NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Abdur R. Shahid; Sushma Mishra – Journal of Information Systems Education, 2024
Due to the increasing demand for efficient, effective, and profitable applications of Artificial Intelligence (AI) in various industries, there is an immense need for professionals with the right skills to meet this demand. As a result, several institutions have started to offer AI programs. Yet, there is a notable gap in academia: the absence of…
Descriptors: Masters Programs, Information Systems, Computer Science Education, Artificial Intelligence
Peer reviewed Peer reviewed
Direct linkDirect link
Woszczynski, Amy B.; Green, Andrew – Journal of Information Systems Education, 2017
Cyber defense competitions (CDCs) simulate a real-world environment where the competitors must protect the information assets of a fictional organization. These competitions are becoming popular at the high school and college levels, as well as in industry and governmental settings. However, there is little research to date on the learning…
Descriptors: Outcomes of Education, Competition, Information Systems, National Security
Peer reviewed Peer reviewed
Direct linkDirect link
Singh, Anil – Journal of Information Systems Education, 2013
Assurance of individual effort from students in computer-based assignments is a challenge. Due to digitization, students can easily use a copy of their friend's work and submit it as their own. Plagiarism in assignments puts students who cheat at par with those who work honestly and this compromises the learning evaluation process. Using a…
Descriptors: Plagiarism, Ethics, Technology Uses in Education, Assignments
Peer reviewed Peer reviewed
Direct linkDirect link
Fulton, Eric; Lawrence, Cameron; Clouse, Shawn – Journal of Information Systems Education, 2013
The aim of this paper is to illuminate the exciting world in which "white hat crackers" operate and to suggest topics that can help prepare students to enter this high-demand field. While currently there is extraordinary demand for graduates to fill these positions that have relatively high starting salaries, employers find it difficult…
Descriptors: Information Security, Computer Security, Information Technology, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Singh, Anil; Mangalaraj, George; Taneja, Aakash – Journal of Information Systems Education, 2010
This paper offers a compilation of technologies that provides either free or low-cost solutions to the challenges of teaching online courses. It presents various teaching methods the outlined tools and technologies can support, with emphasis on fit between these tools and the tasks they are meant to serve. In addition, it highlights various…
Descriptors: Online Courses, Teaching Methods, Technology Uses in Education, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Henson, Kerry L. – Journal of Information Systems Education, 2010
Prompted by restricted funding for a lab which supported student software development work on real-world projects, a contribution program was established to facilitate monetary support from the external clients. The paper explores the relationships between instructor, students and client and how a funding component can affect these ties.…
Descriptors: Student Projects, Web Sites, Design, Experiential Learning