Publication Date
| In 2015 | 0 |
| Since 2014 | 8 |
| Since 2011 (last 5 years) | 91 |
| Since 2006 (last 10 years) | 264 |
| Since 1996 (last 20 years) | 264 |
Descriptor
Source
| Journal of Information… | 264 |
Author
| Davis, Charles K. | 6 |
| Kruck, S. E. | 4 |
| Simkin, Mark G. | 4 |
| Buche, Mari W. | 3 |
| Dadashzadeh, Mohammad | 3 |
| Dykman, Charlene A. | 3 |
| Harris, Albert L. | 3 |
| Lending, Diane | 3 |
| Liu, Chang | 3 |
| Mitri, Michel | 3 |
| More ▼ | |
Publication Type
| Journal Articles | 264 |
| Reports - Descriptive | 118 |
| Reports - Research | 100 |
| Reports - Evaluative | 46 |
| Information Analyses | 5 |
| Tests/Questionnaires | 5 |
Education Level
| Higher Education | 228 |
| Postsecondary Education | 144 |
| Adult Education | 5 |
| Two Year Colleges | 2 |
| High Schools | 1 |
Audience
| Teachers | 37 |
| Students | 2 |
| Administrators | 1 |
Showing 16 to 30 of 264 results
Chen, Liqiang – Journal of Information Systems Education, 2013
IT (Information Technology) entrepreneurs have been contributing greatly to economic growth and job creation. Despite its importance, IT entrepreneurship remains understudied in business research. Particularly, the study of IT entrepreneurial behavior has been ignored in both Information Systems (IS) and entrepreneurship disciplines. Utilizing the…
Descriptors: Information Technology, Entrepreneurship, Social Cognition, Career Choice
Rodon, Joan – Journal of Information Systems Education, 2013
Fitness and Wellness Place (F&W) is a network of fitness and wellness clubs in Spain and Portugal created in 2009 as a result of a buy-out from a large British operator. In 2009, F&W was operating 15 clubs in Spain and Portugal and by the end of 2011, F&W ran 25 clubs. F&W's rapid growth in the period 2009-11 had become a…
Descriptors: Information Systems, Business Administration Education, Case Method (Teaching Technique), Learning Activities
Hepner, Michelle; Dickson, Warren – Journal of Information Systems Education, 2013
In the current economic conditions, many institutions face dwindling budgets and an increased focus on proving the value of the education provided. The effort and costs required to integrate Enterprise Resource Planning systems into course curricula are a significant investment of resources for any university. This paper examines the expense of…
Descriptors: Integrated Curriculum, Investment, Program Effectiveness, Cost Effectiveness
Braender, Lynn M.; Naples, Michele I. – Journal of Information Systems Education, 2013
Practitioners find it difficult to allocate grades to individual students based on their contributions to the team project. They often use classroom observation of teamwork and student peer evaluations to differentiate an individual's grade from the group's grade, which can be subjective and imprecise. We used objective data from student…
Descriptors: Undergraduate Students, Group Activities, Teamwork, Integrated Learning Systems
Yue, Kwok-Bun – Journal of Information Systems Education, 2013
A common problem for university relational database courses is to construct effective databases for instructions and assignments. Highly simplified "toy" databases are easily available for teaching, learning, and practicing. However, they do not reflect the complexity and practical considerations that students encounter in real-world…
Descriptors: Databases, Computer Science Education, Courses, College Instruction
Ractham, Peter; Chen, Charlie – Journal of Information Systems Education, 2013
Social technology is proliferating and influencing different aspects of society. However, very few studies have examined the use of such a technology for a case-based learning pedagogy. This preliminary study investigates the use of social technology as a case-based learning tool to improve the effectiveness of case-based learning in the…
Descriptors: Case Method (Teaching Technique), Educational Technology, Social Networks, College Students
Dekhane, Sonal; Xu, Xin; Tsoi, Mai Yin – Journal of Information Systems Education, 2013
This paper describes a project designed to promote problem solving and critical thinking skills in a general education, computing course at an open access institution. A visual programming tool, GameSalad, was used to enable students to create educational apps for mobile platforms. The students worked on a game development project for the entire…
Descriptors: Computer Oriented Programs, Telecommunications, Handheld Devices, Technology Uses in Education
Zhang, Sonya – Journal of Information Systems Education, 2013
The use of classroom blogs in higher education serves to engage and motivate students as well as to help them build a professional online profile and connect with fellow classmates. Although many studies have focused on the implementation and benefits of blogging in education, few have investigated best practices in design, which can have a…
Descriptors: Electronic Publishing, Web Sites, Student Journals, Success
White, Garry L.; Hewitt, Barbara; Kruck, S. E. – Journal of Information Systems Education, 2013
Over the years, the news media has reported numerous information security incidents. Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. This paper discusses the…
Descriptors: Information Security, Information Systems, College Students, Computer Security
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Patten, Karen P.; Harris, Mark A. – Journal of Information Systems Education, 2013
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the Internet. However, security of these mobile devices is a major concern for organizations. The two leading…
Descriptors: Telecommunications, Handheld Devices, Information Security, Computer Security
Ilvonen, Ilona – Journal of Information Systems Education, 2013
Information security management is an area with a lot of theoretical models. The models are designed to guide practitioners in prioritizing management resources in companies. Information security management education should address the gap between the academic ideals and practice. This paper introduces a teaching method that has been in use as…
Descriptors: Information Security, Teaching Methods, Course Evaluation, Student Attitudes
Woodward, Belle; Imboden, Thomas; Martin, Nancy L. – Journal of Information Systems Education, 2013
This paper describes the implementation of an information security program at a large Midwestern university. The initial work is briefly summarized and improvements that have occurred over time are described. Current activities and future plans are discussed. This paper offers insight and lessons learned for organizations that have or are…
Descriptors: Information Security, Computer Security, Higher Education, Program Development
Sauls, Jeff; Gudigantala, Naveen – Journal of Information Systems Education, 2013
Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…
Descriptors: Computer Security, College Graduates, Labor Force, Computer Science Education

Peer reviewed
Direct link
