Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Author
Evans, Gerald | 1 |
Firth, David | 1 |
Fulton, Eric | 1 |
Kim, J. B. | 1 |
Kussmaul, Clif | 1 |
Lawrence, Cameron | 1 |
Liu, Hong | 1 |
Miko, John S. | 1 |
Serapiglia, Anthony | 1 |
Zhong, Chen | 1 |
Publication Type
Journal Articles | 5 |
Tests/Questionnaires | 5 |
Reports - Descriptive | 4 |
Reports - Research | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Audience
Teachers | 2 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kim, J. B.; Zhong, Chen; Liu, Hong – Journal of Information Systems Education, 2023
Cybersecurity education is becoming increasingly important in modern society, and hands-on practice is an essential element. Although instructors provide hands-on labs in their cybersecurity courses, traditional lab exercises often fail to effectively motivate students. Hence, many instructors desire to incorporate gamification in hands-on…
Descriptors: Gamification, Information Security, Class Activities, Active Learning
Kussmaul, Clif – Information Systems Education Journal, 2020
This case describes a classroom activity that explores a fictional software product company to help students learn about ways that businesses make money from software, including Free & Open Source Software (FOSS). The activity shows how a company might evolve through different business models, but does not imply that some models are always…
Descriptors: Class Activities, Computer Software, Computer Science Education, Inquiry
Lawrence, Cameron; Fulton, Eric; Evans, Gerald; Firth, David – Information Systems Education Journal, 2014
This case study examines the life of a digital native who has her online accounts hacked, passwords reset, and is locked out of important online resources including her university email account and Facebook. Part one of the case study examines how the hack was perpetrated and the fallout of losing control of one's digital identity. Part two of the…
Descriptors: Case Studies, Information Security, Computer Security, Class Activities
Serapiglia, Anthony – Information Systems Education Journal, 2014
The following Teaching Case is designed to expose students to three scenarios related to data stored on hard drives, techniques that could be used to retrieve deleted or corrupted data, and a method for a more thorough deletion of data from a hard drive. These issues are often overlooked in current IT curriculum and in our age of digital clutter…
Descriptors: Information Security, Information Storage, Computer Science Education, Class Activities
Miko, John S. – Information Systems Education Journal, 2014
Search marketing is the process of utilizing search engines to drive traffic to a Web site through both paid and unpaid efforts. One potential paid component of a search marketing strategy is the use of a pay-per-click (PPC) advertising campaign in which advertisers pay search engine hosts only when their advertisement is clicked. This paper…
Descriptors: Marketing, Search Engines, Web Sites, Advertising