Publication Date
In 2025 | 0 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 11 |
Since 2016 (last 10 years) | 32 |
Since 2006 (last 20 years) | 50 |
Descriptor
Source
Information Systems Education… | 50 |
Author
Lawler, James P. | 3 |
Lawrence, Cameron | 3 |
Marquardson, Jim | 3 |
Serapiglia, Anthony | 3 |
Clark, Ulku | 2 |
Frydenberg, Mark | 2 |
Ladwig, Christine | 2 |
Molluzzo, John C. | 2 |
Paullet, Karen | 2 |
Reinicke, Bryan | 2 |
Schwieger, Dana | 2 |
More ▼ |
Publication Type
Journal Articles | 50 |
Reports - Research | 28 |
Reports - Descriptive | 19 |
Tests/Questionnaires | 11 |
Reports - Evaluative | 3 |
Education Level
Higher Education | 36 |
Postsecondary Education | 35 |
High Schools | 2 |
Grade 10 | 1 |
Grade 11 | 1 |
Grade 12 | 1 |
Grade 9 | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
More ▼ |
Audience
Teachers | 5 |
Location
New York (New York) | 2 |
North Carolina | 2 |
Pennsylvania | 2 |
Texas | 2 |
Canada | 1 |
Canada (London) | 1 |
Canada (Toronto) | 1 |
Ghana | 1 |
Hawaii | 1 |
Massachusetts | 1 |
New Jersey (Jersey City) | 1 |
More ▼ |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Ward, Patrick – Information Systems Education Journal, 2021
This paper introduces the problem of constructing a methodology to develop a cybersecurity program. The goal of the program is to prepare students graduating from an accredited two-year college for success in cybersecurity careers. Several challenges must be addressed such as program accreditation, workforce development, pedagogy, existing…
Descriptors: Curriculum Development, Information Security, Community Colleges, Accreditation (Institutions)
Embracing Artificial Intelligence to Improve Self-Directed Learning: A Cybersecurity Classroom Study
Jim Marquardson – Information Systems Education Journal, 2024
Generative artificial intelligence (AI) tools were met with a mix of enthusiasm, skepticism, and fear. AI adoption soared as people discovered compelling use cases--developers wrote code, realtors generated narratives for their websites, students wrote essays, and much more. Calls for caution attempted to temper AI enthusiasm. Experts highlighted…
Descriptors: Artificial Intelligence, Capstone Experiences, Computer Security, Information Security
Bright Siaw Afriyie; Samuel Sambasivam – Information Systems Education Journal, 2023
Nearly half the adult population in developing nations lacks a formal bank account and other financial services. Ghana is no exception, having a massive community of unbanked adults and among those countries positioned at the bottom of the spectrum of financial inclusion. The advent of mobile financial services (MFS) claims an alternative mode to…
Descriptors: Computer Security, Information Security, Prevention, Deception
Lauer, Thomas W. – Information Systems Education Journal, 2020
This paper gives four examples of the use of short speculative fiction for teaching different aspects of information privacy. Information privacy is multi-faceted; as an area of study it intersects with a number of fields. A non-exhaustive list could include: law, information systems, decision science, marketing, management, philosophy,…
Descriptors: Teaching Methods, Fiction, Privacy, Information Security
Bhatnagar, Neelima; Pry, Michael – Information Systems Education Journal, 2020
This paper describes a study designed to collect student perceptions of personal social media risks and their knowledge of the use of privacy and security settings in social media applications. A paper-based survey was administered to 107 students at a regional campus of a major university in western Pennsylvania, representing 10 classes and 18…
Descriptors: Undergraduate Students, Student Attitudes, Privacy, Information Security
Mawel, Maurice; Sambasivam, Samuel – Information Systems Education Journal, 2023
The principal investigator (PI) conducted this research study to explore the strategic cybersecurity defense IT Managers should implement to reduce healthcare data breaches. The PI conducted a systematic literature review and selected articles that addressed healthcare data security breaches, information disclosure, cybersecurity in healthcare,…
Descriptors: Information Security, Information Technology, Confidential Records, Health Services
Peter Draus; Sushma Mishra; Kevin Slonka; Natalya Bromall – Information Systems Education Journal, 2024
