NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)2
Since 2006 (last 20 years)7
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 16 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
van Wyk, Norman; Johnston, Kevin; Möller, Klaus; Haas, Florian – Online Submission, 2020
Aim/Purpose: Academics are often requested to create and teach courses for emerging technologies with perhaps no experience or guidance on how to do so. Background: A Framework to develop IT courses for emerging technologies was created and tested to assist academics; the framework was then tested by developing an IoT course. Methodology: A…
Descriptors: Information Science Education, Information Technology, College Faculty, Guidelines
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alghazzawi, Daniyal; Fardoun, Habib – Journal of Case Studies in Accreditation and Assessment, 2014
The 3-year migration of the computing faculty for three undergraduate programs from ad hoc teaching to three accredited programs is the focus of this paper. This journey started after numerous international accreditation organizations were surveyed, and ABET was chosen as the faculty's target. In this paper, the timelines and processes for…
Descriptors: Accreditation (Institutions), Undergraduate Study, College Faculty, Information Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Yu, Liangzhi – Journal of Librarianship and Information Science, 2012
The term "information world" has been widely used by LIS scholars in a rather cursory manner. Building upon a range of existing concepts in LIS literature, and drawing on evidence from interviews of 40 people of different social statuses, this paper offers a redefinition of the "information worlds of individuals" concept within the framework of…
Descriptors: Access to Information, Information Seeking, Interviews, Scholarship
Peer reviewed Peer reviewed
Direct linkDirect link
Peace, A. Graham – Journal of Information Systems Education, 2011
This experience report details the use of debates in a course on Information Ethics. Formal debates have been used in academia for centuries and create an environment in which students must think critically, communicate well and, above all, synthesize and evaluate the relevant classroom material. They also provide a break from the standard…
Descriptors: Ethics, Debate, Teaching Methods, Class Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Naaj, Mahmoud Abou; Nachouki, Mirna; Ankit, Ahmed – Journal of Information Technology Education: Research, 2012
Blended learning combines multiple delivery media that are designed to complement each other and promote learning and application-learned behavior (Smith & Dillon, 1999). This article reports on a study conducted in the College of Information Technology to evaluate levels of student' satisfaction with blended learning. The particular blend of…
Descriptors: Blended Learning, Participant Satisfaction, Student Attitudes, Information Technology
San Nicolas-Rocca, Tonia – ProQuest LLC, 2010
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Descriptors: Higher Education, Action Research, Observation, Identification
Kanabar, Vijay; Gorgone, John T. – 1997
This paper describes the status of master's degree programs in information systems. An abstracted graduate model curriculum is also presented. Degree programs and course titles from more than 50 graduate information systems programs of universities and colleges were evaluated before a preliminary model was suggested. The model will be useful for…
Descriptors: Curriculum Development, Graduate Study, Higher Education, Information Science Education
Peer reviewed Peer reviewed
Crowley, Bill – Journal of the American Society for Information Science, 1999
Addresses the motivations underlying faculty advocacy of the "information" model for library and information science (LIS) education. Proposes an intensified interest in and support of all aspects of LIS education by the many worlds of LIS practice and suggests that a cultural model of LIS better positions both the "library" and "information"…
Descriptors: Futures (of Society), Higher Education, Information Science, Information Science Education
Sirias, Danilo – 1997
This paper presents a procedure for teaching Management Information Science (MIS) courses called the "Current Reality Tree" (a tool of the Theory of Constraints used to determine the major problem of a system) and proposes a methodology to use it to aid in instruction. The first part of the model (business problems) suggests initiating a session…
Descriptors: Business Administration Education, Higher Education, Information Science Education, Information Technology
Peer reviewed Peer reviewed
Yerbury, Hilary; Todd, Ross J. – Education for Library and Information Services: Australia, 1997
Educators of information professionals must respond to changes in information technology. This article describes an interactive multimedia learning package entitled "What is Information?" for undergraduate students in professional education for information practice at the University of Technology in Sydney, Australia. It elaborates on…
Descriptors: Computer Assisted Instruction, Constructivism (Learning), Foreign Countries, Higher Education
Peer reviewed Peer reviewed
Kibirige, Harry M. – International Information and Library Review, 1993
A theoretical foundation for a proposed discipline of development information science is discussed. Topics covered include an overview of theories in all disciplines, perceptions of information science theory in the Western world, domains and models in development information science, related disciplines, and the relevance of information…
Descriptors: Developing Nations, Foreign Countries, Higher Education, Information Science
Moore, Jo Ellen; Burke, Lisa A. – 1997
This paper describes a framework for research in Information Systems/Information Technology (IS/IT) instruction that is grounded in existing theory and research from education literature. A recently developed model that integrates instructional design and learning motivation theories provides a theoretical basis for future efforts of researchers…
Descriptors: Educational Research, Educational Theories, Higher Education, Information Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Stanton, Wilbur W.; Templeton, Dennie E.; Chase, Joe D.; Rose, Melinda; Eaton, Carlotta – Inquiry, 2005
The authors discuss the joining of 12 Virginia community colleges from the Appalachian region of southwestern Virginia with Radford University to form the Regional Technology Education Consortium (RTEC), a three-year project funded by the National Science Foundation Advanced Technological Education program and designed to develop articulation…
Descriptors: Community Colleges, Distance Education, Articulation (Education), Information Science Education
Money, William H. – 1997
Instructors should be concerned with how to incorporate the World Wide Web into an information systems (IS) curriculum organized across three areas of knowledge: information technology, organizational and management concepts, and theory and development of systems. The Web fits broadly into the information technology component. For the Web to be…
Descriptors: Computer Oriented Programs, Computer System Design, Curriculum Development, Higher Education
Previous Page | Next Page »
Pages: 1  |  2