NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Reports - Descriptive33
Journal Articles25
Tests/Questionnaires3
Guides - Non-Classroom2
Laws, Policies, & Programs
Privacy Act 19741
Assessments and Surveys
Florida Comprehensive…1
What Works Clearinghouse Rating
Showing 1 to 15 of 33 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
Peer reviewed Peer reviewed
Direct linkDirect link
Gibbons, Deborah E.; Freeman, Michael – Decision Sciences Journal of Innovative Education, 2022
Multirole online games offer advantages for learning in business schools, as students process information and coordinate with others while pursuing measurable goals. Gaming environments can be complex, and the choices and timing of players' actions may have long-term effects on the state of the game. Team members practice communication skills as…
Descriptors: Decision Making, Group Dynamics, Computer Games, Educational Games
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim; Asadi, Majid – Information Systems Education Journal, 2023
This case asks information systems analysts to assess the cybersecurity posture of a manufacturing company. The exercise works well as a group activity in an information systems course that addresses cybersecurity controls. The case introduces guidance from the National Institute of Standards and Technology, and learners develop work products…
Descriptors: Teaching Methods, Information Systems, Information Science Education, Information Security
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
Isaac, James; Velez, Erin; Roberson, Amanda Janice – Institute for Higher Education Policy, 2023
Students, families, colleges, and lawmakers need clearer information on postsecondary outcomes to make informed decisions. By leveraging data available at institutions and federal agencies, a nationwide student-level data network (SLDN) would close information gaps that persist in our higher education landscape to answer critical questions about…
Descriptors: College Students, Data, Information Networks, Program Design
Peer reviewed Peer reviewed
Direct linkDirect link
Leigh A. Mutchler; Amy J. Connolly; Daniel E. Rush – Journal of Information Systems Education, 2024
Information systems courses must adapt to meet the unprecedented demand for well-trained information security (InfoSec) professionals, but they cannot competently fill this gap without also ensuring that students are fluent and confident in foundational skills, both technical and behavioral. How to teach behavioral topics in InfoSec management is…
Descriptors: Information Security, Information Science Education, Information Systems, Technological Literacy
Grama, Joanna Lyn – Institute for Higher Education Policy, 2019
Our current federal postsecondary data system is incomplete and fails to provide today's students with the accurate, timely information that they need to inform their college choices and promote their success. As policymakers consider proposals to improve this federal data system, it is critical that they work in tandem to protect students'…
Descriptors: Privacy, Information Security, Postsecondary Education, Information Systems
National Forum on Education Statistics, 2020
The "Forum Guide to Data Governance" highlights how data governance programs benefit education agencies and provide timely and useful best practices, examples, and resources for agencies implementing or updating their data governance programs. This resource is intended to address the needs of federal, state, and local agencies related…
Descriptors: Data, Governance, Information Security, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ladwig, Christine; Schwieger, Dana; Clayton, Donald – Information Systems Education Journal, 2017
The "Piranha Solution"® is a complex and valuable integrated chemical supply inventory management system protected as a trade secret by its asset holder, the Confluence Corporation. The "Piranha" program is the lifeblood of the corporation's growth and success in the chemical supply industry. A common definition of "trade…
Descriptors: Information Systems, Information Security, Management Systems, Knowledge Management
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pratsri, Sajeewan; Nilsook, Prachyanun – Higher Education Studies, 2020
According to a continuously increasing amount of information in all aspects whether the sources are retrieved from an internal or external organization, a platform should be provided for the automation of whole processes in the collection, storage, and processing of Big Data. The tool for creating Big Data is a Big Data challenge. Furthermore, the…
Descriptors: Data Analysis, Higher Education, Information Systems, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Lending, Diane; Mitri, Michel; Dillon, Thomas W. – Journal of Information Systems Education, 2019
This paper describes James Madison University's undergraduate major in Computer Information Systems as an example of a high-quality Information Systems (IS) program and discusses our planned evolution in the context of the rapid changes of technological, business, and social factors. We have determined what we consider to be five essential…
Descriptors: Undergraduate Students, Majors (Students), Teaching Methods, Integrated Curriculum
Leventoff, Jenna – National Skills Coalition, 2019
This report urges states to participate in the State Wage Interchange System (SWIS), as it can aide states in satisfying Workforce Innovation and Opportunity Act (WIOA) reporting requirements, and help states better understand whether former participants in workforce training and education programs are finding good jobs. SWIS is a data sharing…
Descriptors: Federal Legislation, Labor Force Development, Salary Wage Differentials, Employment
Peer reviewed Peer reviewed
Direct linkDirect link
Zadeh, Amir H.; Zolbanin, Hamed M.; Sengupta, Arijit; Schultz, Todd – Journal of Information Systems Education, 2020
Enterprise resource planning systems (ERP) are the most essential and critical information systems that are widely used to build all the functions of a business into a unified and efficient enterprise system. Although the essence of ERP systems are easy to understand, students, especially those who do not have technical experience, have difficulty…
Descriptors: Computer Software, Information Systems, Efficiency, Information Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rossmiller, Zach; Lawrence, Cameron; Clouse, Shawn; Looney, Clayton – Information Systems Education Journal, 2017
Many entrepreneurs and small business owners lack disaster recovery plans, which minimize business disruptions caused by failures of critical technical systems. Typically, technology is not the main focus for a small business owner, as most of their time is spent focused on business operations. This case study demonstrates that when a business…
Descriptors: Emergency Programs, Crisis Management, Small Businesses, Planning
Previous Page | Next Page »
Pages: 1  |  2  |  3