Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Case Method (Teaching… | 5 |
Computer Security | 5 |
Teaching Methods | 5 |
Information Security | 4 |
Information Systems | 3 |
Information Technology | 3 |
Corporations | 2 |
Database Management Systems | 2 |
Higher Education | 2 |
Information Science Education | 2 |
Internet | 2 |
More ▼ |
Author
Asadi, Majid | 1 |
He, Wu | 1 |
Kohlmeyer, James M., III | 1 |
Marquardson, Jim | 1 |
Maurer, Chris | 1 |
Parrish, James L., Jr. | 1 |
Plachkinova, Miloslava | 1 |
Spears, Janine L. | 1 |
Yang, Li | 1 |
Yuan, Xiaohong | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 4 |
Reports - Research | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 2 |
Audience
Location
North Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Marquardson, Jim; Asadi, Majid – Information Systems Education Journal, 2023
This case asks information systems analysts to assess the cybersecurity posture of a manufacturing company. The exercise works well as a group activity in an information systems course that addresses cybersecurity controls. The case introduces guidance from the National Institute of Standards and Technology, and learners develop work products…
Descriptors: Teaching Methods, Information Systems, Information Science Education, Information Security
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Kohlmeyer, James M., III – Journal of College Teaching & Learning, 2008
While it is important for accounting information systems (AIS) students to understand computer technology, internal controls and business processes, such knowledge is of little use without reference to appropriate contexts. Integrating Wall Street Journal (WSJ) readings and discussions into AIS classes can enrich learning by stimulating…
Descriptors: Information Systems, Context Effect, Curriculum Enrichment, Case Method (Teaching Technique)