Information Technology Community Portal
Welcome – From the Editor
Greetings from the Information Technology Board!
Welcome to our portal!
A unique characteristic of the MERLOT IT discipline is that we have designed its taxonomy to align with the undergraduate course topics recommended by CSAB (Computing Sciences Accreditation Board) – the lead society within ABET (Accreditation Board for Engineering and Technology) for accreditation of degree programs in computer science, information systems, software engineering, information technology, and cybersecurity, and is a co-lead society for systems engineering, and is a cooperating society for computer engineering, biological engineering, and information engineering technology. CSAB is governed by the two largest technical, educational, and scientific societies in computer and computer-related fields: The Association for Computing Machinery, Inc. (ACM) and the IEEE-Computer Society (IEEE-CS).
Accordingly, the MERLOT IT discipline portal has been endorsed by both the IEEE Computer Society and IEEE Education Society, and that endorsement is noted with a banner on the IT portal page.
New Materials
-
Epicurious Teaching Lesson - Google Drive
Epicurious provides people a place to explore recipes, food-related articles, and other food content such as videos. In...
-
Dataset Summaries: Interrogating Data, Structures, and Systems in Tabular Datasets with Pivot Tables
Many people are familiar with using spreadsheets to create, manipulate, and carry-out mathematical operations on data. In...
-
Technology in Schools: Its Not Like this in Business
My purpose in writing this book is to give readers a view into the work of managing information technology in schools. IT...
-
OER_2022-ZhenglongLi-Personalized exploration of online education-- adaptive interactive online course based on learner data and knowledge map
Personalization is always the goal of education. In China, "teaching without distinction and according to students'...
-
Computerized Maintenance Management Software
Easy-to-use Computerized Maintenance Management System (CMMS) program for streamlining support administration, putting...
-
Progressive Web App Development
Insta is a leading progressive web app development company that delivers web apps that keep their users engaged by giving...
-
What are the best mobile app development tools?
A mobile application is a form of software meant to operate on a mobile device such as a smartphone or tablet. It...
-
ECON 125 | Lecture 24: Michael Porter - Strategy
Professor Michael Porter of Harvard University's School of Business discusses competitive strategy and the role it can...
-
Social Informatics | Lecture 1 | 23/Sept/2020
To undesrtand broadly what social informatics is
-
MIS BASIC CONCEPTS
To uinderstand that the information is critical in an organization
-
Information Technology Management
This course provides an overview of career opportunities in Information Technology Management.
-
Types of Threats in Cyber Security in 2021|Cybersecurity Training|Edureka | Cybersecurity Rewind - 4
Edureka PGP in Cybersecurity: with Edureka: https://www.edureka.co/post-graduate/... This Edureka video on "Types of...
-
The Data Notebook
The Data Notebook is an online suite of open interactive resources that provides instructional materials for introductory...
-
General Education for the Information Society
The general education curriculum as we know it today is a product of the Industrial Revolution. The assumptions that...
-
How Do I Fix Norton Installation Error 8504, 104, 8506?
There are many types of errors Norton installation error 8504, 104 this problem reinstall If you are unable to remove the...
-
Learn UI/UX Design
In UI design, you design user interfaces for sites, software, and more. In UX design, you will enhance the user...
-
Software Engineering Body of Knowledge Version 3 | IEEE Computer Society
SWEBOK V3.0 is the most recent completely revised and updated version of the internationally respected Guide to the...
-
Interactive Learning for Operation Analytics Topics (ILOAT)
The ILOAT is a self-paced digital resource developed for the Operation Analytics course to support self-directed...
-
UTHealth awarded nearly $10 million for public health informatics workforce development program
In order to develop a talent pipeline with individuals from diverse backgrounds in public health and data science to...
-
What are the features of Java used by Java web development company for web development? | Brainfuel Blog
Web development is still one of today’s most popular activities considering the acceptance of smartphones and allied...
-
Julia Data Science
This is an open-source and open access book on how to do Data Science using Julia. The book describes the basics of the...
