Descriptor
Source
Journal of Information… | 1 |
Author
Astrom, Peik | 1 |
Bergstrom, Laura | 1 |
Grahn, Kaj J. | 1 |
Karlstrom, Krister | 1 |
Korhonen, Vesa | 1 |
Pulkkis, Goran | 1 |
Ruokamo, Heli | 1 |
Tella, Seppo | 1 |
Tuovinen, Heli | 1 |
Vahtivuori, Sanna | 1 |
Varpu, Tissari | 1 |
More ▼ |
Publication Type
Speeches/Meeting Papers | 2 |
Journal Articles | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Audience
Location
Finland | 3 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Korhonen, Vesa – 2001
The main purpose of this paper is to draw attention to assumptions that guide the instructional design process when implementing and organizing network-based learning environments in practice. In this case, the situated and socially shared cognition model and participation metaphor create the guiding paradigm for collaborative learning action,…
Descriptors: Computer Mediated Communication, Computer Networks, Cooperative Learning, Foreign Countries
Ruokamo, Heli; Tuovinen, Heli; Tella, Seppo; Vahtivuori, Sanna; Varpu, Tissari – 2002
This paper presents the Helsinki-Lappi project (HelLa) co-run by two Finnish universities: the University of Helsinki, and the University of Lapland. The general aim of the project is to study, develop, and assess how different training programs relate to educational use of information and communication technologies (ICT). The project is expected…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Uses in Education, Cooperative Programs
Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik – Journal of Information Technology Education, 2004
This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…
Descriptors: Computer Security, Educational Technology, Telecommunications, Computer Networks