Information Technology Community Portal
Welcome – From the Editor
Greetings from the Information Technology Board!
Welcome to our portal!
A unique characteristic of the MERLOT IT discipline is that we have designed its taxonomy to align with the undergraduate course topics recommended by CSAB (Computing Sciences Accreditation Board) – the lead society within ABET (Accreditation Board for Engineering and Technology) for accreditation of degree programs in computer science, information systems, software engineering, information technology, and cybersecurity, and is a co-lead society for systems engineering, and is a cooperating society for computer engineering, biological engineering, and information engineering technology. CSAB is governed by the two largest technical, educational, and scientific societies in computer and computer-related fields: The Association for Computing Machinery, Inc. (ACM) and the IEEE-Computer Society (IEEE-CS).
Accordingly, the MERLOT IT discipline portal has been endorsed by both the IEEE Computer Society and IEEE Education Society, and that endorsement is noted with a banner on the IT portal page.
New Materials
-
Genetic Inroads into the Art of James Joyce
This book is a treasure trove comprising core writings from Hans Walter Gabler‘s seminal work on James Joyce, spanning...
-
Unveiling the Power of Web3 Marketing Solutions: Revolutionizing the Digital Landscape
Web3 Marketing Solutions showcasing arrangements address a change in perspective that gives a potential open door to the...
-
Modelling Between Digital and Humanities: Thinking in Practice
This volume presents an exploration of Digital Humanities (DH), a field focused on the reciprocal transformation of...
-
Ejercicio 5.1 APV Curso en linea
El presente curso tiene como objetivo explicar a detalle los derechos de las personas usuarias de los servicios de...
-
Funciones Lógicas en las Planillas de Cálculo
El presente material aborda los conceptos generales relacionados a las funciones lógicas en una planilla de cálculo. Se...
-
A Person-Centered Guide to Demystifying Technology, 2nd Edition
Digital technologies old and new are not objects that can be packed inside a box. They are a seamless, indivisible...
-
Intermediate Greek- An AI Assignment
The prowess of Achilles, Diomedes, and Hektor are one of the central themes of The Iliad by Homer. There are other,...
-
Brainstorming and Idea Generation for Research Papers
In this assignment, you will use generative AI tools to help you brainstorm for research topics and questions for a class...
-
The ChatGPT Essay
Artificial Intelligence is nothing new – Amazon, Spotify, YouTube use it on you every time you go there, and I’m pretty...
-
Creating and Editing a Multichannel Marketing Plan (Part 1)
Building on the concepts discussed in the competitive analysis, market segmentation, branding, and storytelling sections...
-
Generative AI-Based Course Assignment - DMS-BR 778 Issues in Clinical Practice
Generative artificial intelligence (AI) is a rapidly evolving space with multiple applications in healthcare that we are...
-
Which Statistical Test Should I Use?
In this assignment, you will use mini-cases to help you improve your ability to recognize requirements for a parametric...
-
Using Generative AI to Understand the Rhetorical Situation
Successful writers think carefully about the rhetorical situation and use it to create messages that engage, inform, and...
-
Using Artificial Intelligence to Create an Annotated Bibliography
For this assignment, you will be using ChatGPT to create an annotated bibliography that consists of 5 primary journal...
-
History on the WWW: An Exploratory Introduction
What is today’s digital, networked world and how does it affect how the average American learns about immigration...
-
Retrieval Augmented Generation
This is an assignment used in an introductory computer science course that demonstrates how retrieval augmented...
-
Health Care in the Information Society: Volume 2 - From Anarchy of Transition to Programme for Reform
In this fascinating book David Ingram traces the history of information technology and health informatics from its...
-
Health Care in the Information Society: Volume 1 - From Adventure of Ideas to Anarchy of Transition
In this fascinating book David Ingram traces the history of information technology and health informatics from its...
-
[IDC Research] Create More Business Value From Organizational Data
What is the average organization spending on AI? In what areas and for what use cases? This IDC InfoBrief has the answers...
-
MySQL Tutorial
This is the MySQL Tutorial from the MySQL 5.7 Reference Manual.
-
delaware a.i. - delaware / a.i.
Short books on AI from delaware
-
AI Crypto Token Development Company | AI Token Developers
Maticz is a prominent AI token development company that offers AI crypto token development services on various...
-
NFT Marketplace Script | Top 10 NFT Marketplace Clone Script
Maticz offers white label NFT marketplace script to create NFT marketplace clones like Rarible, Opensea, Binance NFT,...
-
Apresentações relacionadas a MVC
Apresentações referentes a MVC criadas por Othavio Augusto Chiaramonte Teixeira, Everton dos Santos Coelho, Bruno da...
