Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Case Method (Teaching… | 2 |
Computer Security | 2 |
Higher Education | 2 |
Information Security | 2 |
Information Technology | 2 |
Internet | 2 |
Teaching Methods | 2 |
Business | 1 |
Classification | 1 |
Confidentiality | 1 |
Design | 1 |
More ▼ |
Source
Journal of Information… | 2 |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
North Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology