Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Source
Journal of Information… | 3 |
Author
Armstrong, Helen L. | 1 |
Astrom, Peik | 1 |
Bergstrom, Laura | 1 |
Grahn, Kaj J. | 1 |
Karlstrom, Krister | 1 |
Pulkkis, Goran | 1 |
Tan, Grace | 1 |
Venables, Anne | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 2 |
Adult Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tan, Grace; Venables, Anne – Journal of Information Technology Education, 2010
Since 2001, there has been a dramatic decline in Information Technology and Computer Science student enrolments worldwide. As a consequence, many institutions have evaluated their offerings and revamped their programs to include units designed to capture students' interests and increase subsequent enrolment. Likewise, at Victoria University the…
Descriptors: Curriculum Development, Information Technology, Curriculum Design, Computer Science Education
Armstrong, Helen L. – Journal of Information Technology Education, 2009
Lack of accessibility in the design of e-learning courses continues to hinder students with vision impairment. E-learning materials are predominantly vision-centric, incorporating images, animation, and interactive media, and as a result students with acute vision impairment do not have equal opportunity to gain tertiary qualifications or skills…
Descriptors: Industry, Distance Education, Pilot Projects, Educational Environment
Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik – Journal of Information Technology Education, 2004
This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…
Descriptors: Computer Security, Educational Technology, Telecommunications, Computer Networks