Publication Date
In 2025 | 4 |
Since 2024 | 9 |
Descriptor
Source
Journal of Information… | 3 |
ProQuest LLC | 2 |
Education and Information… | 1 |
Higher Education Studies | 1 |
Journal of Cybersecurity… | 1 |
Journal of Education for… | 1 |
Author
Amy J. Connolly | 1 |
Andy Bowman | 1 |
C. Sean Burns | 1 |
Carlos Novo | 1 |
Chang Liu | 1 |
Charles Downing | 1 |
Daniel E. Rush | 1 |
Daniela K. DiGiacomo | 1 |
Fatimah S. Alawbathani | 1 |
Hasimi Sallehudin | 1 |
Hassan Mallam Ibrahim | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 5 |
Dissertations/Theses -… | 2 |
Reports - Research | 2 |
Tests/Questionnaires | 2 |
Education Level
Higher Education | 6 |
Postsecondary Education | 6 |
Audience
Media Staff | 1 |
Teachers | 1 |
Location
Ohio | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Chang Liu; Charles Downing – Journal of Information Systems Education, 2024
This teaching tip describes using Microsoft Power BI Desktop in a class to analyze unstructured data from an exit survey of prior students from a Master of Science in Management Information Systems program. Results from a short survey administered to these students showed that the students, using the no-code Power BI, were able to accomplish their…
Descriptors: Graduate Students, Program Effectiveness, Information Science, Management Information Systems
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Jonee Amanda Meiser – ProQuest LLC, 2024
By law, colleges and universities must provide people with disabilities with access to their digital activities, services, and programs. The problem is that when software development teams build digital educational products and services that support higher education institutions inaccessibly, they may exclude students with certain types of…
Descriptors: Compliance (Legal), Accessibility (for Disabled), Access to Computers, Colleges
Fatimah S. Alawbathani – ProQuest LLC, 2024
This study investigated the graduate students' perceptions toward using cloud technology in their learning and how they use cloud technology in education. A qualitative case study was conducted to attain the study's objectives. The data was collected by interviewing a purposeful sample consisting of 10 participants, Ph.D. students in the…
Descriptors: Student Attitudes, Computer Attitudes, Internet, Computer Software
Hassan Mallam Ibrahim; Kamsuriah Ahmad; Hasimi Sallehudin – Education and Information Technologies, 2025
As the need for digital content increases almost daily, preserving this content for university libraries, especially in the least developed and developing nations, becomes a challenge, resulting in the loss of this data. Even though most of these libraries are automated and adopt one digital preservation strategy or the other, library users need…
Descriptors: Preservation, Technology Uses in Education, Research Libraries, Internet
Pattra Suansokchuak; Pallop Piriyasurawong – Higher Education Studies, 2025
This article aims to present a new educational model that integrates engineering learning with design thinking via a cloud ecosystem to enhance digital intelligence for undergraduate students. This approach utilizes user-centered problem-solving to foster innovation and collaborative learning. The educational environment can adapt to 21st-century…
Descriptors: Design, Thinking Skills, Engineering Education, Undergraduate Students
Leigh A. Mutchler; Amy J. Connolly; Daniel E. Rush – Journal of Information Systems Education, 2024
Information systems courses must adapt to meet the unprecedented demand for well-trained information security (InfoSec) professionals, but they cannot competently fill this gap without also ensuring that students are fluent and confident in foundational skills, both technical and behavioral. How to teach behavioral topics in InfoSec management is…
Descriptors: Information Security, Information Science Education, Information Systems, Technological Literacy
C. Sean Burns; Jennifer Pusateri; Daniela K. DiGiacomo – Journal of Education for Library and Information Science, 2025
This paper presents a novel approach to designing an online, open-source course in systems librarianship, an area of librarianship that may be perceived as complex and intimidating because of the technologies involved. The course design focuses on making systems librarianship more approachable for library and information science students who may…
Descriptors: Library Science, Online Courses, Open Education, Instructional Design
Madhav Sharma; Andy Bowman – Journal of Information Systems Education, 2025
"Not only SQL" (NoSQL) databases have become widespread across organizations, enabling sophisticated, data-driven applications to be highly available, distributed, and cloud-based, such as e-commerce, social media, online multiplayer games, and video streaming. However, NoSQL is still sparsely found in MIS and analytics curricula. This…
Descriptors: Educational Technology, Technology Integration, Databases, Data Analysis