NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
Program for International…1
What Works Clearinghouse Rating
Showing 1 to 15 of 16 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Muhammad Al-Abdullah; Alper Yayla; Mohammed Salem Al-Atoum – Journal of Information Systems Education, 2024
In today's cybersecurity landscape, organizations need frameworks that provide a holistic approach to risk assessment as part of the risk management process. This case introduces SecureEnd Solutions, a rapidly growing cybersecurity company, and its core team, including Alan Touring, Ada Lovecode, Bob Jobs, and Suzan, the head of development. The…
Descriptors: Risk Assessment, Risk Management, Computer Security, Holistic Approach
Peer reviewed Peer reviewed
Direct linkDirect link
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Asfour, Ali; Zain, Samer; Salleh, Norsaremah; Grundy, John – International Journal of Technology in Education and Science, 2019
Agile development methods have been proposed as a natural fit for mobile app development contexts. Despite many studies addressing the adoption of agile methods for traditional web and desktop applications, there is a lack of studies of how mobile app development teams can adopt agile methods and the challenges they are facing. Our study explores…
Descriptors: Computer Software, Case Studies, Guidance, Quality Assurance
Peer reviewed Peer reviewed
Direct linkDirect link
Luburic, Nikola; Sladic, Goran; Slivka, Jelena; Milosavljevic, Branko – ACM Transactions on Computing Education, 2019
With ever-greater reliance of the developed world on information and communication technologies, constructing secure software has become a top priority. To produce secure software, security activities need to be integrated throughout the software development lifecycle. One such activity is security design analysis (SDA), which identifies security…
Descriptors: Computer Security, Case Studies, Blended Learning, Models
Antony, Laljith – ProQuest LLC, 2016
Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…
Descriptors: Computer Software, Qualitative Research, Case Studies, Information Security
Okoye, Stella Ifeyinwa – ProQuest LLC, 2017
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…
Descriptors: Information Security, Foreign Countries, Business, Systems Approach
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Mendoza-Gonzalez, Ricardo, Ed. – IGI Global, 2016
In today's society, educational opportunities have evolved beyond the traditional classroom setting. Most universities have implemented virtual learning environments in an effort to provide more opportunities for potential or current students seeking alternative and more affordable learning solutions. "User-Centered Design Strategies for…
Descriptors: Online Courses, Curriculum Design, Virtual Classrooms, Best Practices
Kim, Richard S. Y. – ProQuest LLC, 2010
The dissertation examines the historical development of surveillance, electronic surveillance, and cyber-surveillance from colonial times in the United States to the present. It presents the surveillance laws, technologies and policies as a balance between national security and privacy. To examine more recent developments, the dissertation…
Descriptors: National Security, Privacy, United States History, Policy Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mandal, Sraboni; Sanjay; Shrivastava, Rajnish – Turkish Online Journal of Distance Education, 2010
Presence of a teacher appraisal system plays a major role in deciding the level of professionalism of an educational institution. In addition to this it also plays a major role in improvement in quality of education imparted by the teacher. Recently assessment of the teaching fraternity has become indispensable measure and thus it is necessary to…
Descriptors: Foreign Countries, Teacher Evaluation, Technical Institutes, Case Studies
Woollard, John – Routledge, Taylor & Francis Group, 2011
"Psychology for the Classroom: E-Learning" is a lively and accessible introduction to the field of technology-supported teaching and learning and the educational psychology associated with those developments. Offering a substantial and useful analysis of e-learning, this practical book includes current research, offers a grounding in both theory…
Descriptors: Electronic Learning, Blended Learning, Social Justice, Constructivism (Learning)
Peer reviewed Peer reviewed
Direct linkDirect link
Duffy, Kevin P.; Davis, Martin H., Jr.; Sethi, Vikram – Journal of Information Systems Education, 2010
We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer…
Descriptors: Student Attitudes, Relevance (Education), Lesson Plans, Learner Engagement
Peer reviewed Peer reviewed
Direct linkDirect link
Teixeira, Claudio; Pinto, Joaquim Sousa; Martins, Joaquim Arnaldo – Campus-Wide Information Systems, 2008
Purpose: The aim of this paper is to describe a project to provide an online web portal that can be used as a front-end for all university users--students, teachers, staff--and services, library, administration, e-learning, and e-mail. Design/methodology/approach: The profile model proposed is mainly inheritable, defined by profile components with…
Descriptors: Information Systems, Profiles, Internet, Web Sites
Stamper, John, Ed.; Pardos, Zachary, Ed.; Mavrikis, Manolis, Ed.; McLaren, Bruce M., Ed. – International Educational Data Mining Society, 2014
The 7th International Conference on Education Data Mining held on July 4th-7th, 2014, at the Institute of Education, London, UK is the leading international forum for high-quality research that mines large data sets in order to answer educational research questions that shed light on the learning process. These data sets may come from the traces…
Descriptors: Information Retrieval, Data Processing, Data Analysis, Data Collection
Previous Page | Next Page ยป
Pages: 1  |  2