Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education

Buy
In information technology, unlike many other fields, the need to support the unique perspective of technologically advanced students and deliver technology-rich content presents unique challenges. Todays IT students need the ability to interact with their instructor in near-real time, interact with their peers and project team members, and access and manipulate technology tools in the pursuit of their educational objectives. The Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education delves deep into the construct of real-time, asynchronous education through information technology, pooling experiences from seasoned researchers and educators to detail their past successes and failures, discussing their techniques, hardships, and triumphs in the search for innovative and effective distance learning education for IT programs. This Premier Reference Source answers the increasing demand for a fundamental, decisive source on this cutting-edge issue facing all institutions, covering topics such as asynchronous communication, real-time instruction, multimedia content, content delivery, and distance education technologies.

About the Author

Solomon Negash
specializes in e-Learning, business intelligence, and Information and Communications Technology (ICT) for developing economies. He is the 2007 Distinguished Graduate Teaching Award recipient from his university and the 2005 recipient of the distinguished eLearning award from his department. His work is published in Information & Management, Communication of the ACM, Psychology and Marketing, Communication of AIS, International Journal in ICT Education, and at conference proceedings in the US, Canada, Spain, Ethiopia, Kenya, and Malaysia. Prof. Negash is the program coordinator for the Bachelor of Science in Information Systems (BSIS) program at Kennesaw State University. With an engineering, management, and information systems background, his over 20 years of industry experience include consulting, entrepreneurship, management, and systems analysis. His teaching area includes system analysis and design, project management, information systems policy, and information technology management.

Mike Whitman is a professor of information systems at Kennesaw State University, Kennesaw, Georgia, where he is also the director of the KSU Center for Information Security Education and the coordinator of the Bachelor of science in information security and assurance program,which is the first program of its kind in the Southeast. Dr. Whitman is an active researcher and author in information security policy and curriculum development, ethical computing, and information systems research methods. He currently teaches graduate and undergraduate courses in information security,local area networks, and data communications. Dr. Whitman has five information security textbooks currently in print and has published articles in Information Systems Research, Communications of the ACM, the Journal of International Business Studies, Information and Management, and the Journal of Computer Information Systems. Dr. Whitman earned his PhD and MBA at Auburn University, Al, and has taught previously for the University of Nevada, Las Vegas and Auburn University.

Amy Woszczynski is MSIS director and an associate professor of information systems at Kennesaw State University. She completed a bachelors in industrial engineering from Georgia Tech, an MBA from Kennesaw State University, and a PhD in industrial management from Clemson University. Dr. Woszczynskis current research interests include diversity in IT and distance learning pedagogy and curriculum initiatives. She has published papers on these and other topics in Journal of Information Systems Education, Journal of Computer Information Systems, Computers in Human Behavior, and Industrial Management & Data Systems. She also coedited The Handbook of Information Systems Research.

Herbert J. Mattord, MBA, CISM, CISSP recently completed 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining faculty as a full time tenure-track instructor. During his career as an IT practitioner, he has been an adjunct professor at a number of universities throughout the south for over 20 years. He currently teaches courses in Information Security, Data Communications, Local Area Networks, Database Technology, Project Management, and Systems Analysis & Design. He is the co-author of Principles of Information Security, Management of Information Security, Principles of Incident Response and Disaster Recovery, Readings and Cases in the Management of Information Security, and The Hands-On Information Security Lab Manual. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation.

(HTML tags aren't allowed.)

Creating Spatial Information Infrastructures: Towards the Spatial Semantic Web
Creating Spatial Information Infrastructures: Towards the Spatial Semantic Web
The concept of information infrastructures is an important one in many countries and organizations for improving the management of distributed information. Many national and international efforts are ongoing to create such information infrastructures, in parallel with research activities to fi nd answers to the remaining problems when realizing...
High-Level Vision: Object Recognition and Visual Cognition
High-Level Vision: Object Recognition and Visual Cognition

In this book, Shimon Ullman focuses on the processes of high-level vision that deal with the interpretation and use of what is seen in the image. In particular, he examines two major problems. The first, object recognition and classification, involves recognizing objects despite large variations in appearance caused by changes in viewing...

Beginning Red Hat Linux 9 (Programmer to Programmer)
Beginning Red Hat Linux 9 (Programmer to Programmer)
Red Hat Linux 9 is a powerful, flexible open source operating system. Its popularity is growing, both in home use and in corporate environments of all sizes. Its user interface makes it every bit as accessible as other operating systems, and its open source pedigree opens the doors to a mind-blowing amount of free software.

This book guides you...


Skin Protection: Practical Applications in the Occupational Setting (Current Problems in Dermatology, Vol. 34)
Skin Protection: Practical Applications in the Occupational Setting (Current Problems in Dermatology, Vol. 34)

The differential application of skin protection in occupational settings becomes increasingly complex. Due to new scientific results and technological aspects as well as European and US regulations that have to be considered in the context of cosmetics and personal protective equipment, the practical application of skin protection requires...

Foundation Flash MX Applications
Foundation Flash MX Applications

This book provides the richest and most solid introduction to the exciting world of Flash applications, which are becoming increasingly popular as ways of presenting visually rich interfaces to useful data and services. Foundation Flash MX Applications supplies you with the knowledge, techniques, and skills that you need to help you...

Trace-Based Post-Silicon Validation for VLSI Circuits (Lecture Notes in Electrical Engineering)
Trace-Based Post-Silicon Validation for VLSI Circuits (Lecture Notes in Electrical Engineering)

This book first provides a comprehensive coverage of state-of-the-art validation solutions based on real-time signal tracing to guarantee the correctness of VLSI circuits.  The authors discuss several key challenges in post-silicon validation and provide automated solutions that are systematic and cost-effective.  A series of...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy