Publication Date
| In 2015 | 0 |
| Since 2014 | 2 |
| Since 2011 (last 5 years) | 39 |
| Since 2006 (last 10 years) | 118 |
| Since 1996 (last 20 years) | 118 |
Descriptor
Source
| Journal of Information… | 118 |
Author
| Davis, Charles K. | 5 |
| Harris, Albert L. | 3 |
| Kruck, S. E. | 3 |
| Lending, Diane | 3 |
| Liu, Chang | 3 |
| Mitri, Michel | 3 |
| Simkin, Mark G. | 3 |
| Dadashzadeh, Mohammad | 2 |
| Dunphy, Steven M. | 2 |
| Dykman, Charlene A. | 2 |
| More ▼ | |
Publication Type
| Journal Articles | 118 |
| Reports - Descriptive | 118 |
Education Level
| Higher Education | 96 |
| Postsecondary Education | 59 |
| Adult Education | 2 |
| Two Year Colleges | 1 |
Showing 1 to 15 of 118 results
Thompson, Nik; Toohey, Danny – Journal of Information Systems Education, 2014
This teaching case discusses the analysis of an electronic voting system. The development of the case was motivated by research into information security and management, but as it includes procedural aspects, organizational structure and personnel, it is a suitable basis for all aspects of systems analysis, planning and design tasks. The material…
Descriptors: Voting, Systems Analysis, Undergraduate Study, Case Method (Teaching Technique)
Mok, Heng Ngee – Journal of Information Systems Education, 2014
The flipped classroom has been gaining popularity in recent years. In theory, flipping the classroom appears sound: passive learning activities such as unidirectional lectures are pushed to outside class hours in the form of videos, and precious class time is spent on active learning activities. Yet the courses for information systems (IS)…
Descriptors: Teaching Methods, Video Technology, Active Learning, Homework
Buche, Mari W. – Journal of Information Systems Education, 2013
Collaboration is an important aspect of information systems (IS) education since work is typically performed in teams. However, IS students often do not fully appreciate the value of group work in their business courses. This teaching tip describes an activity that will objectively demonstrate the value of collaboration and diversity of…
Descriptors: Educational Games, Cooperative Learning, Teamwork, Undergraduate Students
Singh, Anil – Journal of Information Systems Education, 2013
Assurance of individual effort from students in computer-based assignments is a challenge. Due to digitization, students can easily use a copy of their friend's work and submit it as their own. Plagiarism in assignments puts students who cheat at par with those who work honestly and this compromises the learning evaluation process. Using a…
Descriptors: Plagiarism, Ethics, Technology Uses in Education, Assignments
Willey, Lorrie; White, Barbara Jo – Journal of Information Systems Education, 2013
Security is a significant concern in business and in information systems (IS) education from both a technological and a strategic standpoint. Students can benefit from the study of information systems security when security concepts are introduced in the context of real-world industry standards. The development of a data security standard for…
Descriptors: Credit (Finance), Information Security, Retailing, Compliance (Legal)
Simkin, Mark G. – Journal of Information Systems Education, 2013
Playing TV game shows such as "Jeopardy" or "Survivor" in the classroom can be fun. But does it improve student understanding of course concepts? To find out, the author conducted eight experimental trials in five separate undergraduate information systems classes. Although he found limited improvement in student learning, the…
Descriptors: Teaching Methods, Educational Games, Concept Formation, Instructional Effectiveness
Rodon, Joan – Journal of Information Systems Education, 2013
Fitness and Wellness Place (F&W) is a network of fitness and wellness clubs in Spain and Portugal created in 2009 as a result of a buy-out from a large British operator. In 2009, F&W was operating 15 clubs in Spain and Portugal and by the end of 2011, F&W ran 25 clubs. F&W's rapid growth in the period 2009-11 had become a…
Descriptors: Information Systems, Business Administration Education, Case Method (Teaching Technique), Learning Activities
White, Garry L.; Hewitt, Barbara; Kruck, S. E. – Journal of Information Systems Education, 2013
Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…
Descriptors: Information Security, Information Systems, College Students, Computer Security
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Patten, Karen P.; Harris, Mark A. – Journal of Information Systems Education, 2013
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
Descriptors: Telecommunications, Handheld Devices, Information Security, Computer Security
Woodward, Belle; Imboden, Thomas; Martin, Nancy L. – Journal of Information Systems Education, 2013
This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…
Descriptors: Information Security, Computer Security, Higher Education, Program Development
Sauls, Jeff; Gudigantala, Naveen – Journal of Information Systems Education, 2013
Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…
Descriptors: Computer Security, College Graduates, Labor Force, Computer Science Education
Fulton, Eric; Lawrence, Cameron; Clouse, Shawn – Journal of Information Systems Education, 2013
The aim of this paper is to illuminate the exciting world in which "white hat crackers" operate and to suggest topics that can help prepare students to enter this high-demand field. While currently there is extraordinary demand for graduates to fill these positions that have relatively high starting salaries, employers find it difficult…
Descriptors: Information Security, Computer Security, Information Technology, Computer Literacy
The GET Immersion Experience: A New Model for Leveraging the Synergies between Industry and Academia
Saltz, Jeff; Serva, Mark A.; Heckman, Robert – Journal of Information Systems Education, 2013
This article describes a new and innovative open co-op program for MIS/IS students. The program, Global Enterprise Technology Immersion Experience (GET IE), has a global enterprise focus that is integrated with hands-on experiential work-based learning to provide a context in which students are stimulated to utilize their classroom knowledge. The…
Descriptors: Computer Science Education, Cooperative Programs, School Business Relationship, Intercollegiate Cooperation

Peer reviewed
Direct link
