


default search action
SIGITE Conference 2004: Salt Lake City, UT, USA
- C. Richard G. Helps, Eydie Lawson:
Proceedings of the 5th Conference on Information Technology Education, SIGITE 2004, 2004, Salt Lake City, UT, USA, October 28-30, 2004. ACM 2004, ISBN 1-58113-936-5
Engagement I
- John D. Fernandez:
Engaging students with community organizations by using computer technology. 1-5 - Gilbert W. Laware, Andrew J. Walters:
Real world problems bringing life to course content. 6-12 - Stephen J. Zilora:
Industry-based web services project as a classroom teaching tool. 13-18
Security I
- Gordon W. Romney, Brady R. Stevenson:
An isolated, multi-platform network sandbox for teaching IT security system engineers. 19-23 - Jeremiah K. Jones, Gordon W. Romney:
Honeynets: an educational resource for IT security. 24-28 - Keith A. Morneau:
Designing an information security program as a core competency of network technologists. 29-32
Technology to enable learning I
- William J. Wolfe:
Online student peer reviews. 33-37 - Ron Fulbright:
Teaching critical thinking skills in IT using PINE-TRIZ. 38-42 - Daniel S. Bogaard, Ronald P. Vullo, Christopher D. Cascioli:
SVG for educational simulations. 43-49
Course design
- Luther Troell, Yin Pan, Bill Stackpole:
Forensic course development: one year later. 50-55 - C. Richard G. Helps, Stephen A. Renshaw:
Design of a flexible case-study instructional module for operating systems for information technology. 56-59 - Pamela S. Ecker, Jason Caudill, David Hoctor, Colleen Meyer:
Implementing an interdisciplinary capstone course for associate degree information technology programs. 60-65
Security II
- Clayton Bolz, Gordon W. Romney, Brandon L. Rogers:
Safely train security engineers regarding the dangers presented by denial of service attacks. 66-72 - Melissa Jane Dark:
Assessing student performance outcomes in an information security risk assessment, service learning course. 73-78 - Victoria W. Romney, Gordon W. Romney:
Neglect of information privacy instruction: a case of educational malpractice? 79-82
Curriculum design I
- Ronald C. Floyd:
A model for information technology curriculum. 83-89 - Anne I. Mannette-Wright:
Developing an IT curriculum for the small, liberal arts college environment. 90-93 - Hazem Said, Louise Chaytor, Daniel Humpert, John Nyland, Robert Schlemmer, Mark Stockman, Chris Christopherson, Patrick Kumpf, Annu Prabhakar
, Vali Tadayon, Soleda Leung, Sam Geonetta, Russell E. McMahon, Tamisra Sanyal, Tom Wulf:
An implementation of a core curriculum in an information technology degree program. 94-100
Engagement II
- Dianne P. Bills:
Marketing higher education in information technology. 101-105 - Jeffrey A. Lasky, Michael Cardillo:
Designing a cooperative education program to support an IT strategic plan. 106-110 - Robert S. Friedman, Marc Sequeira:
Application development for informal learning environments: where IT education, community outreach, baseball and history intersect. 111-117
Software development I
- Keith J. Whittington, Dianne P. Bills:
Alternative pacing in an introductory java sequence. 118-121 - Kevin J. Bierre, Andrew M. Phelps:
The use of MUPPETS in an introductory java programming course. 122-127 - Mohammad H. N. Tabrizi, Carol B. Collins, E. Ozan, K. Li:
Implementation of object-orientation using UML in entry level software development courses. 128-131
Learning
- Katherine E. Thompson, Evelyn P. Rozanski, Anne R. Haake:
Here, there, anywhere: remote usability testing that works. 132-137 - Mark Stockman, Chris Christopherson, Hazem Said, John Nyland:
An implementation of a networking track in an information technology degree program. 138-143 - Nancy Doubleday, Steve Kurtz:
Shared extensible learning spaces. 144-148
Technology to enable learning II
- Susan L. Miertschin, Cheryl L. Willis:
Mobile computing in the freshman computer literacy course what impact? 149-152 - Cheryl L. Willis, Susan L. Miertschin:
Tablet PC's as instructional tools or the pen is mightier than the 'board! 153-159 - Stephen H. Edwards, N. Dwight Barnette:
Experiences using tablet PCs in a programming laboratory. 160-164
Security III
- Charles Higby, Michael Bailey:
Wireless security patch management system. 165-168 - Ed Crowley:
Experiential learning and security lab design. 169-176 - Gregory L. Orgill, Gordon W. Romney, Michael G. Bailey, Paul M. Orgill:
The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems. 177-181 - Brady R. Stevenson, Gordon W. Romney:
