Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 9 |
Since 2006 (last 20 years) | 18 |
Descriptor
Source
Information Systems Education… | 18 |
Author
Lawrence, Cameron | 2 |
Liu, Michelle | 2 |
Murphy, Diane | 2 |
Anderson, Nicole | 1 |
Babin, Ron | 1 |
Bajracharya, Biju Raja | 1 |
Basal, Abdelraheem | 1 |
Baugh, Jeanne M. | 1 |
Bell, Natalia | 1 |
Chandrasekar, Karthika | 1 |
Ciampa, Mark | 1 |
More ▼ |
Publication Type
Journal Articles | 18 |
Reports - Descriptive | 8 |
Reports - Research | 6 |
Reports - Evaluative | 4 |
Tests/Questionnaires | 3 |
Guides - Classroom - Teacher | 1 |
Education Level
Higher Education | 13 |
Postsecondary Education | 12 |
Elementary Secondary Education | 1 |
Audience
Teachers | 3 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Bell, Natalia; Liu, Michelle; Murphy, Diane – Information Systems Education Journal, 2022
Information technology (IT) plays an increasingly significant role in today's world. The COVID-19 pandemic has increased that reliance. Employers in all industries are struggling with considerable shortages of skilled IT workers and are seeking innovative alternatives to meet these needs. Digital badging and micro-credentials have emerged as an…
Descriptors: Information Technology, Job Skills, Recognition (Achievement), Evaluation Methods
Mawel, Maurice; Sambasivam, Samuel – Information Systems Education Journal, 2023
The principal investigator (PI) conducted this research study to explore the strategic cybersecurity defense IT Managers should implement to reduce healthcare data breaches. The PI conducted a systematic literature review and selected articles that addressed healthcare data security breaches, information disclosure, cybersecurity in healthcare,…
Descriptors: Information Security, Information Technology, Confidential Records, Health Services
Podeschi, R. J.; DeBo, Justin – Information Systems Education Journal, 2022
Cloud computing has grown to become an integral part of information technology (IT) infrastructure. Organizations are increasingly utilizing cloud services to deliver a variety of applications and services in conjunction with their on-premise data center environments. As such, students pursuing careers in information systems and computing need to…
Descriptors: Internet, Information Technology, Information Management, Information Storage
Yue, Kwok-Bun; Chandrasekar, Karthika; Gullapalli, Hema – Information Systems Education Journal, 2019
Bitcoin is the first major decentralized cryptocurrency with wide acceptance. A core technological innovation of Bitcoin is blockchain, a secure and pseudonymous general ledger that stores every Bitcoin transaction. Blockchain has received enormous attention from both the commercial and academic worlds, and it is generally recognized as the…
Descriptors: Monetary Systems, Information Storage, Databases, Technological Advancement
Gondi, Vamsi; Hua, David; Bajracharya, Biju Raja – Information Systems Education Journal, 2021
In the age of COVID-19, traditional teaching techniques are under scrutiny. Most concepts and labs in the area of information technology are intended to be taught face-to-face in labs using clusters and networking infrastructure. Simulation software's such as uCertify, Pearson online, etc.., are good alternative, but are not always a viable…
Descriptors: Computer Science Education, Computer Software, Computer Simulation, Information Technology
Woods, David M. – Information Systems Education Journal, 2018
Cloud computing is a rapidly emerging topic, but should it be included in an introductory IT course? The magnitude of cloud computing use, especially cloud infrastructure, along with students' limited knowledge of the topic support adding cloud content to the IT curriculum. There are several arguments that support including cloud computing in an…
Descriptors: Introductory Courses, Internet, Computer Science Education, Computer Software
Babin, Ron; Halilovic, Branka – Information Systems Education Journal, 2017
The use of cloud computing services has grown dramatically in post-secondary institutions in the last decade. In particular, universities have been attracted to the low-cost and flexibility of acquiring cloud software services from Google, Microsoft and others, to implement e-mail, calendar and document management and other basic office software.…
Descriptors: Internet, Computer Software, Information Management, Educational Technology
Rossmiller, Zach; Lawrence, Cameron; Clouse, Shawn; Looney, Clayton – Information Systems Education Journal, 2017
Many entrepreneurs and small business owners lack disaster recovery plans, which minimize business disruptions caused by failures of critical technical systems. Typically, technology is not the main focus for a small business owner, as most of their time is spent focused on business operations. This case study demonstrates that when a business…
Descriptors: Emergency Programs, Crisis Management, Small Businesses, Planning
Liu, Michelle; Murphy, Diane – Information Systems Education Journal, 2014
Within the context of "big data", there is an increasing focus on the source of the large volumes of data now stored electronically. The greatest portion of this data is unstructured and comes from a variety of sources in a variety of formats, much of which does not conform to a consistent data model. As business and government…
Descriptors: Information Storage, Information Management, Information Systems, Records (Forms)
Serapiglia, Anthony – Information Systems Education Journal, 2014
The following Teaching Case is designed to expose students to three scenarios related to data stored on hard drives, techniques that could be used to retrieve deleted or corrupted data, and a method for a more thorough deletion of data from a hard drive. These issues are often overlooked in current IT curriculum and in our age of digital clutter…
Descriptors: Information Security, Information Storage, Computer Science Education, Class Activities
Korzaan, Melinda; Lawrence, Cameron – Information Systems Education Journal, 2016
This lab exercise exposes students to Evernote, which is a powerful productivity application that has gained significant purchase in professional work environments. In many academic settings the introductory computer applications course has a specific focus on standard productivity applications such as MS Word and MS Excel. While ensuring fluency…
Descriptors: Productivity, Computer Oriented Programs, Introductory Courses, Computer Science Education
Baugh, Jeanne M. – Information Systems Education Journal, 2015
All Computer Information Systems programs require a database course for their majors. This paper describes an approach to such a course in which real world examples, both design projects and actual database application projects are incorporated throughout the semester. Students are expected to apply the traditional database concepts to actual…
Descriptors: Undergraduate Students, Computer Science Education, Information Systems, Databases
Slack, James M. – Information Systems Education Journal, 2011
We want our students to experience system testing of both desktop and web applications, but the cost of professional system-testing tools is far too high. We evaluate several free tools and find that AutoIt makes an ideal educational system-testing tool. We show several examples of desktop and web testing with AutoIt, starting with simple…
Descriptors: Computer Software Evaluation, Computer Oriented Programs, Evaluation Methods, Information Storage
McMaster, Kirby; Sambasivam, Samuel E.; Anderson, Nicole – Information Systems Education Journal, 2010
In demand paging virtual memory systems, the page fault rate of a process varies with the number of memory frames allocated to the process. When an increase in the number of allocated frames leads to an increase in the number of page faults, Belady's anomaly is said to occur. In this paper, we present a probability model for Belady's anomaly. We…
Descriptors: Probability, Models, Computer Science Education, Information Systems
Ciampa, Mark – Information Systems Education Journal, 2011
Passwords have the distinction of being the most widely-used form of authentication--and the most vulnerable. With the dramatic increase today in the number of accounts that require passwords, overwhelmed users usually resort to creating weak passwords or reusing the same password for multiple accounts, thus making passwords the weakest link in…
Descriptors: Information Security, Information Storage, Information Retrieval, Memorization
Previous Page | Next Page ยป
Pages: 1 | 2