Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Source
Information Systems Education… | 2 |
Data Quality Campaign | 1 |
IEEE Transactions on Learning… | 1 |
Journal of Information… | 1 |
ProQuest LLC | 1 |
Author
Ahluwalia, Madhu V. | 1 |
Alier, Marc | 1 |
Altun, Halis | 1 |
Baker, Elizabeth | 1 |
Bergner, Terry | 1 |
Blackman, Harvey | 1 |
Haddad, Hatem | 1 |
Irwin, Gretchen | 1 |
Jones, Kiku | 1 |
Kaiiali, Mustafa | 1 |
Lang, Guido | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 3 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Leonard, Lori N. K.; Jones, Kiku; Lang, Guido – Information Systems Education Journal, 2019
Information systems (IS) curriculum review is a continuous process. Universities seek to offer content that they believe will be most beneficial to students as they begin their career. However, that content may or may not satisfy employer needs. This paper, which is part of a larger study, seeks to determine if required course content matches the…
Descriptors: Information Systems, Employer Attitudes, Curriculum Evaluation, Education Work Relationship
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc – IEEE Transactions on Learning Technologies, 2016
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
Descriptors: Electronic Learning, Computer System Design, Computer Security, Confidentiality
Ahluwalia, Madhu V. – ProQuest LLC, 2011
In the context of association rule mining, the state-of-the-art in privacy preserving data mining provides solutions for categorical and Boolean association rules but not for quantitative association rules. This research fills this gap by describing a method based on discrete wavelet transform (DWT) to protect input data privacy while preserving…
Descriptors: Databases, Information Security, Data, Information Retrieval
Irwin, Gretchen; Wessel, Lark; Blackman, Harvey – Journal of Information Systems Education, 2012
This case describes a database redesign project for the United States Department of Agriculture's National Animal Germplasm Program (NAGP). The case provides a valuable context for teaching and practicing database analysis, design, and implementation skills, and can be used as the basis for a semester-long team project. The case demonstrates the…
Descriptors: Course Descriptions, Genetics, Animals, Animal Husbandry
Bergner, Terry; Smith, Nancy J. – Data Quality Campaign, 2007
Imagine if, at the start of the school year, a teacher could have detailed information about the academic history of every student in her or his classroom. This is possible if the teacher can log on to a Web site that provides access to an educational data warehouse. The teacher would see not only several years of state assessment results, but…
Descriptors: Database Design, Database Management Systems, Management Information Systems, State Programs