Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 6 |
Database Management Systems | 6 |
Information Systems | 6 |
Information Technology | 4 |
Teaching Methods | 3 |
Case Method (Teaching… | 2 |
Database Design | 2 |
Databases | 2 |
Educational Needs | 2 |
Human Factors Engineering | 2 |
Information Management | 2 |
More ▼ |
Source
Journal of College Teaching &… | 1 |
Journal of Information… | 1 |
Journal of Information… | 1 |
Journal of School Nursing | 1 |
Online Submission | 1 |
ProQuest LLC | 1 |
Author
Bergren, Martha Dewey | 1 |
Edwards, Gregory | 1 |
Kohlmeyer, James M., III | 1 |
Liu, Shijie | 1 |
Maurer, Chris | 1 |
Murray, Meg Coffin | 1 |
Plachkinova, Miloslava | 1 |
Ren, Zhanying | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 4 |
Dissertations/Theses -… | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 4 |
Adult Education | 1 |
Elementary Secondary Education | 1 |
Audience
Location
China | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Kohlmeyer, James M., III – Journal of College Teaching & Learning, 2008
While it is important for accounting information systems (AIS) students to understand computer technology, internal controls and business processes, such knowledge is of little use without reference to appropriate contexts. Integrating Wall Street Journal (WSJ) readings and discussions into AIS classes can enrich learning by stimulating…
Descriptors: Information Systems, Context Effect, Curriculum Enrichment, Case Method (Teaching Technique)
Bergren, Martha Dewey – Journal of School Nursing, 2004
School nurses and health office employees are the creators and caretakers of legal documentation. School nurses have an ethical and legal obligation to protect the integrity of electronic student health records. Although there are many threats to data integrity, from inadequate hardware to electrical surges, one of the most pervasive threats to…
Descriptors: School Nurses, Computer Security, School Health Services, Confidential Records
Ren, Zhanying; Liu, Shijie – Online Submission, 2005
According to the requirement of modern teaching theory and technology, based on software engineering, database theory, the technique of net information security and system integration, a net testing system on local network was designed and realized. The system benefits for dividing of testing & teaching and settles the problems of random…
Descriptors: Educational Technology, Databases, Information Technology, Computer Networks