Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 6 |
Descriptor
Source
| Journal of Information… | 3 |
| American School Board Journal | 1 |
| Distance Education | 1 |
| Grantee Submission | 1 |
| Online Journal of Distance… | 1 |
Author
Publication Type
| Journal Articles | 7 |
| Reports - Descriptive | 4 |
| Reports - Research | 2 |
| Reports - Evaluative | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 6 |
| Postsecondary Education | 2 |
Audience
| Policymakers | 1 |
| Practitioners | 1 |
Location
| Australia | 1 |
| South Africa | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zhang, Zhiyong; Zhang, Danyang – Grantee Submission, 2021
Data science has maintained its popularity for about 20 years. This study adopts a bottom-up approach to understand what data science is by analyzing the descriptions of courses offered by the data science programs in the United States. Through topic modeling, 14 topics are identified from the current curricula of 56 data science programs. These…
Descriptors: Statistics Education, Definitions, Course Descriptions, Computer Science Education
Brown, Victoria – Online Journal of Distance Learning Administration, 2018
Protection of academic integrity in online environments can be challenging. Understanding how the technology works and concerns about each of the methods for monitoring online interactions can assist in the selection of the best proctoring tools. Depending on the content, the type of assessment and the comfort level with the technology, a…
Descriptors: Integrity, Online Courses, Technology Uses in Education, Identification
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Singh, Divya; Ramutsheli, Mashamaite Peterlia – Distance Education, 2016
Personal information is among the most significant assets for businesses today, and clear transactional rules are becoming increasingly important. Organizations, including universities, are charged with more responsibility than ever to protect the personal information used during the course of their business, specifically student data. The paper…
Descriptors: Foreign Countries, Higher Education, Comparative Analysis, Database Management Systems
Cellucci, Leigh W.; Layman, Elizabeth J.; Campbell, Robert; Zeng, Xiaoming – Journal of Information Systems Education, 2011
Federal initiatives are encouraging the increase of IS graduates to work in the healthcare environment because they possess knowledge of datasets and dataset management that are key to effective management of electronic health records (EHRs) and health information technology (IT). IS graduates will be members of the healthcare team, and as such,…
Descriptors: Information Technology, Ethics, Information Science, Information Science Education
Singh, Anil; Mangalaraj, George; Taneja, Aakash – Journal of Information Systems Education, 2010
This paper offers a compilation of technologies that provides either free or low-cost solutions to the challenges of teaching online courses. It presents various teaching methods the outlined tools and technologies can support, with emphasis on fit between these tools and the tasks they are meant to serve. In addition, it highlights various…
Descriptors: Online Courses, Teaching Methods, Technology Uses in Education, Technology Integration
Philips, Stephen P.; Summers, Joseph V. – American School Board Journal, 1987
Discusses a "silent menace" in school computer rooms--the potential misuse of databases containing student directories, teacher salary information, test scores, and other data. Describes administrative computer uses and possible abuses, including invasion of privacy, false correlations between data sets, and manipulation of data for questionable…
Descriptors: Achievement Tests, Boards of Education, Computer Uses in Education, Data Interpretation

Peer reviewed
Direct link
