Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 4 |
Lesson Plans | 4 |
Teaching Methods | 4 |
Case Studies | 2 |
Course Content | 2 |
Crime | 2 |
Educational Technology | 2 |
Higher Education | 2 |
Learning Activities | 2 |
Student Attitudes | 2 |
Vignettes | 2 |
More ▼ |
Author
Baker, Elizabeth | 1 |
Davis, Martin H., Jr. | 1 |
Duffy, Kevin P. | 1 |
Isaías, Pedro, Ed. | 1 |
Reinicke, Bryan | 1 |
Sethi, Vikram | 1 |
Sánchez, Inmaculada… | 1 |
Toothman, Callie | 1 |
Publication Type
Journal Articles | 2 |
Reports - Evaluative | 2 |
Collected Works - Proceedings | 1 |
Guides - Classroom - Learner | 1 |
Guides - Classroom - Teacher | 1 |
Audience
Practitioners | 1 |
Students | 1 |
Teachers | 1 |
Location
Brazil | 1 |
Bulgaria | 1 |
Ghana | 1 |
Malaysia | 1 |
South Africa | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Duffy, Kevin P.; Davis, Martin H., Jr.; Sethi, Vikram – Journal of Information Systems Education, 2010
We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer…
Descriptors: Student Attitudes, Relevance (Education), Lesson Plans, Learner Engagement
Sánchez, Inmaculada Arnedillo, Ed.; Isaías, Pedro, Ed. – International Association for Development of the Information Society, 2014
These proceedings contain the papers of the 10th International Conference on Mobile Learning 2014, which was organised by the International Association for Development of the Information Society, in Madrid, Spain, February 28-March 2, 2014. The Mobile Learning 2014 International Conference seeks to provide a forum for the presentation and…
Descriptors: Conference Papers, Telecommunications, Handheld Devices, Technology Uses in Education
Internal Revenue Service (Dept. of Treasury), Washington, DC. – 1994
This packet contains a textbook, an instructor's guide, and a student workbook for a course on conducting financial investigations to detect and solve crimes. The topics covered in the 11 chapters of the textbook and the ancillaries are the following: (1) why financial investigation?; (2) laws related to financial crimes; (3) evidence; (4) sources…
Descriptors: Banking, Classroom Techniques, Computer Security, Course Content