Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Case Method (Teaching… | 1 |
| Computer Security | 1 |
| Higher Education | 1 |
| Information Security | 1 |
| Information Technology | 1 |
| Internet | 1 |
| Libraries | 1 |
| Models | 1 |
| Online Courses | 1 |
| Responses | 1 |
| Teaching Methods | 1 |
| More ▼ | |
Source
| Journal of Information… | 1 |
Author
| He, Wu | 1 |
| Yang, Li | 1 |
| Yuan, Xiaohong | 1 |
Publication Type
| Journal Articles | 1 |
| Reports - Descriptive | 1 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| North Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology

Peer reviewed
Direct link
