NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Adam Patterson; Cathy Temple; Nikki Anderson; Chris Rogalski; Kevin Mentzer – Information Systems Education Journal, 2025
This research examines the implementation of virtual reality into an effective speaking course at a small business college in New England. The researchers detail how they piloted the use of MetaQuest 2 headsets to students for round-the-clock availability of public speaking software in an Effective Speaking course. Students were administered a…
Descriptors: Computer Simulation, Speech Instruction, Public Speaking, Experiential Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gondi, Vamsi; Hua, David; Bajracharya, Biju Raja – Information Systems Education Journal, 2021
In the age of COVID-19, traditional teaching techniques are under scrutiny. Most concepts and labs in the area of information technology are intended to be taught face-to-face in labs using clusters and networking infrastructure. Simulation software's such as uCertify, Pearson online, etc.., are good alternative, but are not always a viable…
Descriptors: Computer Science Education, Computer Software, Computer Simulation, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim – Information Systems Education Journal, 2018
Academics are responding to the call from industry for graduates armed with cybersecurity skills. A common challenge that educators face is creating effective cybersecurity curriculum that prepares students with practical skills upon graduation. While hands-on exercises are a powerful method for teaching and assessing cybersecurity skills, these…
Descriptors: Information Security, Information Science Education, Teaching Methods, Skill Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Waguespack, Leslie J. – Information Systems Education Journal, 2014
With the increasing proliferation of multitasking and Internet-connected devices, security has reemerged as a fundamental design concern in information systems. The shift of IS curricula toward a largely organizational perspective of security leaves little room for focus on its foundation in systems architecture, the computational underpinnings of…
Descriptors: Computer Security, Internet, Information Systems, Computer Software