Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Source
Journal of Information… | 6 |
Author
Dadashzadeh, Mohammad | 1 |
Dunn, Paul | 1 |
He, Wu | 1 |
Kshirsagar, Ashish | 1 |
Li, Yaohang | 1 |
Mangalaraj, George | 1 |
Maurer, Chris | 1 |
Miller, Robert E. | 1 |
Nwala, Alexander | 1 |
Plachkinova, Miloslava | 1 |
Singh, Anil | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 4 |
Reports - Research | 2 |
Guides - Classroom - Teacher | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 2 |
Audience
Teachers | 2 |
Location
Michigan | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Wang, Hai; Wang, Shouhong – Journal of Information Systems Education, 2023
NoSQL databases have been used in organizations for decades. Few database textbooks on the market, however, have suitable materials about NoSQL beyond general introductions for typical business students. In fact, users of the typical NoSQL systems on the software market need to have certain computer programming skills. This teaching tip introduces…
Descriptors: Databases, Programming, Computer Science Education, Business Administration Education
Miller, Robert E.; Dunn, Paul – Journal of Information Systems Education, 2018
This teaching case describes the functionality of an applicant processing system designed for a fictitious hotel chain. The system detailed in the case includes a webform where applicants complete and submit job applications. The system also includes a desktop application used by hotel managers and Human Resources to track applications and process…
Descriptors: Job Application, Hospitality Occupations, Computer System Design, Online Systems
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang – Journal of Information Systems Education, 2014
In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…
Descriptors: Information Security, Case Studies, Teaching Methods, Active Learning
Singh, Anil; Mangalaraj, George; Taneja, Aakash – Journal of Information Systems Education, 2010
This paper offers a compilation of technologies that provides either free or low-cost solutions to the challenges of teaching online courses. It presents various teaching methods the outlined tools and technologies can support, with emphasis on fit between these tools and the tasks they are meant to serve. In addition, it highlights various…
Descriptors: Online Courses, Teaching Methods, Technology Uses in Education, Technology Integration
Dadashzadeh, Mohammad – Journal of Information Systems Education, 2007
Semantic integrity constraints are business-specific rules that limit the permissible values in a database. For example, a university rule dictating that an "incomplete" grade cannot be changed to an A constrains the possible states of the database. To maintain database integrity, business rules should be identified in the course of database…
Descriptors: Semantics, Integrity, Database Management Systems, Database Design