Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Source
Journal of Information… | 3 |
Author
Astrom, Peik | 1 |
Bergstrom, Laura | 1 |
Bowman, Michael | 1 |
Grahn, Kaj J. | 1 |
Hawk, Stephen | 1 |
Karlstrom, Krister | 1 |
Pulkkis, Goran | 1 |
Rice, George | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Audience
Location
Finland | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Rice, George; Bowman, Michael – Journal of Information Technology Education, 2007
Children in the back seat on a long trip are not the only ones asking the question "Are we there yet?" At Murray State University (MSU) and other universities starting new programs, the question becomes one of validation of the program. In the late 90s, MSU, a midsize university, was entrusted with the responsibility of developing a program of…
Descriptors: Information Systems, Computers, Information Technology, Computer Science
Hawk, Stephen – Journal of Information Technology Education, 2005
Preparation for employment in the telecommunications area is not a major emphasis in most information system (IS) programs. The curricula of most programs include only one or two courses related to telecommunications. As a result, most do not provide much preparation for employment in this area. There may be, however, increasing employment…
Descriptors: Telecommunications, Computer Networks, Undergraduate Study, Units of Study
Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik – Journal of Information Technology Education, 2004
This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…
Descriptors: Computer Security, Educational Technology, Telecommunications, Computer Networks