Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 6 |
Educational Practices | 6 |
Information Security | 6 |
Barriers | 3 |
Educational Change | 2 |
Foreign Countries | 2 |
Information Science Education | 2 |
Instructional Innovation | 2 |
Performance Factors | 2 |
Teaching Methods | 2 |
Undergraduate Students | 2 |
More ▼ |
Source
American Journal of Business… | 1 |
Information Systems Education… | 1 |
International Journal of… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Information… | 1 |
Technology, Pedagogy and… | 1 |
Author
Burden, Kevin | 1 |
Guynes, Carl S. | 1 |
Harris, Albert L. | 1 |
Jensen, Bradley K. | 1 |
Kruck, S. E. | 1 |
Lang, Michael | 1 |
Male, Trevor | 1 |
Mayes, Lisa | 1 |
Nyaboga, Andrew | 1 |
Paredes, Tisha | 1 |
Payne, Brian K. | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Research | 4 |
Reports - Descriptive | 2 |
Education Level
Higher Education | 5 |
Postsecondary Education | 4 |
Audience
Location
Turkey | 1 |
United Kingdom | 1 |
Virginia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Payne, Brian K.; Mayes, Lisa; Paredes, Tisha; Smith, Elizabeth; Wu, Hongyi; Xin, ChunSheng – Journal of Cybersecurity Education, Research and Practice, 2021
The Center for Cybersecurity Education and Research at Old Dominion University has expanded its use of high impact practices in the university's undergraduate cybersecurity degree program. Strategies developed to promote student learning included learning communities, undergraduate research, a robust internship program, service learning, and…
Descriptors: Interdisciplinary Approach, Information Security, Computer Security, Information Science Education
Tosun, Nilgün – International Journal of Curriculum and Instruction, 2021
After the World Health Organization declared COVID-19 a pandemic, universities in Turkey, like many other countries, began compulsory distance education in March. Most of the courses are conducted by distance education. Millions of students and academics have been involved in distance education through technologies enabled by the existing…
Descriptors: Foreign Countries, COVID-19, Pandemics, Distance Education
Serapiglia, Anthony – Information Systems Education Journal, 2016
Through industry news as well as contemporary reporting, the topic of computer security has become omnipresent in our daily lives. Whether the news is about corporate data breaches, international cyber espionage, or personal data compromises and identity theft--EVERYONE has had to deal with digital security in some way. Because of this, one of the…
Descriptors: Competition, Undergraduate Students, Computer Security, Information Security
Male, Trevor; Burden, Kevin – Technology, Pedagogy and Education, 2014
This article considers how developments in technologies have transformed the kind of social interaction possible over the Internet, making it feasible to undertake discourse and dialogue without having to rely solely on text-based mediation. This represents a fundamental change to learning, shifting from passive acquisition of someone else's ideas…
Descriptors: Technology Uses in Education, Technology Integration, Access to Computers, Access to Information
Harris, Albert L.; Lang, Michael; Yates, Dave; Kruck, S. E. – Journal of Information Systems Education, 2011
This paper discusses the importance of ethics and social responsibility in information systems (IS) education. The many public scandals of corporate misconduct have increased the need for more emphasis to be placed on ethics and ethical issues in IS education. The authors describe how the inclusion of ethics and social responsibility in the IS…
Descriptors: Freedom of Speech, Intellectual Property, Information Systems, Social Responsibility
Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew – American Journal of Business Education, 2009
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…
Descriptors: Graduate Students, Management Information Systems, Information Security, Concept Teaching