Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education

Buy
In information technology, unlike many other fields, the need to support the unique perspective of technologically advanced students and deliver technology-rich content presents unique challenges. Todays IT students need the ability to interact with their instructor in near-real time, interact with their peers and project team members, and access and manipulate technology tools in the pursuit of their educational objectives. The Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education delves deep into the construct of real-time, asynchronous education through information technology, pooling experiences from seasoned researchers and educators to detail their past successes and failures, discussing their techniques, hardships, and triumphs in the search for innovative and effective distance learning education for IT programs. This Premier Reference Source answers the increasing demand for a fundamental, decisive source on this cutting-edge issue facing all institutions, covering topics such as asynchronous communication, real-time instruction, multimedia content, content delivery, and distance education technologies.

About the Author

Solomon Negash
specializes in e-Learning, business intelligence, and Information and Communications Technology (ICT) for developing economies. He is the 2007 Distinguished Graduate Teaching Award recipient from his university and the 2005 recipient of the distinguished eLearning award from his department. His work is published in Information & Management, Communication of the ACM, Psychology and Marketing, Communication of AIS, International Journal in ICT Education, and at conference proceedings in the US, Canada, Spain, Ethiopia, Kenya, and Malaysia. Prof. Negash is the program coordinator for the Bachelor of Science in Information Systems (BSIS) program at Kennesaw State University. With an engineering, management, and information systems background, his over 20 years of industry experience include consulting, entrepreneurship, management, and systems analysis. His teaching area includes system analysis and design, project management, information systems policy, and information technology management.

Mike Whitman is a professor of information systems at Kennesaw State University, Kennesaw, Georgia, where he is also the director of the KSU Center for Information Security Education and the coordinator of the Bachelor of science in information security and assurance program,which is the first program of its kind in the Southeast. Dr. Whitman is an active researcher and author in information security policy and curriculum development, ethical computing, and information systems research methods. He currently teaches graduate and undergraduate courses in information security,local area networks, and data communications. Dr. Whitman has five information security textbooks currently in print and has published articles in Information Systems Research, Communications of the ACM, the Journal of International Business Studies, Information and Management, and the Journal of Computer Information Systems. Dr. Whitman earned his PhD and MBA at Auburn University, Al, and has taught previously for the University of Nevada, Las Vegas and Auburn University.

Amy Woszczynski is MSIS director and an associate professor of information systems at Kennesaw State University. She completed a bachelors in industrial engineering from Georgia Tech, an MBA from Kennesaw State University, and a PhD in industrial management from Clemson University. Dr. Woszczynskis current research interests include diversity in IT and distance learning pedagogy and curriculum initiatives. She has published papers on these and other topics in Journal of Information Systems Education, Journal of Computer Information Systems, Computers in Human Behavior, and Industrial Management & Data Systems. She also coedited The Handbook of Information Systems Research.

Herbert J. Mattord, MBA, CISM, CISSP recently completed 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining faculty as a full time tenure-track instructor. During his career as an IT practitioner, he has been an adjunct professor at a number of universities throughout the south for over 20 years. He currently teaches courses in Information Security, Data Communications, Local Area Networks, Database Technology, Project Management, and Systems Analysis & Design. He is the co-author of Principles of Information Security, Management of Information Security, Principles of Incident Response and Disaster Recovery, Readings and Cases in the Management of Information Security, and The Hands-On Information Security Lab Manual. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation.

(HTML tags aren't allowed.)

Algorithmic Learning Theory: 17th International Conference, ALT 2006, Barcelona, Spain, October 7-10, 2006, Proceedings
Algorithmic Learning Theory: 17th International Conference, ALT 2006, Barcelona, Spain, October 7-10, 2006, Proceedings
This book constitutes the refereed proceedings of the 17th International Conference on Algorithmic Learning Theory, ALT 2006, held in Barcelona, Spain in October 2006, colocated with the 9th International Conference on Discovery Science, DS 2006.

The 24 revised full papers presented together with the abstracts of 5 invited papers were carefully...

WLAN Positioning Systems: Principles and Applications in Location-Based Services
WLAN Positioning Systems: Principles and Applications in Location-Based Services

Describing the relevant detection and estimation theory, this detailed guide provides the background knowledge needed to tackle the design of practical WLAN positioning systems. It sets out key system-level challenges and design considerations in increasing positioning accuracy and reducing computational complexity, and it also examines...

Unmasking the Social Engineer: The Human Element of Security
Unmasking the Social Engineer: The Human Element of Security

Learn to identify the social engineer by non-verbal behavior

Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and...


Promoting Sustainable Electricity in Europe: Challenging the Path Dependence of Dominant Energy Systems
Promoting Sustainable Electricity in Europe: Challenging the Path Dependence of Dominant Energy Systems
This is a timely and comparative assessment of initiatives to promote renewable electricity sources (RES) in eight European countries. Carried out by the ProSus research programme at the University of Oslo in cooperation with leading research institutions in each country, the study focuses on the promotional schemes used to foster RES in Austria,...
50 Fast Flash MX Techniques
50 Fast Flash MX Techniques
If you’re a Web designer, Macromedia Flash can help you create interactive effects that’ll reel in site visitors–and keep them coming back for more. Using lots of example movies, clear step-by-step instructions, and 32 pages of vivid color illustrations, Gurdy Leete and Ellen Finkelstein walk you through 50 of today’s...
Mobile Commerce: Technology, Theory and Applications
Mobile Commerce: Technology, Theory and Applications
M-commerce (mobile-commerce) refers to e-commerce activities carried out via a mobile terminal such as a phone or PDA. M-commerce applications for both individuals and organizations are expected to grow considerably over the next few years. Mobile Commerce: Technology, Theory and Applications addresses issues pertaining to the development,...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy