Gabriel Doncel

...to 2019. Education M.S. in information systems and technology management, University of Delaware M.B.A., University of Delaware B.S. in computer & network security, Wilmington University Certifications include CISSP & C|CISO...

Benchmark study signals growing need for financial services analytics experts

...confirm there are many unmet needs that present opportunities for new or recent graduates. Trained financial services analytics experts will be at the forefront of solving some of financial industry’s...

Patrick Costigan

...course in business), Introduction to Marketing and MISY 160 Business Computing Tools and Concepts. Dr. Costigan is also an adjunct instructor at Wilmington University and has taught Computer Applications for...

Information Systems and Technology Management (ISTM) Spotlight: Meet our alumni

...left) What made you decide to pursue an ISTM degree? I have a bachelor’s degree in computer engineering, and for my next step I was looking for a degree that...

From the Orchestra to the Office

...translation industry experienced a massive digital transformation in the last decade, going from pen, paper and dictionaries to computer-assisted translation software, translation memories and digital glossaries,” he continued. This transition,...

Lerner Graduate Student Stories: Dipti Dighe

Dipti Dighe works as graduate assistant and career counselor at the Lerner Career Services Center, in addition to being an MBA in business analytics candidate at the University of Delaware’s...

The National Association of Black Accountants 

...being in the organization as I had recently changed directions from computer science into accounting. The organization helped me transition by providing resources and support and eventually I was appointed...

MBA Concentration in Information Technology

...Internship or related course (when focused on IT-related topic) with prior approval Some graduate level courses from the Department of Computer Science, are also acceptable with prior approval. In addition...

How Faking Social Responsibility May Get Companies Hacked

...incidents, external assessments of firms’ CSP and other factors. The results, published this week in the Information Systems Research paper “Too Good to Be True: Firm Social Performance and the...