Abstract is missing.
- Using Technology to Build CompassionNigel Jacob. 1 [doi]
- Career Trajectory Analysis of Information Technology Alumni: A LinkedIn PerspectiveLei Li, Guangzhi Zheng, Svetlana Peltsverger, Chi Zhang. 2-6 [doi]
- Transforming IT Education with No-Cost Learning MaterialsRebecca H. Rutherfoord, Svetlana Peltsverger, Lei Li, Guangzhi Zheng, James K. Rutherfoord. 7-11 [doi]
- Initiatives for Smooth Academia-Workplace Transition upon GraduationJoseph Mani. 12 [doi]
- A Comparison between the ACM/IEEE Computer Science Curriculum Guidelines and the Information Technology Curriculum GuidelinesRussell E. McMahon. 13 [doi]
- Teaching Security Management for Mobile DevicesXiaohong Yuan, Wu He, Li Yang, Lindsay Simpkins. 14-19 [doi]
- Platoon: A Virtual Platform for Team-oriented Cybersecurity Training and ExercisesYanyan Li, Mengjun Xie. 20-25 [doi]
- The Untrustables: How Underclassmen Evolved Our Approach to Student Red-TeamingSarah Cunha, Whitney Winders, Dale C. Rowe, Cara Cornel. 26-30 [doi]
- Open Source Technologies to Build Stable and Resilient Infrastructures in Information Technology EducationHoward R. Turner, Robert M. Barron, Aaron G. McCrocklin. 31-33 [doi]
- Improving Retention and Reducing Isolation via a Linked-courses Learning CommunityAmber Settle, Theresa Steinbach. 34-39 [doi]
- Design and Launch of an Intensive Cybersecurity Program for Military VeteransWilliam D. Armitage, William Gauvin, Adam Sheffield. 40-45 [doi]
- What is Information Technology's Role in Cybersecurity?Jean R. S. Blair, Edward Sobiesk, Joseph J. Ekstrom, Allen Parrish. 46-47 [doi]
- A Smartphone App for Enhancing Students' Hands-on Learning on Network and DoS Attacks Traffic GenerationZouheir Trabelsi, Mohammed Al Matrooshi, Saeed Al Bairaq. 48-53 [doi]
- Android Malware Detection Using Category-Based Machine Learning ClassifiersHuda Ali Alatwi, Tae-Hwan Oh, Ernest Fokoué, Bill Stackpole. 54-59 [doi]
- Developing Hands-on Labware for Emerging Database SecurityLei Li, Kai Qian, Qian Chen, Ragib Hasan, Guifeng Shao. 60-64 [doi]
- Panel Discussion: Teaching Ethics in the Information Technology CurriculumBryan S. Goda, Cynthia K. Riemenschneider, Janet S. Renwick. 65 [doi]
- Workshop: Capturing Students, by Capturing FlagsDale C. Rowe, Cara Cornel, Sarah Cunha. 66 [doi]
- SecLab: An Innovative Approach to Learn and Understand Current Security and Privacy IssuesMarco Ghiglieri, Martin Stopczynski. 67-72 [doi]
- Security Assessment of Industrial Control Supervisory and Process Control ZonesMarcia Combs-Ford. 73-76 [doi]
- Security Requirements Embedded in MS Programs in Information Sciences and TechnologiesJai W. Kang, Qi Yu, Edward P. Holden, Tae H. Oh. 77-82 [doi]
- Advancing Diversity and Inclusivity in STEM EducationSharon Mason, Margaret Bailey, Sara Wadia-Fascetti, Mary Deane Sorcinelli. 83-84 [doi]
- Teaching Elementary Students Programming in a Physical Computing ClassroomKaren H. Jin, Kathleen Haynie, Gavin Kearns. 85-90 [doi]
- Integrating Programming into the Mathematics Curriculum: Combining Scratch and Geometry in Grades 6 and 7Klaus-Tycho Foerster. 91-96 [doi]
- Teaching Software Design Engineering Across the K-12 Curriculum: Using Visual Thinking and Computational ThinkingIlenia Fronza, Nabil El Ioini, Luis Corral. 97-101 [doi]
- ACM/IEEE-CS Information Technology Curriculum 2017: A Status UpdateMihaela Sabin, Svetlana Peltsverger, Cara Tang, Barry M. Lunt. 102-103 [doi]
- Why All this Security?: Teaching about Privacy in a Database SystemsDiane C. Shichtman. 104 [doi]
