NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Fowler, Brad; Godin, Joy; Geddy, Margaret – Journal of Information Systems Education, 2016
Many organizations are dealing with the increasing demands of big data, so they are turning to NoSQL databases as their preferred system for handling the unique problems of capturing and storing massive amounts of data. Therefore, it is likely that employees in all sizes of organizations will encounter NoSQL databases. Thus, to be more job-ready,…
Descriptors: Information Storage, Information Retrieval, Database Management Systems, Databases
Peer reviewed Peer reviewed
Direct linkDirect link
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Peer reviewed Peer reviewed
Direct linkDirect link
He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang – Journal of Information Systems Education, 2014
In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…
Descriptors: Information Security, Case Studies, Teaching Methods, Active Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Islam, A. K. M. Najmul – Journal of Information Systems Education, 2011
This paper examines factors that influence the post-adoption satisfaction of educators with e-learning systems. Based on the expectation-confirmation framework, we propose a research model that demonstrates how post-adoption beliefs affect post-adoption satisfaction. The model was tested at a university by educators (n = 175) who use an e-learning…
Descriptors: Electronic Learning, Testing Programs, Participant Satisfaction, Teacher Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Matos, Victor; Grasser, Rebecca – Journal of Information Systems Education, 2007
This paper presents an example of integrating IT skills using an interesting real life problem. We describe how the reverse- and forward-engineering of the USA National Do Not Call registry was used in our capstone course to illustrate the fusion of different (but interdependent) issues and techniques learned in the IT program. The purpose of the…
Descriptors: Information Technology, Engineering, Ethics, Learning Experience