Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 5 |
Descriptor
| Computer Security | 6 |
| Information Technology | 5 |
| Feedback (Response) | 4 |
| Information Security | 3 |
| Higher Education | 2 |
| Internet | 2 |
| Models | 2 |
| Responses | 2 |
| Teaching Methods | 2 |
| Administrative Policy | 1 |
| Architecture | 1 |
| More ▼ | |
Source
| AACE Journal | 1 |
| EDUCAUSE Review | 1 |
| Educational Technology &… | 1 |
| Information Systems Education… | 1 |
| Journal of Information… | 1 |
| Journal on Educational… | 1 |
Author
| Bangert-Drowns, Robert | 1 |
| Baykal, Adnan | 1 |
| Berg, George | 1 |
| Bloniarz, Peter | 1 |
| Coolin, Kirstie | 1 |
| Delio, Vince | 1 |
| Enyeart, Mike | 1 |
| Gangolly, Jagdish | 1 |
| Goel, Sanjay | 1 |
| He, Wu | 1 |
| Hobbs, Jon | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 6 |
| Reports - Descriptive | 6 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
| Elementary Education | 1 |
| Middle Schools | 1 |
Audience
Laws, Policies, & Programs
| Digital Millennium Copyright… | 1 |
| First Amendment | 1 |
| Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Kirkham, Thomas; Winfield, Sandra; Smallwood, Angela; Coolin, Kirstie; Wood, Stuart; Searchwell, Louis – Educational Technology & Society, 2009
This paper presents a platform on which a new generation of applications targeted to aid the self-organised learner can be presented. The new application is enabled by innovations in trust-based security of data built upon emerging infrastructures to aid federated data access in the UK education sector. Within the proposed architecture, users and…
Descriptors: Architecture, Learning Processes, Foreign Countries, Educational Technology
del Moral Talabis, Mark Ryan – AACE Journal, 2007
Learning IT Security in a classroom setting has often been a frustrating endeavor for both instructors and students alike. From our experience, traditional instructional methods like direct instruction and lectures though widely used and effective in most other areas have significant shortcomings when applied in IT security learning. In this…
Descriptors: Feedback (Response), Teaching Methods, Methods, Information Technology
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing
Enyeart, Mike; Staman, E. Michael; Valdes, Jose J., Jr. – EDUCAUSE Review, 2007
The concept of convergence has evolved significantly during recent years. Today, "convergence" refers to the integration of the communications and computing resources and services that seamlessly traverse multiple infrastructures and deliver content to multiple platforms or appliances. Convergence is real. Those in higher education, and especially…
Descriptors: Educational Opportunities, Higher Education, Educational Trends, Surveys
Goel, Sanjay; Pon, Damira; Bloniarz, Peter; Bangert-Drowns, Robert; Berg, George; Delio, Vince; Iwan, Laura; Hurbanek, Thomas; Schuman, Sandoor P.; Gangolly, Jagdish; Baykal, Adnan; Hobbs, Jon – Journal on Educational Resources in Computing, 2006
A novel idea for information security education created by the New York State Center for Information Forensics and Assurance (CIFA) is presented. This new approach incorporates a teaching hospital model originally developed for medical training. In this model, information security problems from industry and government are solved and abstracted…
Descriptors: Feedback (Response), Curriculum Development, Hospitals, Computer Security

Peer reviewed
Direct link
