NotesFAQContact Us
Collection
Advanced
Search Tips
Source
Information Systems Education…50
Audience
Teachers5
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 50 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ward, Patrick – Information Systems Education Journal, 2021
This paper introduces the problem of constructing a methodology to develop a cybersecurity program. The goal of the program is to prepare students graduating from an accredited two-year college for success in cybersecurity careers. Several challenges must be addressed such as program accreditation, workforce development, pedagogy, existing…
Descriptors: Curriculum Development, Information Security, Community Colleges, Accreditation (Institutions)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jim Marquardson – Information Systems Education Journal, 2024
Generative artificial intelligence (AI) tools were met with a mix of enthusiasm, skepticism, and fear. AI adoption soared as people discovered compelling use cases--developers wrote code, realtors generated narratives for their websites, students wrote essays, and much more. Calls for caution attempted to temper AI enthusiasm. Experts highlighted…
Descriptors: Artificial Intelligence, Capstone Experiences, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bright Siaw Afriyie; Samuel Sambasivam – Information Systems Education Journal, 2023
Nearly half the adult population in developing nations lacks a formal bank account and other financial services. Ghana is no exception, having a massive community of unbanked adults and among those countries positioned at the bottom of the spectrum of financial inclusion. The advent of mobile financial services (MFS) claims an alternative mode to…
Descriptors: Computer Security, Information Security, Prevention, Deception
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lauer, Thomas W. – Information Systems Education Journal, 2020
This paper gives four examples of the use of short speculative fiction for teaching different aspects of information privacy. Information privacy is multi-faceted; as an area of study it intersects with a number of fields. A non-exhaustive list could include: law, information systems, decision science, marketing, management, philosophy,…
Descriptors: Teaching Methods, Fiction, Privacy, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bhatnagar, Neelima; Pry, Michael – Information Systems Education Journal, 2020
This paper describes a study designed to collect student perceptions of personal social media risks and their knowledge of the use of privacy and security settings in social media applications. A paper-based survey was administered to 107 students at a regional campus of a major university in western Pennsylvania, representing 10 classes and 18…
Descriptors: Undergraduate Students, Student Attitudes, Privacy, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mawel, Maurice; Sambasivam, Samuel – Information Systems Education Journal, 2023
The principal investigator (PI) conducted this research study to explore the strategic cybersecurity defense IT Managers should implement to reduce healthcare data breaches. The PI conducted a systematic literature review and selected articles that addressed healthcare data security breaches, information disclosure, cybersecurity in healthcare,…
Descriptors: Information Security, Information Technology, Confidential Records, Health Services
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Peter Draus; Sushma Mishra; Kevin Slonka; Natalya Bromall – Information Systems Education Journal, 2024
There is a significant skill gap, with millions of cybersecurity jobs still needing to be fulfilled due to a lack of a trained workforce. Various academic programs are available that teach students in different aspects of cybersecurity. This paper investigates if the title of an IT program has any impact on the desirability of a program and if…
Descriptors: College Students, Information Technology, Information Security, Cybernetics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lionel Mew; William H. Money – Information Systems Education Journal, 2024
Since it was released on November 30, 2022, ChatGPT has offered numerous opportunities for higher education professors to improve their course offerings. However, not all information provided by the application is accurate. The application has been known to yield highly inaccurate information with high confidence. Yet, with that knowledge, ChatGPT…
Descriptors: Artificial Intelligence, Computer Software, Technology Uses in Education, Library Research
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim; Asadi, Majid – Information Systems Education Journal, 2023
This case asks information systems analysts to assess the cybersecurity posture of a manufacturing company. The exercise works well as a group activity in an information systems course that addresses cybersecurity controls. The case introduces guidance from the National Institute of Standards and Technology, and learners develop work products…
Descriptors: Teaching Methods, Information Systems, Information Science Education, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yaprak Dalat Ward; James G. Ward; Li-Jen Lester – Information Systems Education Journal, 2024
This study investigated the digital existence of the food bank users in a university town in Texas, and subsequently, aligned with the research's pragmatic focus, the researchers designed a training model for these food bank users. Two research questions guided the study: What are the digital existence levels of the food bank users, and what…
Descriptors: Food, Hunger, Universities, Digital Literacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Stoker, Geoff; Clark, Ulku; Vanajakumari, Manoj; Wetherill, William – Information Systems Education Journal, 2021
The United States, along with the rest of the developed world, is experiencing a shortage of cybersecurity talent in the workforce ((ISC)[superscript 2], 2019). Among the strategies being encouraged and used to close this workforce gap are work-based learning programs like cybersecurity apprenticeships. Well-designed apprenticeships can provide a…
Descriptors: Information Security, Computer Science Education, Workplace Learning, Apprenticeships
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Steinhagen, Dustin; Lucas, Chase; Francis, Mary; Lawrence, Mark; Streff, Kevin – Information Systems Education Journal, 2021
Privacy workforce development is a growing need as organizations struggle to find qualified privacy professionals such as Data Protection Officers and privacy engineers. Little has been written about the availability of formal privacy education opportunities that could satisfy this demand. This study inventoried the current state of formal privacy…
Descriptors: Privacy, Information Security, College Curriculum, Universities
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frydenberg, Mark; Lorenz, Birgy – Information Systems Education Journal, 2020
Learning cybersecurity awareness builds on basic information technology concepts and digital literacy skills. In an effort to raise cybersecurity awareness among information technology students, this paper describes a series of three different interactive sessions offered to students of all levels at a business university. The sessions introduced…
Descriptors: Computer Security, Computer Science Education, Computer Literacy, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brown, Randy – Information Systems Education Journal, 2019
Information Security has been a challenge since humans began keeping information. With the advent of computerized data and computer networks, that challenge has increased dramatically. Not only are more breaches occurring, but public knowledge about those breaches is now commonplace adding to virtual hysteria concerning data and information…
Descriptors: Computer Security, Information Security, Professional Personnel, Specialists
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Clark, Ulku; Stoker, Geoff; Vetter, Ron – Information Systems Education Journal, 2020
The rising number and cost of cybersecurity attacks justifies continued strong interest in the National Security Agency (NSA) and Department of Homeland Security (DHS) jointly sponsored program for National Centers of Academic Excellence in Cyber Defense (CAE-CD). After briefly outlining the current state of the cybersecurity challenge, this…
Descriptors: Educational Change, Information Security, Public Agencies, National Security
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4