Teaching security best practices by architecting and administering an IT security lab. 182-187
Working in a complex world
- Ron Fulbright, Richard L. Routh:
How information technology professionals keep from being outsourced or offshored. 188-193 - Adrian Gardiner, Vladan M. Jovanovic, Han Reichgelt:
Second thoughts about a career in IT? 194-201 - Kathleen Burnett, Manimegalai M. Subramaniam:
Defining the information technology workforce from the educational perspectives: a pilot study. 202-205
Software development II
- Hazem Said, Russell E. McMahon, Soleda Leung, Annu Prabhakar
, Tamisra Sanyal, Mark Stockman, Tom Wulf:
An implementation of a software development track in an information technology degree program. 206-210 - Edward P. Holden, Elissa Weeden:
The experience factor in early programming education. 211-218 - Keyuan Jiang, John Maniotes, Reza Kamali:
A different approach of teaching introductory visual basic course. 219-223
Curriculum design II
- Robert F. Cohen, Deborah Boisvert:
Aligning programming education between community colleges and universities. 224-226 - Anne Marchant:
Teaching ethics in the context of IT and globalization. 227-230 - Mark Stockman, Louise Chaytor, Daniel Humpert, John Nyland, Robert Schlemmer, Hazem Said, Chris Christopherson, Patrick Kumpf, Annu Prabhakar
, Vali Tadayon, Soleda Leung, Sam Geonetta, Russell E. McMahon, Tamisra Sanyal, Tom Wulf:
An implementation of secondary tracks in an information technology degree program. 231-234
The big picture
- Barbara A. Price, Cindy H. Randall:
Technology-based degrees: do faculty and students agree on necessary skills for success in these programs? 235-240 - Reza Kamali, Lillian N. Cassel, Richard J. LeBlanc:
Keeping family of computing related disciplines together. 241-243 - John Mendonca:
Organizational impact of information technology: a leadership course for IT. 244-247
The academic environment
- Han Reichgelt:
Towards a research agenda for information technology. 248-254 - Soleda Leung, Hazem Said, Mark Stockman:
Enroute to making an IT baccalaureate program. 255-260 - Kenneth L. Alford, Curtis A. Carver, Daniel Ragsdale, Eugene K. Ressler, Charles W. Reynolds:
Specification and managed development of information technology curricula. 261-266
Posters
- Timothy Daryl Stanley:
Bringing bits, bytes, devices and computers to life with designs in multimedia logic. 267 - Pavel Azalov, Michelle Cullen, Robert Rinish:
ReExpress: a tutor for regular expressions mentoring with technology. 268 - Russell E. McMahon:
How can you teach what you don't know?: a case study of learning and teaching microsoft .NET framework and C#. 269 - Nikunja Swain, Mrutyunjaya Swain:
Design and development of computer networking modules using virtual instruments and object oriented programming. 270 - Ronald P. Vullo, Daniel S. Bogaard:
Visualization with dynamically generated SVG. 271 - Ed Crowley, Susan L. Miertschin:
Online student portfolios. 272 - Nathan H. Blackham, Michael G. Bailey, Todd Berrett:
Building the web server for a web systems class. 273 - Annu Prabhakar, George Suckarieh:
Real-world project experience for IT students through honors scholars program. 274 - Thomas I. M. Ho:
Curricular and marketing responses to offshoring of information technology services. 275 - Steve Wood, Gordon W. Romney:
Protection methods against IP packet attacks. 276 - Myungsook Klassen:
Another approach to teaching programming concept course with object first. 277 - Myungsook Klassen, Russell Stockard, Ali Akbari:
Stimulating information technology education among underrepresented minorities. 278 - Sharon Mason, Daryl Johnson, Luther Troell:
Network and systems security, a collaborative approach. 279 - Larry S. Corman, Evans Adams:
TECH@FLC: a program funded by an industry consortium. 280 - Michele Kleckner:
Where writing and rhetoric meet multimedia production designing an effective, interdisciplinary capstone experience. 281 - Rebecca H. Rutherfoord:
Andragogy in the information age educating the IT adult learner. 282 - Lynn J. McKell, John H. Reynolds, Herbert E. Longenecker Jr., Jeffrey P. Landry, John Harold Pardue:
Integrating program evaluation and a new certification for information technology professionals. 283 - Fahad T. Alotaiby, Jim X. Chen, Edward J. Wegman, Harry Wechsler, Deborah Sprague:
Teacher-driven: web-based learning system. 284

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.