Publication Date
In 2025 | 1 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 7 |
Since 2016 (last 10 years) | 19 |
Since 2006 (last 20 years) | 29 |
Descriptor
Source
Information Systems Education… | 29 |
Author
Frydenberg, Mark | 3 |
Marquardson, Jim | 3 |
Ladwig, Christine | 2 |
Mishra, Sushma | 2 |
Schwieger, Dana | 2 |
Waguespack, Leslie J. | 2 |
Yates, David J. | 2 |
Ahamed, Sheikh | 1 |
Babb, Jeffry S. | 1 |
Bennett, Judith | 1 |
Bhatnagar, Neelima | 1 |
More ▼ |
Publication Type
Journal Articles | 29 |
Reports - Research | 19 |
Reports - Descriptive | 9 |
Tests/Questionnaires | 4 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 29 |
Postsecondary Education | 29 |
Audience
Location
Pennsylvania | 3 |
Massachusetts | 2 |
Texas | 2 |
California | 1 |
New Jersey (Jersey City) | 1 |
New York (New York) | 1 |
Ohio | 1 |
Rhode Island | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Jeff Hanson; Blair Taylor; Siddharth Kaza – Information Systems Education Journal, 2025
Cybersecurity content is typically taught and assessed using Bloom's Taxonomy to ensure that students acquire foundational and higher-order knowledge. In this study we show that when students are given the objectives written in the form of a competency-based statements, students have a more clearly defined outcome and are be able to exhibit their…
Descriptors: College Students, Universities, Competency Based Education, Educational Objectives
Embracing Artificial Intelligence to Improve Self-Directed Learning: A Cybersecurity Classroom Study
Jim Marquardson – Information Systems Education Journal, 2024
Generative artificial intelligence (AI) tools were met with a mix of enthusiasm, skepticism, and fear. AI adoption soared as people discovered compelling use cases--developers wrote code, realtors generated narratives for their websites, students wrote essays, and much more. Calls for caution attempted to temper AI enthusiasm. Experts highlighted…
Descriptors: Artificial Intelligence, Capstone Experiences, Computer Security, Information Security
Pinchot, Jamie; Cellante, Donna; Mishra, Sushma; Paullet, Karen – Information Systems Education Journal, 2020
The cybersecurity industry is facing a significant shortage of professionals to fill open positions, with a projected staffing shortage of 1.8 million jobs worldwide by 2022. Part of this shortage can be attributed to the underrepresentation of women in the field. This research addresses the gender gap in cybersecurity by exploring the perceptions…
Descriptors: Student Attitudes, Barriers, Mentors, Computer Security
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2022
As the twenty-first century advances technologically, the era is also becoming notorious for the rise of organized cybercrime and attacks on business information and operations. Company data and intellectual property are considered the "New Oil" that generates value for organizations and their constituents. With the escalating number of…
Descriptors: Computer Security, Crime, Insurance, Intellectual Property
Bhatnagar, Neelima; Pry, Michael – Information Systems Education Journal, 2020
This paper describes a study designed to collect student perceptions of personal social media risks and their knowledge of the use of privacy and security settings in social media applications. A paper-based survey was administered to 107 students at a regional campus of a major university in western Pennsylvania, representing 10 classes and 18…
Descriptors: Undergraduate Students, Student Attitudes, Privacy, Information Security
Riad, A. B. M. Kamrul; Islam, Md Saiful; Shahriar, Hossain; Zhang, Chi; Valero, Maria; Sneha, Sweta; Ahamed, Sheikh – Information Systems Education Journal, 2021
Mobile device security has become increasingly important in mobile computing. Since the mobile devices and applications are growing rapidly, the security threats are intensified due to mobile app flaws and lack of security consideration in early stages of software development. The unsecure software development process creates a serious weak path…
Descriptors: Handheld Devices, Computer Security, Computer Software, Computer Science Education
Peter Draus; Sushma Mishra; Kevin Slonka; Natalya Bromall – Information Systems Education Journal, 2024
There is a significant skill gap, with millions of cybersecurity jobs still needing to be fulfilled due to a lack of a trained workforce. Various academic programs are available that teach students in different aspects of cybersecurity. This paper investigates if the title of an IT program has any impact on the desirability of a program and if…
Descriptors: College Students, Information Technology, Information Security, Cybernetics
Yaprak Dalat Ward; James G. Ward; Li-Jen Lester – Information Systems Education Journal, 2024
This study investigated the digital existence of the food bank users in a university town in Texas, and subsequently, aligned with the research's pragmatic focus, the researchers designed a training model for these food bank users. Two research questions guided the study: What are the digital existence levels of the food bank users, and what…
Descriptors: Food, Hunger, Universities, Digital Literacy
Marquardson, Jim – Information Systems Education Journal, 2020
Information systems tools, techniques, and technologies are changing at an ever-increasing pace. Technical skills with operating systems, applications, and hardware are important to learn in an information systems curriculum so that students can be immediately productive upon graduating, but these skills may have a shelf life. Technical skills…
Descriptors: Lifelong Learning, Technology Uses in Education, Information Systems, Independent Study
Draus, Peter; Mishra, Sushma; Slonka, Kevin; Bromall, Natalya – Information Systems Education Journal, 2022
Information Technology (IT) skills gap discourse suggests a mismatch between what students are acquiring in terms of knowledge and skills in their education versus what employers believe are useful skills for doing day to day tasks. This study builds upon previous research (analyzing the skills of college students in IT-related majors) by…
Descriptors: Skills, Achievement Gap, Employment Qualifications, Information Technology
Frydenberg, Mark; Lorenz, Birgy – Information Systems Education Journal, 2020
Learning cybersecurity awareness builds on basic information technology concepts and digital literacy skills. In an effort to raise cybersecurity awareness among information technology students, this paper describes a series of three different interactive sessions offered to students of all levels at a business university. The sessions introduced…
Descriptors: Computer Security, Computer Science Education, Computer Literacy, Information Technology
Brown, Randy – Information Systems Education Journal, 2019
Information Security has been a challenge since humans began keeping information. With the advent of computerized data and computer networks, that challenge has increased dramatically. Not only are more breaches occurring, but public knowledge about those breaches is now commonplace adding to virtual hysteria concerning data and information…
Descriptors: Computer Security, Information Security, Professional Personnel, Specialists
Green, Nathan; Liu, Michelle; Murphy, Diane – Information Systems Education Journal, 2020
Finding the first full-time, major-related job is a challenge faced by most college students, particularly those who have not gained much working experience before entering the job market. This challenge is amplified for the students majoring in Information Technology (IT), and cybersecurity in particular, due to the constantly changing technology…
Descriptors: Information Technology, Resumes (Personal), College Graduates, Employment Potential
Marquardson, Jim; Elnoshokaty, Ahmed – Information Systems Education Journal, 2020
People starting cybersecurity careers have three main avenues for achieving entry-level job qualifications: learning in-demand skills, earning industry certifications, and graduating with a college degree. Though people can pursue skills, certificates, and degrees together, financial and time constraints often make people focus their efforts to…
Descriptors: Information Security, Computer Security, Employment Opportunities, Employment Qualifications
Marquardson, Jim – Information Systems Education Journal, 2018
Academics are responding to the call from industry for graduates armed with cybersecurity skills. A common challenge that educators face is creating effective cybersecurity curriculum that prepares students with practical skills upon graduation. While hands-on exercises are a powerful method for teaching and assessing cybersecurity skills, these…
Descriptors: Information Security, Information Science Education, Teaching Methods, Skill Development
Previous Page | Next Page ยป
Pages: 1 | 2