Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Comparative Analysis | 3 |
| Computer Security | 3 |
| Intermode Differences | 3 |
| Computer Science Education | 2 |
| Delivery Systems | 2 |
| Online Courses | 2 |
| Teaching Methods | 2 |
| Audience Analysis | 1 |
| College Programs | 1 |
| Computer Managed Instruction | 1 |
| Computer Software | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 2 |
| Reports - Research | 2 |
| Dissertations/Theses -… | 1 |
Education Level
| Adult Education | 2 |
| Higher Education | 2 |
| Postsecondary Education | 2 |
Audience
Location
| Pennsylvania | 1 |
| United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Smith, Neil; Caldwell, Helen; Richards, Mike; Bandara, Arosha – International Journal of Information and Learning Technology, 2017
Purpose: The purpose of this paper is to present a comparison of two ways of developing and delivering massive open online courses (MOOCs). One was developed by The Open University in collaboration with FutureLearn; the other was developed independently by a small team at the Northampton University. Design/methodology/approach: The different…
Descriptors: Online Courses, Delivery Systems, Comparative Analysis, Instructional Development
Oliver, Kevin – Journal of Computers in Mathematics and Science Teaching, 2016
This paper presents the results of a comparison study between graduate students taking a software security course at an American university and international working professionals taking a version of the same course online through a free massive open online course (MOOC) created in the Google CourseBuilder learning environment. A goal of the study…
Descriptors: Computer Science Education, Online Courses, Graduate Students, Continuing Education
Kim, Philip – ProQuest LLC, 2010
Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…
Descriptors: Financial Services, Knowledge Level, Transfer of Training, Computer Security

Peer reviewed
Direct link
