Descriptor
Computer Security | 2 |
Computer Uses in Education | 2 |
Course Content | 2 |
Foreign Countries | 2 |
Computer Attitudes | 1 |
Computer Networks | 1 |
Computer Science Education | 1 |
Course Descriptions | 1 |
Courseware | 1 |
Delivery Systems | 1 |
Design Requirements | 1 |
More ▼ |
Source
Journal of Information… | 1 |
Author
Astrom, Peik | 1 |
Bergstrom, Laura | 1 |
Choy, Sarojni | 1 |
Clayton, Berwyn | 1 |
Grahn, Kaj J. | 1 |
Karlstrom, Krister | 1 |
McNickle, Cathy | 1 |
Pulkkis, Goran | 1 |
Publication Type
Journal Articles | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik – Journal of Information Technology Education, 2004
This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…
Descriptors: Computer Security, Educational Technology, Telecommunications, Computer Networks
Choy, Sarojni; McNickle, Cathy; Clayton, Berwyn – 2001
Since little research existed about services for online learners in Australia, a national study was conducted to explore the expectations and experiences of online learners in the Vocational Education and Training (VET) sector. Online learners enrolled with various Registered Training Organizations (RTOs) from the VET sector were contacted for…
Descriptors: Computer Attitudes, Computer Security, Computer Uses in Education, Course Content