NotesFAQContact Us
Collection
Advanced
Search Tips
50 Years of ERIC
50 Years of ERIC
The Education Resources Information Center (ERIC) is celebrating its 50th Birthday! First opened on May 15th, 1964 ERIC continues the long tradition of ongoing innovation and enhancement.

Learn more about the history of ERIC here. PDF icon

Showing 1 to 15 of 91 results
Peer reviewed Peer reviewed
Direct linkDirect link
He, Wu; Yen, Cherng-Jyh – Journal of Information Systems Education, 2014
More and more information technology (IT) programs are offering distance learning courses to their students. However, to date, there are a very limited number of published articles in the IT education literature that compare how different methods of delivering distance course relate to undergraduate students' learning outcomes in IT software…
Descriptors: Programming, Computer Software, Computer Science Education, Participant Satisfaction
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Liqiang – Journal of Information Systems Education, 2013
IT (Information Technology) entrepreneurs have been contributing greatly to economic growth and job creation. Despite its importance, IT entrepreneurship remains understudied in business research. Particularly, the study of IT entrepreneurial behavior has been ignored in both Information Systems (IS) and entrepreneurship disciplines. Utilizing the…
Descriptors: Information Technology, Entrepreneurship, Social Cognition, Career Choice
Peer reviewed Peer reviewed
Direct linkDirect link
Dekhane, Sonal; Xu, Xin; Tsoi, Mai Yin – Journal of Information Systems Education, 2013
This paper describes a project designed to promote problem solving and critical thinking skills in a general education, computing course at an open access institution. A visual programming tool, GameSalad, was used to enable students to create educational apps for mobile platforms. The students worked on a game development project for the entire…
Descriptors: Computer Oriented Programs, Telecommunications, Handheld Devices, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
White, Garry L.; Hewitt, Barbara; Kruck, S. E. – Journal of Information Systems Education, 2013
Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…
Descriptors: Information Security, Information Systems, College Students, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Patten, Karen P.; Harris, Mark A. – Journal of Information Systems Education, 2013
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
Descriptors: Telecommunications, Handheld Devices, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Ilvonen, Ilona – Journal of Information Systems Education, 2013
Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…
Descriptors: Information Security, Teaching Methods, Course Evaluation, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Fulton, Eric; Lawrence, Cameron; Clouse, Shawn – Journal of Information Systems Education, 2013
The aim of this paper is to illuminate the exciting world in which "white hat crackers" operate and to suggest topics that can help prepare students to enter this high-demand field. While currently there is extraordinary demand for graduates to fill these positions that have relatively high starting salaries, employers find it difficult…
Descriptors: Information Security, Computer Security, Information Technology, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Larson, Eric C. – Journal of Information Systems Education, 2013
Managing a portfolio of IT projects is an important capability for firms and their managers. The classroom simulation described here provides students in an MBA information systems management/strategy course with the opportunity to deepen their understanding of the key concepts that should be considered in managing an IT portfolio and helps…
Descriptors: Information Technology, Information Management, Portfolios (Background Materials), Computer Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Akbulut-Bailey, Asli – Journal of Information Systems Education, 2012
Over the last decade, enrollment in Information Systems (IS) and related programs has dropped worldwide and still remains low despite positive job market predictions. Given the significant negative consequences of low enrollments on both academia and industry, the IS community has focused its efforts on mechanisms to increase enrollments. This…
Descriptors: Self Efficacy, Student Attitudes, Information Systems, Labor Market
Peer reviewed Peer reviewed
Direct linkDirect link
Pollard, Carol E. – Journal of Information Systems Education, 2012
This work proposes that a subtle combination of three learning methods offering "just in time" project management knowledge, coupled with hands-on project management experience can be particularly effective in producing project management students with employable skills. Students were required to apply formal project management knowledge to gain…
Descriptors: Educational Environment, Experiential Learning, Student Experience, Management Development
Peer reviewed Peer reviewed
Direct linkDirect link
Maloni, Michael; Dembla, Pamila; Swaim, J. Anthony – Journal of Information Systems Education, 2012
Information systems (IS) practitioners must regularly work cross-functionally with business users when implementing enterprise systems. However, most IS higher education is not truly cross-functional in nature with students typically relying on instructors or even themselves to represent user requirements. To address this gap, we describe an…
Descriptors: Feedback (Response), Information Systems, Student Surveys, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Ling; Liu, Yang; Gallagher, Marcus; Pailthorpe, Bernard; Sadiq, Shazia; Shen, Heng Tao; Li, Xue – Journal of Information Systems Education, 2012
The demand for graduates with exposure in Cloud Computing is on the rise. For many educational institutions, the challenge is to decide on how to incorporate appropriate cloud-based technologies into their curricula. In this paper, we describe our design and experiences of integrating Cloud Computing components into seven third/fourth-year…
Descriptors: Computers, Schools, Foreign Countries, Computer Science
Peer reviewed Peer reviewed
Direct linkDirect link
Westfall, Ralph D. – Journal of Information Systems Education, 2012
Defining information systems has been a longstanding problem for the field. This paper suggests that, since it may not be possible to develop a universal definition, consideration should be given to a plurality of definitions aligned toward specific purposes. As an implementation of this approach it recommends the following shorter definition for…
Descriptors: Information Systems, Computer Science Education, Definitions, Employment
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7