NotesFAQContact Us
Collection
Advanced
Search Tips
50 Years of ERIC
50 Years of ERIC
The Education Resources Information Center (ERIC) is celebrating its 50th Birthday! First opened on May 15th, 1964 ERIC continues the long tradition of ongoing innovation and enhancement.

Learn more about the history of ERIC here. PDF icon

Showing 1 to 15 of 118 results
Peer reviewed Peer reviewed
Direct linkDirect link
Thompson, Nik; Toohey, Danny – Journal of Information Systems Education, 2014
This teaching case discusses the analysis of an electronic voting system. The development of the case was motivated by research into information security and management, but as it includes procedural aspects, organizational structure and personnel, it is a suitable basis for all aspects of systems analysis, planning and design tasks. The material…
Descriptors: Voting, Systems Analysis, Undergraduate Study, Case Method (Teaching Technique)
Peer reviewed Peer reviewed
Direct linkDirect link
Mok, Heng Ngee – Journal of Information Systems Education, 2014
The flipped classroom has been gaining popularity in recent years. In theory, flipping the classroom appears sound: passive learning activities such as unidirectional lectures are pushed to outside class hours in the form of videos, and precious class time is spent on active learning activities. Yet the courses for information systems (IS)…
Descriptors: Teaching Methods, Video Technology, Active Learning, Homework
Peer reviewed Peer reviewed
Direct linkDirect link
Buche, Mari W. – Journal of Information Systems Education, 2013
Collaboration is an important aspect of information systems (IS) education since work is typically performed in teams. However, IS students often do not fully appreciate the value of group work in their business courses. This teaching tip describes an activity that will objectively demonstrate the value of collaboration and diversity of…
Descriptors: Educational Games, Cooperative Learning, Teamwork, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Singh, Anil – Journal of Information Systems Education, 2013
Assurance of individual effort from students in computer-based assignments is a challenge. Due to digitization, students can easily use a copy of their friend's work and submit it as their own. Plagiarism in assignments puts students who cheat at par with those who work honestly and this compromises the learning evaluation process. Using a…
Descriptors: Plagiarism, Ethics, Technology Uses in Education, Assignments
Peer reviewed Peer reviewed
Direct linkDirect link
Willey, Lorrie; White, Barbara Jo – Journal of Information Systems Education, 2013
Security is a significant concern in business and in information systems (IS) education from both a technological and a strategic standpoint. Students can benefit from the study of information systems security when security concepts are introduced in the context of real-world industry standards. The development of a data security standard for…
Descriptors: Credit (Finance), Information Security, Retailing, Compliance (Legal)
Peer reviewed Peer reviewed
Direct linkDirect link
Simkin, Mark G. – Journal of Information Systems Education, 2013
Playing TV game shows such as "Jeopardy" or "Survivor" in the classroom can be fun. But does it improve student understanding of course concepts? To find out, the author conducted eight experimental trials in five separate undergraduate information systems classes. Although he found limited improvement in student learning, the…
Descriptors: Teaching Methods, Educational Games, Concept Formation, Instructional Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Rodon, Joan – Journal of Information Systems Education, 2013
Fitness and Wellness Place (F&W) is a network of fitness and wellness clubs in Spain and Portugal created in 2009 as a result of a buy-out from a large British operator. In 2009, F&W was operating 15 clubs in Spain and Portugal and by the end of 2011, F&W ran 25 clubs. F&W's rapid growth in the period 2009-11 had become a…
Descriptors: Information Systems, Business Administration Education, Case Method (Teaching Technique), Learning Activities
Peer reviewed Peer reviewed
Direct linkDirect link
White, Garry L.; Hewitt, Barbara; Kruck, S. E. – Journal of Information Systems Education, 2013
Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…
Descriptors: Information Security, Information Systems, College Students, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Patten, Karen P.; Harris, Mark A. – Journal of Information Systems Education, 2013
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
Descriptors: Telecommunications, Handheld Devices, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Woodward, Belle; Imboden, Thomas; Martin, Nancy L. – Journal of Information Systems Education, 2013
This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…
Descriptors: Information Security, Computer Security, Higher Education, Program Development
Peer reviewed Peer reviewed
Direct linkDirect link
Sauls, Jeff; Gudigantala, Naveen – Journal of Information Systems Education, 2013
Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…
Descriptors: Computer Security, College Graduates, Labor Force, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Fulton, Eric; Lawrence, Cameron; Clouse, Shawn – Journal of Information Systems Education, 2013
The aim of this paper is to illuminate the exciting world in which "white hat crackers" operate and to suggest topics that can help prepare students to enter this high-demand field. While currently there is extraordinary demand for graduates to fill these positions that have relatively high starting salaries, employers find it difficult…
Descriptors: Information Security, Computer Security, Information Technology, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Saltz, Jeff; Serva, Mark A.; Heckman, Robert – Journal of Information Systems Education, 2013
This article describes a new and innovative open co-op program for MIS/IS students. The program, Global Enterprise Technology Immersion Experience (GET IE), has a global enterprise focus that is integrated with hands-on experiential work-based learning to provide a context in which students are stimulated to utilize their classroom knowledge. The…
Descriptors: Computer Science Education, Cooperative Programs, School Business Relationship, Intercollegiate Cooperation
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8