Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 9 |
Since 2006 (last 20 years) | 17 |
Descriptor
Source
Information Systems Education… | 17 |
Author
Frydenberg, Mark | 2 |
Fustos, Janos | 2 |
Haga, Wayne | 2 |
Morris, Gerard | 2 |
Babb, Jeffry S. | 1 |
Baker, Elizabeth | 1 |
Bonneau, Thomas | 1 |
Bromall, Natalya | 1 |
Carlin, Anna | 1 |
Chen, Frankie | 1 |
Conlon, Michael P. | 1 |
More ▼ |
Publication Type
Journal Articles | 17 |
Reports - Descriptive | 10 |
Reports - Research | 6 |
Guides - Classroom - Learner | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 11 |
Postsecondary Education | 9 |
Grade 10 | 1 |
Grade 11 | 1 |
Grade 12 | 1 |
Grade 9 | 1 |
High Schools | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Audience
Students | 1 |
Location
California | 1 |
Massachusetts | 1 |
Ohio | 1 |
Pennsylvania | 1 |
Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Frydenberg, Mark – Information Systems Education Journal, 2023
The Internet of Things (IoT) is a network of objects that can exchange data with other devices also connected to the Internet. One of the most common consumer examples of IoT is home automation, as a variety of smart devices, including doorbells, lightbulbs, thermostats, and refrigerators are now available which users can control remotely using…
Descriptors: Internet, Computer Software, Automation, Information Technology
Draus, Peter; Mishra, Sushma; Slonka, Kevin; Bromall, Natalya – Information Systems Education Journal, 2022
Information Technology (IT) skills gap discourse suggests a mismatch between what students are acquiring in terms of knowledge and skills in their education versus what employers believe are useful skills for doing day to day tasks. This study builds upon previous research (analyzing the skills of college students in IT-related majors) by…
Descriptors: Skills, Achievement Gap, Employment Qualifications, Information Technology
What! No GUI? -- Teaching a Text Based Command Line Oriented Introduction to Computer Science Course
Goldstein, Ira – Information Systems Education Journal, 2019
Computer Science students need to acquire knowledge about both the hardware and software aspects of computing systems. It is necessary for them to understand how each layer interacts with one another. However, since Graphical User Interfaces have become ubiquitous, the opportunities to interact with the computer via a command prompt as part of…
Descriptors: Computer Science Education, Computer Software, Introductory Courses, Programming
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Marquardson, Jim; Gomillion, David L. – Information Systems Education Journal, 2019
Simulated environments can provide a convenient, effective way to teach skills. Simulations have been used for decades to teach skills such as piloting aircraft. As technology has improved, it has become feasible to simulate many other tasks. Recent advances in virtual and augmented reality provide new avenues for expanding training using…
Descriptors: Computer Simulation, Teaching Methods, Transfer of Training, Introductory Courses
Morris, Gerard; Fustos, Janos; Haga, Wayne – Information Systems Education Journal, 2018
One definition of a network administrator describes a person who works with computer infrastructures with an emphasis on networking. To determine the specific skills required of a network administrator by employers, data was collected from 698 nationwide job advertisements on Dice.com. The data collection focused on technical skills rather than…
Descriptors: Skill Analysis, Job Skills, Database Management Systems, Information Networks
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Wimmer, Hayden; Hall, Kenneth – Information Systems Education Journal, 2016
Enterprise Resource Planning and Customer Relationship Management are becoming important topics at the university level, and are increasingly receiving course-level attention in the curriculum. In fact, the Information Systems Body of Knowledge specifically identifies Enterprise Architecture as an Information Systems-specific knowledge area. The…
Descriptors: Higher Education, Educational Technology, Computers, Computer Uses in Education
Serapiglia, Anthony; Serapiglia, Constance; McIntyre, Joshua – Information Systems Education Journal, 2015
Bitcoin, Litecoin, Dogecoin, et al "cryptocurrencies" have enjoyed a meteoric rise in popularity and use as a way of performing transactions on the Internet and beyond. While gaining market valuations of billions of dollars and generating much popular press in doing so, little has been academically published on the Computer…
Descriptors: Monetary Systems, Information Technology, Information Systems, Internet
VanderClock, William – Information Systems Education Journal, 2015
Most freshmen taking required, introductory information systems courses do not understand why they are required to take such courses and can't imagine that they will learn anything they don't already know. This paper presents an exercise that will excite and enthuse students about their computers and Information Systems in general. Every freshman…
Descriptors: College Freshmen, Computer Literacy, Information Systems, Technological Literacy
Pittman, Jason M.; Pike, Ronald E. – Information Systems Education Journal, 2016
This paper reports on the design and implementation of a cybersecurity camp offered as a cybersecurity learning experience to a group of female and male high school students. Students ranged in grade level from freshmen to senior. Student demographics, including any existing pre-requisite knowledge, were unknown to camp designers prior to the…
Descriptors: Peer Relationship, Cooperative Learning, High School Students, Observation
Marchant, Robert L.; Bonneau, Thomas – Information Systems Education Journal, 2013
Transition from small, independent LANs into larger enterprise managed infrastructures is becoming more prominent in academia, business and government. Consolidation of IT resources into larger, more disciplined, and more professionally managed environments has significant advantages however they do bring their own unique issues to solve in order…
Descriptors: Computer Networks, Computer Security, Client Server Architecture, Computer Interfaces
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Conlon, Michael P.; Mullins, Paul – Information Systems Education Journal, 2011
The Computer Science Department at Slippery Rock University created a laboratory for its Computer Networks and System Administration and Security courses under relaxed financial constraints. This paper describes the department's experience designing and using this laboratory, including lessons learned and descriptions of some student projects…
Descriptors: Laboratories, Computer Networks, Computer Science Education, Computer Security
Morris, Gerard; Fustos, Janos; Haga, Wayne – Information Systems Education Journal, 2012
A network engineer is an Information Technology (IT) professional who designs, implements, maintains, and troubleshoots computer networks. While the United States is still experiencing relatively high unemployment, demand for network engineers remains strong. To determine what skills employers are looking for, data was collected and analyzed from…
Descriptors: Computer Networks, Engineering Education, Information Technology, Career Development
Previous Page | Next Page ยป
Pages: 1 | 2