Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Computer Networks | 2 |
| Protocol Analysis | 2 |
| Access to Information | 1 |
| Active Learning | 1 |
| Case Studies | 1 |
| College Students | 1 |
| Computer Security | 1 |
| Computer Software | 1 |
| Data Collection | 1 |
| Data Interpretation | 1 |
| Electronic Mail | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
| Information Analyses | 1 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| Ohio | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Tessmer, Martin – Performance Improvement Quarterly, 1994
Discussion of formative evaluation highlights alternative formative evaluation methods and tools and explains their advantages, disadvantages, and applicable contexts. Methods described include two-on-one evaluation; think-aloud protocols; computer interviewing; self-evaluation; panel reviews; evaluation meetings; computer journals and networks;…
Descriptors: Computer Networks, Electronic Mail, Evaluation Methods, Formative Evaluation

Peer reviewed
