Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 5 |
Descriptor
| Identification | 5 |
| Teaching Methods | 5 |
| Information Systems | 3 |
| Computer Software | 2 |
| Geographic Information Systems | 2 |
| Information Security | 2 |
| Instructional Materials | 2 |
| Active Learning | 1 |
| Animals | 1 |
| Assignments | 1 |
| Biodiversity | 1 |
| More ▼ | |
Source
| Computer Assisted Language… | 1 |
| IEEE Transactions on Education | 1 |
| Information Systems Education… | 1 |
| Journal of Geography | 1 |
| ProQuest LLC | 1 |
Author
| Asadi, Majid | 1 |
| Daugherty, Michael K. | 1 |
| DeMers, Michael N. | 1 |
| Di, Jia | 1 |
| Marquardson, Jim | 1 |
| McCully, Kristin M. | 1 |
| Shih, Ya-Chun | 1 |
| Thompson, Dale R. | 1 |
| Vincent, Jeffrey S. | 1 |
Publication Type
| Journal Articles | 4 |
| Reports - Descriptive | 3 |
| Dissertations/Theses -… | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 2 |
| Elementary Secondary Education | 1 |
Audience
Location
| Arkansas | 1 |
| Hawaii | 1 |
| Taiwan | 1 |
| United Kingdom (London) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Marquardson, Jim; Asadi, Majid – Information Systems Education Journal, 2023
This case asks information systems analysts to assess the cybersecurity posture of a manufacturing company. The exercise works well as a group activity in an information systems course that addresses cybersecurity controls. The case introduces guidance from the National Institute of Standards and Technology, and learners develop work products…
Descriptors: Teaching Methods, Information Systems, Information Science Education, Information Security
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
McCully, Kristin M. – ProQuest LLC, 2013
To protect and conserve the Earth's biodiversity and ecosystem services, it is important not only to understand and conserve species and ecosystems, but also to instill an understanding and appreciation for biodiversity and ecosystem services in the next generations of both scientists and citizens. Thus, this dissertation combines research into…
Descriptors: Biology, Mathematics Instruction, Science Instruction, Biodiversity
Shih, Ya-Chun – Computer Assisted Language Learning, 2015
Integrating Google Street View into a three-dimensional virtual environment in which users control personal avatars provides these said users with access to an innovative, interactive, and real-world context for communication and culture learning. We have selected London, a city famous for its rich historical, architectural, and artistic heritage,…
Descriptors: Geographic Information Systems, Case Studies, Qualitative Research, Language Proficiency
DeMers, Michael N.; Vincent, Jeffrey S. – Journal of Geography, 2007
The use of geographic information systems (GIS) in the classroom provides a robust and effective method of teaching the primary spatial skills of identification, description, and explanation of spatial pattern. A major handicap for the development of GIS-based learning experiences, especially for non-GIS specialist educators, is the availability…
Descriptors: Geographic Location, Information Systems, Teaching Methods, Identification

Peer reviewed
Direct link
