Publication Date
In 2025 | 1 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 14 |
Since 2006 (last 20 years) | 18 |
Descriptor
Information Security | 18 |
Information Systems | 18 |
Teaching Methods | 18 |
Information Science Education | 11 |
Computer Software | 8 |
Computer Security | 7 |
Computer Science Education | 6 |
Privacy | 6 |
Undergraduate Students | 6 |
Higher Education | 5 |
Case Studies | 4 |
More ▼ |
Source
Author
A. Renee Staton | 1 |
Al-Azawei, Ahmed | 1 |
Amy J. Connolly | 1 |
Asadi, Majid | 1 |
Beuran, Razvan | 1 |
Daniel E. Rush | 1 |
Daniel L. Segal | 1 |
Daugherty, Michael K. | 1 |
David Kocsis | 1 |
Di, Jia | 1 |
Dillon, Thomas W. | 1 |
More ▼ |
Publication Type
Journal Articles | 17 |
Reports - Descriptive | 9 |
Reports - Research | 7 |
Books | 1 |
Collected Works - General | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 14 |
Postsecondary Education | 11 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Marquardson, Jim; Asadi, Majid – Information Systems Education Journal, 2023
This case asks information systems analysts to assess the cybersecurity posture of a manufacturing company. The exercise works well as a group activity in an information systems course that addresses cybersecurity controls. The case introduces guidance from the National Institute of Standards and Technology, and learners develop work products…
Descriptors: Teaching Methods, Information Systems, Information Science Education, Information Security
Beuran, Razvan; Tang, Dat; Tan, Zheyu; Hasegawa, Shinobu; Tan, Yasuo; Shinoda, Yoichi – Education and Information Technologies, 2019
Cybersecurity education and training are being conducted on an ever-increasing scale, as most organizations need to improve their readiness in dealing with the more and more frequent cyberattacks. However, most systems used for such education and training purposes are built from scratch, are highly customized, and often proprietary. This is true…
Descriptors: Information Security, Teaching Methods, Management Systems, Information Systems
Leigh A. Mutchler; Amy J. Connolly; Daniel E. Rush – Journal of Information Systems Education, 2024
Information systems courses must adapt to meet the unprecedented demand for well-trained information security (InfoSec) professionals, but they cannot competently fill this gap without also ensuring that students are fluent and confident in foundational skills, both technical and behavioral. How to teach behavioral topics in InfoSec management is…
Descriptors: Information Security, Information Science Education, Information Systems, Technological Literacy
Panagiotis Panagiotidis – European Journal of Education (EJED), 2022
New technological developments, such as 5G networks, smart and interconnected devices, and the development of the Internet of Things (IoT), lead to a new reality in which the secure flow of data is non-negotiable. In this new reality, blockchain technology can play a crucial role, as it has the ability to provide the necessary background for the…
Descriptors: Second Language Learning, Second Language Instruction, Telecommunications, Handheld Devices
Pratsri, Sajeewan; Nilsook, Prachyanun – Higher Education Studies, 2020
According to a continuously increasing amount of information in all aspects whether the sources are retrieved from an internal or external organization, a platform should be provided for the automation of whole processes in the collection, storage, and processing of Big Data. The tool for creating Big Data is a Big Data challenge. Furthermore, the…
Descriptors: Data Analysis, Higher Education, Information Systems, Data Collection
Lending, Diane; Mitri, Michel; Dillon, Thomas W. – Journal of Information Systems Education, 2019
This paper describes James Madison University's undergraduate major in Computer Information Systems as an example of a high-quality Information Systems (IS) program and discusses our planned evolution in the context of the rapid changes of technological, business, and social factors. We have determined what we consider to be five essential…
Descriptors: Undergraduate Students, Majors (Students), Teaching Methods, Integrated Curriculum
Zadeh, Amir H.; Zolbanin, Hamed M.; Sengupta, Arijit; Schultz, Todd – Journal of Information Systems Education, 2020
Enterprise resource planning systems (ERP) are the most essential and critical information systems that are widely used to build all the functions of a business into a unified and efficient enterprise system. Although the essence of ERP systems are easy to understand, students, especially those who do not have technical experience, have difficulty…
Descriptors: Computer Software, Information Systems, Efficiency, Information Science Education
Al-Azawei, Ahmed – Journal of Information Technology Education: Research, 2019
Aim/Purpose: This research investigates the success variables affecting the adoption of social networking sites (SNS), namely Facebook, and learning management systems (LMS), specifically Moodle, in developing countries. Background: In contemporary education, universities invest heavily in the integration of LMS with traditional classrooms.…
Descriptors: Social Networks, Social Media, Management Systems, Undergraduate Students
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2016
The demand for college graduates with skills in big data analysis is on the rise. Employers in all industry sectors have found significant value in analyzing both separate and combined data streams. However, news reports continue to script headlines drawing attention to data improprieties, privacy breaches and identity theft. While data privacy is…
Descriptors: Information Security, Information Systems, Data, Privacy
Nakama, Debra; Paullet, Karen – Information Systems Education Journal, 2018
There is urgency for minority serving rural hybrid community colleges for innovation in offering cybersecurity education to local high school students who have no access to these emerging occupations. Focusing on high school women and minorities, this case study uses field experiences to drive an iterative improvement process that enhances the…
Descriptors: Information Systems, Rural Areas, Information Security, Online Courses
Makewa, Lazarus Ndiku, Ed.; Ngussa, Baraka Manjale, Ed. – IGI Global, 2020
Effective use of technology in areas that include admissions, record keeping, billing, compliance, athletic administration, and more hold untold potential to transform higher education by introducing significant efficiencies and dramatic cost reductions in serving students. How the institution organizes itself will to a large extent depend on how…
Descriptors: Information Technology, Higher Education, Organizational Culture, College Faculty
Pawlowski, Suzanne D.; Jung, Yoonhyuk – Journal of Information Systems Education, 2015
Cybersecurity has become an essential topic in introductory information systems (IS) core courses. As an aid to course design, the exploratory research in this paper uses a social representations lens to elucidate the perceptions of cybersecurity and cybersecurity threats held by students. Analysis of qualitative survey data from 152 students at a…
Descriptors: Information Security, Information Science Education, Information Systems, Qualitative Research
Previous Page | Next Page ยป
Pages: 1 | 2