NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 14 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Heinrich, Matthew; Gerhart, Natalie – Journal of Information Systems Education, 2023
Mobile devices are a constantly used item in a college student's life. Students depend on them for entertainment, academics, and socializing with their friends. While they continually use them, they perhaps do not understand the impact of their use on their privacy or that the devices can be used to track them and collect their personal…
Descriptors: Privacy, Handheld Devices, College Students, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Ramezan, Christopher A. – Journal of Information Systems Education, 2023
While demand for cybersecurity professionals is high, the field is currently facing a workforce shortage and a skills gap. Thus, an examination of current cybersecurity position hiring requirements may be advantageous for helping to close the skills gap. This work examines the education, professional experience, industry certification, security…
Descriptors: Computer Security, Information Technology, Job Skills, Digital Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Cummings, Jeff; Janicki, Thomas; Matthews, Kevin – Journal of Information Systems Education, 2023
Faculty in the information systems (IS) and information technology (IT) fields are faced with the challenge to keep their curriculum relevant and current. What was taught two years ago will often be outdated and faculty must constantly update their curriculum on which courses should be taught as well as what should be taught within a particular…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Peer reviewed Peer reviewed
Direct linkDirect link
Bohler, Jeffrey A.; Larson, Benjamin; Peachey, Todd A.; Shehane, Ronald F. – Journal of Information Systems Education, 2020
Information systems education objectives must continually adapt to a dynamic marketplace for knowledge and skills. For faculty developing programs that better prepare students for this demanding environment, existing research and guidelines provide a foundation to develop relevant coursework. However, an examination of peer institutions indicates…
Descriptors: Information Systems, Computer Science Education, Curriculum Evaluation, Guidelines
Peer reviewed Peer reviewed
Direct linkDirect link
Cummings, Jeff; Janicki, Thomas – Journal of Information Systems Education, 2021
In the fields of information technology and information systems, faculty must consistently adjust the curriculum to meet the demands of the field. However, a challenge they often face is understanding what should be covered, especially given the limited number of courses most universities are able to offer. This research is a biennial report of…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Peer reviewed Peer reviewed
Direct linkDirect link
Topi, Heikki – Journal of Information Systems Education, 2019
This essay discusses the current state of and potential future directions for information systems education structured around several key themes that have emerged as central in several large-scale IS education initiatives over the past 15 years. The core idea that connects all of these themes is the centrality of IS as a transformative enabler for…
Descriptors: Information Systems, Computer Science Education, Educational Trends, State of the Art Reviews
Peer reviewed Peer reviewed
Direct linkDirect link
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Peer reviewed Peer reviewed
Direct linkDirect link
White, Garry L.; Hewitt, Barbara; Kruck, S. E. – Journal of Information Systems Education, 2013
Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…
Descriptors: Information Security, Information Systems, College Students, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L. – Journal of Information Systems Education, 2011
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Descriptors: Copyrights, Confidentiality, Computer Security, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Harris, Albert L.; Lang, Michael; Yates, Dave; Kruck, S. E. – Journal of Information Systems Education, 2011
This paper discusses the importance of ethics and social responsibility in information systems (IS) education. The many public scandals of corporate misconduct have increased the need for more emphasis to be placed on ethics and ethical issues in IS education. The authors describe how the inclusion of ethics and social responsibility in the IS…
Descriptors: Freedom of Speech, Intellectual Property, Information Systems, Social Responsibility
Peer reviewed Peer reviewed
Direct linkDirect link
Pendegraft, Norman – Journal of Information Systems Education, 2009
An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…
Descriptors: Privacy, Instructional Materials, Business Administration Education, Class Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Peer reviewed Peer reviewed
Direct linkDirect link
Katerattanakul, Pairin; Kam, Hwee-Joo; Lee, James J.; Hong, Soongoo – Journal of Information Systems Education, 2009
The MetaFrame system migration project at WorldPharma, while driven by merger and acquisition, had faced complexities caused by both technical challenges and organizational issues in the climate of uncertainties. However, WorldPharma still insisted on instigating this post-merger system migration project. This project served to (1) consolidate the…
Descriptors: Case Method (Teaching Technique), Business Administration Education, Class Activities, Computer Science Education