Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 10 |
Descriptor
Source
Journal of Information… | 3 |
Association Supporting… | 1 |
British Columbia Council on… | 1 |
Campus Technology | 1 |
Distance Learning | 1 |
Information Systems Education… | 1 |
Interactive Technology and… | 1 |
Journal of Cybersecurity… | 1 |
Author
Cummings, Jeff | 2 |
Janicki, Thomas | 2 |
Atkinson, Al | 1 |
Brady D. Lund | 1 |
Campbell, Jackie | 1 |
Capo, Berta | 1 |
Elnoshokaty, Ahmed | 1 |
Hong, Soongoo | 1 |
Kam, Hwee-Joo | 1 |
Karp, Jason | 1 |
Katerattanakul, Pairin | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Research | 5 |
Reports - Descriptive | 3 |
Collected Works - Proceedings | 1 |
Reports - Evaluative | 1 |
Education Level
Postsecondary Education | 10 |
Higher Education | 7 |
Elementary Secondary Education | 1 |
Audience
Location
Canada | 1 |
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Cummings, Jeff; Janicki, Thomas; Matthews, Kevin – Journal of Information Systems Education, 2023
Faculty in the information systems (IS) and information technology (IT) fields are faced with the challenge to keep their curriculum relevant and current. What was taught two years ago will often be outdated and faculty must constantly update their curriculum on which courses should be taught as well as what should be taught within a particular…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Marquardson, Jim; Elnoshokaty, Ahmed – Information Systems Education Journal, 2020
People starting cybersecurity careers have three main avenues for achieving entry-level job qualifications: learning in-demand skills, earning industry certifications, and graduating with a college degree. Though people can pursue skills, certificates, and degrees together, financial and time constraints often make people focus their efforts to…
Descriptors: Information Security, Computer Security, Employment Opportunities, Employment Qualifications
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Cummings, Jeff; Janicki, Thomas – Journal of Information Systems Education, 2021
In the fields of information technology and information systems, faculty must consistently adjust the curriculum to meet the demands of the field. However, a challenge they often face is understanding what should be covered, especially given the limited number of courses most universities are able to offer. This research is a biennial report of…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning
Atkinson, Al – British Columbia Council on Admissions and Transfer, 2009
The Education Planner website provides a searchable database of approximately 1,700 undergraduate post-secondary programs in British Columbia (BC). It is intended as a "one-start entry point" for students looking for post-secondary options. This independent review of Education Planner was undertaken to determine its overall…
Descriptors: Web Sites, Postsecondary Education, Undergraduate Study, Databases
Katerattanakul, Pairin; Kam, Hwee-Joo; Lee, James J.; Hong, Soongoo – Journal of Information Systems Education, 2009
The MetaFrame system migration project at WorldPharma, while driven by merger and acquisition, had faced complexities caused by both technical challenges and organizational issues in the climate of uncertainties. However, WorldPharma still insisted on instigating this post-merger system migration project. This project served to (1) consolidate the…
Descriptors: Case Method (Teaching Technique), Business Administration Education, Class Activities, Computer Science Education
Panettieri, Joseph C. – Campus Technology, 2007
There's no silver bullet to information security; universities must continue to keep their antivirus, anti-spyware, firewall, and patch management systems in good working order. These days, the largest target for hackers appears to be university databases. Now, universities are searching for new solutions to safeguard those systems. This article…
Descriptors: Databases, Best Practices, Higher Education, Technology Planning
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2014
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Conferences (Gatherings), Conference Papers, Computer Uses in Education, Small Colleges