NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Podeschi, R. J. – Information Systems Education Journal, 2016
Information systems curricula are increasingly using active learning methodologies to help students learn "through" technology rather than just "about" technology. While one way to achieve this is through the assignment of semester-long projects, previous research suggests that real-world projects provide more meaningful…
Descriptors: Databases, Computer System Design, Information Systems, Active Learning
Ren, Zhanying; Liu, Shijie – Online Submission, 2005
According to the requirement of modern teaching theory and technology, based on software engineering, database theory, the technique of net information security and system integration, a net testing system on local network was designed and realized. The system benefits for dividing of testing & teaching and settles the problems of random…
Descriptors: Educational Technology, Databases, Information Technology, Computer Networks