi]
- The role of cyber-security in information technology educationDale C. Rowe, Barry M. Lunt, Joseph J. Ekstrom. 113-122 [doi]
- An assessment framework for identifying information technology programsDale C. Rowe, Barry M. Lunt, C. Richard G. Helps. 123-128 [doi]
- A competency based approach to developing articulation agreements in computingSandra Gorka, Jacob R. Miller, Daniel W. Yoas. 129-132 [doi]
- Computing faculty tenure and promotion requirements at USA and Canadian post-secondary institutionsMonica McGill, Amber Settle. 133-138 [doi]
- Even so with the pieces borrowed from others: dressing an IS program in IT clothingRandy W. Connolly, Bill Paterson. 139-144 [doi]
- Informatics minor for non-computer studentsStephen J. Zilora. 145-148 [doi]
- The 2+2 bachelor of applied science in information technology follow-up 2 years later: dealing with challengesRebecca H. Rutherfoord, Han Reichgelt, Andy Ju An Wang. 149-154 [doi]
- The Georgia WebBSIT: profile of an online student reexaminedArt Gowan, Kam Fui Lau, Angela Leverett, Byron Jeff, Wayne Summers, Andy Ju An Wang, Simon Baev. 155-160 [doi]
- Impact of student training on the perceived ease of use and ease of navigation of a learning management systemKevin McReynolds. 161-164 [doi]
- SAVI: a new system for advanced SQL visualizationMaurizio Cembalo, Alfredo De Santis, Umberto Ferraro Petrillo. 165-170 [doi]
- Databases in the cloud: a status reportEdward P. Holden, Jai W. Kang, Geoffrey R. Anderson, Dianne P. Bills. 171-176 [doi]
- Introducing cloud computing with a senior design project in undergraduate education of computer system and network administrationXinli Wang, Guy C. Hembroff, Alexander B. Cerier, Brian W. Perrault. 177-182 [doi]
- Implementing IT0/CS0 with scratch, app inventor forandroid, and lego mindstormsSuleyman Uludag, Murat Karakus, Stephen W. Turner. 183-190 [doi]
- A minimal, extensible, drag-and-drop implementation of the C programming languageStefano Federici. 191-196 [doi]
- Teaching garbage collection with open source virtual machineDelvin C. Defoe. 197-202 [doi]
- Multimedia-based visual programming promoting core competencies in IT educationV. J. Manzo, Matthew Halper, Michael Halper. 203-208 [doi]
- Visualizing the modern operating system: simulation experiments supporting enhanced learningBesim Mustafa. 209-214 [doi]
- An architecture for delivery of distance education in developing countriesKhondkar R. Islam, Charles M. Snow. 215-220 [doi]
- Teaching enterprise application development: strategies and challengesDavid Matthew Whittinghill, Kyle D. Lutes. 221-226 [doi]
- Teaching natural user interaction using OpenNI and the Microsoft Kinect sensorNorman Villaroman, Dale Rowe, Bret Swan. 227-232 [doi]
- Teaching innovation-on-demand in an undergraduate information technology programRon Fulbright. 233-238 [doi]
- A health IT application domain course for a traditional IT programChia-Chi Teng, Joseph J. Ekstrom. 239-244 [doi]
- Information technology for continuous patient health educationJoseph Finkelstein, Jeffrey Wood. 245-250 [doi]
- A trust-aware tag-based privacy control for eHealth 2.0Kyle Levy, Brent Sargent, Yan Bai. 251-256 [doi]
- A multi-layer tree model for enterprise vulnerability managementBin Wu, Andy Ju An Wang. 257-262 [doi]
- A solace in quantumMichael A. Costa. 263-268 [doi]
- Measuring the performance of VoIP over Wireless LANKeshav Neupane, Victor Kulgachev, Andrew Elam, Sri Harsha Vasireddy, Hetal Jasani. 269-274 [doi]
- Capstone experience: lessons from an undergraduate research group in speech at UNH ManchesterMichael Jonas. 275-280 [doi]
- Effects of communication, leadership, and team performance on successful IT capstone projects: a case studyChi Zhang, Andy Ju An Wang. 281-286 [doi]
- Do students have the relevant ICT skills they need to do their research projectsOduronke T. Eyitayo. 287-292 [doi]
- Enhancing network security education with research and development contentMostafa Bassiouni, Ratan Guha. 293-298 [doi]
- Assessment and accreditationRichard Helps, Jim Leone, Barbara Price, Han Reichgelt. 299-300 [doi]
- Infrastructure-as-a-service clouds in a professional environmentAlexander B. Cerier, Matt Visich, Chris Bork, Jon Brooks, Brian W. Perrault, Philip Haddad, Xinli Wang. 301-302 [doi]
- Parasitic databases: an investigationSvetlin Tzolov, Dianne P. Bills. 303-304 [doi]
- Cyber defense competition: enhancing student competency in information securityYan Bai, Carol Taylor. 305-306 [doi]
- Student IT services to support open source software for humanityHeidi J. C. Ellis, Gregory W. Hislop. 307-308 [doi]
- Introducing virtualization management concepts using open source cloud infrastructure managersPeng Li. 309-310 [doi]
- The computational thinking across the curriculum workshopAmber Settle. 311-312 [doi]
- Learning styles of information technology studentsJanet S. Renwick, C. Bryan Foltz. 313-314 [doi]
- Findings from the NSF-ACM strategic summit on computing education in community collegesElizabeth K. Hawthorne, Robert D. Campbell, Anita Verno. 315-316 [doi]
- Social and professional issues: online naturallyDiane C. Shichtman, Patricia A. Wheeler. 317-318 [doi]
- Applying pair programming for advanced Java course: a different approachAnnu B. Prabhakar. 319-320 [doi]
- Building and utilizing an IT data center labChris Kadlec, Art Gowan. 321-322 [doi]
- A domain model to improve IT course designC. Richard G. Helps. 323-324 [doi]