Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 9 |
Descriptor
Source
ProQuest LLC | 4 |
Journal of Information… | 3 |
Association of Governing… | 1 |
European Journal of Education… | 1 |
Author
Cummings, Jeff | 2 |
Janicki, Thomas | 2 |
Daniel L. Segal | 1 |
David Kocsis | 1 |
Hendrix, Dorothy Marie | 1 |
Johnson, Gerald D. | 1 |
Lee, Ally | 1 |
Liles, Samuel P. | 1 |
Matthews, Kevin | 1 |
Morgan Shepherd | 1 |
Panagiotis Panagiotidis | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 4 |
Journal Articles | 4 |
Reports - Research | 3 |
Books | 1 |
Guides - Non-Classroom | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Postsecondary Education | 5 |
Higher Education | 3 |
Audience
Location
Colorado (Colorado Springs) | 1 |
Estonia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Association of Governing Boards of Universities and Colleges, 2021
Every year, more news outlets report cybersecurity?breaches--and higher education is not immune from these sinister trends. Cyberattacks on colleges, universities, and foundations have become more frequent, more sophisticated, and more dangerous. Successful cyberattacks can compromise an institution's reputation, result in substantial financial…
Descriptors: Information Security, Higher Education, Governing Boards, Risk
Cummings, Jeff; Janicki, Thomas; Matthews, Kevin – Journal of Information Systems Education, 2023
Faculty in the information systems (IS) and information technology (IT) fields are faced with the challenge to keep their curriculum relevant and current. What was taught two years ago will often be outdated and faculty must constantly update their curriculum on which courses should be taught as well as what should be taught within a particular…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Panagiotis Panagiotidis – European Journal of Education (EJED), 2022
New technological developments, such as 5G networks, smart and interconnected devices, and the development of the Internet of Things (IoT), lead to a new reality in which the secure flow of data is non-negotiable. In this new reality, blockchain technology can play a crucial role, as it has the ability to provide the necessary background for the…
Descriptors: Second Language Learning, Second Language Instruction, Telecommunications, Handheld Devices
Cummings, Jeff; Janicki, Thomas – Journal of Information Systems Education, 2021
In the fields of information technology and information systems, faculty must consistently adjust the curriculum to meet the demands of the field. However, a challenge they often face is understanding what should be covered, especially given the limited number of courses most universities are able to offer. This research is a biennial report of…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Liles, Samuel P. – ProQuest LLC, 2012
In April 2007, what has been incorrectly called the first cyber war and since then referred more correctly as a cyber riot, an attack on the domain name systems and the various servers of Estonia occurred. It was perpetrated by ethnic Russians living in Estonia who were incensed by the movement of a bronze war memorial for Russian soldiers to a…
Descriptors: Conflict, Models, Internet, War
Johnson, Gerald D. – ProQuest LLC, 2012
As U.S federal government agencies have increased the use of the Internet to utilize technologies such as e-learning, U.S. federal government information systems have become more exposed to security vulnerabilities that may contribute to system attacks and system exploitation. U.S. federal government agencies are required to come up with their own…
Descriptors: Audits (Verification), Classification, Public Agencies, Federal Government
Hendrix, Dorothy Marie – ProQuest LLC, 2011
Roles and functions of health information professionals are evolving due to the mandated electronic health record adoption process for healthcare facilities. A knowledgeable workforce with computer information technology skill sets is required for the successful collection of quality patient-care data, improvement of productivity, and…
Descriptors: Self Efficacy, Integrity, Information Systems, Electronic Equipment
Lee, Ally – ProQuest LLC, 2011
Over the past decade, there has been a change in the citizen-government relationship. Citizens have moved from a traditional face-to-face communication with their government, to an electronic interaction through the use of e-government systems. Emerging technology has enabled citizens to communicate with their government remotely. However, trust…
Descriptors: Factor Analysis, Information Systems, Predictor Variables, Focus Groups