Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 5 |
Information Science Education | 5 |
Information Technology | 5 |
Information Security | 3 |
Computer Science Education | 2 |
Curriculum Development | 2 |
Ethics | 2 |
Models | 2 |
Privacy | 2 |
Access to Computers | 1 |
Accreditation (Institutions) | 1 |
More ▼ |
Source
Information Systems Education… | 1 |
Journal of Education for… | 1 |
Journal of Information… | 1 |
Journal of Information… | 1 |
ProQuest LLC | 1 |
Author
Alper Yayla | 1 |
Dark, Melissa Jane | 1 |
Ekstrom, Joseph J. | 1 |
Ersin Dincelli | 1 |
Lunt, Barry M. | 1 |
Peslak, Alan R. | 1 |
San Nicolas-Rocca, Tonia | 1 |
Yang, Samuel C. | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 2 |
Audience
Location
Pennsylvania | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
San Nicolas-Rocca, Tonia – ProQuest LLC, 2010
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Descriptors: Higher Education, Action Research, Observation, Identification
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing
Dark, Melissa Jane; Ekstrom, Joseph J.; Lunt, Barry M. – Journal of Information Technology Education, 2006
In December 2001 a meeting of interested parties from fifteen four-year IT programs from the US along with representatives from IEEE, ACM, and ABET (CITC-1) began work on the formalization of Information Technology as an accredited academic discipline. The effort has evolved into SIGITE, the ACM SIG for Information Technology Education. During…
Descriptors: Intellectual Disciplines, Information Technology, Technology Education, Information Science Education