-
August 2021 Healthcare Data Breach Report
There was a 44% month-over-month decrease in the number of reported healthcare data breaches in August 2021. 38...
-
July 2021 Healthcare Data Breach Report
High numbers of healthcare data breaches continued to be reported by HIPAA-covered entities and their business...
-
Predicting the future of healthcare: 10 takeaways from HIMSS21
Along with "guarded optimism" on the current state of the pandemic, some 19,000 on-site attendees in Las Vegas mulled...
New Members
-
Tron TokenTron Token
-
Mehdi MekniUniversity of New Haven
-
James SmithNone
-
tauseef khanRawasi systems
-
ali özkaleelakzo
-
Shardul BhattTntra
-
Lindsay deRuyterGeorgian College of Applied Arts and Technology
-
Saurabh2 SNone
-
Julie LarsenMid-State Technical College
-
Kevin HoustonNone
-
Rian AdelioPonselspek
-
Katherine RunyonUniversity of Tennessee System - Knoxville
-
Nikolina NikolovaSofia University "St. Kliment Ohridski"
-
Deborah LunnUniversity of Tennessee System - Knoxville
-
Muslim SattarovNone
-
Sophia JasperPepper Square
-
Regina GeorgeCryotos CMMS
-
CHESTER SIGUAWestfields International School Inc.
-
Zhenglong LiShaanxi Normal University
-
Harsh UttamIndian Institute of Science Education and Research, Tirupati
-
Social Bookmarking siteSocial Bookmarking Site
-
Rupal AroraYoctel Solution (India)
-
Rima FathallahESSTHS
-
Htay Hlaing WinNone
Materials by Discipline
- Application Development (373)
- Business Process Management (63)
- Data and Information Management (100)
- Enterprise Systems and Architecture (1)
- Foundations of Information Systems (18)
- Human Computer Interaction (18)
- IS Project Management (13)
- IS Strategy, Management and Acquisition (7)
- IT Audit and Controls (11)
- IT Infrastructure (567)
- IT Security and Risk Management (58)
- Knowledge Management (14)
- Social Informatics (28)
- System Analysis and Design (130)
Professional Organizations
- Institute of Electrical and Electronics Engineers (IEEE)
- IEEE Education Society
- IEEE Computer Society
- Association for Computing Machinery (ACM)
- Certified Information Systems Security Professional (CISSP)
- Government Cybersecurity
- Certified Ethical Hacker (CEH)
- Consortium for Computing Sciences in Colleges (CCSC)
- Instructional Technology Council (ITC)
- The MASIE Center
- ACM Special Interest Group on Computer Science Education (SIGCSE)
- Online Learning Consortium (formerly Sloan-C)
- Association for Talent Development (ATD)
- The eLearning Guild
- Michigan Association for Computer Users in Learning (MACUL)
- Flipped Learning Network
- United States Distance Learning Organization
Journals & Publications
- Journal of Cybersecurity
- National Cybersecurity Institute Journal
- International Journal of Cyber–Security and Digital Forensics (IJCSDF)
- Journal of Information Assurance & Cybersecurity
- Journal of Cyber Security & Information Systems
- ACM TechNews
- Campus Technology Higher Education Technology Newsletters
- CIO Magazine
- Computerworld
- eCampus News
- OLC Online Learning Journal
- Journal of Information Technology Education: Research (JITE:Research)
- Journal of Information Technology Education: Innovations in Practice (JITE:IIP)
- Journal of Information Technology Education: Discussion Cases (JITE:DC)
- Learning Solutions Magazine
- Network World
- Newsletters by O'Reilly (Free Registration gives you access to free newsletters, online discussions, and more.)
