Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 6 |
Descriptor
Author
Clayton, Donald | 1 |
Clouse, Shawn | 1 |
Kim, J. B. | 1 |
Ladwig, Christine | 1 |
Lawrence, Cameron | 1 |
Liu, Hong | 1 |
Looney, Clayton | 1 |
Naydenova, Iva | 1 |
Pomykalski, James J. | 1 |
Rossmiller, Zach | 1 |
Schwieger, Dana | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 6 |
Tests/Questionnaires | 6 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Audience
Teachers | 3 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kim, J. B.; Zhong, Chen; Liu, Hong – Journal of Information Systems Education, 2023
Cybersecurity education is becoming increasingly important in modern society, and hands-on practice is an essential element. Although instructors provide hands-on labs in their cybersecurity courses, traditional lab exercises often fail to effectively motivate students. Hence, many instructors desire to incorporate gamification in hands-on…
Descriptors: Gamification, Information Security, Class Activities, Active Learning
Ladwig, Christine; Schwieger, Dana; Clayton, Donald – Information Systems Education Journal, 2017
The "Piranha Solution"® is a complex and valuable integrated chemical supply inventory management system protected as a trade secret by its asset holder, the Confluence Corporation. The "Piranha" program is the lifeblood of the corporation's growth and success in the chemical supply industry. A common definition of "trade…
Descriptors: Information Systems, Information Security, Management Systems, Knowledge Management
Pomykalski, James J. – Information Systems Education Journal, 2017
Many IS courses address the issues of ethical decision making and privacy through full course or section of a larger course. In this paper, the author discusses the development of a series of activities in an IS2010.07 course. The primary purpose of these activities is to raise awareness by the students of issues dealing with the collection,…
Descriptors: Privacy, Ethics, Information Science, Social Responsibility
Rossmiller, Zach; Lawrence, Cameron; Clouse, Shawn; Looney, Clayton – Information Systems Education Journal, 2017
Many entrepreneurs and small business owners lack disaster recovery plans, which minimize business disruptions caused by failures of critical technical systems. Typically, technology is not the main focus for a small business owner, as most of their time is spent focused on business operations. This case study demonstrates that when a business…
Descriptors: Emergency Programs, Crisis Management, Small Businesses, Planning
Serapiglia, Anthony – Information Systems Education Journal, 2014
The following Teaching Case is designed to expose students to three scenarios related to data stored on hard drives, techniques that could be used to retrieve deleted or corrupted data, and a method for a more thorough deletion of data from a hard drive. These issues are often overlooked in current IT curriculum and in our age of digital clutter…
Descriptors: Information Security, Information Storage, Computer Science Education, Class Activities
Naydenova, Iva; White, Bruce – Information Systems Education Journal, 2013
Healthcare has become a rapidly changing field. With the introduction of value-based purchasing to determine reimbursement of Medicare providers based on the quality of care in addition to outcomes in treatment, the environment is becoming ever more competitive. Saint Philip's Hospital is among the largest non-profit hospitals in the nation…
Descriptors: Hospitals, Health Services, Automation, Information Technology