Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 11 |
Databases | 11 |
Information Systems | 11 |
Computer Software | 6 |
Computer Science Education | 5 |
Information Technology | 5 |
Information Security | 4 |
Certification | 3 |
Higher Education | 3 |
Internet | 3 |
Postsecondary Education | 3 |
More ▼ |
Source
Journal of Information… | 3 |
Association Supporting… | 1 |
Australian Mathematics Teacher | 1 |
Information Systems Education… | 1 |
Journal of Educational Media… | 1 |
Journal of School Nursing | 1 |
Online Submission | 1 |
ProQuest LLC | 1 |
Author
Cummings, Jeff | 2 |
Janicki, Thomas | 2 |
Bergren, Martha Dewey | 1 |
Cardinali, Richard | 1 |
Elnoshokaty, Ahmed | 1 |
Hong, Soongoo | 1 |
Hyde, Hartley | 1 |
Jabbour, Ghassan | 1 |
Kam, Hwee-Joo | 1 |
Katerattanakul, Pairin | 1 |
Lee, James J. | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Descriptive | 5 |
Reports - Research | 3 |
Collected Works - Proceedings | 1 |
Dissertations/Theses -… | 1 |
Legal/Legislative/Regulatory… | 1 |
Education Level
Postsecondary Education | 5 |
Higher Education | 4 |
Elementary Secondary Education | 1 |
Audience
Location
China | 1 |
Laws, Policies, & Programs
Family Education Loan Program | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Cummings, Jeff; Janicki, Thomas; Matthews, Kevin – Journal of Information Systems Education, 2023
Faculty in the information systems (IS) and information technology (IT) fields are faced with the challenge to keep their curriculum relevant and current. What was taught two years ago will often be outdated and faculty must constantly update their curriculum on which courses should be taught as well as what should be taught within a particular…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Marquardson, Jim; Elnoshokaty, Ahmed – Information Systems Education Journal, 2020
People starting cybersecurity careers have three main avenues for achieving entry-level job qualifications: learning in-demand skills, earning industry certifications, and graduating with a college degree. Though people can pursue skills, certificates, and degrees together, financial and time constraints often make people focus their efforts to…
Descriptors: Information Security, Computer Security, Employment Opportunities, Employment Qualifications
Cummings, Jeff; Janicki, Thomas – Journal of Information Systems Education, 2021
In the fields of information technology and information systems, faculty must consistently adjust the curriculum to meet the demands of the field. However, a challenge they often face is understanding what should be covered, especially given the limited number of courses most universities are able to offer. This research is a biennial report of…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Jabbour, Ghassan – ProQuest LLC, 2010
The increasing proliferation of globally interconnected complex information systems has elevated the magnitude of attacks and the level of damage that they inflict on such systems. This open environment of intertwined financial, medical, defense, and other systems has attracted hackers to increase their malicious activities to cause harm or to…
Descriptors: Computer Software, Information Systems, Computers, Databases
Hyde, Hartley – Australian Mathematics Teacher, 2007
The transfer of data from one part of a computer to another has always been a complex task in which speed is traded against accuracy and the time required for error correction. Much more complex therefore is the transfer of information from one machine to another of a different type. Difficulties arise when machines are updated, when file formats…
Descriptors: Computer Software, Internet, Information Transfer, Information Systems
Katerattanakul, Pairin; Kam, Hwee-Joo; Lee, James J.; Hong, Soongoo – Journal of Information Systems Education, 2009
The MetaFrame system migration project at WorldPharma, while driven by merger and acquisition, had faced complexities caused by both technical challenges and organizational issues in the climate of uncertainties. However, WorldPharma still insisted on instigating this post-merger system migration project. This project served to (1) consolidate the…
Descriptors: Case Method (Teaching Technique), Business Administration Education, Class Activities, Computer Science Education

Cardinali, Richard – Journal of Educational Media and Library Sciences, 1995
Discusses issues of database security and integrity, including computer crime and vandalism, human error, computer viruses, employee and user access, and personnel policies. Suggests some precautions to minimize system vulnerability such as careful personnel screening, audit systems, passwords, and building and software security systems. (JKP)
Descriptors: Computer Security, Crime Prevention, Databases, Information Systems
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2014
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Conferences (Gatherings), Conference Papers, Computer Uses in Education, Small Colleges
Bergren, Martha Dewey – Journal of School Nursing, 2004
School nurses and health office employees are the creators and caretakers of legal documentation. School nurses have an ethical and legal obligation to protect the integrity of electronic student health records. Although there are many threats to data integrity, from inadequate hardware to electrical surges, one of the most pervasive threats to…
Descriptors: School Nurses, Computer Security, School Health Services, Confidential Records
General Accounting Office, Washington, DC. Accounting and Information Management Div. – 1995
This report presents an evaluation of the general controls over the Federal Family Education Loan Program (FFELP) information system maintained and operated by a contractor for the U.S. Department of Education (ED), which administers FFELP. The evaluation found that ED's general controls over the FFELP information system did not adequately protect…
Descriptors: Access to Information, Computer Security, Databases, Federal Programs
Ren, Zhanying; Liu, Shijie – Online Submission, 2005
According to the requirement of modern teaching theory and technology, based on software engineering, database theory, the technique of net information security and system integration, a net testing system on local network was designed and realized. The system benefits for dividing of testing & teaching and settles the problems of random…
Descriptors: Educational Technology, Databases, Information Technology, Computer Networks