NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers1
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 9 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alexandra Rysul'ova – NORDSCI, 2023
Virtual worlds, like Second Life, are transformative innovations in education. These immersive 3D environments offer teachers and students unique opportunities beyond traditional classrooms. They foster active learning, allowing students to interact, manipulate objects, and engage with diverse content. This multimodal approach accommodates various…
Descriptors: Information Security, Computer Simulation, Barriers, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Allison, Jordan – Journal of Further and Higher Education, 2023
Cyber security is a growing area of international importance, with shortages present for cyber security skills. While many universities have introduced degree programmes for cyber security, the major focus of these programmes is on the development of technical skills with some reports indicating how graduates of these courses lack in softer skills…
Descriptors: Computer Security, Information Security, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Maxworth, Ashanthi – Advances in Engineering Education, 2021
This paper presents the implementation of a case study analysis in an introductory level electrical circuits course. According to the author's knowledge, this is the first time hybrid implementation of a case study analysis with problem-based learning (PBL) and virtual experimentation (VE) was used in an introductory level electrical circuits…
Descriptors: Engineering Education, Problem Based Learning, Feedback (Response), Introductory Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Leigh A. Mutchler; Amy J. Connolly; Daniel E. Rush – Journal of Information Systems Education, 2024
Information systems courses must adapt to meet the unprecedented demand for well-trained information security (InfoSec) professionals, but they cannot competently fill this gap without also ensuring that students are fluent and confident in foundational skills, both technical and behavioral. How to teach behavioral topics in InfoSec management is…
Descriptors: Information Security, Information Science Education, Information Systems, Technological Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Brown-Devlin, Natalie – Journal of Advertising Education, 2021
As the advertising industry continues to list analytical reasoning as a necessary skill for employment, more universities are including analytics into their advertising curriculum. This article outlines how I teach an analytics-focused course in a top-ranked advertising program. In this article, I briefly summarize each course module and describe…
Descriptors: Advertising, Teaching Methods, Data Analysis, College Faculty
Peer reviewed Peer reviewed
Direct linkDirect link
Labrecque, Lauren I.; Markos, Ereni; Darmody, Aron – Journal of Marketing Education, 2021
Sophisticated technology advances are delivering new and powerful ways for marketers to collect and use consumer data. These data-driven marketing capabilities present a unique challenge for students, as they will soon be expected to manage consumer data and make business decisions based on ethical, legal, and fiscal considerations. This article…
Descriptors: Marketing, Advertising, Privacy, Comparative Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Bhuyan, Jay; Wu, Fan; Thomas, Cassandra; Koong, Kai; Hur, Jung Won; Wang, Chih-hsuan – TechTrends: Linking Research and Practice to Improve Learning, 2020
This paper describes the design, implementation, and results of an NSF funded Summer Academy from 2016 to 2018, which engaged, on an annual basis, 30 to 60 rising 10th and 11th grade high school science students in an innovative, technology-enriched Project Based Learning (PBL) environment. This Academy emphasized how tech gadgets work and the…
Descriptors: Teaching Methods, Grade 10, Grade 11, High School Students
Peer reviewed Peer reviewed
Direct linkDirect link
He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang – Journal of Information Systems Education, 2014
In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…
Descriptors: Information Security, Case Studies, Teaching Methods, Active Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Simonson, Michael, Ed. – Association for Educational Communications and Technology, 2016
For the thirty-ninth time, the Research and Theory Division of the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented at the annual AECT Convention in Las Vegas, Nevada. The Proceedings of AECT's Convention are published in two volumes.…
Descriptors: Annual Reports, Conference Papers, Conferences (Gatherings), Teaching Methods