Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Database Design | 2 |
| Database Management Systems | 2 |
| Program Implementation | 2 |
| Teaching Methods | 2 |
| College Students | 1 |
| Computer Mediated… | 1 |
| Computer Networks | 1 |
| Computer Security | 1 |
| Computer Simulation | 1 |
| Courseware | 1 |
| Curriculum Design | 1 |
| More ▼ | |
Author
| Baker, Elizabeth | 1 |
| Costello, Jane | 1 |
| Hawkins, Thomas | 1 |
| Reinicke, Bryan | 1 |
| Rohr, Linda E. | 1 |
| Toothman, Callie | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 1 |
| Reports - Evaluative | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 1 |
Audience
Location
| Canada | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Rohr, Linda E.; Costello, Jane; Hawkins, Thomas – International Review of Research in Open and Distributed Learning, 2015
While the use of Twitter for communication and assessment activities in online courses is not new, it has not been without its challenges. This is increasingly true of high enrolment courses. The use of a Twitter Evaluation application which leverages a Learning Management System's (LMS's) application programming interface (API) provides a…
Descriptors: Design Preferences, Technology Integration, Curriculum Design, Online Courses

Peer reviewed
