Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 15 |
Since 2016 (last 10 years) | 27 |
Since 2006 (last 20 years) | 45 |
Descriptor
Source
Journal of Information… | 45 |
Author
Kruck, S. E. | 3 |
Cummings, Jeff | 2 |
He, Wu | 2 |
Janicki, Thomas | 2 |
Plachkinova, Miloslava | 2 |
Spears, Janine L. | 2 |
White, Barbara Jo | 2 |
Willey, Lorrie | 2 |
Yang, Li | 2 |
Young, Jacob A. | 2 |
Yuan, Xiaohong | 2 |
More ▼ |
Publication Type
Journal Articles | 45 |
Reports - Research | 21 |
Reports - Descriptive | 20 |
Tests/Questionnaires | 5 |
Reports - Evaluative | 3 |
Guides - Classroom - Teacher | 2 |
Information Analyses | 1 |
Education Level
Higher Education | 32 |
Postsecondary Education | 29 |
High Schools | 1 |
Two Year Colleges | 1 |
Audience
Teachers | 6 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Young, Jacob A.; Farshadkhah, Sahar – Journal of Information Systems Education, 2023
In this paper, we describe the development of an in-class exercise designed to teach students how to craft social engineering attacks. Specifically, we focus on the development of phishing emails. Providing an opportunity to craft offensive attacks not only helps prepare students for a career in penetration testing but can also enhance their…
Descriptors: Information Security, Class Activities, Computer Science Education, Social Psychology
Luse, Andy; Shadbad, Forough Nasirpouri – Journal of Information Systems Education, 2023
The demand for qualified analytics professionals remains high with forecasts showing a continued need over the next few years. While this demand necessitates instruction in analytics in the classroom, many students find analytics concepts to be complicated and boring. This teaching brief describes a novel approach to teaching analytics through…
Descriptors: Computer Science Education, Information Security, Learning Activities, Learner Engagement
Samuel C. Yang – Journal of Information Systems Education, 2024
Amid the ever-increasing number of cyberthreats, cybersecurity degree programs represent a potential growth area for business schools. This study examines undergraduate cybersecurity programs offered by AACSB-accredited business schools in the US. It surveyed 503 AACSB-accredited schools and identified 72 cybersecurity programs. Using the IS2020…
Descriptors: Computer Security, Information Security, Business Administration Education, Business Schools
Heinrich, Matthew; Gerhart, Natalie – Journal of Information Systems Education, 2023
Mobile devices are a constantly used item in a college student's life. Students depend on them for entertainment, academics, and socializing with their friends. While they continually use them, they perhaps do not understand the impact of their use on their privacy or that the devices can be used to track them and collect their personal…
Descriptors: Privacy, Handheld Devices, College Students, Student Attitudes
Kim, J. B.; Zhong, Chen; Liu, Hong – Journal of Information Systems Education, 2023
Cybersecurity education is becoming increasingly important in modern society, and hands-on practice is an essential element. Although instructors provide hands-on labs in their cybersecurity courses, traditional lab exercises often fail to effectively motivate students. Hence, many instructors desire to incorporate gamification in hands-on…
Descriptors: Gamification, Information Security, Class Activities, Active Learning
Desai, Roopa Ramesh; Kim, Jaehoon – Journal of Information Systems Education, 2023
The Internet of Things (IoT) has pervaded practically all aspects of our lives. In this exploratory study, we survey its applications in the field of education. It is evident that technology in general, and, in particular IoT, has been increasingly altering the educational landscape. The goal of this paper is to review the academic literature on…
Descriptors: Internet, Information Technology, Technology Uses in Education, Influence of Technology
Bongiovanni, Ivano – Journal of Information Systems Education, 2022
In this role-playing teaching case, students impersonate Selective Consulting, a fictitious, Australian-based company tasked with assessing the information security practices of SkillPlat, a provider of apprenticeship and traineeship services. The case develops around the one-week visit paid by Selective Consulting to SkillPlat's headquarters,…
Descriptors: Information Security, Role Playing, Teaching Methods, Foreign Countries
Ramezan, Christopher A. – Journal of Information Systems Education, 2023
While demand for cybersecurity professionals is high, the field is currently facing a workforce shortage and a skills gap. Thus, an examination of current cybersecurity position hiring requirements may be advantageous for helping to close the skills gap. This work examines the education, professional experience, industry certification, security…
Descriptors: Computer Security, Information Technology, Job Skills, Digital Literacy
Gross, Melissa; Ho, Shuyuan M. – Journal of Information Systems Education, 2021
This paper explores the perceptions of undergraduate students experiencing an educational intervention in a cybersecurity course. The intervention was developed using activity theory. Laboratory activities were designed to 'protect' and 'poke around' systems and networks in a sandbox cloud environment. These activities provided dynamic…
Descriptors: Cooperative Learning, Information Security, Undergraduate Students, Student Attitudes
Haywood, M. Elizabeth – Journal of Information Systems Education, 2021
ISACA, a non-profit, independent association that advocates for professionals involved in information security, assurance, risk management, and governance, recently updated its IT governance framework, Control Objectives for Information and Related Technology (COBIT). COBIT 2019 presents a logical approach to information technology and policy…
Descriptors: Community Colleges, Crime, Computer Security, Information Technology
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Young, Jacob A. – Journal of Information Systems Education, 2020
Despite advancements in pedagogy and technology, students often yearn for more applied opportunities in information security education. Further, small businesses are likely to have inadequate information security postures due to limited budgets and expertise. To address both issues, an advanced course in ethical hacking was developed which allows…
Descriptors: Service Learning, Information Security, Computer Security, Computer Science Education
Leigh A. Mutchler; Amy J. Connolly; Daniel E. Rush – Journal of Information Systems Education, 2024
Information systems courses must adapt to meet the unprecedented demand for well-trained information security (InfoSec) professionals, but they cannot competently fill this gap without also ensuring that students are fluent and confident in foundational skills, both technical and behavioral. How to teach behavioral topics in InfoSec management is…
Descriptors: Information Security, Information Science Education, Information Systems, Technological Literacy
Cummings, Jeff; Janicki, Thomas; Matthews, Kevin – Journal of Information Systems Education, 2023
Faculty in the information systems (IS) and information technology (IT) fields are faced with the challenge to keep their curriculum relevant and current. What was taught two years ago will often be outdated and faculty must constantly update their curriculum on which courses should be taught as well as what should be taught within a particular…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Urbaczewski, Andrew; Keeling, Kellie B. – Journal of Information Systems Education, 2019
This paper takes a look backward while simultaneously looking to the future for MIS departments that are making the transition to Analytics departments. MIS has a long past of providing a base of skills supporting organizations. We examine this history as well as how the blending of MIS with business translator and modeling skills has led to the…
Descriptors: Departments, Management Information Systems, Data Analysis, Educational Trends