NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers2
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 31 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Muhammad Al-Abdullah; Alper Yayla; Mohammed Salem Al-Atoum – Journal of Information Systems Education, 2024
In today's cybersecurity landscape, organizations need frameworks that provide a holistic approach to risk assessment as part of the risk management process. This case introduces SecureEnd Solutions, a rapidly growing cybersecurity company, and its core team, including Alan Touring, Ada Lovecode, Bob Jobs, and Suzan, the head of development. The…
Descriptors: Risk Assessment, Risk Management, Computer Security, Holistic Approach
Peer reviewed Peer reviewed
Direct linkDirect link
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Giboney, Justin Scott; McDonald, Jason K.; Balzotti, Jonathan; Hansen, Derek L.; Winters, Desiree M.; Bonsignore, Elizabeth – TechTrends: Linking Research and Practice to Improve Learning, 2021
In this paper we introduce an approach to cybersecurity education and helping students develop professional understanding in the form of a Playable Case Study (PCS), a form of educational simulation that draws on affordances of the broader educational simulation genre, case study instruction, and educational Alternate Reality Games (or ARGs). A…
Descriptors: Computer Security, Computer Simulation, Case Studies, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Allison, Jordan – Journal of Further and Higher Education, 2023
Cyber security is a growing area of international importance, with shortages present for cyber security skills. While many universities have introduced degree programmes for cyber security, the major focus of these programmes is on the development of technical skills with some reports indicating how graduates of these courses lack in softer skills…
Descriptors: Computer Security, Information Security, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Spruit, Marcel – Higher Education, Skills and Work-based Learning, 2022
Purpose: The information security field requires standardised education. This could be based on generic job profiles and a standard competence framework. The question is whether this is possible and feasible. To find out, the author did a case study: developing an information security master curriculum based on a generic PVIB job profile and the…
Descriptors: Information Security, Computer Science Education, Profiles, Case Studies
Peer reviewed Peer reviewed
Direct linkDirect link
Almuhaideb, Abdullah M.; Saeed, Saqib – Journal of Information Systems Education, 2021
ABET accreditation has become a well-known standard for academic programs not only in the U.S. but also across the globe. Instantiating the processes to systematically improve the quality of programs is a daunting task for higher education institutions. In this contribution, we provide a detailed process-based framework that can assist aspiring…
Descriptors: Engineering Education, Accreditation (Institutions), Computer Security, Crime
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Asfour, Ali; Zain, Samer; Salleh, Norsaremah; Grundy, John – International Journal of Technology in Education and Science, 2019
Agile development methods have been proposed as a natural fit for mobile app development contexts. Despite many studies addressing the adoption of agile methods for traditional web and desktop applications, there is a lack of studies of how mobile app development teams can adopt agile methods and the challenges they are facing. Our study explores…
Descriptors: Computer Software, Case Studies, Guidance, Quality Assurance
Peer reviewed Peer reviewed
Direct linkDirect link
Luburic, Nikola; Sladic, Goran; Slivka, Jelena; Milosavljevic, Branko – ACM Transactions on Computing Education, 2019
With ever-greater reliance of the developed world on information and communication technologies, constructing secure software has become a top priority. To produce secure software, security activities need to be integrated throughout the software development lifecycle. One such activity is security design analysis (SDA), which identifies security…
Descriptors: Computer Security, Case Studies, Blended Learning, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Onah, Daniel F. O.; Pang, Elaine L. L.; Sinclair, Jane E. – Education and Information Technologies, 2020
Independent learning in massive open online courses (MOOCs) requires considerable effort from the learners themselves. Blended-learning has been recognised to foster independent learning among undergraduate students. With the popularity of the blended-learning approach to teach in traditional educational settings, little has been mentioned on how…
Descriptors: Positive Attitudes, Blended Learning, Student Attitudes, Metacognition
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rossmiller, Zach; Lawrence, Cameron; Clouse, Shawn; Looney, Clayton – Information Systems Education Journal, 2017
Many entrepreneurs and small business owners lack disaster recovery plans, which minimize business disruptions caused by failures of critical technical systems. Typically, technology is not the main focus for a small business owner, as most of their time is spent focused on business operations. This case study demonstrates that when a business…
Descriptors: Emergency Programs, Crisis Management, Small Businesses, Planning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lawrence, Cameron; Fulton, Eric; Evans, Gerald; Firth, David – Information Systems Education Journal, 2014
This case study examines the life of a digital native who has her online accounts hacked, passwords reset, and is locked out of important online resources including her university email account and Facebook. Part one of the case study examines how the hack was perpetrated and the fallout of losing control of one's digital identity. Part two of the…
Descriptors: Case Studies, Information Security, Computer Security, Class Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Knapp, Kenneth J.; Maurer, Christopher; Plachkinova, Miloslava – Journal of Information Systems Education, 2017
Much has been published about developing a cybersecurity curriculum for institutes of higher learning (IHL). Now that a growing number of IHLs globally offer such programs, a need exists on how to guide, maintain, and improve the relevancy of existing curricula. Just as cybersecurity professionals must be hone their skills continually to keep with…
Descriptors: Information Security, Computer Security, Computer Science Education, Certification
Peer reviewed Peer reviewed
Direct linkDirect link
Harris, Mark A.; Patten, Karen P. – Journal of Information Systems Education, 2015
Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs…
Descriptors: Taxonomy, Computer Security, Curriculum Development, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
Fitzgerald, Brian K.; Barkanic, Steve; Cardenas-Navia, Isabel; Elzey, Karen; Hughes, Debbie; Troyan, Danielle – Industry and Higher Education, 2015
BHEF has achieved particular success in operationalizing its National Higher Education and Workforce Initiative (HEWI) in Maryland focusing on cybersecurity. Leveraging its membership of corporate CEOs, university presidents and government agency leaders, BHEF partnered with the University System of Maryland to build a system-wide response to the…
Descriptors: Higher Education, Labor Force Development, Internet, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lawrence, Cameron; Olson, Garrett; Douma, Bambi – Information Systems Education Journal, 2015
The widespread use of digital technologies such as smartphones, tablets, and notebook computers expose firms engaged in international business to risks that far exceed what most corporate technology users understand. This case study examines some of the technology-specific vulnerabilities managers face when engaged in international travel and…
Descriptors: Information Security, Computer Security, Global Approach, Travel
Previous Page | Next Page ยป
Pages: 1  |  2  |  3