Abstract is missing.
- Cybersecurity: What I Hope Someone's TeachingFernando J. Maymi. 1-2 [doi]
- The Convergence of Information and Operational Technology is Powering the Fourth Industrial Revolution: Digital Transformation is an ImperativeNeal Meldrum. 3 [doi]
- Computing Competency: A Contemporary Transformational AgentJohn Impagliazzo. 4 [doi]
- Identifying and Evaluating Information Technology Baccalaureate Degree Programs per IT2017Barry M. Lunt, Brady Redfearn, Elizabeth Mitchell, Samuel Tenney, Cayman Williams. 5-9 [doi]
- Complementing Course Contents Between IT/CS: A Case Study on Database CoursesJai W. Kang, Qi Yu 0001, Edward P. Holden, Xumin Liu. 10-15 [doi]
- Enhancing the Program Quality and College-Level Success Metrics of an IT Program at a Large Public UniversityPrateek Basavaraj, Ivan Garibay. 16-21 [doi]
- Engaging IT Students through the NASA SUITS Design Challenge: An Experience ReportGiovanni Vincenti. 22-27 [doi]
- Using Virtual Machines to Enhance the Educational Experience in an Introductory Computing CourseDavid P. Harvie, Jason R. Cody, Christopher Morrell, Tanya T. Estes. 28-32 [doi]
- Project Design and Implementation for Digital Forensics EducationXinli Wang, Yan Bai, Bryan S. Goda. 33-38 [doi]
- Are We Ready for a VR Classroom?: A Review of Current Designs and a Vision of Future Virtual Reality ClassroomsChunming Gao, Yan Bai, Bryan S. Goda. 39 [doi]
- Classroom Engagement Activities with the Raspberry PiMichael K. Hills, Chris W. Gamrat, Carson M. Brown. 40 [doi]
- Development of a Configuration Management Course for Operations StudentsCharles Border. 41 [doi]
- Pedagogical Strategies for Classroom-based Mixed Reality (MR) Technology CurriculumBrady Redfearn. 42 [doi]
- A Course on Applied AI and Data Science: Recommender SystemsYong Zheng. 43-48 [doi]
- Deep Learning in the IT CurriculumAmy K. Hoover, Adam Spryszynski, Michael Halper. 49-54 [doi]
- Combining Block-Based Programming and Hardware Prototyping to Foster Computational ThinkingIlenia Fronza, Luis Corral, Claus Pahl. 55-60 [doi]
- Panel: Increasing Female Enrollment and Retention for Computing DegreesHollis Greenberg, Daniel S. Bogaard, Karen Jin, Chi Zhang. 61-62 [doi]
- A New Methodology for a Functional and Logic Programming Course: On Smoothening the Transition between the Two ParadigmsAntoine Bossard, Keiichi Kaneko. 63-68 [doi]
- Expanding Learners as Designers (LasD) in ITMahir Akgun, Phil Tietjen, Tutaleni I. Asino, Edward J. Glantz. 69-74 [doi]
- The Role of Multiple Representations and Representational Fluency in Cryptography EducationZiyang Tang, Xiang Liu, Yingjie Chen, Baijian Yang. 75-80 [doi]
- The Use and Non-Use of Cybersecurity Tools Among Consumers: Do They Want Help?Marc Dupuis, Tamara Geiger, Marshelle Slayton, Frances Dewing. 81-86 [doi]
- Human Risk Factors in CybersecurityTom Cuchta, Brian Blackwood, Thomas R. Devine, Robert J. Niichel, Kristina M. Daniels, Caleb H. Lutjens, Sydney Maibach, Ryan J. Stephenson. 87-92 [doi]
- Closing the Feedback Loop Between UX Design, Software Development, Security Engineering, and OperationsJessica Nguyen, Marc Dupuis. 93-98 [doi]
- Panel: Online Learning, The Educators ExperiencesDaniel S. Bogaard, Hollis Greenberg, George Grispos, Bryan S. Goda, Rick Homkes, Kevin McReynolds. 99-100 [doi]
- A Process of Transitioning to the New ABET Criterion 3: An IT Degree Program's ApproachYe Diana Wang. 101 [doi]
