Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 10 |
Descriptor
Source
Author
Bachman, Dale J. | 1 |
Bicak, Ali | 1 |
Brown, Ezra A. | 1 |
Casola, Linda | 1 |
Daugherty, Michael K. | 1 |
Di, Jia | 1 |
Dotinga, Randy | 1 |
Jeremy Roschelle | 1 |
Judi Fusco | 1 |
Ladwig, Christine | 1 |
Lawler, James P. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 15 |
Journal Articles | 12 |
Legal/Legislative/Regulatory… | 1 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 10 |
Postsecondary Education | 7 |
Two Year Colleges | 1 |
Audience
Practitioners | 1 |
Teachers | 1 |
Location
Virginia | 2 |
Washington | 2 |
Arkansas | 1 |
Australia | 1 |
California | 1 |
China (Shanghai) | 1 |
New York (New York) | 1 |
North Carolina | 1 |
Ohio | 1 |
Oregon | 1 |
Spain | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jeremy Roschelle; Judi Fusco; Pati Ruiz – Digital Promise, 2024
As Artificial Intelligence within education becomes increasingly important, Digital Promise reviewed the guidance documents released by seven states--California, North Carolina, Ohio, Oregon, Virginia, Washington state, and West Virginia--on how to approach artificial intelligence (AI) in education. Throughout this report the authors summarize the…
Descriptors: Artificial Intelligence, Technology Uses in Education, Employment Qualifications, Responsibility
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2016
The demand for college graduates with skills in big data analysis is on the rise. Employers in all industry sectors have found significant value in analyzing both separate and combined data streams. However, news reports continue to script headlines drawing attention to data improprieties, privacy breaches and identity theft. While data privacy is…
Descriptors: Information Security, Information Systems, Data, Privacy
Casola, Linda – National Academies Press, 2020
Established in December 2016, the National Academies of Sciences, Engineering, and Medicine's Roundtable on Data Science Postsecondary Education was charged with identifying the challenges of and highlighting best practices in postsecondary data science education. Convening quarterly for 3 years, representatives from academia, industry, and…
Descriptors: Meetings, Data Analysis, Postsecondary Education, Statistics Education
Molluzzo, John C.; Lawler, James P. – Information Systems Education Journal, 2015
Big Data is becoming a critical component of the Information Systems curriculum. Educators are enhancing gradually the concentration curriculum for Big Data in schools of computer science and information systems. This paper proposes a creative curriculum design for Big Data Analytics for a program at a major metropolitan university. The design…
Descriptors: Curriculum Design, Data Analysis, Data Collection, Information Systems
Bicak, Ali; Liu, Michelle; Murphy, Diane – Information Systems Education Journal, 2015
The cybersecurity curriculum has grown dramatically over the past decade: once it was just a couple of courses in a computer science graduate program. Today cybersecurity is introduced at the high school level, incorporated into undergraduate computer science and information systems programs, and has resulted in a variety of cybersecurity-specific…
Descriptors: Information Security, Curriculum Design, Computer Science, Graduate Study
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Venables, Anne; Tan, Grace; Miliszewska, Iwona – Journal of Information Technology Education: Innovations in Practice, 2013
To succeed within the increasingly global context of their work environment, today's IT professional needs to be equipped with both cutting-edge technical skills and a strong repertoire of "soft" skills. An important and often unrecognized soft skill is an appreciation of how various IT issues impact upon different peoples and what…
Descriptors: Foreign Countries, Cultural Awareness, Information Technology, Computer Science Education
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Dotinga, Randy – Chronicle of Higher Education, 2008
Tags such as the radio-frequency identifications or RFIDs are devices that make it possible for individuals to be tracked and their location reported back to a database. The devices--chips with radio antennas--emit signals, and tracking them reveals the movement of people or things. Many stores use the technology to catch shoplifters at exits. To…
Descriptors: Experiments, Privacy, Electromechanical Technology, State Universities
Pendegraft, Norman – Journal of Information Systems Education, 2009
An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…
Descriptors: Privacy, Instructional Materials, Business Administration Education, Class Activities
Ware, Willis H. – EDUCOM, 1984
Computer security and computer privacy issues are discussed. Among the areas addressed are technical and human security threats, security and privacy issues for information in electronic mail systems, the need for a national commission to examine these issues, and security/privacy issues relevant to colleges and universities. (JN)
Descriptors: Computer Science, Higher Education, Information Systems, Privacy
Spillman, Richard – Collegiate Microcomputer, 1992
Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…
Descriptors: Coding, Computer Science Education, Course Descriptions, Crime
Smith, Sean W. – EDUCAUSE Quarterly, 2004
At Dartmouth College, the author teaches a course called "Security and Privacy." Its early position in the overall computer science curriculum means the course needs to be introductory, and the author can't assume the students possess an extensive computer science background. These constraints leave the author with a challenge: to construct…
Descriptors: Homework, Assignments, Privacy, Computer Security
National Academy of Sciences - National Research Council, Washington, DC. Assembly of Engineering. – 1976
This report addressed to policy making officials in local government deals with the role of federal assistance in future developments of information systems by local governments through an assessment of the Urban Information Systems Inter-Agency Committee (USAC) Program, which, beginning in 1970, provided grants to five municipalities--Charlotte,…
Descriptors: Agency Cooperation, Computer Science, Cost Effectiveness, Decision Making
Sicilia, Miguel-Angel – Journal of Information Technology Education, 2005
Personalization technology has become an important topic in e-commerce, fostered by the emergence of the relationship-marketing paradigm. But teaching e-commerce personalization technology is a challenging task, since it requires a balance between marketing and management and technical implementation issues that must be calibrated according to the…
Descriptors: Models, Business, Hypermedia, Marketing