Publication Date
In 2025 | 2 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 16 |
Descriptor
Source
Information Systems Education… | 16 |
Author
Kevin Mentzer | 2 |
Mark Frydenberg | 2 |
Marquardson, Jim | 2 |
Adam Patterson | 1 |
Akujobi, Innocent | 1 |
Anderson, Nicole | 1 |
Andre Noonan | 1 |
Bajracharya, Biju Raja | 1 |
Baker, Elizabeth | 1 |
Black, Michael | 1 |
Cathy Temple | 1 |
More ▼ |
Publication Type
Journal Articles | 16 |
Reports - Research | 9 |
Reports - Descriptive | 6 |
Tests/Questionnaires | 6 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 12 |
Postsecondary Education | 11 |
Audience
Location
Belarus | 1 |
North Carolina | 1 |
Tennessee | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kevin Mentzer; Mark Frydenberg; Suhong Li – Information Systems Education Journal, 2025
Virtual Reality has the potential to transform educational experiences. This evolution, from the earliest days of projecting and viewing stereoscopic static images to the immersive headset experiences possible today, allows VR to transport students to new locations, enable them to participate in virtual spaces and simulations, and design 3-D…
Descriptors: Computer Simulation, Business Education, Educational Technology, Technology Uses in Education
Adam Patterson; Cathy Temple; Nikki Anderson; Chris Rogalski; Kevin Mentzer – Information Systems Education Journal, 2025
This research examines the implementation of virtual reality into an effective speaking course at a small business college in New England. The researchers detail how they piloted the use of MetaQuest 2 headsets to students for round-the-clock availability of public speaking software in an Effective Speaking course. Students were administered a…
Descriptors: Computer Simulation, Speech Instruction, Public Speaking, Experiential Learning
Mark Frydenberg; David J. Yates; Andre Noonan – Information Systems Education Journal, 2024
This paper explores the course design and implementation of a first-year discovery seminar on "Living in the Metaverse" offered at a business university. Integrated with standardized college-readiness topics, the course combines hands-on activities with collaborative assignments and class discussions to present a multidisciplinary…
Descriptors: Pedagogical Content Knowledge, Technological Literacy, Interdisciplinary Approach, First Year Seminars
Black, Michael; Chapman, Debra; Clark, Angela – Information Systems Education Journal, 2018
The Enhanced Virtual Laboratory (EVL) is the product of a Department of Defense grant to enhance outreach, research, and education for cyber security. Through web-based laboratories, EVL allows users to remotely experience interactive content with virtual machines inside a modern web browser providing constructivism-based, student-centered,…
Descriptors: Computer Security, Computer Simulation, Laboratories, Internet
Gondi, Vamsi; Hua, David; Bajracharya, Biju Raja – Information Systems Education Journal, 2021
In the age of COVID-19, traditional teaching techniques are under scrutiny. Most concepts and labs in the area of information technology are intended to be taught face-to-face in labs using clusters and networking infrastructure. Simulation software's such as uCertify, Pearson online, etc.., are good alternative, but are not always a viable…
Descriptors: Computer Science Education, Computer Software, Computer Simulation, Information Technology
Marquardson, Jim – Information Systems Education Journal, 2018
Academics are responding to the call from industry for graduates armed with cybersecurity skills. A common challenge that educators face is creating effective cybersecurity curriculum that prepares students with practical skills upon graduation. While hands-on exercises are a powerful method for teaching and assessing cybersecurity skills, these…
Descriptors: Information Security, Information Science Education, Teaching Methods, Skill Development
Christian, Nicholas; Akujobi, Innocent; Saha, Munmun; Korzaan, Melinda – Information Systems Education Journal, 2018
Advanced Competition Simulations (ACS), a massive multiplayer online (MMO) strategy gaming company, has petabytes of customer data at their data center in Brentwood, Tennessee that could assist executives with decision making, but they currently do not have business intelligence software or a business intelligence and analytics (BIA) team. As is…
Descriptors: Computer Games, Computer Simulation, Business, Intelligence
Marquardson, Jim; Gomillion, David L. – Information Systems Education Journal, 2019
Simulated environments can provide a convenient, effective way to teach skills. Simulations have been used for decades to teach skills such as piloting aircraft. As technology has improved, it has become feasible to simulate many other tasks. Recent advances in virtual and augmented reality provide new avenues for expanding training using…
Descriptors: Computer Simulation, Teaching Methods, Transfer of Training, Introductory Courses
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Serapiglia, Anthony – Information Systems Education Journal, 2016
Through industry news as well as contemporary reporting, the topic of computer security has become omnipresent in our daily lives. Whether the news is about corporate data breaches, international cyber espionage, or personal data compromises and identity theft--EVERYONE has had to deal with digital security in some way. Because of this, one of the…
Descriptors: Competition, Undergraduate Students, Computer Security, Information Security
Waguespack, Leslie J. – Information Systems Education Journal, 2014
With the increasing proliferation of multitasking and Internet-connected devices, security has reemerged as a fundamental design concern in information systems. The shift of IS curricula toward a largely organizational perspective of security leaves little room for focus on its foundation in systems architecture, the computational underpinnings of…
Descriptors: Computer Security, Internet, Information Systems, Computer Software
Faja, Silvana – Information Systems Education Journal, 2013
Virtual collaborative activities have the potential to keep students engaged, create a sense of community in online courses and allow them to experience and practice virtual teamwork skills. This study presents an attempt to explore students' perceptions of online collaborative learning involving both process and product oriented activities. The…
Descriptors: Cooperative Learning, Online Courses, Student Attitudes, Management Systems
Murphy, Marianne C.; Sharma, Aditya; Rosso, Mark – Information Systems Education Journal, 2012
Teaching office applications such as word processing, spreadsheet and presentation skills has been widely debated regarding its necessity, extent and delivery method. Training and Assessment applications such as MyITLab, SAM, etc. are popular tools for training students and are particularly useful in measuring Assurance of Learning (AOL)…
Descriptors: Office Occupations Education, Computer Assisted Instruction, Training Methods, Student Evaluation
McMaster, Kirby; Sambasivam, Samuel E.; Anderson, Nicole – Information Systems Education Journal, 2010
In demand paging virtual memory systems, the page fault rate of a process varies with the number of memory frames allocated to the process. When an increase in the number of allocated frames leads to an increase in the number of page faults, Belady's anomaly is said to occur. In this paper, we present a probability model for Belady's anomaly. We…
Descriptors: Probability, Models, Computer Science Education, Information Systems
Reinicke, Bryan A.; Yaylacicegi, Ulku – Information Systems Education Journal, 2010
Undergraduate students often have difficulty understanding the way in which data moves across a TCP/IP network, such as the Internet. From the initial data request, to larger files being packetized and transmitted via multiple routes, the students can become lost in the details. These are important concepts for both introductory Management…
Descriptors: Undergraduate Students, Internet, Management Information Systems, Telecommunications
Previous Page | Next Page ยป
Pages: 1 | 2