Information Technology Community Portal
Welcome – From the Editor
Greetings from the Information Technology Board!
Welcome to our portal!
A unique characteristic of the MERLOT IT discipline is that we have designed its taxonomy to align with the undergraduate course topics recommended by CSAB (Computing Sciences Accreditation Board) – the lead society within ABET (Accreditation Board for Engineering and Technology) for accreditation of degree programs in computer science, information systems, software engineering, information technology, and cybersecurity, and is a co-lead society for systems engineering, and is a cooperating society for computer engineering, biological engineering, and information engineering technology. CSAB is governed by the two largest technical, educational, and scientific societies in computer and computer-related fields: The Association for Computing Machinery, Inc. (ACM) and the IEEE-Computer Society (IEEE-CS).
Accordingly, the MERLOT IT discipline portal has been endorsed by both the IEEE Computer Society and IEEE Education Society, and that endorsement is noted with a banner on the IT portal page.
Proyecto clasificador de objetos por color
pagina wen de proyecto(separador de colores )universidad libre cali,colombia
Epicurious Teaching Lesson - Google Drive
Epicurious provides people a place to explore recipes, food-related articles, and other food content such as videos. In...
Dataset Summaries: Interrogating Data, Structures, and Systems in Tabular Datasets with Pivot Tables
Many people are familiar with using spreadsheets to create, manipulate, and carry-out mathematical operations on data. In...
Technology in Schools: Its Not Like this in Business
My purpose in writing this book is to give readers a view into the work of managing information technology in schools. IT...
OER_2022-ZhenglongLi-Personalized exploration of online education-- adaptive interactive online course based on learner data and knowledge map
Personalization is always the goal of education. In China, "teaching without distinction and according to students'...
Computerized Maintenance Management Software
Easy-to-use Computerized Maintenance Management System (CMMS) program for streamlining support administration, putting...
Progressive Web App Development
Insta is a leading progressive web app development company that delivers web apps that keep their users engaged by giving...
What are the best mobile app development tools?
A mobile application is a form of software meant to operate on a mobile device such as a smartphone or tablet. It...
ECON 125 | Lecture 24: Michael Porter - Strategy
Professor Michael Porter of Harvard University's School of Business discusses competitive strategy and the role it can...
Social Informatics | Lecture 1 | 23/Sept/2020
To undesrtand broadly what social informatics is
MIS BASIC CONCEPTS
To uinderstand that the information is critical in an organization
Information Technology Management
This course provides an overview of career opportunities in Information Technology Management.
Types of Threats in Cyber Security in 2021|Cybersecurity Training|Edureka | Cybersecurity Rewind - 4
Edureka PGP in Cybersecurity: with Edureka: https://www.edureka.co/post-graduate/... This Edureka video on "Types of...
The Data Notebook
The Data Notebook is an online suite of open interactive resources that provides instructional materials for introductory...
General Education for the Information Society
The general education curriculum as we know it today is a product of the Industrial Revolution. The assumptions that...
How Do I Fix Norton Installation Error 8504, 104, 8506?
There are many types of errors Norton installation error 8504, 104 this problem reinstall If you are unable to remove the...
Learn UI/UX Design
In UI design, you design user interfaces for sites, software, and more. In UX design, you will enhance the user...
Software Engineering Body of Knowledge Version 3 | IEEE Computer Society
SWEBOK V3.0 is the most recent completely revised and updated version of the internationally respected Guide to the...
Interactive Learning for Operation Analytics Topics (ILOAT)
The ILOAT is a self-paced digital resource developed for the Operation Analytics course to support self-directed...
UTHealth awarded nearly $10 million for public health informatics workforce development program
In order to develop a talent pipeline with individuals from diverse backgrounds in public health and data science to...
What are the features of Java used by Java web development company for web development? | Brainfuel Blog
Web development is still one of today’s most popular activities considering the acceptance of smartphones and allied...
Julia Data Science
This is an open-source and open access book on how to do Data Science using Julia. The book describes the basics of the...
August 2021 Healthcare Data Breach Report
There was a 44% month-over-month decrease in the number of reported healthcare data breaches in August 2021. 38...
baldreck chipaUniversity of South Africa
GetIt SMSBangalore university
The Modern BackThe Modern Back
Isaiah McCommonsTrine University
Bee VolkensVesper Assessor of Employment & Communications
JOHN FERNANDO GRANADOS ROMEROUniversidad de Guayaquil
Umesh ChaudharyUniversity of Wales Newport
Mehdi MekniUniversity of New Haven
tauseef khanRawasi systems
Lindsay deRuyterGeorgian College of Applied Arts and Technology
Julie LarsenMid-State Technical College
Katherine RunyonUniversity of Tennessee System - Knoxville
Materials by Discipline
- Application Development (373)
- Business Process Management (63)
- Data and Information Management (100)
- Enterprise Systems and Architecture (1)
- Foundations of Information Systems (18)
- Human Computer Interaction (18)
- IS Project Management (13)
- IS Strategy, Management and Acquisition (7)
- IT Audit and Controls (11)
- IT Infrastructure (567)
- IT Security and Risk Management (59)
- Knowledge Management (14)
- Social Informatics (28)
- System Analysis and Design (130)
- Institute of Electrical and Electronics Engineers (IEEE)
- IEEE Education Society
- IEEE Computer Society
- Association for Computing Machinery (ACM)
- Certified Information Systems Security Professional (CISSP)
- Government Cybersecurity
- Certified Ethical Hacker (CEH)
- Consortium for Computing Sciences in Colleges (CCSC)
- Instructional Technology Council (ITC)
- The MASIE Center
- ACM Special Interest Group on Computer Science Education (SIGCSE)
- Online Learning Consortium (formerly Sloan-C)
- Association for Talent Development (ATD)
- The eLearning Guild
- Michigan Association for Computer Users in Learning (MACUL)
- Flipped Learning Network
- United States Distance Learning Organization
Journals & Publications
- Journal of Cybersecurity
- National Cybersecurity Institute Journal
- International Journal of Cyber–Security and Digital Forensics (IJCSDF)
- Journal of Information Assurance & Cybersecurity
- Journal of Cyber Security & Information Systems
- ACM TechNews
- Campus Technology Higher Education Technology Newsletters
- CIO Magazine
- eCampus News
- OLC Online Learning Journal
- Journal of Information Technology Education: Research (JITE:Research)
- Journal of Information Technology Education: Innovations in Practice (JITE:IIP)
- Journal of Information Technology Education: Discussion Cases (JITE:DC)
- Learning Solutions Magazine
- Network World
- Newsletters by O'Reilly (Free Registration gives you access to free newsletters, online discussions, and more.)
