Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
Information Systems Education… | 5 |
Author
Marquardson, Jim | 2 |
Baker, Elizabeth | 1 |
Gomillion, David L. | 1 |
Reinicke, Bryan | 1 |
Semeniuta, Andrei | 1 |
Tastle, William J. | 1 |
Toothman, Callie | 1 |
Waguespack, Leslie J. | 1 |
White, Bruce A. | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 4 |
Audience
Location
Belarus | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Marquardson, Jim – Information Systems Education Journal, 2018
Academics are responding to the call from industry for graduates armed with cybersecurity skills. A common challenge that educators face is creating effective cybersecurity curriculum that prepares students with practical skills upon graduation. While hands-on exercises are a powerful method for teaching and assessing cybersecurity skills, these…
Descriptors: Information Security, Information Science Education, Teaching Methods, Skill Development
Marquardson, Jim; Gomillion, David L. – Information Systems Education Journal, 2019
Simulated environments can provide a convenient, effective way to teach skills. Simulations have been used for decades to teach skills such as piloting aircraft. As technology has improved, it has become feasible to simulate many other tasks. Recent advances in virtual and augmented reality provide new avenues for expanding training using…
Descriptors: Computer Simulation, Teaching Methods, Transfer of Training, Introductory Courses
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Waguespack, Leslie J. – Information Systems Education Journal, 2014
With the increasing proliferation of multitasking and Internet-connected devices, security has reemerged as a fundamental design concern in information systems. The shift of IS curricula toward a largely organizational perspective of security leaves little room for focus on its foundation in systems architecture, the computational underpinnings of…
Descriptors: Computer Security, Internet, Information Systems, Computer Software
White, Bruce A.; Tastle, William J.; Semeniuta, Andrei – Information Systems Education Journal, 2010
Outsourcing has been a major discussion topic for several years. It is common to pick up any IT trade publication and not see some article about managing global IT or IT outsourcing or IT offshoring or even the news briefs about a US company setting up some information technology operation in India or China or another locale. Outsourcing is tied…
Descriptors: Computer Simulation, Teamwork, Teaching Methods, Information Technology