- Designing the IT Capstone Course: A Systematic Literature ReviewNancy Martin. 102 [doi]
- On Including the Institutional Review Board Process in Undergraduate Information Technology CurriculaRichard Halstead-Nussloch, Paola Spoletini. 103 [doi]
- Balancing Theory and Practice in IT Curriculum: New Challenges and SolutionsAmos O. Olagunju, Francis Lowe, Philemon Kinene. 104 [doi]
- Project-Based Learning Improves Critical Thinking for Software Development StudentsCengiz Günay, Anca Doloc-Mihu, Thomas Gluick, Catherine A. Moore. 105 [doi]
- Modular Tasks Design for Teaching Young Students on Physical Computing PlatformsKaren H. Jin. 106-111 [doi]
- Hacking the Non-Technical Brain: Maximizing Retention in a Core Introductory IT CourseEric M. Sturzinger, Daniel S. Hawthorne, Thomas A. Babbitt. 112-117 [doi]
- The Adventures of ScriptKitty: Using the Raspberry Pi to Teach Adolescents about Internet SafetyOvidiu-Gabriel Baciu-Ureche, Carlie Sleeman, William C. Moody, Suzanne J. Matthews. 118-123 [doi]
- Adapting the IT2017 Curricula for Two Year Transfer Programs: Determining the Optimal Level of Curricular GuidanceMarkus Geissler, Cara Tang, Svetlana Peltsverger, Tim Preuss. 124-125 [doi]
- Practice What You Preach - Building a Capstone Management System as Undergraduate IT Capstone ProjectsZhigang Li, Xin Tian 0007, Lei Li, Ming Yang, Meng Han. 126-131 [doi]
- Case Study: The Evolution of the IT Discipline in a Research UniversityHazem Said. 132-137 [doi]
- Serverless Distributed Architecture by Incremental ExamplesLaurie White, Charles Engelke. 138-139 [doi]
- From Design to Implementation - Algorithm Conversion and Transition to a Mobile Platform for an Artificial PancreasCaterina Lazaro Martinez, Erdal Oruklu, Mudassir Rashid, Mert Sevil, Iman Hajizadeh, Ali Cinar, Jeremy Hajek. 140 [doi]
- PROF: An Assistive Tool for Educators to Semi-Autonomously Create Topic Maps and Skill TreesJacob Orner, Richard Dill. 141 [doi]
- How Selective True-False Questions Reward Student RecognitionMohammed Hossain, Vincent Maccio, Daniel Zingaro. 142 [doi]
- AppConnect NW: A Collaborative Network of Seven Community and Technical College Programs in Software DevelopmentKendrick Hang, Timothy Mason, Brianna Rockenstire, Thomas Abott, Brian Bansenauer, Steven Balo, Stefanie McIrvin. 143-144 [doi]
- MySecurityLab: A Tool for Teaching and Learning Quantitative Assessments of Security RisksAmos O. Olagunju. 145 [doi]
- Resources for Improving the Cybersecurity PipelineSandra Gorka, Alicia McNett, Jacob R. Miller, Bradley M. Webb. 146 [doi]
- Work in Progress: Native Language Consistency Effect on Learners' Introduction to Block-Based Instructional TechnologiesPedro Guillermo Feijóo García, Keith McNamara, Jacob Stuart. 147 [doi]
- Merging Sustainability and Technology: Building an Urban Indoor FarmGiovanni Vincenti, Wolf T. Pecher. 148 [doi]
- Fundamentals of Ethical Hacking and Penetration TestingUmar Mujahid Khokhar, Binh Tran. 149-150 [doi]
- Digital Culture and Information: A Library-Based Minor Focusing on How Modern Information Access Impacts SocietyJason T. Mickel. 151 [doi]
- Instruction Recall Under StressErin Colvin, Noah Hance. 152 [doi]
- Using the Raspberry Pi in IT EducationRahul Emani, Edward J. Glantz, Christopher Gamrat, Michael K. Hills. 153 [doi]
- Dropout vs. Time to Degree: The Existing Tension between Retaining and Graduating 'At-Risk' Students in a Timely MannerPrateek Basavaraj, Ivan Garibay. 154 [doi]
