Descriptor
Source
| Journal of Information… | 3 |
Author
| Astrom, Peik | 1 |
| Bergstrom, Laura | 1 |
| Gercek, Gokhan | 1 |
| Grahn, Kaj J. | 1 |
| Karlstrom, Krister | 1 |
| Liang, Hailong | 1 |
| Narasimhan, V. Lakshmi | 1 |
| Pulkkis, Goran | 1 |
| Saleem, Naveed | 1 |
| Zhang, Shuangyi | 1 |
| Zhao, Shuxin | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 3 |
| Reports - Descriptive | 3 |
Education Level
| Higher Education | 1 |
Audience
Location
| Finland | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Gercek, Gokhan; Saleem, Naveed – Journal of Information Technology Education, 2006
Providing adequate computing lab support for Management Information Systems (MIS) and Computer Science (CS) programs is a perennial challenge for most academic institutions in the US and abroad. Factors, such as lack of physical space, budgetary constraints, conflicting needs of different courses, and rapid obsolescence of computing technology,…
Descriptors: Computer Uses in Education, Management Information Systems, Computer Science Education, Computers
Narasimhan, V. Lakshmi; Zhao, Shuxin; Liang, Hailong; Zhang, Shuangyi – Journal of Information Technology Education, 2006
This paper presents an interactive educational environment for use over both "in situ" and distance-based modalities of teaching. Several technological issues relating to the design and development of the distributed virtual learning environment have also been raised. The PROVIDE framework proposed in this paper is a seamless distributed…
Descriptors: Distance Education, Educational Environment, Teaching Methods, Online Systems
Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik – Journal of Information Technology Education, 2004
This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…
Descriptors: Computer Security, Educational Technology, Telecommunications, Computer Networks

Peer reviewed
Direct link