- Today's Campus
Information Technology on the Web
-
Cybersecurity norms may make it 'difficult' to do business in India: 11 industry bodies to CERT-In
May 27, 2022 09:18 PM PDT
-
10 Information Technology Stocks Moving In Friday's Intraday Session - Benzinga
May 27, 2022 07:13 PM PDT
-
City of Portland says it lost $1.4 million in one fraudulent transaction - KGW
May 27, 2022 04:54 PM PDT
-
What's the difference between zero trust vs. defense in depth? - TechTarget
May 27, 2022 04:33 PM PDT
-
ISA Global Cybersecurity Alliance | ISA - International Society of Automation (ISA)
May 27, 2022 04:09 PM PDT
-
61% Of Organizations Have Cyberinsurance, Survey Finds - Law360
May 27, 2022 03:56 PM PDT
-
Global bodies raise concerns over new cybersecurity norms | The Financial Express
May 27, 2022 03:53 PM PDT
-
$62.3M for eHealth Sask. upgrades not enough, cybersecurity experts warn | CBC News
May 27, 2022 03:43 PM PDT
-
COLUMN: Recent attacks force businesses to view cybersecurity with a wider lens
May 27, 2022 02:37 PM PDT
-
A unified cybersecurity strategy is the key to protecting businesses | National Post
May 27, 2022 02:26 PM PDT
-
2 Top Cybersecurity Stocks to “Set It and Forget It” | InvestorPlace
May 27, 2022 02:21 PM PDT
-
DOE Presents Public Roadmap for Boosting Cybersecurity in Manufacturing Industry - ExecutiveGov
May 27, 2022 02:03 PM PDT
-
Space Force to Assess Satellite Operators' Cybersecurity Via Infrastructure Asset Pre ...
May 27, 2022 02:03 PM PDT
-
City of Portland launches investigation after $1.4M fraudulent transaction - KOIN 6
May 27, 2022 01:47 PM PDT
-
Cyber defense CEO gives tips on cybersecurity - Spectrum News
May 27, 2022 01:23 PM PDT
-
Cybersecurity breach at the city of Portland led to fraudulent $1.4M transaction | KATU
May 27, 2022 01:23 PM PDT
-
Portland lost $1.4M in a 'cybersecurity breach' - OPB
May 27, 2022 01:11 PM PDT
-
This Mental Health Awareness Month, take care of your cybersecurity staff | VentureBeat
May 27, 2022 01:09 PM PDT
-
New York man sentenced to four years in transnational cybercrime scheme | The Hill
May 27, 2022 01:01 PM PDT
-
Portland government email account used to defraud city of $1.4M in cybersecurity breach
May 27, 2022 12:55 PM PDT
Info Tech on Twitter
- Register for this #EDUCAUSE Institute to develop critical areas of learning leadership success, academic communicat… twitter.com/i/web/status/1…5 hours ago | educause
- "Download your free checklist now to ensure your company’s inclusion initiatives are fully supported." Read more:… twitter.com/i/web/status/1…7 hours ago | learningsolpub
- Mainstreaming online and hybrid education has the potential to greatly impact equity and inclusion.… twitter.com/i/web/status/1…8 hours ago | educause
- Institutions are continuing to work towards centralizing IT. Learn more in our workforce report. bit.ly/37YTlmG9 hours ago | educause
- RT @CISAJen: 🎵“…Pour some #MFA sugar on me…”🎶
#MFAMay #MoreThanAPassword #DefLeppard https://t.co/kLWwemofc9, photo: pic.twitter.com/kLWwemofc99 hours ago | cyber
- If we think of technology as a tool to extend and amplify meaningful human interactions, students' experiences will… twitter.com/i/web/status/1…10 hours ago | EDUCAUSEreview
- RT @CyberGovAU: It’s #MFAMay in the U.S! Did you know #MFA secures your accounts and protects your data whether you’re in the 🇺🇸, 🇦🇺 or els…10 hours ago | cyber
- From ITIL/IT Service Management to Information Security, United Training courses can help you gain the skills you n… twitter.com/i/web/status/1…11 hours ago | educause
- Today's institutional leaders, working to improve their quality of learning, equitable access, and affordability at… twitter.com/i/web/status/1…12 hours ago | EDUCAUSEreview
- Are you with a company that serves higher ed IT and new to working in this space? Don’t miss the online program, Th… twitter.com/i/web/status/1…12 hours ago | educause