Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Higher Education (2)
- Adjunct Instructor (1)
- Authentication in e-learning activities (1)
- Authentication in e-learning systems (1)
- Community of Practice (1)
-
- E-learning impersonation fraud (1)
- Education (1)
- Educational Technology (1)
- Educational technology (1)
- Higher education (1)
- Information science (1)
- Information technology (1)
- Instructional Design (1)
- Instructional design (1)
- Online education (1)
- Online pedagogy (1)
- Online teaching (1)
- Open Education (1)
- Open SUNY (1)
- Pedagogy (1)
- Risk in E-learning (1)
- SECI (1)
- Teacher Training (1)
- Teaching strategies (1)
Articles 1 - 4 of 4
Full-Text Articles in Education
Effective Teaching Practices In Online Higher Education, Kim Mcmurtry
Effective Teaching Practices In Online Higher Education, Kim Mcmurtry
CCE Theses and Dissertations
In the context of continuing growth in online higher education in the United States, students are struggling to succeed, as evidenced by lower course outcomes and lower retention rates in online courses in comparison with face-to-face courses. The problem identified for investigation is how university instructors can ensure that effective teaching and learning is happening in their online courses. The research questions were:
- What are the best practices of effective online teaching in higher education according to current research?
- How do exemplary online instructors enact teaching presence in higher education?
- What are the best practices of effective online teaching in …
A Big Idea: The Rollout Of Open Suny, Karen E. Case
A Big Idea: The Rollout Of Open Suny, Karen E. Case
CCE Theses and Dissertations
Leveraging technology may be a viable solution in the higher education industry as enrollments decline and institutions have a hard time meeting their projected budgets. One innovative approach to mitigating this problem was approved in March of 2013 by the Board of Trustees of the State University of New York (SUNY). It is called Open SUNY. Open SUNY consists of nine components: the creation and expansion of online programs to meet workforce development needs, the development of online credit-bearing experiential learning experiences, support for training of faculty who opt to use emerging technologies, support for student access to online courses, …
Blended Learning For Faculty Professional Development Incorporating Knowledge Management Principles, Julie E. Hewitt
Blended Learning For Faculty Professional Development Incorporating Knowledge Management Principles, Julie E. Hewitt
CCE Theses and Dissertations
Adjunct faculty comprise a large percentage of part-time faculty for many colleges and universities today. Adjunct faculty are hired because they are experts in their content areas; however, this does not guarantee that they are skilled in effective classroom management. These instructors can become bewildered and frustrated because they lack the knowledge and skills that are needed to run an effective classroom.
While educational organizations have adopted blended learning environments as an effective delivery method for their students, this method has not gained much traction as a way to deliver instruction to their own employees. Thus, there are opportunities to …
An Empirical Study Of Authentication Methods To Secure E-Learning System Activities Against Impersonation Fraud, Shauna Beaudin
An Empirical Study Of Authentication Methods To Secure E-Learning System Activities Against Impersonation Fraud, Shauna Beaudin
CCE Theses and Dissertations
Studies have revealed that securing Information Systems (IS) from intentional misuse is a concern among organizations today. The use of Web-based systems has grown dramatically across industries including e-commerce, e-banking, e-government, and e learning to name a few. Web-based systems provide e-services through a number of diverse activities. The demand for e-learning systems in both academic and non-academic organizations has increased the need to improve security against impersonation fraud. Although there are a number of studies focused on securing Web-based systems from Information Systems (IS) misuse, research has recognized the importance of identifying suitable levels of authenticating strength for various …