NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Peer reviewed Peer reviewed
Direct linkDirect link
Iyer, Viswanathan K. – Education and Information Technologies, 2017
This paper addresses the issue of effective content-delivery of Computer Science subjects taking advantage of a university intranet. The proposal described herein for teaching a subject like Combinatorics and Graph Theory (CGT) is to supplement lectures with a moderated online forum against an associated intranet portal, which is referred to as a…
Descriptors: Computer Networks, Computer Science Education, Universities, Mathematical Concepts
Peer reviewed Peer reviewed
Direct linkDirect link
Blackbourn, J. M.; Fillingim, Jennifer G.; McCelland, Susan; Elrod, G. Franklin; Medley, Meagan B.; Kritsonis, Mary Alice; Ray, Jan – Journal of Instructional Psychology, 2008
This study examines the use of wireless laptop technology to support the application of problem-based learning (PBL) in a special education methods course. This field based course used a progressive disclosure process in weekly seminars to address issues posed in a case study. Eight scenarios, all related to the case, were presented to upper level…
Descriptors: Preservice Teachers, Methods Courses, Teacher Education, Group Discussion