Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 10 |
Descriptor
Source
Information Systems Education… | 10 |
Author
Babb, Jeffry S. | 1 |
Baker, Elizabeth | 1 |
Bonneau, Thomas | 1 |
Bromall, Natalya | 1 |
Carlin, Anna | 1 |
Chen, Frankie | 1 |
Conlon, Michael P. | 1 |
Draus, Peter | 1 |
Frank, Charles E. | 1 |
Frydenberg, Mark | 1 |
Howard, Elizabeth V. | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Descriptive | 6 |
Reports - Research | 3 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 5 |
Grade 10 | 1 |
Grade 11 | 1 |
Grade 12 | 1 |
Grade 9 | 1 |
High Schools | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Audience
Location
California | 1 |
Massachusetts | 1 |
Ohio | 1 |
Pennsylvania | 1 |
Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Draus, Peter; Mishra, Sushma; Slonka, Kevin; Bromall, Natalya – Information Systems Education Journal, 2022
Information Technology (IT) skills gap discourse suggests a mismatch between what students are acquiring in terms of knowledge and skills in their education versus what employers believe are useful skills for doing day to day tasks. This study builds upon previous research (analyzing the skills of college students in IT-related majors) by…
Descriptors: Skills, Achievement Gap, Employment Qualifications, Information Technology
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Serapiglia, Anthony; Serapiglia, Constance; McIntyre, Joshua – Information Systems Education Journal, 2015
Bitcoin, Litecoin, Dogecoin, et al "cryptocurrencies" have enjoyed a meteoric rise in popularity and use as a way of performing transactions on the Internet and beyond. While gaining market valuations of billions of dollars and generating much popular press in doing so, little has been academically published on the Computer…
Descriptors: Monetary Systems, Information Technology, Information Systems, Internet
Pittman, Jason M.; Pike, Ronald E. – Information Systems Education Journal, 2016
This paper reports on the design and implementation of a cybersecurity camp offered as a cybersecurity learning experience to a group of female and male high school students. Students ranged in grade level from freshmen to senior. Student demographics, including any existing pre-requisite knowledge, were unknown to camp designers prior to the…
Descriptors: Peer Relationship, Cooperative Learning, High School Students, Observation
Marchant, Robert L.; Bonneau, Thomas – Information Systems Education Journal, 2013
Transition from small, independent LANs into larger enterprise managed infrastructures is becoming more prominent in academia, business and government. Consolidation of IT resources into larger, more disciplined, and more professionally managed environments has significant advantages however they do bring their own unique issues to solve in order…
Descriptors: Computer Networks, Computer Security, Client Server Architecture, Computer Interfaces
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Conlon, Michael P.; Mullins, Paul – Information Systems Education Journal, 2011
The Computer Science Department at Slippery Rock University created a laboratory for its Computer Networks and System Administration and Security courses under relaxed financial constraints. This paper describes the department's experience designing and using this laboratory, including lessons learned and descriptions of some student projects…
Descriptors: Laboratories, Computer Networks, Computer Science Education, Computer Security
Carlin, Anna; Manson, Daniel P.; Zhu, Jake – Information Systems Education Journal, 2010
With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Specialization
Werner, Laurie A.; Frank, Charles E. – Information Systems Education Journal, 2010
Teaching a computer security course which includes network administration and protection software is especially challenging because textbook tools are out of date by the time the text is published. In an effort to use lab activities that work effectively, we turned to the internet. This paper describes several resources for teaching computer…
Descriptors: Information Security, Information Science Education, Video Technology, Computer Security