Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education

Buy
In information technology, unlike many other fields, the need to support the unique perspective of technologically advanced students and deliver technology-rich content presents unique challenges. Todays IT students need the ability to interact with their instructor in near-real time, interact with their peers and project team members, and access and manipulate technology tools in the pursuit of their educational objectives. The Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education delves deep into the construct of real-time, asynchronous education through information technology, pooling experiences from seasoned researchers and educators to detail their past successes and failures, discussing their techniques, hardships, and triumphs in the search for innovative and effective distance learning education for IT programs. This Premier Reference Source answers the increasing demand for a fundamental, decisive source on this cutting-edge issue facing all institutions, covering topics such as asynchronous communication, real-time instruction, multimedia content, content delivery, and distance education technologies.

About the Author

Solomon Negash
specializes in e-Learning, business intelligence, and Information and Communications Technology (ICT) for developing economies. He is the 2007 Distinguished Graduate Teaching Award recipient from his university and the 2005 recipient of the distinguished eLearning award from his department. His work is published in Information & Management, Communication of the ACM, Psychology and Marketing, Communication of AIS, International Journal in ICT Education, and at conference proceedings in the US, Canada, Spain, Ethiopia, Kenya, and Malaysia. Prof. Negash is the program coordinator for the Bachelor of Science in Information Systems (BSIS) program at Kennesaw State University. With an engineering, management, and information systems background, his over 20 years of industry experience include consulting, entrepreneurship, management, and systems analysis. His teaching area includes system analysis and design, project management, information systems policy, and information technology management.

Mike Whitman is a professor of information systems at Kennesaw State University, Kennesaw, Georgia, where he is also the director of the KSU Center for Information Security Education and the coordinator of the Bachelor of science in information security and assurance program,which is the first program of its kind in the Southeast. Dr. Whitman is an active researcher and author in information security policy and curriculum development, ethical computing, and information systems research methods. He currently teaches graduate and undergraduate courses in information security,local area networks, and data communications. Dr. Whitman has five information security textbooks currently in print and has published articles in Information Systems Research, Communications of the ACM, the Journal of International Business Studies, Information and Management, and the Journal of Computer Information Systems. Dr. Whitman earned his PhD and MBA at Auburn University, Al, and has taught previously for the University of Nevada, Las Vegas and Auburn University.

Amy Woszczynski is MSIS director and an associate professor of information systems at Kennesaw State University. She completed a bachelors in industrial engineering from Georgia Tech, an MBA from Kennesaw State University, and a PhD in industrial management from Clemson University. Dr. Woszczynskis current research interests include diversity in IT and distance learning pedagogy and curriculum initiatives. She has published papers on these and other topics in Journal of Information Systems Education, Journal of Computer Information Systems, Computers in Human Behavior, and Industrial Management & Data Systems. She also coedited The Handbook of Information Systems Research.

Herbert J. Mattord, MBA, CISM, CISSP recently completed 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining faculty as a full time tenure-track instructor. During his career as an IT practitioner, he has been an adjunct professor at a number of universities throughout the south for over 20 years. He currently teaches courses in Information Security, Data Communications, Local Area Networks, Database Technology, Project Management, and Systems Analysis & Design. He is the co-author of Principles of Information Security, Management of Information Security, Principles of Incident Response and Disaster Recovery, Readings and Cases in the Management of Information Security, and The Hands-On Information Security Lab Manual. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation.

(HTML tags aren't allowed.)

Ruling by Statute: How Uncertainty and Vote Buying Shape Lawmaking
Ruling by Statute: How Uncertainty and Vote Buying Shape Lawmaking

What are the main factors that allow presidents and prime ministers to enact policy through acts of government that carry the force of law? Or, simply put, when does a government actually govern? The theory presented in this book provides a major advance in our understanding of statutory policy making. Using a combination of an original...

Maintaining Team Performance (Center for Creative Leadership)
Maintaining Team Performance (Center for Creative Leadership)
Between the time a team is launched and the time it delivers results, managers need to know that the team is on course. Whether they have launched a team to achieve a business objective or have inherited a team, they need to monitor effectiveness on an ongoing basis and make course corrections that keep small problems from becoming major...
Optical Network Control: Architecture, Protocols, and Standards
Optical Network Control: Architecture, Protocols, and Standards

Optical Network Control is the first expert guide and single-source reference for controlling and managing optical networks. This book fills the gap between optical network engineering and routing/signaling-helping both optical and IP professionals build networks that are more robust, flexible, manageable, and profitable. Coverage includes:...


Biologically Motivated Computer Vision
Biologically Motivated Computer Vision
This book constitutes the refereed proceedings of the Second International Workshop on Biologically Motivated Computer Vision, BMCV 2002, held in Tübingen, Germany, in November 2002.

The 22 revised full papers and 37 revised short papers presented together with 6 invited papers were carefully reviewed and selected from 97...

Embedded Systems: Desktop Integration (Wordware Applications Library)
Embedded Systems: Desktop Integration (Wordware Applications Library)
In this book, we design a thermostat that interfaces to a host
system through RS-232, USB, and Ethernet. To make things fun,
the device layer and user applications have to run on Windows,
Linux, and FreeBSD. We build three prototype thermostats using
the BASIC Stamp, PIC Microcontroller, and PSOC Microcontroller.
We
...
Beginning Fedora Desktop: Fedora 20 Edition
Beginning Fedora Desktop: Fedora 20 Edition

Beginning Fedora Desktop: Fedora 20 Edition is a complete guide to using the Fedora 20 Desktop Linux release as your daily driver for multimedia, productivity, social networking, the GNOME 3 desktop, administrative tasks, and more. Author and Linux expert Richard Petersen delves into the operating system as a whole and offers you a...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy