About
44
Publications
185,448
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
578
Citations
Citations since 2017
Introduction
Additional affiliations
January 2015 - present
July 2011 - December 2015
Publications
Publications (44)
Learning Management Systems (LMS) have evolved from simple delivery and management systems to key pieces of modern organizational learning and performance improvement capabilities. In a changing and globally competitive world, a LMS can allow for improved access and tracking of learning activities as well as support organizational growth and develo...
Information technology (IT) professionals have constantly stressed the importance of soft skills and used them as a key factor in hiring and career development. The soft skills are often difficult to be practiced and evaluated in IT curriculum, specifically in a subject or a skill focused course. We took on the challenge in an IT capstone course wh...
* Accompanying more recent lecture notes: https://bit.ly/2x3jDP7 or
https://www.edocr.com/v/yqwmqeba/jgzheng/Business-Data-Visualization
-------
Compared to other types and applications of visualization, business data visualization, particularly concerns about the visualization of business data, is mainly for the purpose of communication, informati...
This chapter summarizes a unique department-wide effort in the adoption, development, implementation, and assessment of open educational resources (OER) for a wide range of information technology courses. The chapter presents the development principles and practices at four levels: OER-driven pedagogies, OER adoption and development, course design/...
Web analytics is the technology and method for the collection, measurement, analysis and reporting of websites and web applications usage data (Burby & Brown, 2007). Web analytics has been growing ever since the development of the World Wide Web. It has grown from a simple function of HTTP (Hypertext Transfer Protocol) traffic logging to a more com...
An introduction of business intelligence and analytics in the first class of IT 7123 at Kennesaw State University - continuously updated. Also located at https://www.edocr.com/v/r4dg6mjr
Lecture for IT 7113 Data Visualization at Kennesaw State University. Accompanying book chapter:
https://www.researchgate.net/publication/321804138_Data_Visualization_for_Business_Intelligence
or https://bit.ly/2oZ2ZvK
See the complete collection at https://www.edocr.com/user/jgzheng/collection/datavisualizationlecturenotes
Adult learners are a large group for higher education. Adult learning is different from children's learning in that adult learners are more self-directed, having prior experience, and are internally motivated to learn subjects that are more relevant to life and can be applied immediately. Understanding adult learners' characteristics can help insti...
A summary report for the IT capstone projects I have coordinated in IT 4983 from 2012 to 2017. Related paper https://www.researchgate.net/publication/281806496_Practicing_and_Evaluating_Soft_Skills_in_IT_Capstone_Projects
Collaboration technologies play an increasingly important role in student teamwork in universities. With the proliferation of collaboration systems on the market and the wide range of features they offer, choosing an appropriate system can be an overwhelming task for college students. In this paper, the authors present an empirical study that aimed...
Understanding alumni's career path is critical for an Information Technology (IT) program to engage existing students, get connected to alumni and adapt the curriculum to the ever-changing technology field. LinkedIn, the largest professional networking site, provides a wealth of publicly available career outcomes of educations from higher education...
One of the high costs for students includes buying textbooks and other materials for courses. According to the Institute for College Access and Success (2015) project on the student debt report, Georgia ranked 24th in the nation with $26,518 average debt per student in 2014. [1] Since then, the average debt per student in Georgia increased 73 perce...
The growing tuition has placed a large financial burden on many college students. High cost of textbooks adds to the problem that may cause students to delay or withdraw their education. Another problem of many current textbooks is their relevancy and currency. This is particularly notable in the computing and technology areas. In this project, we...
Engaging students in the learning process is critical to their learning experience. One common practice is to have student do the work and report it back in classroom as presentations. However, many of these presentations are solely presented by students and are crowded into specific presentation class sessions. This is suboptimal in achieving a te...
The paper describes the development of four learning modules that focus on technical details of how a person’s privacy might be compromised in real-world scenarios. The paper shows how students benefited from the addition of hands-on learning experiences of privacy and data protection to the existing information technology courses. These learning m...
This Grants Collection for Business Intelligence was created under a Round Two ALG Textbook Transformation Grant. Affordable Learning Georgia Grants Collections are intended to provide faculty with the frameworks to quickly implement or revise the same materials as a Textbook Transformation Grants team, along with the aims and lessons learned from...
Campus energy management increasingly demands a controlled and managed process for achieving the aims of cost control and operation effectiveness. A mature decision making process is driven by data gathering, analysis and reporting, as advocated by business intelligence (BI), which already has had broad impact on enterprises. The BI process has bee...
This chapter will present an evaluation framework to examine major web navigation systems from a human information behavior and user interface perspective. The framework focuses on content structure and ease-of-access, two of the most important features of web navigation systems. The advantages and weaknesses of each type of web navigation system w...
Business intelligence (BI) and healthcare analytics are the emerging technologies that provide analytical capability to help healthcare industry improve service quality, reduce cost, and manage risks. However, such component on analytical healthcare data processing is largely missed from current healthcare information technology (HIT) or health inf...
