NotesFAQContact Us
Collection
Advanced
Search Tips
50 Years of ERIC
50 Years of ERIC
The Education Resources Information Center (ERIC) is celebrating its 50th Birthday! First opened on May 15th, 1964 ERIC continues the long tradition of ongoing innovation and enhancement.

Learn more about the history of ERIC here. PDF icon

Showing 16 to 30 of 264 results
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Liqiang – Journal of Information Systems Education, 2013
IT (Information Technology) entrepreneurs have been contributing greatly to economic growth and job creation. Despite its importance, IT entrepreneurship remains understudied in business research. Particularly, the study of IT entrepreneurial behavior has been ignored in both Information Systems (IS) and entrepreneurship disciplines. Utilizing the…
Descriptors: Information Technology, Entrepreneurship, Social Cognition, Career Choice
Peer reviewed Peer reviewed
Direct linkDirect link
Rodon, Joan – Journal of Information Systems Education, 2013
Fitness and Wellness Place (F&W) is a network of fitness and wellness clubs in Spain and Portugal created in 2009 as a result of a buy-out from a large British operator. In 2009, F&W was operating 15 clubs in Spain and Portugal and by the end of 2011, F&W ran 25 clubs. F&W's rapid growth in the period 2009-11 had become a…
Descriptors: Information Systems, Business Administration Education, Case Method (Teaching Technique), Learning Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Hepner, Michelle; Dickson, Warren – Journal of Information Systems Education, 2013
In the current economic conditions, many institutions face dwindling budgets and an increased focus on proving the value of the education provided. The effort and costs required to integrate Enterprise Resource Planning systems into course curricula are a significant investment of resources for any university. This paper examines the expense of…
Descriptors: Integrated Curriculum, Investment, Program Effectiveness, Cost Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Braender, Lynn M.; Naples, Michele I. – Journal of Information Systems Education, 2013
Practitioners find it difficult to allocate grades to individual students based on their contributions to the team project. They often use classroom observation of teamwork and student peer evaluations to differentiate an individual's grade from the group's grade, which can be subjective and imprecise. We used objective data from student…
Descriptors: Undergraduate Students, Group Activities, Teamwork, Integrated Learning Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Yue, Kwok-Bun – Journal of Information Systems Education, 2013
A common problem for university relational database courses is to construct effective databases for instructions and assignments. Highly simplified "toy" databases are easily available for teaching, learning, and practicing. However, they do not reflect the complexity and practical considerations that students encounter in real-world…
Descriptors: Databases, Computer Science Education, Courses, College Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Ractham, Peter; Chen, Charlie – Journal of Information Systems Education, 2013
Social technology is proliferating and influencing different aspects of society. However, very few studies have examined the use of such a technology for a case-based learning pedagogy. This preliminary study investigates the use of social technology as a case-based learning tool to improve the effectiveness of case-based learning in the…
Descriptors: Case Method (Teaching Technique), Educational Technology, Social Networks, College Students
Peer reviewed Peer reviewed
Direct linkDirect link
Dekhane, Sonal; Xu, Xin; Tsoi, Mai Yin – Journal of Information Systems Education, 2013
This paper describes a project designed to promote problem solving and critical thinking skills in a general education, computing course at an open access institution. A visual programming tool, GameSalad, was used to enable students to create educational apps for mobile platforms. The students worked on a game development project for the entire…
Descriptors: Computer Oriented Programs, Telecommunications, Handheld Devices, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Zhang, Sonya – Journal of Information Systems Education, 2013
The use of classroom blogs in higher education serves to engage and motivate students as well as to help them build a professional online profile and connect with fellow classmates. Although many studies have focused on the implementation and benefits of blogging in education, few have investigated best practices in design, which can have a…
Descriptors: Electronic Publishing, Web Sites, Student Journals, Success
Peer reviewed Peer reviewed
Direct linkDirect link
White, Garry L.; Hewitt, Barbara; Kruck, S. E. – Journal of Information Systems Education, 2013
Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…
Descriptors: Information Security, Information Systems, College Students, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Patten, Karen P.; Harris, Mark A. – Journal of Information Systems Education, 2013
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
Descriptors: Telecommunications, Handheld Devices, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Ilvonen, Ilona – Journal of Information Systems Education, 2013
Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…
Descriptors: Information Security, Teaching Methods, Course Evaluation, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Woodward, Belle; Imboden, Thomas; Martin, Nancy L. – Journal of Information Systems Education, 2013
This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…
Descriptors: Information Security, Computer Security, Higher Education, Program Development
Peer reviewed Peer reviewed
Direct linkDirect link
Sauls, Jeff; Gudigantala, Naveen – Journal of Information Systems Education, 2013
Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…
Descriptors: Computer Security, College Graduates, Labor Force, Computer Science Education
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  18