Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Classification | 4 |
| Computer Security | 4 |
| Teaching Methods | 4 |
| Computer Mediated… | 3 |
| Academic Achievement | 2 |
| Academic Persistence | 2 |
| Business | 2 |
| Case Studies | 2 |
| Causal Models | 2 |
| Classroom Communication | 2 |
| Cognitive Processes | 2 |
| More ▼ | |
Source
| International Association for… | 1 |
| International Educational… | 1 |
| Journal of Information… | 1 |
| Journal of Technical Writing… | 1 |
Author
| Mavrikis, Manolis, Ed. | 1 |
| McLaren, Bruce M., Ed. | 1 |
| Pardos, Zachary, Ed. | 1 |
| Parrish, James L., Jr. | 1 |
| Ross, Derek G. | 1 |
| Spears, Janine L. | 1 |
| Stamper, John, Ed. | 1 |
Publication Type
| Collected Works - Proceedings | 2 |
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
| Elementary Education | 1 |
| Elementary Secondary Education | 1 |
| Grade 6 | 1 |
| Intermediate Grades | 1 |
| Junior High Schools | 1 |
| Middle Schools | 1 |
| Secondary Education | 1 |
Audience
Location
| Asia | 1 |
| Australia | 1 |
| Brazil | 1 |
| Connecticut | 1 |
| Denmark | 1 |
| Egypt | 1 |
| Estonia | 1 |
| Finland | 1 |
| Florida | 1 |
| France | 1 |
| Germany | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 1 |
What Works Clearinghouse Rating
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
Ross, Derek G. – Journal of Technical Writing and Communication, 2009
Phishing e-mails deceive individuals into giving out personal information which may then be utilized for identity theft. One particular type, the Personal Solicitation E-mail (PSE) mimics personal letters--modern perversions of "ars dictaminis" (the classical art of letter writing). In this article, I determine and discuss 19 appeals common to the…
Descriptors: Letters (Correspondence), Rhetoric, Rhetorical Criticism, Electronic Mail
Stamper, John, Ed.; Pardos, Zachary, Ed.; Mavrikis, Manolis, Ed.; McLaren, Bruce M., Ed. – International Educational Data Mining Society, 2014
The 7th International Conference on Education Data Mining held on July 4th-7th, 2014, at the Institute of Education, London, UK is the leading international forum for high-quality research that mines large data sets in order to answer educational research questions that shed light on the learning process. These data sets may come from the traces…
Descriptors: Information Retrieval, Data Processing, Data Analysis, Data Collection
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers

Peer reviewed
Direct link
