NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Peer reviewed Peer reviewed
Direct linkDirect link
See, Andrew; Teetor, Travis Stephen – Journal of Access Services, 2014
In the summer of 2012, the University of Arizona Libraries implemented an online training program to effectively train Access Services staff and student employees at a large academic research library. This article discusses the program, which was built using a course management system (D2L) and various e-Learning software applications (Articulate…
Descriptors: Staff Development, Training Methods, Library Personnel, Courseware
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers