Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Computer System Design | 2 |
| Design Requirements | 2 |
| Higher Education | 2 |
| Barriers | 1 |
| Computer Networks | 1 |
| Computer Security | 1 |
| Courseware | 1 |
| Design Preferences | 1 |
| Educational Technology | 1 |
| Guidelines | 1 |
| Information Technology | 1 |
| More ▼ | |
Source
| EDUCAUSE Review | 2 |
Author
| Johnson, Chris | 1 |
| Voloudakis, John | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
| Information Analyses | 1 |
Education Level
| Higher Education | 2 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Drawing a Roadmap: Barriers and Challenges to Designing the Ideal Virtual World for Higher Education
Johnson, Chris – EDUCAUSE Review, 2008
The goal of this article is to draw a roadmap for designing an "ideal" virtual world for higher education, pointing decision-makers in a general direction for implementing virtual worlds and noting various barriers along the way. When using a roadmap, one can take many different paths to reach a desired destination. Similarly, institutions can…
Descriptors: Higher Education, Barriers, Virtual Classrooms, Computer System Design
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security

Peer reviewed
Direct link
