Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 6 |
Descriptor
Source
Author
Ali, Shafqat | 1 |
Anisimova, Tatyana Ivanovna | 1 |
Baker, Elizabeth | 1 |
Cook, Michael | 1 |
Dobozy, Eva | 1 |
Greener, Susan | 1 |
He, Wu | 1 |
Krasnova, Lyubov Alekseevna | 1 |
Kshirsagar, Ashish | 1 |
Li, Yaohang | 1 |
Liu, Shijie | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Descriptive | 3 |
Reports - Evaluative | 3 |
Collected Works - Proceedings | 2 |
Opinion Papers | 2 |
Reports - Research | 2 |
Guides - Classroom - Teacher | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 5 |
Elementary Secondary Education | 1 |
Audience
Practitioners | 2 |
Researchers | 1 |
Teachers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Anisimova, Tatyana Ivanovna; Krasnova, Lyubov Alekseevna – International Education Studies, 2015
Modern professional education in the transition to a tiered system of specialists training is focused not on the transfer of ready knowledge but on teaching to find this knowledge and to apply them in situations close to the professional conditions. The educational process, relying on use of interactive methods of teaching, which is organized with…
Descriptors: Educational Resources, Electronic Libraries, Teaching Methods, Higher Education
He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang – Journal of Information Systems Education, 2014
In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…
Descriptors: Information Security, Case Studies, Teaching Methods, Active Learning
Dobozy, Eva – Teaching English with Technology, 2012
In this paper, the five interlocking de Bono LAMS sequences are introduced as a new form of generic template designs. This transdisciplinary knowledge-mobilising strategy is based on Edward de Bono's attention-directing ideas and thinking skills, commonly known as the CoRT tools. The development of the de Bono LAMS sequence series is an important…
Descriptors: Higher Education, Interdisciplinary Approach, Sequential Approach, Sequential Learning
Greener, Susan – Campus-Wide Information Systems, 2009
Purpose: The purpose of this paper is to reflect on the value and constraints of varied online communication tools from web 2.0 to e-mail in a higher education (HE) teaching and learning context, where these tools are used to support or be the main focus of learning. Design/methodology/approach: A structured reflection is produced with the aid of…
Descriptors: Computer Mediated Communication, Learning Experience, Teaching Methods, Reflection
Shaoul, Jean – 1988
This paper analyzes ways in which the new, relatively cheap, user friendly technology and associated software is changing the way that accounting is being taught. Techniques that have been available, in principle, for years, are now widely available. The newer techniques stress decision making for planning, and, to a lesser extent, control, in…
Descriptors: Accounting, Business Administration Education, Computer Assisted Instruction, Computer Software

Rittle, Robert H. – Teaching of Psychology, 1990
Discusses a research design course in which undergraduates were taught to program microcomputers for the control of experimental tasks. Describes the teaching approach for the three-hour course unit, along with the experimental tasks that were performed. Reports that students ranked the programing of experimental tasks as important as other…
Descriptors: Computer Literacy, Computer Uses in Education, Curriculum Development, Database Management Systems
Ren, Zhanying; Liu, Shijie – Online Submission, 2005
According to the requirement of modern teaching theory and technology, based on software engineering, database theory, the technique of net information security and system integration, a net testing system on local network was designed and realized. The system benefits for dividing of testing & teaching and settles the problems of random…
Descriptors: Educational Technology, Databases, Information Technology, Computer Networks
Ali, Shafqat; Salter, Graeme – Electronic Journal of e-Learning, 2004
In higher education, online discussions are an integral part of collaborative based e-Learning systems. However, there can be problems associated with current online discussion models. For example, it can be easy to set open-ended discussions which attract little participation and assessing contributions can be difficult or time-consuming.…
Descriptors: Discussion (Teaching Technique), Computer Mediated Communication, Higher Education, Electronic Learning
Cook, Michael – 1987
This paper provides a commentary on the RAMP guidelines on curriculum development in the teaching of information technology, which were developed as a result of the UNESCO seminar on harmonization held in Paris in October 1984. This report is divided into three parts: (1) basic working assumptions for curriculum planning in the face of information…
Descriptors: Course Evaluation, Curriculum Development, Database Management Systems, Databases
Association for the Development of Computer-based Instructional Systems. – 1986
This volume is divided into full formal paper manuscripts and 200-word abstracts of presentations that were made without submitting formal papers. The 73 papers presented in full represent recent research and applications in the field of computer-based instruction. They are organized into 13 sections by special interest group: (1) Computer-Based…
Descriptors: Abstracts, Computer Assisted Instruction, Computer Assisted Testing, Computer Simulation
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers