Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 3 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Assignments | 4 |
| Computer Security | 4 |
| Teaching Methods | 4 |
| Computer Software | 2 |
| Identification | 2 |
| Information Systems | 2 |
| Undergraduate Students | 2 |
| Advanced Courses | 1 |
| Barriers | 1 |
| Building Design | 1 |
| Case Method (Teaching… | 1 |
| More ▼ | |
Source
| Information Systems Education… | 1 |
| Journal of Educational Data… | 1 |
| Journal on Educational… | 1 |
| ProQuest LLC | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Descriptive | 2 |
| Dissertations/Theses -… | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 2 |
| High Schools | 1 |
| Postsecondary Education | 1 |
| Secondary Education | 1 |
Audience
Location
| Utah | 1 |
Laws, Policies, & Programs
Assessments and Surveys
| ACT Assessment | 1 |
What Works Clearinghouse Rating
Malone, Mac – ProQuest LLC, 2023
We analyze the thesis that a fully immersive gamified learning platform benefits students, improving their enjoyment, time management, and performance by engaging them with the subject matter. We assert that an immersive experience centered around a true game produces better results than exercises with just a few gamified elements (e.g., points,…
Descriptors: Game Based Learning, Teaching Methods, Time Management, Learner Engagement
Marquardson, Jim; Asadi, Majid – Information Systems Education Journal, 2023
This case asks information systems analysts to assess the cybersecurity posture of a manufacturing company. The exercise works well as a group activity in an information systems course that addresses cybersecurity controls. The case introduces guidance from the National Institute of Standards and Technology, and learners develop work products…
Descriptors: Teaching Methods, Information Systems, Information Science Education, Information Security
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Bhagyavati – Journal on Educational Resources in Computing, 2006
Information assurance courses delivered in an online environment pose challenges to the development of meaningful hands-on exercises for students. This article presents techniques on furnishing laboratory exercises to online students and presents examples of assignments drawn from the author's experiences in teaching online courses for over three…
Descriptors: Assignments, Advanced Courses, Distance Education, Online Courses

Direct link
Peer reviewed