- The Effects of Surface-Level Diversity Compared to Deep-Level DiversityAlan Franklin, Belle Woodward. 155 [doi]
- Improving the Cybersecurity and Information Assurance Pipeline: Impact of High School After-School ProgramSandra Gorka, Alicia McNett, Jacob R. Miller, Bradley M. Webb. 156 [doi]
- Bikesharing: Analysis and PredictionGeeth Priya Kuppusamy, Chandni Thakkar, Yong Zheng. 157 [doi]
- Exploratory Analysis of Chicago Taxi RidesNikita Shahane, Megha Kaul, Yong Zheng. 158 [doi]
- Technology Acceptance Model Revisited: Toward a Framework of Integrated Information Technology Evaluation ModelXinli Wang, Mostafa El-Said. 159 [doi]
- A Comparison of Tools for Teaching and Learning Data AnalyticsYong Zheng. 160 [doi]
- Redeveloping Electronic Health Records Course with Open Source Tools and PlatformsChi Zhang, Hossain Shahriar. 161 [doi]
- Development of Mobile Application for Incident ReportingMary Ann E. Ignaco. 162 [doi]
- JPEG Steganography Using BPCSFlavien Andrieux, Clement Deltel. 163 [doi]
- Modeling School Choice of STEM Students using Decision TreeRex Perez Bringula, Blandina S. Panelo, Olympia C. Tabi, Mark Rey U. Tan, Jamaica G. Gonzales, Johnny P. Tan, Luningning A. Isidro. 164 [doi]
- Proposal and Evaluation of a Security Incident Response Training Method using ProgrammingKatsumi Nagai, Hiroshi Koide, Kouichi Sakurai. 165 [doi]
- Untampered Electronic Voting in Entertainment Industry: A Blockchain-based ImplementationShreya Desai, Meng Han, Lei Li, Zhigang Li, Jing (Selena) He, XiaoHua Xu. 166 [doi]
- Modeling Filipino Academic Affect during Online Examination using Machine LearningMideth B. Abisado, Ramon L. Rodriguez, Antero Rosauro V. Arias Jr., Cheryl Mari M. Isip, James Darryl D. Bungay, John Mark V. Cipriano, Larry A. Vea. 167 [doi]
- A Didactic Module to Teach Software Engineering Principles in Middle SchoolsIlenia Fronza, Claus Pahl, Boris Susanj. 168 [doi]
- An Architecture for Blockchain-Enabled Collaborative Signature-based Intrusion Detection SystemDaniel Laufenberg, Lei Li, Hossain Shahriar, Meng Han. 169 [doi]
- Initial Results from an Applied Baccalaureate Program in Software DevelopmentKendrick Hang, Tina J. Ostrander, Andy Orr. 170 [doi]
- Building an Ecosystem of Strategic Partners for New Baccalaureate Programs in Information TechnologyKendrick Hang, Timothy Mason, Andy Orr. 171 [doi]
- Teamwork Online: Learning From the ExperienceDiane C. Shichtman. 172 [doi]
- Student-Centered Learning: Create a Significant Learning Experience by Using Flipped Classroom ApproachChunming Gao, Bryan S. Goda. 173 [doi]
- Tips for Sources of Cost-Free and Open Educational Resources to Reduce Textbook Costs in IT CoursesRichard Halstead-Nussloch, Rebecca H. Rutherfoord. 174 [doi]
- Panel: Transfer StudentsGregory W. Hislop, Heidi J. C. Ellis, Mihaela Sabin, Sandra Gorka. 175-176 [doi]
- Examining Faculty Perceptions and Approaches to Problem Solving, Reflective Learning and Social Learning in a Computing Education Program: An Exploratory Case StudySharon Mason. 177-182 [doi]
- Integrating Data Science into a General Education Information Technology Course: An Approach to Developing Data Savvy UndergraduatesMalcolm Haynes, Joshua Groen, Eric Sturzinger, Danny Zhu, Justin Shafer, Timothy McGee. 183-188 [doi]
- CHEESE: Cyber Human Ecosystem of Engaged Security EducationBaijian Yang, Rajesh Kalyanam, Craig Willis, Mike Lambert, Christine Kirkpatrick. 189-190 [doi]