Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Course Descriptions | 2 |
| Course Objectives | 2 |
| Educational Practices | 2 |
| Performance Factors | 2 |
| Action Research | 1 |
| Barriers | 1 |
| Communities of Practice | 1 |
| Computer Security | 1 |
| Concept Teaching | 1 |
| Educational Strategies | 1 |
| Electronic Learning | 1 |
| More ▼ | |
Author
| Guynes, Carl S. | 1 |
| Jensen, Bradley K. | 1 |
| Linder VanBerschot, Jennifer | 1 |
| Nyaboga, Andrew | 1 |
| Wilson, Brent G. | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Wilson, Brent G.; Linder VanBerschot, Jennifer – Canadian Journal of Learning and Technology, 2014
Two instructors report our experience co-teaching an action research (AR) required as part of an e-learning master's degree. Adopting a practice-centered stance we focus on the course activities of participants (instructors and students), with particular attention to the careful crafting of course elements with the goal of achieving an…
Descriptors: Online Courses, Electronic Learning, Team Teaching, Teacher Collaboration
Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew – American Journal of Business Education, 2009
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…
Descriptors: Graduate Students, Management Information Systems, Information Security, Concept Teaching

Peer reviewed
