This research paper explores the impact of generative AI chatbots like ChatGPT and SQL Query Builder on academia, particularly in the fields of Computer Science (CS) and Information Systems (IS).
This article discusses the increasing demand for education in Financial Technology (FinTech) due to the industry’s rapid growth since the “Fintech Revolution” in 2017. It highlights the current lack of consensus and standardized curriculum for FinTech education in universities and presents findings from a study that examines the state of FinTech curricula.
What do conference attendees want from academic presentations? A study of an information systems professional organization.
This paper identifies what academic conference attendees in the Information Systems (IS) field consider to be attributes of successful and unsuccessful academic presentations.
This study addressed college students’ acceptance of push communication (i.e., email and SMS messaging) as a means of receiving course-related content.
This research aims to investigate what factors influence the users on StackOverflow to participate.
The purpose of this study was to identify the factors that influence the acceptance of electronic collaboration technology by higher education students and that influence their predicted usage of the technology for virtual team collaboration.
This study examines 83 IS qualitative studies in leading IS journals for the following purposes: (a) identifying the extent to which IS qualitative studies employ best practices of justifying sample size; (b) identifying optimal ranges of interviews for various types of qualitative research; and (c) identifying the extent to which cultural factors (such as journal of publication, number of authors, world region) impact sample size of interviews.
This paper details some of the obstacles to cloud computing that have been identified in recent literature, grouping organizational concerns into four categories, namely security, organizational resistance, performance, and lack of economic gains.
This article describes the growing adoption of enterprise social networking platforms by organizations in an attempt to foster better team communication and collaboration.
The project-based approach to foundational IS topics in an introductory course provides modest benefits in interest in MIS majors and minors.
We examined the impacts of the team listening environment and the frequency of team communication on team coordination in business environments.
In this research paper, we describe the process we took to go green in one of the computer labs on our campus.
A comparison of wireless security procedures: Security coupled with ease of implementation for college campus
There are many blogs and columns available online as to what security measure is the best to implement and when, however very few articles actually compare and contrast methods side by side.
This paper describes our approach to using virtualization in two courses for MIS students.
Using theory-driven scenarios to teach about individualism and collectivism in cross-cultural training
This article presents a cross-cultural training method that focuses on horizontal and vertical individualism and collectivism.
This paper identifies some key attributes Information System (IS) graduates should be aware of in their quest to find a job.
The objective of this research project is to apply the method of web-based learning to overcome the limitations of comment-based code learning.
The primary focus of this study was to determine why and how small businesses implement content management and to clarify the relationship of content management to regulatory compliance issues presented by the Health Insurance Portability and Accountability and Sarbanes-Oxley Act.
This paper reviews Web Services technologies, challenges to their implementation, demonstrates nine ways that traditional assumptions regarding security are inapplicable to Web Services, and suggests possible solutions to these problems.
The focus of this paper is to elaborate on how such an integration would be accomplished in an advanced database course.
This paper reviews Web Services technologies, challenges to their implementation, demonstrates nine ways that traditional security best practices are inapplicable to Web Services, and suggests possible solutions to these problems.