Transitioning from Face-to-Face to Online Instruction: How to Increase Presence and Cognitive/Social Interaction in an Online Information Security Risk Assessment Class

Transitioning from Face-to-Face to Online Instruction: How to Increase Presence and Cognitive/Social Interaction in an Online Information Security Risk Assessment Class

Cindy S. York
Copyright: © 2009 |Pages: 11
ISBN13: 9781605660943|ISBN10: 1605660949|ISBN13 Softcover: 9781616925185|EISBN13: 9781605660950
DOI: 10.4018/978-1-60566-094-3.ch029
Cite Chapter Cite Chapter

MLA

York, Cindy S. "Transitioning from Face-to-Face to Online Instruction: How to Increase Presence and Cognitive/Social Interaction in an Online Information Security Risk Assessment Class." Selected Readings on Telecommunications and Networking, edited by Jairo Gutierrez , IGI Global, 2009, pp. 405-415. https://doi.org/10.4018/978-1-60566-094-3.ch029

APA

York, C. S. (2009). Transitioning from Face-to-Face to Online Instruction: How to Increase Presence and Cognitive/Social Interaction in an Online Information Security Risk Assessment Class. In J. Gutierrez (Ed.), Selected Readings on Telecommunications and Networking (pp. 405-415). IGI Global. https://doi.org/10.4018/978-1-60566-094-3.ch029

Chicago

York, Cindy S. "Transitioning from Face-to-Face to Online Instruction: How to Increase Presence and Cognitive/Social Interaction in an Online Information Security Risk Assessment Class." In Selected Readings on Telecommunications and Networking, edited by Jairo Gutierrez , 405-415. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-094-3.ch029

Export Reference

Mendeley
Favorite

Abstract

This article briefly reviews two important goals in online education: interaction and presence. These are important goals in online education because they are linked to learning and motivation to learn. The article provides guidelines and an extended example of how to design an online course in information security in a manner that will enhance interaction and presence. This article’s contribution is to provide guidelines with a corresponding extended and concrete example for those who are tasked with designing and delivering online courses. Although the guidelines and example were targeted to the field of information security, they can be readily adopted by other disciplines.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.