New Members
-
Shariq HassanExperts Consulting
-
Secure VPN GuideSecure VPN Guide
-
Jeff MillerSouthern Illinois University System - Carbondale
-
Chandra VasasaliAmrita University
-
Time CalculatorTime-Calculator.IO
-
cocomii comcocomiicom
-
Kathryn Odell-HamileonUniversity at Albany
-
Tony DedmanTennessee College of Applied Technology - Hartsville
-
Smith LindsayAhmedabad.Gujarat
-
Selwyn Aerole FranciscoAMA Online Education (under AMA Education System)
-
Joe Mar ClosaLeyte Normal University
-
Sowjanya AthreyaJSDC
-
Priyank BhattFanshawe College
-
Meghan HoldenDuke University
-
Mary LebensSummit Academy OIC
-
Debayan ChakroborttyBJSS
-
Lency KorienOpsTree IT Solutions
-
Emily RobertsonUsa
-
James AlbertJackson Financial
-
Web3 Marketing SolutionsBabu Banarasi Das University, Lucknow
-
John Jose MundapuzhaBoston City Campus
-
rentprivate villasRentprivatevillas
-
JESSICA HAWESWestern Governors University
-
Karen ThurstonLong Beach City College
Materials by Discipline
- Application Development (442)
- Business Process Management (106)
- Data and Information Management (160)
- Enterprise Systems and Architecture (7)
- Foundations of Information Systems (36)
- Human Computer Interaction (36)
- IS Project Management (18)
- IS Strategy, Management and Acquisition (11)
- IT Audit and Controls (12)
- IT Infrastructure (578)
- IT Security and Risk Management (72)
- Knowledge Management (29)
- Social Informatics (38)
- System Analysis and Design (151)
Professional Organizations
- Institute of Electrical and Electronics Engineers (IEEE)
- IEEE Education Society
- IEEE Computer Society
- Association for Computing Machinery (ACM)
- Certified Information Systems Security Professional (CISSP)
- Government Cybersecurity
- Certified Ethical Hacker (CEH)
- Consortium for Computing Sciences in Colleges (CCSC)
- Instructional Technology Council (ITC)
- The MASIE Center
- ACM Special Interest Group on Computer Science Education (SIGCSE)
- Online Learning Consortium (formerly Sloan-C)
- Association for Talent Development (ATD)
- The eLearning Guild
- Michigan Association for Computer Users in Learning (MACUL)
- Flipped Learning Network
- United States Distance Learning Organization
Journals & Publications
- Journal of Cybersecurity
- National Cybersecurity Institute Journal
- International Journal of Cyber–Security and Digital Forensics (IJCSDF)
- Journal of Information Assurance & Cybersecurity
- Journal of Cyber Security & Information Systems
- ACM TechNews
- Campus Technology Higher Education Technology Newsletters
- CIO Magazine
- Computerworld
- eCampus News
- OLC Online Learning Journal
- Journal of Information Technology Education: Research (JITE:Research)
- Journal of Information Technology Education: Innovations in Practice (JITE:IIP)
- Journal of Information Technology Education: Discussion Cases (JITE:DC)
- Learning Solutions Magazine
- Network World
- Newsletters by O'Reilly (Free Registration gives you access to free newsletters, online discussions, and more.)
- Today's Campus
Information Technology on the Web
-
Cybersecurity jobs available right now: March 19, 2024 - Help Net Security
Mar 18, 2024 10:31 PM PDT
-
What Fund Management Boards Need to Know about Cybersecurity - Finextra Research
Mar 18, 2024 08:35 PM PDT
-
Cisco ready for "AI revolution" as it acquires Splunk in $28 billion deal - USA Today
Mar 18, 2024 08:33 PM PDT
-
We're one step closer to a global cybersecurity standard for smart home devices - The Verge
Mar 18, 2024 07:02 PM PDT
-
CrowdStrike Collaborates with NVIDIA to Advance Cybersecurity with Generative AI
Mar 18, 2024 06:43 PM PDT
-
AI Infused with XDR, SIEM, and Threat Intelligence Set to Reshape Cybersecurity
Mar 18, 2024 05:48 PM PDT
-
Senate Intelligence Committee Chair on Cybersecurity Defense | C-SPAN.org
Mar 18, 2024 04:51 PM PDT
-
CrowdStrike and Nvidia form strategic partnership to enhance cybersecurity with AI
Mar 18, 2024 04:27 PM PDT
-
Saudi Arabia's National Cybersecurity Authority Announces the GCF Annual Meeting 2024
Mar 18, 2024 04:20 PM PDT
-
Gartner unveils top eight cybersecurity predictions for 2024 - Express Computer
Mar 18, 2024 03:37 PM PDT
-
AI Portends New Cybersecurity Risks, Opportunities for Higher Ed - Government Technology
Mar 18, 2024 03:04 PM PDT
-
Cybersecurity experts urge retirement of touchscreen voting machines used in Pennsylvania
Mar 18, 2024 03:01 PM PDT
-
Cybersecurity experts urge retirement of touchscreen voting machines used in Pennsylvania
Mar 18, 2024 02:54 PM PDT
-
FCC Approves Voluntary Cybersecurity Labeling Program for Wireless IoT Devices
Mar 18, 2024 02:39 PM PDT
-
3 Ways to Practice Cybersecurity on Your Team - RISMedia
Mar 18, 2024 01:52 PM PDT
-
DNS Security: The Forgotten Hero of Your Cybersecurity Strategy - Gigaom
Mar 18, 2024 01:43 PM PDT
-
The Rundown of a Cybersecurity Certificate - Abilene Christian University
Mar 18, 2024 01:31 PM PDT
-
Partnerships in Cybersecurity: Permira x Mimecast
Mar 18, 2024 01:17 PM PDT
-
ThreatHunter.ai Reinforces Its Commitment to Revolutionizing Cybersecurity Through ...
Mar 18, 2024 01:06 PM PDT
-
NIST Expands Cybersecurity Framework to Manage Risks - The National Law Review
Mar 18, 2024 01:05 PM PDT