NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Muhammad Al-Abdullah; Alper Yayla; Mohammed Salem Al-Atoum – Journal of Information Systems Education, 2024
In today's cybersecurity landscape, organizations need frameworks that provide a holistic approach to risk assessment as part of the risk management process. This case introduces SecureEnd Solutions, a rapidly growing cybersecurity company, and its core team, including Alan Touring, Ada Lovecode, Bob Jobs, and Suzan, the head of development. The…
Descriptors: Risk Assessment, Risk Management, Computer Security, Holistic Approach
Peer reviewed Peer reviewed
Direct linkDirect link
Elhasnaoui, Soukaina – International Journal of Web-Based Learning and Teaching Technologies, 2021
An ERP (enterprise resource planning) is an information system that makes it possible to manage and monitor on a daily basis all the information and operational services of a company. It is able to effectively reduce the cost of products, improve customer service experience, and increase business competitiveness. However, the implementation rate…
Descriptors: Information Systems, Information Management, Business, Program Implementation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Christine Ladwig; Dana Schwieger – Information Systems Education Journal, 2024
Hollywood screenwriters worry about Artificial Intelligence (AI) replacements taking over their jobs. Famous museums litigate to protect their art from AI infringement. A major retailer scraps a machine-learning based recruitment program that was biased against women. These are just a few examples of how AI is affecting the world of work,…
Descriptors: Computer Science Education, Curriculum Development, Information Systems, Information Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
McShane, Ian; Dearman, Philip – Australian Association for Research in Education, 2016
This paper examines the rise and fall of the Victorian education department's learning management system Ultranet. The Ultranet was conceived as a web-based portal that was designed to integrate and deliver on a range of policy objectives in the areas of student management, school networking and communication, and teaching and learning. Heavily…
Descriptors: Foreign Countries, Educational Technology, Computer Software, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Nerland, Monika; Jensen, Karen – International Journal of Lifelong Education, 2007
This article explores self management in professional work in the context of a shift from traditional professionalism to forms of governance where functions and responsibilities previously attributable to the professional communities are "insourced" to the individual worker. Drawing on data from an interview study among recently educated…
Descriptors: Foreign Countries, Self Motivation, Self Management, Risk Management
Lawrence, Gregory W.; Kehoe, William R.; Rieger, Oya Y.; Walters, William H.; Kenney, Anne R. – 2000
Given the right hardware and software, digital information is easy to create, copy, and disseminate; however it is very hard to preserve. At present, it is impossible to guarantee the longevity and legibility of digital information for even one human generation. Migration can be defined as the periodic transfer of digital materials from one…
Descriptors: Archives, Computer Software, Electronic Text, Information Management