NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Fowler, Brad; Godin, Joy; Geddy, Margaret – Journal of Information Systems Education, 2016
Many organizations are dealing with the increasing demands of big data, so they are turning to NoSQL databases as their preferred system for handling the unique problems of capturing and storing massive amounts of data. Therefore, it is likely that employees in all sizes of organizations will encounter NoSQL databases. Thus, to be more job-ready,…
Descriptors: Information Storage, Information Retrieval, Database Management Systems, Databases
Peer reviewed Peer reviewed
Direct linkDirect link
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Witman, Paul D.; Njunge, Christopher – Information Systems Education Journal, 2016
Often, users of information systems (both automated and manual) must analyze those systems in a "black box" fashion, without being able to see the internals of how the system is supposed to work. In this case of business process outsourcing, an insurance industry customer encounters an ongoing stream of customer service issues, with both…
Descriptors: Outsourcing, Case Method (Teaching Technique), Information Systems, Systems Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang – Journal of Information Systems Education, 2014
In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…
Descriptors: Information Security, Case Studies, Teaching Methods, Active Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Matos, Victor; Grasser, Rebecca – Journal of Information Systems Education, 2007
This paper presents an example of integrating IT skills using an interesting real life problem. We describe how the reverse- and forward-engineering of the USA National Do Not Call registry was used in our capstone course to illustrate the fusion of different (but interdependent) issues and techniques learned in the IT program. The purpose of the…
Descriptors: Information Technology, Engineering, Ethics, Learning Experience