Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 2 |
| Electronic Learning | 2 |
| Intermode Differences | 2 |
| Audience Analysis | 1 |
| College Programs | 1 |
| Comparative Analysis | 1 |
| Concept Mapping | 1 |
| Consciousness Raising | 1 |
| Database Management Systems | 1 |
| Delivery Systems | 1 |
| Distance Education | 1 |
| More ▼ | |
Author
| Bandara, Arosha | 1 |
| Caldwell, Helen | 1 |
| Huang, Nan-Ching | 1 |
| Huang, Tien-Chuan | 1 |
| Keh, Huan-Chao | 1 |
| Richards, Mike | 1 |
| Shaw, Ruey-Shiang | 1 |
| Smith, Neil | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Research | 2 |
Education Level
| Adult Education | 1 |
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Smith, Neil; Caldwell, Helen; Richards, Mike; Bandara, Arosha – International Journal of Information and Learning Technology, 2017
Purpose: The purpose of this paper is to present a comparison of two ways of developing and delivering massive open online courses (MOOCs). One was developed by The Open University in collaboration with FutureLearn; the other was developed independently by a small team at the Northampton University. Design/methodology/approach: The different…
Descriptors: Online Courses, Delivery Systems, Comparative Analysis, Instructional Development
Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan – International Journal of Distance Education Technologies, 2011
Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…
Descriptors: Electronic Learning, Concept Mapping, Learning Processes, Computer Security

Peer reviewed
Direct link
