Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 3 |
Descriptor
Source
| Information Systems Education… | 1 |
| International Association for… | 1 |
| Journal of Educational… | 1 |
| Journal of Information… | 1 |
| Teaching History: A Journal… | 1 |
Author
| Baker, Elizabeth | 1 |
| He, Wu | 1 |
| Kshirsagar, Ashish | 1 |
| Li, Yaohang | 1 |
| Nwala, Alexander | 1 |
| Reinicke, Bryan | 1 |
| Schick, James B. M. | 1 |
| Toothman, Callie | 1 |
| Turban, Efraim | 1 |
Publication Type
| Journal Articles | 4 |
| Reports - Descriptive | 3 |
| Collected Works - Proceedings | 2 |
| Guides - Non-Classroom | 1 |
| Opinion Papers | 1 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 2 |
| Elementary Secondary Education | 1 |
Location
| Asia | 1 |
| Australia | 1 |
| Brazil | 1 |
| Connecticut | 1 |
| Denmark | 1 |
| Egypt | 1 |
| Estonia | 1 |
| Florida | 1 |
| Germany | 1 |
| Greece | 1 |
| Hawaii | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang – Journal of Information Systems Education, 2014
In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…
Descriptors: Information Security, Case Studies, Teaching Methods, Active Learning
Peer reviewedTurban, Efraim; And Others – Journal of Educational Administration, 1988
Presents an overview of a computerized Decision Support System (DSS) for academic administrators. Following a discussion of its capabilities, the various components of a DSS are examined as well as the development tools needed. Examples follow of DSS in two universities, and various development and implementation issues are considered. (TE)
Descriptors: Computer Managed Instruction, Computer Simulation, Computer Software, Database Management Systems
Peer reviewedSchick, James B. M. – Teaching History: A Journal of Methods, 1989
Examines current use of computers by historians and teachers of history. Attempts to predict extent of their use in next decade. Focuses on the use of four types of computer programs: word processors; spreadsheets and statistical packages; database management programs; and simulations. States that the computer is a tool historians can use to make…
Descriptors: Computer Simulation, Computer Software, Computer Uses in Education, Computers
Association for the Development of Computer-based Instructional Systems. – 1986
This volume is divided into full formal paper manuscripts and 200-word abstracts of presentations that were made without submitting formal papers. The 73 papers presented in full represent recent research and applications in the field of computer-based instruction. They are organized into 13 sections by special interest group: (1) Computer-Based…
Descriptors: Abstracts, Computer Assisted Instruction, Computer Assisted Testing, Computer Simulation
Office of Postsecondary Education, Washington DC. Student Financial Assistance Programs. – 1998
This participant workbook on electronic aid offices is intended to be used in a two-day workshop that provides hands-on computer instruction and addresses regulatory requirements for participating in electronic processes of the U.S. Department of Education (ED). The materials encompass eight training sessions that cover the following topics: How…
Descriptors: Administrator Guides, Case Records, Compliance (Legal), Computer Oriented Programs
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers

Direct link
