Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
Association Supporting… | 1 |
Community College Journal | 1 |
Information Systems Education… | 1 |
Journal of Information… | 1 |
Online Submission | 1 |
Author
Cummings, Jeff | 1 |
Grover, Mark | 1 |
He, Wu | 1 |
Jackowicz, Stephen, Ed. | 1 |
Reinicke, Bryan | 1 |
Sahin, Ismail, Ed. | 1 |
Smith, Peter, Ed. | 1 |
Wong, Wylie | 1 |
Yang, Li | 1 |
Yuan, Xiaohong | 1 |
Publication Type
Journal Articles | 3 |
Collected Works - Proceedings | 2 |
Reports - Descriptive | 2 |
Books | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Grade 1 | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Two Year Colleges | 1 |
Audience
Location
North Carolina | 5 |
Kentucky | 3 |
Maryland | 2 |
Virginia | 2 |
West Virginia | 2 |
Albania | 1 |
China | 1 |
Croatia | 1 |
District of Columbia | 1 |
Florida | 1 |
Georgia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Grover, Mark; Reinicke, Bryan; Cummings, Jeff – Information Systems Education Journal, 2016
As the popularity of Information Technology programs has expanded at many universities, there are a number of questions to be answered from a curriculum standpoint. As many of these programs are either interdisciplinary, or at least exist outside of the usual Computer Science and Information Systems programs, questions of what is appropriate for…
Descriptors: Information Technology, Information Security, Evaluation Methods, Program Evaluation
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Wong, Wylie – Community College Journal, 2015
Community colleges are using grants and workforce partnerships to train a new generation of technology workers. In September, the Obama administration awarded $450 million in grants to nearly 270 community colleges that have partnered with more than 400 employers nationally. It was the final installment of a four-year, $2 billion competitive grant…
Descriptors: Community Colleges, Two Year Colleges, Higher Education, Partnerships in Education
Jackowicz, Stephen, Ed.; Sahin, Ismail, Ed. – Online Submission, 2021
"Proceedings of International Conference on Humanities, Social and Education Sciences" includes full papers presented at the International Conference on Humanities, Social and Education Sciences (iHSES) which took place on April 22-25, 2021 in New York, USA-www.ihses.net. The aim of the conference is to offer opportunities to share…
Descriptors: History Instruction, Handheld Devices, Audio Equipment, Foreign Students
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2015
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Workshops, Administrators, Educational Games, Access to Information