Publication Date
In 2025 | 1 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 9 |
Descriptor
Source
Journal of Information… | 9 |
Author
Cummings, Jeff | 2 |
Janicki, Thomas | 2 |
Alper Yayla | 1 |
Amy J. Connolly | 1 |
Clouse, Shawn | 1 |
Daniel E. Rush | 1 |
Daniel L. Segal | 1 |
David Kocsis | 1 |
Ersin Dincelli | 1 |
Fulton, Eric | 1 |
Green, Andrew | 1 |
More ▼ |
Publication Type
Journal Articles | 9 |
Reports - Research | 5 |
Reports - Descriptive | 3 |
Tests/Questionnaires | 2 |
Guides - Classroom - Teacher | 1 |
Education Level
Postsecondary Education | 6 |
Higher Education | 4 |
High Schools | 1 |
Audience
Teachers | 2 |
Location
Colorado (Colorado Springs) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Leigh A. Mutchler; Amy J. Connolly; Daniel E. Rush – Journal of Information Systems Education, 2024
Information systems courses must adapt to meet the unprecedented demand for well-trained information security (InfoSec) professionals, but they cannot competently fill this gap without also ensuring that students are fluent and confident in foundational skills, both technical and behavioral. How to teach behavioral topics in InfoSec management is…
Descriptors: Information Security, Information Science Education, Information Systems, Technological Literacy
Cummings, Jeff; Janicki, Thomas; Matthews, Kevin – Journal of Information Systems Education, 2023
Faculty in the information systems (IS) and information technology (IT) fields are faced with the challenge to keep their curriculum relevant and current. What was taught two years ago will often be outdated and faculty must constantly update their curriculum on which courses should be taught as well as what should be taught within a particular…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Larson, Eric C.; Vieregger, Carl – Journal of Information Systems Education, 2019
This teaching case highlights the complex and unique strategic issues facing social media platform companies, using Facebook as the primary, motivating example. The case centers on the breach of trust that occurred when Cambridge Analytica acquired user data from 87 million Facebook accounts and then attempted to sway the 2016 U.S. Presidential…
Descriptors: Social Media, Strategic Planning, Trust (Psychology), Users (Information)
Cummings, Jeff; Janicki, Thomas – Journal of Information Systems Education, 2021
In the fields of information technology and information systems, faculty must consistently adjust the curriculum to meet the demands of the field. However, a challenge they often face is understanding what should be covered, especially given the limited number of courses most universities are able to offer. This research is a biennial report of…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Zadeh, Amir H.; Zolbanin, Hamed M.; Sengupta, Arijit; Schultz, Todd – Journal of Information Systems Education, 2020
Enterprise resource planning systems (ERP) are the most essential and critical information systems that are widely used to build all the functions of a business into a unified and efficient enterprise system. Although the essence of ERP systems are easy to understand, students, especially those who do not have technical experience, have difficulty…
Descriptors: Computer Software, Information Systems, Efficiency, Information Science Education
Woszczynski, Amy B.; Green, Andrew – Journal of Information Systems Education, 2017
Cyber defense competitions (CDCs) simulate a real-world environment where the competitors must protect the information assets of a fictional organization. These competitions are becoming popular at the high school and college levels, as well as in industry and governmental settings. However, there is little research to date on the learning…
Descriptors: Outcomes of Education, Competition, Information Systems, National Security
Fulton, Eric; Lawrence, Cameron; Clouse, Shawn – Journal of Information Systems Education, 2013
The aim of this paper is to illuminate the exciting world in which "white hat crackers" operate and to suggest topics that can help prepare students to enter this high-demand field. While currently there is extraordinary demand for graduates to fill these positions that have relatively high starting salaries, employers find it difficult…
Descriptors: Information Security, Computer Security, Information Technology, Computer Literacy