Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Source
Journal of Information… | 5 |
Author
Astrom, Peik | 1 |
Bergstrom, Laura | 1 |
Glaser, Rainer E. | 1 |
Grahn, Kaj J. | 1 |
Karlstrom, Krister | 1 |
Liang, Hailong | 1 |
Murray, Meg Coffin | 1 |
Narasimhan, V. Lakshmi | 1 |
Pendergast, Mark O. | 1 |
Pulkkis, Goran | 1 |
Wu, Zhengyu | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 5 |
Education Level
Higher Education | 3 |
Audience
Location
Finland | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Narasimhan, V. Lakshmi; Zhao, Shuxin; Liang, Hailong; Zhang, Shuangyi – Journal of Information Technology Education, 2006
This paper presents an interactive educational environment for use over both "in situ" and distance-based modalities of teaching. Several technological issues relating to the design and development of the distributed virtual learning environment have also been raised. The PROVIDE framework proposed in this paper is a seamless distributed…
Descriptors: Distance Education, Educational Environment, Teaching Methods, Online Systems
Pendergast, Mark O. – Journal of Information Technology Education, 2006
This paper examines the impact the use of the Java programming language has had on the way our students learn to program and the success they achieve. The importance of a properly constructed first course in programming cannot be overstated. A course well experienced will leave students with good programming habits, the ability to learn on their…
Descriptors: Programming Languages, Active Learning, Programming, Introductory Courses
Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik – Journal of Information Technology Education, 2004
This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…
Descriptors: Computer Security, Educational Technology, Telecommunications, Computer Networks
Wu, Zhengyu; Glaser, Rainer E. – Journal of Information Technology Education, 2004
The realization of information and communication technology (ICT) literacy is a global and complex objective. It has been argued that it cannot be accomplished by single-focused, stand-alone curricula. Instead, it has been recommended that ICT education be integrated into the instruction of other disciplines to effectively promote technical…
Descriptors: Chemistry, Educational Technology, Media Literacy, Science Education