Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Author
Alier, Marc | 1 |
Altun, Halis | 1 |
Baker, Elizabeth | 1 |
Blackman, Harvey | 1 |
Haddad, Hatem | 1 |
Irwin, Gretchen | 1 |
Jones, Kiku | 1 |
Kaiiali, Mustafa | 1 |
Lang, Guido | 1 |
Leonard, Lori N. K. | 1 |
Ozkaya, Armagan | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 2 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Leonard, Lori N. K.; Jones, Kiku; Lang, Guido – Information Systems Education Journal, 2019
Information systems (IS) curriculum review is a continuous process. Universities seek to offer content that they believe will be most beneficial to students as they begin their career. However, that content may or may not satisfy employer needs. This paper, which is part of a larger study, seeks to determine if required course content matches the…
Descriptors: Information Systems, Employer Attitudes, Curriculum Evaluation, Education Work Relationship
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc – IEEE Transactions on Learning Technologies, 2016
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
Descriptors: Electronic Learning, Computer System Design, Computer Security, Confidentiality
Irwin, Gretchen; Wessel, Lark; Blackman, Harvey – Journal of Information Systems Education, 2012
This case describes a database redesign project for the United States Department of Agriculture's National Animal Germplasm Program (NAGP). The case provides a valuable context for teaching and practicing database analysis, design, and implementation skills, and can be used as the basis for a semester-long team project. The case demonstrates the…
Descriptors: Course Descriptions, Genetics, Animals, Animal Husbandry