IT capstone projects have become an essential part of the IT curriculum and give students valuable experience to work in a semester long project in a real world context. This paper investigates project success factors and challenges by examining the student feedback data we collected for the past two years. We plan to use a template analysis method...
The world of web development has been impacted by the mobile computing, particularly the wide use of smart phones. The rising trend in mobile computing has motivated us to develop a new senior technical track (Bachelor of Science) on Mobile and Web. This panel will discuss the various aspects of setting up new mobile computing courses to be added t...
Weak enrollment growth has been a concern for many Information Systems (IS) programs in recent years although the IT/IS job market remains strong. Stimulating undergraduate students' interest to IS programs have been a challenge. In this paper, the researchers took a comprehensive approach to study how to effectively promote a Management Informatio...
Check the journal version at https://www.researchgate.net/publication/281417728_Bringing_Business_Intelligence_to_Health_Information_Technology_Curriculum
Business intelligence (BI) and healthcare analytics are emerging technologies that provide analytical capability to help healthcare industry improve service quality, reduce cost, and manage risk...
Adult learners are a large group for higher education. Adult learning is different from children's learning in that adult learners are more self-directed, having prior experience, and are internally motivated to learn subjects that are more relevant to life and can be applied immediately. Understanding adult learners' characteristics can help insti...
Most of Information Technology and Information Systems courses teach students about possible invasion of privacy as a result of poor information system security, not about privacy as an essential principle in information systems. Moreover, students must know not only policy and compliance aspects of privacy, but also technical safeguards, so they c...
Web use continues its remarkable growth, not just in the diversity of applications and the devices that deliver them, but also in the technologies for developing new applications. Most notable is the proliferation of new development methodologies and frameworks. Major trends include stricter adherence to Model-View-Controller (MVC) architecture, ob...
The environment of higher education is changing; we have new challenges and opportunities created by social media, streaming technology, access to learning materials, and pathways of acquiring and assessing knowledge and skills. This panel discusses forces of change and disruption to existing models of higher education and suggests means by which I...
Laboratory exercises are important in all technical disciplines including information security. Development of reliable laboratory exercises covering rapidly changing topics takes a lot of time and resources. Instructors often prefer to cover an ever-changing topic using textbook materials and additional readings rather than developing a new lab ex...
A fundamental issue is still not addressed in current web navigation designs is the consistency of navigation models across different websites. In addition, almost all of the current designs are static and passive; users have to adapt their navigation behaviors to each model and follow it all the time on a particular website. This research presents...
This paper describes a team blog network method designed for a graduate class which surveyed the concepts and practices of system integration. To facilitate student participation and knowledge sharing, a project based on a network of team blog websites was designed. The paper introduces the project setting and summarizes student feedback collected...
Many Information Assurance courses include privacy topics. However, many of them do not address privacy issues systematically and comprehensively. Those courses do not offer students a complete picture of privacy from both data providers' and data collectors' perspectives. A coherent and consistent curriculum framework on teaching privacy needs to...
When prioritizing projects, managers usually have to evaluate multiple attributes (dimensions) of project data. However, these dimensions are usually condensed into one or two indicators in many existing analysis processes. For example, projects are commonly prioritized using a scoring approach: they are evaluated according to predefined categories...
In project management, many decisions are made based on multiple attributes (dimensions) of project data. However, these dimensions are usually condensed into one or two indicators in the analysis process. For example, projects are commonly prioritized using a scoring approach: they are evaluated according to predefined categories, which are then a...
This paper investigates: (1) the influence of risk checklists on software practitioner risk perception and decision-making, and (2) the influence of role (inside project manager vs. outside consultant) on software practitioner risk perception and decision-making. Evidence on these points is presented based on a role playing experiment conducted wit...
As Web-based information systems and applications have been growing more and more complex, the concept of “Web engineering” begins to prevail. Generally, Web engineering refers to a field concerned about the employment of systematic and disciplined approaches to the development and management of Web sites and Web applications (Lowe, 1999; Murugesan...
For full text please visit its journal publication:
https://www.researchgate.net/publication/264935893_A_Multidimensional_Perceptual_Map_Approach_to_Project_Prioritization_and_Selection
This paper investigates: (1) the influence of risk checklists on software practitioner risk perception and decision-making, and (2) the influence of role (inside project manager vs. outside consultant) on software practitioner risk perception and decision-making. Evidence on these points is presented based on a role playing experiment conducted wit...
The problem of semantic heterogeneity has gained ever increasing attention as the world's digital information systems become more closely interconnected. Among the various interoperability problems faced by information integration solutions, the semantic interoperability problem has been growing in importance, with increasingly sophisticated approa...
This paper profiles the eCommerce research of the past 7 years. Drawing on a sample of 582 articles in both academic and professional journals, we highlight the major domains and explore the most salient themes in each area. Our analysis finds that the interdisciplinary nature of eCommerce research has led to great diversity in the topics explored....
Semantic heterogeneity is becoming increasingly prominent in bioinformatics domains that deal with constantly expanding, dynamic, often very large, datasets from various distributed sources. Metadata is the key component for effective information integration. Traditional approaches for reconciling semantic heterogeneity use standards or mediation-b...