Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Information Security | 5 |
Privacy | 5 |
Computer Science Education | 4 |
Curriculum Design | 3 |
Data Analysis | 3 |
College Students | 2 |
Computer Security | 2 |
Core Curriculum | 2 |
Guidelines | 2 |
Information Systems | 2 |
Models | 2 |
More ▼ |
Source
Information Systems Education… | 5 |
Author
Lawler, James P. | 2 |
Molluzzo, John C. | 2 |
Bicak, Ali | 1 |
Doshi, Vijal | 1 |
Douma, Bambi | 1 |
Ladwig, Christine | 1 |
Lawrence, Cameron | 1 |
Liu, Michelle | 1 |
Murphy, Diane | 1 |
Olson, Garrett | 1 |
Schwieger, Dana | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 3 |
Reports - Research | 2 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Audience
Teachers | 1 |
Location
New York | 1 |
New York (New York) | 1 |
Virginia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2016
The demand for college graduates with skills in big data analysis is on the rise. Employers in all industry sectors have found significant value in analyzing both separate and combined data streams. However, news reports continue to script headlines drawing attention to data improprieties, privacy breaches and identity theft. While data privacy is…
Descriptors: Information Security, Information Systems, Data, Privacy
Molluzzo, John C.; Lawler, James P. – Information Systems Education Journal, 2015
Big Data is becoming a critical component of the Information Systems curriculum. Educators are enhancing gradually the concentration curriculum for Big Data in schools of computer science and information systems. This paper proposes a creative curriculum design for Big Data Analytics for a program at a major metropolitan university. The design…
Descriptors: Curriculum Design, Data Analysis, Data Collection, Information Systems
Lawrence, Cameron; Olson, Garrett; Douma, Bambi – Information Systems Education Journal, 2015
The widespread use of digital technologies such as smartphones, tablets, and notebook computers expose firms engaged in international business to risks that far exceed what most corporate technology users understand. This case study examines some of the technology-specific vulnerabilities managers face when engaged in international travel and…
Descriptors: Information Security, Computer Security, Global Approach, Travel
Bicak, Ali; Liu, Michelle; Murphy, Diane – Information Systems Education Journal, 2015
The cybersecurity curriculum has grown dramatically over the past decade: once it was just a couple of courses in a computer science graduate program. Today cybersecurity is introduced at the high school level, incorporated into undergraduate computer science and information systems programs, and has resulted in a variety of cybersecurity-specific…
Descriptors: Information Security, Curriculum Design, Computer Science, Graduate Study
Lawler, James P.; Molluzzo, John C.; Doshi, Vijal – Information Systems Education Journal, 2012
Social networking on the Internet continues to be a frequent avenue of communication, especially among Net Generation consumers, giving benefits both personal and professional. The benefits may be eventually hindered by issues in information gathering and sharing on social networking sites. This study evaluates the perceptions of students taking a…
Descriptors: Social Networks, Privacy, Information Security, Student Attitudes