There is a significant skill gap, with millions of cybersecurity jobs still needing to be fulfilled due to a lack of a trained workforce. Various academic programs are available that teach students in different aspects of cybersecurity. This paper investigates if the title of an IT program has any impact on the desirability of a program and if…
Descriptors: College Students, Information Technology, Information Security, Cybernetics
Lionel Mew; William H. Money – Information Systems Education Journal, 2024
Since it was released on November 30, 2022, ChatGPT has offered numerous opportunities for higher education professors to improve their course offerings. However, not all information provided by the application is accurate. The application has been known to yield highly inaccurate information with high confidence. Yet, with that knowledge, ChatGPT…
Descriptors: Artificial Intelligence, Computer Software, Technology Uses in Education, Library Research
Marquardson, Jim; Asadi, Majid – Information Systems Education Journal, 2023
This case asks information systems analysts to assess the cybersecurity posture of a manufacturing company. The exercise works well as a group activity in an information systems course that addresses cybersecurity controls. The case introduces guidance from the National Institute of Standards and Technology, and learners develop work products…
Descriptors: Teaching Methods, Information Systems, Information Science Education, Information Security
Yaprak Dalat Ward; James G. Ward; Li-Jen Lester – Information Systems Education Journal, 2024
This study investigated the digital existence of the food bank users in a university town in Texas, and subsequently, aligned with the research's pragmatic focus, the researchers designed a training model for these food bank users. Two research questions guided the study: What are the digital existence levels of the food bank users, and what…
Descriptors: Food, Hunger, Universities, Digital Literacy
Stoker, Geoff; Clark, Ulku; Vanajakumari, Manoj; Wetherill, William – Information Systems Education Journal, 2021
The United States, along with the rest of the developed world, is experiencing a shortage of cybersecurity talent in the workforce ((ISC)[superscript 2], 2019). Among the strategies being encouraged and used to close this workforce gap are work-based learning programs like cybersecurity apprenticeships. Well-designed apprenticeships can provide a…
Descriptors: Information Security, Computer Science Education, Workplace Learning, Apprenticeships
Steinhagen, Dustin; Lucas, Chase; Francis, Mary; Lawrence, Mark; Streff, Kevin – Information Systems Education Journal, 2021
Privacy workforce development is a growing need as organizations struggle to find qualified privacy professionals such as Data Protection Officers and privacy engineers. Little has been written about the availability of formal privacy education opportunities that could satisfy this demand. This study inventoried the current state of formal privacy…
Descriptors: Privacy, Information Security, College Curriculum, Universities
Frydenberg, Mark; Lorenz, Birgy – Information Systems Education Journal, 2020
Learning cybersecurity awareness builds on basic information technology concepts and digital literacy skills. In an effort to raise cybersecurity awareness among information technology students, this paper describes a series of three different interactive sessions offered to students of all levels at a business university. The sessions introduced…
Descriptors: Computer Security, Computer Science Education, Computer Literacy, Information Technology
Brown, Randy – Information Systems Education Journal, 2019
Information Security has been a challenge since humans began keeping information. With the advent of computerized data and computer networks, that challenge has increased dramatically. Not only are more breaches occurring, but public knowledge about those breaches is now commonplace adding to virtual hysteria concerning data and information…
Descriptors: Computer Security, Information Security, Professional Personnel, Specialists
Clark, Ulku; Stoker, Geoff; Vetter, Ron – Information Systems Education Journal, 2020
The rising number and cost of cybersecurity attacks justifies continued strong interest in the National Security Agency (NSA) and Department of Homeland Security (DHS) jointly sponsored program for National Centers of Academic Excellence in Cyber Defense (CAE-CD). After briefly outlining the current state of the cybersecurity challenge, this…
Descriptors: Educational Change, Information Security, Public Agencies, National Security