Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Source
Journal of Information… | 4 |
Author
Alper Yayla | 1 |
Clapper, Danial L. | 1 |
Davis, Martin H., Jr. | 1 |
Duffy, Kevin P. | 1 |
Ford, Janet C. | 1 |
Mohammed Salem Al-Atoum | 1 |
Muhammad Al-Abdullah | 1 |
Sethi, Vikram | 1 |
Topi, Heikki | 1 |
White, Barbara Jo | 1 |
Willey, Lorrie | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Evaluative | 4 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Muhammad Al-Abdullah; Alper Yayla; Mohammed Salem Al-Atoum – Journal of Information Systems Education, 2024
In today's cybersecurity landscape, organizations need frameworks that provide a holistic approach to risk assessment as part of the risk management process. This case introduces SecureEnd Solutions, a rapidly growing cybersecurity company, and its core team, including Alan Touring, Ada Lovecode, Bob Jobs, and Suzan, the head of development. The…
Descriptors: Risk Assessment, Risk Management, Computer Security, Holistic Approach
Topi, Heikki – Journal of Information Systems Education, 2019
This essay discusses the current state of and potential future directions for information systems education structured around several key themes that have emerged as central in several large-scale IS education initiatives over the past 15 years. The core idea that connects all of these themes is the centrality of IS as a transformative enabler for…
Descriptors: Information Systems, Computer Science Education, Educational Trends, State of the Art Reviews
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L. – Journal of Information Systems Education, 2011
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Descriptors: Copyrights, Confidentiality, Computer Security, Information Systems
Duffy, Kevin P.; Davis, Martin H., Jr.; Sethi, Vikram – Journal of Information Systems Education, 2010
We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer…
Descriptors: Student Attitudes, Relevance (Education), Lesson Plans, Learner Engagement