Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Author
Amy J. Connolly | 1 |
Chen, Li-Chiou | 1 |
Daniel E. Rush | 1 |
Larson, Eric C. | 1 |
Leigh A. Mutchler | 1 |
Tao, Lixin | 1 |
Vieregger, Carl | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Guides - Classroom - Teacher | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Teachers | 3 |
Location
New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Leigh A. Mutchler; Amy J. Connolly; Daniel E. Rush – Journal of Information Systems Education, 2024
Information systems courses must adapt to meet the unprecedented demand for well-trained information security (InfoSec) professionals, but they cannot competently fill this gap without also ensuring that students are fluent and confident in foundational skills, both technical and behavioral. How to teach behavioral topics in InfoSec management is…
Descriptors: Information Security, Information Science Education, Information Systems, Technological Literacy
Larson, Eric C.; Vieregger, Carl – Journal of Information Systems Education, 2019
This teaching case highlights the complex and unique strategic issues facing social media platform companies, using Facebook as the primary, motivating example. The case centers on the breach of trust that occurred when Cambridge Analytica acquired user data from 87 million Facebook accounts and then attempted to sway the 2016 U.S. Presidential…
Descriptors: Social Media, Strategic Planning, Trust (Psychology), Users (Information)
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education