NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Black, Michael; Chapman, Debra; Clark, Angela – Information Systems Education Journal, 2018
The Enhanced Virtual Laboratory (EVL) is the product of a Department of Defense grant to enhance outreach, research, and education for cyber security. Through web-based laboratories, EVL allows users to remotely experience interactive content with virtual machines inside a modern web browser providing constructivism-based, student-centered,…
Descriptors: Computer Security, Computer Simulation, Laboratories, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gondi, Vamsi; Hua, David; Bajracharya, Biju Raja – Information Systems Education Journal, 2021
In the age of COVID-19, traditional teaching techniques are under scrutiny. Most concepts and labs in the area of information technology are intended to be taught face-to-face in labs using clusters and networking infrastructure. Simulation software's such as uCertify, Pearson online, etc.., are good alternative, but are not always a viable…
Descriptors: Computer Science Education, Computer Software, Computer Simulation, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim – Information Systems Education Journal, 2018
Academics are responding to the call from industry for graduates armed with cybersecurity skills. A common challenge that educators face is creating effective cybersecurity curriculum that prepares students with practical skills upon graduation. While hands-on exercises are a powerful method for teaching and assessing cybersecurity skills, these…
Descriptors: Information Security, Information Science Education, Teaching Methods, Skill Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Christian, Nicholas; Akujobi, Innocent; Saha, Munmun; Korzaan, Melinda – Information Systems Education Journal, 2018
Advanced Competition Simulations (ACS), a massive multiplayer online (MMO) strategy gaming company, has petabytes of customer data at their data center in Brentwood, Tennessee that could assist executives with decision making, but they currently do not have business intelligence software or a business intelligence and analytics (BIA) team. As is…
Descriptors: Computer Games, Computer Simulation, Business, Intelligence
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Waguespack, Leslie J. – Information Systems Education Journal, 2014
With the increasing proliferation of multitasking and Internet-connected devices, security has reemerged as a fundamental design concern in information systems. The shift of IS curricula toward a largely organizational perspective of security leaves little room for focus on its foundation in systems architecture, the computational underpinnings of…
Descriptors: Computer Security, Internet, Information Systems, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Murphy, Marianne C.; Sharma, Aditya; Rosso, Mark – Information Systems Education Journal, 2012
Teaching office applications such as word processing, spreadsheet and presentation skills has been widely debated regarding its necessity, extent and delivery method. Training and Assessment applications such as MyITLab, SAM, etc. are popular tools for training students and are particularly useful in measuring Assurance of Learning (AOL)…
Descriptors: Office Occupations Education, Computer Assisted Instruction, Training Methods, Student Evaluation