Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Comparative Analysis | 3 |
Computer Security | 3 |
Intermode Differences | 3 |
Computer Science Education | 2 |
Delivery Systems | 2 |
Online Courses | 2 |
Teaching Methods | 2 |
Audience Analysis | 1 |
College Programs | 1 |
Computer Managed Instruction | 1 |
Computer Software | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Education Level
Adult Education | 2 |
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
Pennsylvania | 1 |
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Smith, Neil; Caldwell, Helen; Richards, Mike; Bandara, Arosha – International Journal of Information and Learning Technology, 2017
Purpose: The purpose of this paper is to present a comparison of two ways of developing and delivering massive open online courses (MOOCs). One was developed by The Open University in collaboration with FutureLearn; the other was developed independently by a small team at the Northampton University. Design/methodology/approach: The different…
Descriptors: Online Courses, Delivery Systems, Comparative Analysis, Instructional Development
Oliver, Kevin – Journal of Computers in Mathematics and Science Teaching, 2016
This paper presents the results of a comparison study between graduate students taking a software security course at an American university and international working professionals taking a version of the same course online through a free massive open online course (MOOC) created in the Google CourseBuilder learning environment. A goal of the study…
Descriptors: Computer Science Education, Online Courses, Graduate Students, Continuing Education
Kim, Philip – ProQuest LLC, 2010
Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…
Descriptors: Financial Services, Knowledge Level, Transfer of Training, Computer Security