NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Smith, Neil; Caldwell, Helen; Richards, Mike; Bandara, Arosha – International Journal of Information and Learning Technology, 2017
Purpose: The purpose of this paper is to present a comparison of two ways of developing and delivering massive open online courses (MOOCs). One was developed by The Open University in collaboration with FutureLearn; the other was developed independently by a small team at the Northampton University. Design/methodology/approach: The different…
Descriptors: Online Courses, Delivery Systems, Comparative Analysis, Instructional Development
Peer reviewed Peer reviewed
Direct linkDirect link
Oliver, Kevin – Journal of Computers in Mathematics and Science Teaching, 2016
This paper presents the results of a comparison study between graduate students taking a software security course at an American university and international working professionals taking a version of the same course online through a free massive open online course (MOOC) created in the Google CourseBuilder learning environment. A goal of the study…
Descriptors: Computer Science Education, Online Courses, Graduate Students, Continuing Education
Peer reviewed Peer reviewed
Direct linkDirect link
Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan – International Journal of Distance Education Technologies, 2011
Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…
Descriptors: Electronic Learning, Concept Mapping, Learning Processes, Computer Security
Kim, Philip – ProQuest LLC, 2010
Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…
Descriptors: Financial Services, Knowledge Level, Transfer of Training, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Tabor, Sharon W. – Quarterly Review of Distance Education, 2007
Distance education has become an expectation with students who have grown up with technology as well as nontraditional and working students. Most universities now offer a wide range of online courses and degree programs to meet these needs. Online delivery of technology courses, however, has been problematic when the course includes very complex…
Descriptors: Distance Education, Online Courses, Computer Security, Information Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
O'Hanlon, Charlene – T.H.E. Journal, 2007
According to a January 2007 survey by the Pew Internet & American Life Project, 55 percent of teens (ages 12 to 17) report having created a personal profile online, and an equal number regularly use social networking sites such as MySpace or Facebook. Of those, 91 percent use the sites to stay in touch with friends they see frequently. With all…
Descriptors: Internet, Social Networks, Adolescents, Student Motivation
Peer reviewed Peer reviewed
Furnell, Steven; Evans, Mike; Bailey, Paul – Quarterly Review of Distance Education, 2000
Discusses benefits of online distance learning and considers some of the barriers that need to be addressed for successful implementation. Topics include quality compared to traditional face-to-face methods; academic workloads; self-pacing issues; the lecturer's role; lack of standards; security concerns; and the need for strategic planning. (LRW)
Descriptors: Computer Assisted Instruction, Computer Security, Conventional Instruction, Distance Education