- Towards a 3-D Approach to Cybersecurity Awareness for College StudentsJackson Muhirwe. 105 [doi]
- The Impacts of Digital Transformation, Agile, and DevOps on Future IT curriculaCharles Betz, Amos O. Olagunju, Patrick Paulson. 106 [doi]
- Securing the Professional Future of IT Students with LinkedInYe Diana Wang. 107 [doi]
- An Open and Portable Platform for Learning Data Security in Mobile Cloud ComputingLei Li, Kai Qian, Ragid Hasan, Qian Chen, Dalei Wu, Yong Shi. 108 [doi]
- University of Cincinnati and Saint Ursula Academy Partnership: Introducing Female High School Students to the Field of Information Technology, Year 2Jen Fritz, Margie Matthews, Tom Wulf, Jim Scott, Jamie Fritz. 109 [doi]
- Challenges of Interdisciplinary IoT CurriculumAmos O. Olagunju, Firasat Khan. 110 [doi]
- Evaluating Student Learning in an IT Curriculum Using Bloom's - Webb's Curriculum TaxonomyKaren P. Patten, Mark A. Harris. 111-114 [doi]
- Red Fish Blue Fish: Reexamining Student Understanding of the Computing DisciplinesRandy W. Connolly, Janet Miller, Faith-Michael E. Uzoka, Barry Lunt, Marc Schroeder, Craig S. Miller, Annabella Habinka. 115-120 [doi]
- Ten-Year Synthesis Review: A Baccalaureate Program in Computer ForensicsJigang Liu. 121-126 [doi]
- Creating Courses with No Textbook - Pros and Cons: Panel DiscussionRebecca H. Rutherfoord, Svetlana Peltsverger, Lei Li, Guangzhi Zheng, James K. Rutherfoord. 127 [doi]
- MEAN Web Development: A Tutorial for EducatorsAdrian German, Santiago Salmeron, Wonyong Ha, Bo Henderson. 128-129 [doi]
- A Tale of Two CapstonesHollis Greenberg Davis, Stephen J. Zilora. 130-135 [doi]
- An Industrial Partnership Game Development Capstone CourseBen Stephenson, Mark James, Nigel Brooke, John Aycock. 136-141 [doi]
- A Capstone Design Project for Teaching Cybersecurity to Non-technical UsersTanya Estes, James C. Finocchiaro, Jean R. S. Blair, Johnathan Robison, Justin Dalme, Michael Emana, Luke Jenkins, Edward Sobiesk. 142-147 [doi]
- Learning by Taking Apart: Deconstructing Code by Reading, Tracing, and DebuggingJean M. Griffin. 148-153 [doi]
- A Computer Organization Team Project: Introducing Performance Benchmarking to Students using a Real World Case StudyJoseph V. Elarde, Barry Bruster. 154-159 [doi]
- Program Slicing Technique: A Novel Approach to Improve Programming Skills in Novice LearnersKiran L. N. Eranki, Kannan M. Moudgalya. 160-165 [doi]
- GALILEO: Emergency Rooms and Crowd ComputingAndrés F. Cruz, Sebastián Ospina, Pedro G. Feijóo, Daniel R. Suárez. 166 [doi]
- ConnectUP: An Academic Social Networking Application Developed Using University OntologyRicardo Pablo de Leon, Michelle Ann Nazario, Ma. Rowena Solamo, Rommel P. Feria. 167 [doi]
- Pathways to Student Learning within HFOSSHeidi J. C. Ellis, Gregory W. Hislop. 168 [doi]
- A Concept for an Introduction to Parallelization in Java: Multithreading with Programmable Robots in MinecraftKlaus-Tycho Förster, Michael König, Roger Wattenhofer. 169 [doi]
- A Profile of SIGITE/RIIT AuthorsBarry M. Lunt, Kaylee Richmond, Dale C. Rowe. 170-172 [doi]
- A Re-examination of Information Technology Related Meetups and Professional Organizations in the Greater Cincinnati AreaRussell E. McMahon. 173 [doi]
- A Comparison amongst Face-to-Face, Hybrid, and Partially Online Course Involving a Freshman Database CourseRussell E. McMahon. 174 [doi]
- AccesMusic: Communication Channel for Musical TrainingDaniel Felipe Sánchez Fernández, Andres David Torres Acevedo, Nestor Albeiro Moreno Vargas, Olga Liliana Campo Cadena. 175 [doi]