Publication Date
In 2025 | 1 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Source
Information Systems Education… | 1 |
Interactive Learning… | 1 |
International Journal of… | 1 |
International Review of… | 1 |
Author
Bo-Yang Shan | 1 |
Chen, Yong | 1 |
Guido Lang | 1 |
He, Wu | 1 |
Huang, Nan-Ching | 1 |
Huang, Tien-Chuan | 1 |
Jason H. Sharp | 1 |
John E. Anderson | 1 |
Keh, Huan-Chao | 1 |
Shaw, Ruey-Shiang | 1 |
Shian-Shyong Tseng | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 4 |
Information Analyses | 2 |
Education Level
Adult Education | 1 |
Elementary Education | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Audience
Location
Taiwan | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jason H. Sharp; John E. Anderson; Guido Lang – Information Systems Education Journal, 2025
The "Information Systems Education Journal" has published uninterrupted since 2003. Over its publication history, it has covered myriad topics related to information systems education including model curriculum, outcomes assessment, online learning, capstone courses, service learning, data analytics, and cybersecurity, just to name a…
Descriptors: Information Systems, Computer Science Education, Educational Research, Bibliometrics
Shian-Shyong Tseng; Tsung-Yu Yang; Wen-Chung Shih; Bo-Yang Shan – Interactive Learning Environments, 2024
In this paper, to handle the problem of the quick evolution of cyber-security attacks, we developed the iMonsters board game and proposed the attack and defense knowledge self-evolving algorithm. Three versions of the iMonsters were launched in 2013, 2017, and 2019, respectively. Accordingly, the cyber-security ontology can be refined by the…
Descriptors: Educational Games, Computer Security, Computer Science Education, Game Based Learning
Chen, Yong; He, Wu – International Review of Research in Open and Distance Learning, 2013
This paper describes a survey of online learning which attempts to determine online learning providers' awareness of potential security risks and the protection measures that will diminish them. The authors use a combination of two methods: blog mining and a traditional literature search. The findings indicate that, while scholars have…
Descriptors: Computer Security, Risk, Online Courses, Electronic Publishing
Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan – International Journal of Distance Education Technologies, 2011
Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…
Descriptors: Electronic Learning, Concept Mapping, Learning Processes, Computer Security