Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education

Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education

Solomon Negash (Kennesaw State University, USA), Michael Whitman (Kennesaw State University, USA), Amy Woszczynski (Kennesaw State University, USA), Ken Hoganson (Kennesaw State University, USA) and Herbert Mattord (Kennesaw State University, USA)
Indexed In: SCOPUS View 2 More Indices
Release Date: May, 2008|Copyright: © 2008 |Pages: 406
DOI: 10.4018/978-1-59904-964-9
ISBN13: 9781599049649|ISBN10: 1599049643|EISBN13: 9781599049656
Hardcover:
Available
$210.00
TOTAL SAVINGS: $210.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$189.00
List Price: $210.00
10% Discount:-$21.00
TOTAL SAVINGS: $21.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$250.00
TOTAL SAVINGS: $250.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

In information technology, unlike many other fields, the need to support the unique perspective of technologically advanced students and deliver technology-rich content presents unique challenges. Today's IT students need the ability to interact with their instructor in near-real time, interact with their peers and project team members, and access and manipulate technology tools in the pursuit of their educational objectives.

The Handbook of Distance Learning for Real-Time and Asynchronous Information Technology Education delves deep into the construct of real-time, asynchronous education through information technology, pooling experiences from seasoned researchers and educators to detail their past successes and failures, discussing their techniques, hardships, and triumphs in the search for innovative and effective distance learning education for IT programs. This Premier Reference Source answers the increasing demand for a fundamental, decisive source on this cutting-edge issue facing all institutions, covering topics such as asynchronous communication, real-time instruction, multimedia content, content delivery, and distance education technologies.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Applications of learning theory
  • Asynchronous instruction
  • Authoring systems
  • Bandwidth-intensive or bandwidth conservative methods
  • Broadband and Wireless Communication Tools
  • Computational methods
  • Content Delivery
  • Copyright Protection
  • Distance education competencies
  • Distance education in the future
  • Distance Education Technologies
  • Distributed Systems
  • Implementation of IT in education
  • Implications of distance learning
  • Instructional Design
  • Intelligent Tutoring
  • Mobile Systems
  • Multimedia Design
  • Pedagogical technologies
  • Quality of education
  • Real-time instruction
  • Streamlined or multi-media content
  • Student Support
  • Web-supported instruction
Reviews and Testimonials

This book shares lessons learned from hands-on experience in teaching in synchronous and asynchronous DL. The book discusses DL issues ranging from learning environments to course design and technologies used in the classroom.

– Solomon Negash, Kennesaw State University, USA

These 18 articles cover the theories, methods and issues librarians encounter as they learn how to support this shift through strategic planning, operational guidelines and practices.

– Book News Inc. (August 2008)

Very good examples of student-centered approaches...higher education practitioners in the field of information technology teaching can usefully mine the chapters in this book for examples of good practice in their discipline.

– British Journal of Educational Technology, Vol. 40 No. 3 (2009)
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Solomon Negash specializes in e-Learning, business intelligence, and Information and Communications Technology (ICT) for developing economies. He is the 2007 Distinguished Graduate Teaching Award recipient from his university and the 2005 recipient of the distinguished eLearning award from his department. His work is published in Information & Management, Communication of the ACM, Psychology and Marketing, Communication of AIS, International Journal in ICT Education, and at conference proceedings in the US, Canada, Spain, Ethiopia, Kenya, and Malaysia. Prof. Negash is the program coordinator for the Bachelor of Science in Information Systems (BSIS) program at Kennesaw State University. With an engineering, management, and information systems background, his over 20 years of industry experience include consulting, entrepreneurship, management, and systems analysis. His teaching area includes system analysis and design, project management, information systems policy, and information technology management.
Mike Whitman is an Associate Professor of Information Systems in the Department of Computer Science and Information Systems at Kennesaw State University, GA. He is also the Director of the Master of Science in Information Systems and Director of the Center for Information Security Education and Awareness at Kennesaw State University, USA. Dr. Whitman received his Ph.D. in Management Information Systems, an MBA and a Bachelor’s Degree in Management from Auburn University. Dr. Whitman’s current research interests include information security, security policy, computer use ethics and IS research methods. He has published articles on these topics in journals such as Information Systems Research, Communications of the ACM, Information & Management, the Journal of International Business Systems, and the Journal of Computer Information Systems. He has delivered frequent presentations at national and regional conferences, including the Americas Conference on Information Systems, the Decision Sciences Institute and the Southern Association for Information Systems.
Amy Woszczynski is an Assistant Professor of Information Systems in the Department of Computer Science and Information Systems at Kennesaw State University. She received her Ph.D. in Industrial Management from Clemson University, her MBA from Kennesaw State University, and a Bachelor's Degree in Industrial Engineering at Georgia Tech. Dr. Woszczynski's current research interests include pedagogy and curriculum to improve the success rate of students in the first programming course, individual differences in the information systems classroom, diversity in the IT workforce, and research methods in information systems. She has published articles on these topics in journals such as Computers in Human Behavior and Industrial Management and Data Systems. She has delivered frequent presentations at national and regional conferences, including the Americas Conference on Information Systems, the Southern Association for Information Systems, and the Southeast Informs.
Herbert J. Mattord, MBA, CISM, CISSP recently completed 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining faculty as a full time tenure-track instructor. During his career as an IT practitioner, he has been an adjunct professor at a number of universities throughout the south for over 20 years. He currently teaches courses in Information Security, Data Communications, Local Area Networks, Database Technology, Project Management, and Systems Analysis & Design. He is the co-author of Principles of Information Security, Management of Information Security, Principles of Incident Response and Disaster Recovery, Readings and Cases in the Management of Information Security, and The Hands-On Information Security Lab Manual. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation.
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.