NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 14 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Young, Jacob A. – Journal of Information Systems Education, 2020
Despite advancements in pedagogy and technology, students often yearn for more applied opportunities in information security education. Further, small businesses are likely to have inadequate information security postures due to limited budgets and expertise. To address both issues, an advanced course in ethical hacking was developed which allows…
Descriptors: Service Learning, Information Security, Computer Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Payne, Brian K.; He, Wu; Wang, Cong; Wittkower, D. E.; Wu, Hongyi – Journal of Information Systems Education, 2021
This paper describes an interdisciplinary effort involving faculty from five different disciplines who came together to develop an interdisciplinary, open, general education cybersecurity course. The course, Cybersecurity, Technology, and Society, brings together ideas from interdisciplinary studies, information technology, engineering, business,…
Descriptors: Computer Security, Interdisciplinary Approach, Curriculum Development, General Education
Peer reviewed Peer reviewed
Direct linkDirect link
Sauls, Jeff; Gudigantala, Naveen – Journal of Information Systems Education, 2013
Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…
Descriptors: Computer Security, College Graduates, Labor Force, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
White, Garry L.; Hewitt, Barbara; Kruck, S. E. – Journal of Information Systems Education, 2013
Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…
Descriptors: Information Security, Information Systems, College Students, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Patten, Karen P.; Harris, Mark A. – Journal of Information Systems Education, 2013
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
Descriptors: Telecommunications, Handheld Devices, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Fulton, Eric; Lawrence, Cameron; Clouse, Shawn – Journal of Information Systems Education, 2013
The aim of this paper is to illuminate the exciting world in which "white hat crackers" operate and to suggest topics that can help prepare students to enter this high-demand field. While currently there is extraordinary demand for graduates to fill these positions that have relatively high starting salaries, employers find it difficult…
Descriptors: Information Security, Computer Security, Information Technology, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Woodward, Belle; Imboden, Thomas; Martin, Nancy L. – Journal of Information Systems Education, 2013
This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…
Descriptors: Information Security, Computer Security, Higher Education, Program Development
Peer reviewed Peer reviewed
Direct linkDirect link
Harris, Albert L.; Lang, Michael; Yates, Dave; Kruck, S. E. – Journal of Information Systems Education, 2011
This paper discusses the importance of ethics and social responsibility in information systems (IS) education. The many public scandals of corporate misconduct have increased the need for more emphasis to be placed on ethics and ethical issues in IS education. The authors describe how the inclusion of ethics and social responsibility in the IS…
Descriptors: Freedom of Speech, Intellectual Property, Information Systems, Social Responsibility
Peer reviewed Peer reviewed
Direct linkDirect link
Singh, Anil; Mangalaraj, George; Taneja, Aakash – Journal of Information Systems Education, 2010
This paper offers a compilation of technologies that provides either free or low-cost solutions to the challenges of teaching online courses. It presents various teaching methods the outlined tools and technologies can support, with emphasis on fit between these tools and the tasks they are meant to serve. In addition, it highlights various…
Descriptors: Online Courses, Teaching Methods, Technology Uses in Education, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Pendegraft, Norman – Journal of Information Systems Education, 2009
An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…
Descriptors: Privacy, Instructional Materials, Business Administration Education, Class Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Peer reviewed Peer reviewed
Direct linkDirect link
Katerattanakul, Pairin; Kam, Hwee-Joo; Lee, James J.; Hong, Soongoo – Journal of Information Systems Education, 2009
The MetaFrame system migration project at WorldPharma, while driven by merger and acquisition, had faced complexities caused by both technical challenges and organizational issues in the climate of uncertainties. However, WorldPharma still insisted on instigating this post-merger system migration project. This project served to (1) consolidate the…
Descriptors: Case Method (Teaching Technique), Business Administration Education, Class Activities, Computer Science Education