Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 29 |
Descriptor
Source
Journal of Information… | 29 |
Author
He, Wu | 2 |
Akbulut, Asli Y. | 1 |
Andone, Diana | 1 |
Case, Thomas | 1 |
Cheong, Christopher | 1 |
Cheong, France | 1 |
Dang, Duong | 1 |
Davis, Charles K. | 1 |
Dick, Geoffrey | 1 |
Dillon, Thomas W. | 1 |
Dykman, Charlene A. | 1 |
More ▼ |
Publication Type
Journal Articles | 29 |
Reports - Descriptive | 13 |
Reports - Research | 12 |
Reports - Evaluative | 3 |
Tests/Questionnaires | 2 |
Information Analyses | 1 |
Education Level
Higher Education | 28 |
Postsecondary Education | 17 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Teachers | 6 |
Location
Greece | 1 |
Hong Kong | 1 |
India | 1 |
Indiana | 1 |
Israel | 1 |
Massachusetts | 1 |
Michigan | 1 |
North Carolina | 1 |
Romania | 1 |
Virginia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dang, Duong; Vartiainen, Tero – Journal of Information Systems Education, 2022
In recent years, there has been a considerable amount of information systems (IS) research on digital strategy. However, it is not clear how digital strategy is taught in higher education. To investigate this issue, we conducted a literature review on digital strategy in the IS field and IS education. We then developed a digital strategy course…
Descriptors: Information Science Education, Information Systems, Problem Based Learning, Course Descriptions
Case, Thomas; Dick, Geoffrey; Granger, Mary J.; Akbulut, Asli Y. – Journal of Information Systems Education, 2019
The Information Systems discipline has long suffered an identity crisis. It has also been prone to program sustainability issues as a technology focus has waxed and waned over the last 50 years. This paper suggests a new approach to teaching Information Systems, utilizing the notion of "fundamental and powerful concepts." Using digital…
Descriptors: Information Systems, Information Science Education, Teaching Methods, Information Technology
Zadeh, Amir H.; Zolbanin, Hamed M.; Sharda, Ramesh – Journal of Information Systems Education, 2021
The age of big data drives the need for emerging technologies to enable scalable analytics on massive, rapidly generated, and varied data. It requires "data scientists" with deep knowledge of managing the six Vs of big data: volume, velocity, variety, volatility, veracity, and value. As a result of this trend, new analytical tools are…
Descriptors: Social Media, Business Administration Education, Data Analysis, Teaching Methods
Poon, Pak-Lok – Journal of Information Systems Education, 2023
Teaching the concepts of expert systems to accounting students is often challenging, not only because these students are not equipped with the necessary technical knowledge to comprehend the concepts taught, but also due to the other various constraints (e.g., limited teaching hours and a diverse background of the students' undergraduate…
Descriptors: Graduate Students, Accounting, Teaching Methods, Learning Processes
Randolph, Adriane B.; Raven, A. J. – Journal of Information Systems Education, 2022
Neuro-marketing, neuro-economics, and now the field of neuro-information systems (neuro-IS) is growing, and our students want to know more about it all. This paper presents the examination of the learning-needs of new entrants to the field of neuro-IS. The resulting elective course is targeted at IS undergraduate majors interested in learning…
Descriptors: Information Systems, Undergraduate Students, Majors (Students), Information Science Education
Jones, Christopher G.; Liu, David – Journal of Information Systems Education, 2017
The success of tech company IPOs such as Facebook, Twitter, and Snap has not been lost on today's Information Systems (IS) majors. The demand for entrepreneurship education has grown rapidly from a just a few college classes in entrepreneurship in the 1970s to the over 3,000 colleges and universities providing entrepreneurship curriculum today…
Descriptors: Information Systems, Entrepreneurship, Information Technology, Social Media
Frydenberg, Mark; Andone, Diana – Journal of Information Systems Education, 2018
Augmented and virtual reality applications bring new insights to real world objects and scenarios. This paper shares research results of the TalkTech project, an ongoing study investigating the impact of learning about new technologies as members of global communities. This study shares results of a collaborative learning project about augmented…
Descriptors: Computer Graphics, Computer Simulation, Global Approach, Communities of Practice
Magana, Alejandra J.; Seah, Ying Ying; Thomas, Paul – Journal of Information Systems Education, 2018
Agile methods such as Scrum that emphasize technical, communication, and teamwork skills have been practiced by IT professionals to effectively deliver software products of good quality. The same methods combined with pedagogies of engagement can potentially be used in the setting of higher education to promote effective group learning in software…
Descriptors: Cooperative Learning, Class Activities, Design, Teaching Methods
Riemenschneider, Cynthia K.; Manly, Tracy S.; Leonard, Lori N. K. – Journal of Information Systems Education, 2016
Academic integrity continues to be a concern for universities and faculty. Yet practical methods for conveying ethical behavior can be difficult to achieve. This study uses the multidimensional ethics scale to gain insight into three situations involving students. The findings from those scenarios are then framed using the "Giving Voice to…
Descriptors: Information Technology, Integrity, Academic Achievement, Student Improvement
Dillon, Thomas W.; Reif, Harry L.; Thomas, Daphyne S. – Journal of Information Systems Education, 2016
This study examines two alternative interventions designed to attract diverse students to pursue information technology or, more generally, STEM (science, technology, engineering, and math) careers from a Return on Investment (ROI) perspective. More specifically, this study examines the effectiveness and efficiency of single-day and multi-day…
Descriptors: Models, Comparative Analysis, Information Technology, Intervention
Nandi, Santosh; Nandi, Madhavi L. – Journal of Information Systems Education, 2015
Mobility has become an important extension to the business strategies of present-day organizations. Thus, organizations are increasingly seeking managers with knowledge of value chain related to mobile-oriented business activities, usually referred to as mobile commerce (m-commerce). Accordingly, business management schools are interesting in…
Descriptors: Management Development, Business Administration Education, Business Schools, Teaching Experience
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
Ilvonen, Ilona – Journal of Information Systems Education, 2013
Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…
Descriptors: Information Security, Teaching Methods, Course Evaluation, Student Attitudes
Larson, Eric C. – Journal of Information Systems Education, 2013
Managing a portfolio of IT projects is an important capability for firms and their managers. The classroom simulation described here provides students in an MBA information systems management/strategy course with the opportunity to deepen their understanding of the key concepts that should be considered in managing an IT portfolio and helps…
Descriptors: Information Technology, Information Management, Portfolios (Background Materials), Computer Simulation
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Previous Page | Next Page ยป
Pages: 1 | 2