Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 5 |
Descriptor
Author
| Marquardson, Jim | 2 |
| Alper Yayla | 1 |
| Asadi, Majid | 1 |
| Daniel L. Segal | 1 |
| David Kocsis | 1 |
| Ersin Dincelli | 1 |
| Evmorfia-Iro Bartzia | 1 |
| Marco Sbaraglia | 1 |
| Michael Lodi | 1 |
| Morgan Shepherd | 1 |
| Simon Modeste | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 5 |
| Reports - Research | 4 |
| Tests/Questionnaires | 2 |
| Reports - Descriptive | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
| Early Childhood Education | 1 |
| Elementary Education | 1 |
| Elementary Secondary Education | 1 |
| Kindergarten | 1 |
| Primary Education | 1 |
Audience
Location
| Colorado (Colorado Springs) | 1 |
| Europe | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Marquardson, Jim; Asadi, Majid – Information Systems Education Journal, 2023
This case asks information systems analysts to assess the cybersecurity posture of a manufacturing company. The exercise works well as a group activity in an information systems course that addresses cybersecurity controls. The case introduces guidance from the National Institute of Standards and Technology, and learners develop work products…
Descriptors: Teaching Methods, Information Systems, Information Science Education, Information Security
Evmorfia-Iro Bartzia; Michael Lodi; Marco Sbaraglia; Simon Modeste; Viviane Durand-Guerrier; Simone Martini – Informatics in Education, 2024
In this paper, we present an activity to introduce the idea of public-key cryptography and to make pre-service STEM teachers explore fundamental informatics and mathematical concepts and methods. We follow the Theory of Didactical Situations within the Didactical Engineering methodology (both widely used in mathematics education research) to…
Descriptors: Information Science Education, Mathematics Education, Problem Solving, Teaching Methods
Marquardson, Jim – Journal of Information Systems Education, 2022
Employers want applicants with experience, even for entry-level cybersecurity roles. Universities traditionally help students gain cybersecurity experience by hiring them for on-campus jobs or by matching job seekers to employers for off-campus work. A third option is described in this paper in which universities bring external companies on…
Descriptors: Information Science Education, Information Security, Campuses, Computer Security

Peer reviewed
Direct link
