NotesFAQContact Us
Collection
Advanced
Search Tips
Source
Journal of Information…31
Education Level
Higher Education31
Postsecondary Education23
Two Year Colleges1
Audience
Laws, Policies, & Programs
Assessments and Surveys
Learning Style Inventory1
What Works Clearinghouse Rating
Showing 1 to 15 of 31 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Croes, Jo-Anne V.; Visser, Melina M. – Journal of Information Systems Education, 2015
The Google Online Marketing Challenge (GOMC) is a global, online student competition sponsored by Google. It is a prime example of an experiential learning activity that includes using real money ($250 sponsored by Google) with a real client. The GOMC has yielded compelling results in student engagement and learning objectives related to the…
Descriptors: Internet, Search Engines, Experiential Learning, Marketing
Peer reviewed Peer reviewed
Direct linkDirect link
Rivituso, Jack – Journal of Information Systems Education, 2014
This interpretive phenomenological analysis explored the lived experiences and the psychological impact of victimization from cyberbullying among college students. Two theories, Bandura's Theory of Triadic Reciprocal Determinism and the General Strain Theory, guided the primary research questions used for this exploration. Each of these…
Descriptors: Internet, Bullying, Victims, Phenomenology
Peer reviewed Peer reviewed
Direct linkDirect link
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Mitri, Michel – Journal of Information Systems Education, 2012
XML has become the most ubiquitous format for exchange of data between applications running on the Internet. Most Web Services provide their information to clients in the form of XML. The ability to process complex XML documents in order to extract relevant information is becoming as important a skill for IS students to master as querying…
Descriptors: Computer Science Education, Databases, Internet, College Curriculum
Peer reviewed Peer reviewed
Direct linkDirect link
Aasheim, Cheryl L.; Rutner, Paige S.; Li, Lixin; Williams, Susan R. – Journal of Information Systems Education, 2012
This paper examines student attitudes towards a number of behaviors which range from acceptable means of seeking help on assignments to unacceptable behaviors such as copying from another student or paying someone to complete an assignment. Attitudes regarding such behaviors are compared based on the type of assignment (programming assignment,…
Descriptors: Internet, Feedback (Response), Information Systems, Student Surveys
Peer reviewed Peer reviewed
Direct linkDirect link
Chilton, Michael A. – Journal of Information Systems Education, 2012
The experiential learning process is a method by which students learn from direct exposure to relevant applications within the discipline being taught. One way in which MIS students can benefit from experiential learning occurs when organizations in some way sponsor curricular outcomes. Sponsorship can range from classroom visits during which…
Descriptors: Technological Advancement, Educational Technology, Virtual Classrooms, Experiential Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Ling; Liu, Yang; Gallagher, Marcus; Pailthorpe, Bernard; Sadiq, Shazia; Shen, Heng Tao; Li, Xue – Journal of Information Systems Education, 2012
The demand for graduates with exposure in Cloud Computing is on the rise. For many educational institutions, the challenge is to decide on how to incorporate appropriate cloud-based technologies into their curricula. In this paper, we describe our design and experiences of integrating Cloud Computing components into seven third/fourth-year…
Descriptors: Computers, Schools, Foreign Countries, Computer Science
Peer reviewed Peer reviewed
Direct linkDirect link
Hosack, Bryan; Lim, Billy; Vogt, W. Paul – Journal of Information Systems Education, 2012
An introduction to programming course can be a challenge for both students and instructors. This paper describes a study that introduced Web services (WS) and Service-Oriented Architecture in Information Systems 1 (IS 1) and Computer Science 1 (CS 1) programming courses over a two-year period. WS were used as an instruction tool based on their…
Descriptors: Computer Science Education, Programming, Introductory Courses, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary – Journal of Information Systems Education, 2012
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
Descriptors: Internet, Privacy, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Shouhong; Wang, Hai – Journal of Information Systems Education, 2011
Given the emergence of service-oriented architecture, IS students need to be knowledgeable of multiple server-side computer programming languages to be able to meet the needs of the job market. This paper outlines the pedagogy of an innovative course of multiple server-side computer languages for the undergraduate IS majors. The paper discusses…
Descriptors: Labor Market, Teaching Methods, Undergraduate Study, Course Descriptions
Peer reviewed Peer reviewed
Direct linkDirect link
Riemenschneider, Cynthia K.; Leonard, Lori N. K.; Manly, Tracy S. – Journal of Information Systems Education, 2011
Business educators have increased the focus on ethics in the classroom. In order for students to become ethical professionals, they must first be held to an ethical standard as students. As information technology continues to permeate every aspect of students' lives, it becomes increasingly important to understand student decision-making in this…
Descriptors: Universities, Intention, Information Technology, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Mufeti, Tulimevava Kaunapawa; Mbale, Jameson; Suresh, Nalina – Journal of Information Systems Education, 2011
In an effort to encourage the uptake of technology among its academic community, the University of Namibia (UNAM) introduced the Electronic Notes System (ENS) in the year 2010. The ENS was envisaged as a web-based method of distributing lecture notes to students, where the faculty members would upload the teaching materials and the students would…
Descriptors: Interviews, Electronic Equipment, Computer Science, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Dadashzadeh, Mohammad – Journal of Information Systems Education, 2010
Service Oriented Architecture (SOA) shows demonstrable signs of simplifying software integration. It provides the necessary framework for building applications that can be integrated and can reduce the cost of integration significantly. Organizations are beginning to architect new integration solutions following the SOA approach. As such,…
Descriptors: Information Systems, Internet, Client Server Architecture, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Levy, Meira; Hadar, Irit – Journal of Information Systems Education, 2010
The new concepts and technologies of Web 2.0 attract researches in a variety of fields including education, business and knowledge management. However, while the Web 2.0 potential in the education discipline has been widely studied, in the management discipline the Web 2.0 business value has not been fully acknowledged. This research suggests an…
Descriptors: Knowledge Management, Business Administration Education, Internet, Electronic Publishing
Previous Page | Next Page ยป
Pages: 1  |  2  |  3