NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Scarabottolo, Nello – International Association for Development of the Information Society, 2018
This paper compares the students enrolled to a three-year undergraduate, bachelor degree on Security of Computer Systems and Networks -- offered in traditional, classroom fashion as well as online at the University of Milan (Italy) -- in terms of results in exams of the various courses as well as in the final dissertation for obtaining the degree.…
Descriptors: Online Courses, Educational Technology, Technology Uses in Education, Undergraduate Students
Atkinson, Al – British Columbia Council on Admissions and Transfer, 2009
The Education Planner website provides a searchable database of approximately 1,700 undergraduate post-secondary programs in British Columbia (BC). It is intended as a "one-start entry point" for students looking for post-secondary options. This independent review of Education Planner was undertaken to determine its overall…
Descriptors: Web Sites, Postsecondary Education, Undergraduate Study, Databases
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lei, Kimfong; Schmidt, Therese; Schaffer, Scott P.; Um, Eun Joon – Association for Educational Communications and Technology, 2004
The American Society for Training and Development (ASTD) defines human performance technology (HPT) as "a systematic approach to analyzing, improving, and managing performance in the workplace through the use of appropriate and varied interventions." The first step in this approach is the performance analysis (Gilbert, 1978). In this…
Descriptors: Program Effectiveness, Graduate Students, Computer Security, Performance Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Baker-Eveleth, Lori; Eveleth, Daniel M.; O'Neill, Michele; Stone, Robert W. – EDUCAUSE Quarterly, 2006
The College of Business and Economics at the University of Idaho conducted a pilot study that used commercially available encryption software called Securexam to deliver computer-based examinations. A multi-step implementation procedure was developed, implemented, and then evaluated on the basis of what students viewed as valuable. Two key aspects…
Descriptors: Business Administration Education, Tests, Data Processing, Computer Security