- Today's Campus
Information Technology on the Web
Our View: Cybersecurity is a vital life skill for today's youth - The Dispatch - CDispatch.com
Jun 24, 2022 05:12 PM PDT
A “whole-of-state” approach to cybersecurity - Security Boulevard
Jun 24, 2022 04:32 PM PDT
Cybersecurity Incidents From Poor API Security Cost Businesses $75 Billion Annually
Jun 24, 2022 03:02 PM PDT
Small doesn't mean secure for local government cybersecurity - Bond Buyer
Jun 24, 2022 02:58 PM PDT
Carnival Fined $5M By NY For Cybersecurity Violations - Law360
Jun 24, 2022 02:36 PM PDT
Carnival is fined $5 million by New York for cybersecurity violations - SaltWire
Jun 24, 2022 02:28 PM PDT
China launches cybersecurity review into online academic database to 'prevent data ...
Jun 24, 2022 01:39 PM PDT
Surging attacks driving growth in cybersecurity for operating environments - BNamericas
Jun 24, 2022 01:37 PM PDT
Microsoft teams up with ICT Academy for cybersecurity skilling programme - Moneycontrol
Jun 24, 2022 01:25 PM PDT
New law will require NH towns and cities to report cybersecurity attacks
Jun 24, 2022 12:59 PM PDT
American Data Privacy and Protection Act. US President signs three cybersecurity bills ... - CyberWire
Jun 24, 2022 12:56 PM PDT
Asia-Pacific sees hiring boom in food industry cybersecurity roles - Just Food
Jun 24, 2022 12:40 PM PDT
Brad Smith on 'influence operations' and cybersecurity - YouTube
Jun 24, 2022 12:27 PM PDT
Cybersecurity advice: keep current on employee training, changes in laws
Jun 24, 2022 12:14 PM PDT
Carnival fined $5 million by New York for cybersecurity violations | Business Insurance
Jun 24, 2022 12:04 PM PDT
Does Biden's cybersecurity order go far enough? - Brookings
Jun 24, 2022 12:01 PM PDT
North America sees hiring boom in drinks industry cybersecurity roles
Jun 24, 2022 11:58 AM PDT
Allied Cybersecurity Agencies Advise Against Disabling Popular Tool for Cyberattackers
Jun 24, 2022 11:51 AM PDT
Schneider Electric & Claroty launch 'Cybersecurity Solutions for Buildings'
Jun 24, 2022 11:13 AM PDT
Zero Trust Cyber Exchange: NASA's Mike Witt, Christine Gex on intersection of RPA, cybersecurity
Jun 24, 2022 11:12 AM PDT
Info Tech on Twitter
- The new #EDUCAUSEShowcase examines the pros and cons of #AI within the framework of its visibility, dynamism, and t… twitter.com/i/web/status/1…1 hour ago | educause
- In this episode of The Integrative CIO Podcast, hosts Cynthia and Jack talk with Mark Roman, former CIO for Simon F… twitter.com/i/web/status/1…4 hours ago | educause
- House appropriators approve CISA spending bill with investments for incident reporting regime, shared services dlvr.it/SSnmZB5 hours ago | InsideCyber
- Meet the Program Director of @Course_Gateway, Andrea Jones-Davis! coursegateway.org https://t.co/wAWwqTppjQ, photo: pic.twitter.com/wAWwqTppjQ6 hours ago | educause
- The academic libraries being designed and built, or renovated, today should be envisioned as spaces for more than j… twitter.com/i/web/status/1…6 hours ago | EDUCAUSEreview
- Well-designed HyFlex courses can provide a rich learning environment that improves and enhances the class experienc… twitter.com/i/web/status/1…6 hours ago | educause
- Join us at the #ChicagoCybersecurityConference to gain insights to help you better navigate #cyberthreats.
NCA Ex… twitter.com/i/web/status/1…8 hours ago | StaySafeOnline
- Some applications of AI in higher education reveal its perils, but at least one development shows its promise. Lear… twitter.com/i/web/status/1…8 hours ago | EDUCAUSEreview
- The academic libraries being designed and built, or renovated, today should be envisioned as spaces for more than j… twitter.com/i/web/status/1…9 hours ago | educause