Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 3 |
Descriptor
Author
Alier, Marc | 1 |
Altun, Halis | 1 |
Baker, Elizabeth | 1 |
Haddad, Hatem | 1 |
Jones, Kiku | 1 |
Kaiiali, Mustafa | 1 |
Lang, Guido | 1 |
Leonard, Lori N. K. | 1 |
Ozkaya, Armagan | 1 |
Reinicke, Bryan | 1 |
Toothman, Callie | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Leonard, Lori N. K.; Jones, Kiku; Lang, Guido – Information Systems Education Journal, 2019
Information systems (IS) curriculum review is a continuous process. Universities seek to offer content that they believe will be most beneficial to students as they begin their career. However, that content may or may not satisfy employer needs. This paper, which is part of a larger study, seeks to determine if required course content matches the…
Descriptors: Information Systems, Employer Attitudes, Curriculum Evaluation, Education Work Relationship
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc – IEEE Transactions on Learning Technologies, 2016
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
Descriptors: Electronic Learning, Computer System Design, Computer Security, Confidentiality