Publication Date
| In 2015 | 0 |
| Since 2014 | 2 |
| Since 2011 (last 5 years) | 3 |
| Since 2006 (last 10 years) | 3 |
| Since 1996 (last 20 years) | 3 |
Descriptor
| Internet | 3 |
| Electronic Learning | 2 |
| Electronic Publishing | 2 |
| Higher Education | 2 |
| Online Courses | 2 |
| Online Searching | 2 |
| Access to Computers | 1 |
| Access to Information | 1 |
| Barriers | 1 |
| Case Studies | 1 |
| More ▼ | |
Source
| International Review of… | 3 |
Author
| Chen, Yong | 3 |
| He, Wu | 1 |
| Khan, Muhammad Jahanzaib | 1 |
| Wang, Minjuan | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 2 |
| Information Analyses | 1 |
| Reports - Evaluative | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
Audience
Showing all 3 results
Wang, Minjuan; Chen, Yong; Khan, Muhammad Jahanzaib – International Review of Research in Open and Distance Learning, 2014
Mobile cloud learning, a combination of mobile learning and cloud computing, is a relatively new concept that holds considerable promise for future development and delivery in the education sectors. Cloud computing helps mobile learning overcome obstacles related to mobile computing. The main focus of this paper is to explore how cloud computing…
Descriptors: Electronic Learning, Information Storage, Internet, Case Studies
Chen, Yong – International Review of Research in Open and Distance Learning, 2014
MOOCs (massive open online course) is a disruptive innovation and a current buzzword in higher education. However, the discussion of MOOCs is disparate, fragmented, and distributed among different outlets. Systematic, extensively published research on MOOCs is unavailable. This paper adopts a novel method called blog mining to analyze MOOCs. The…
Descriptors: Online Courses, Electronic Learning, Online Searching, Electronic Publishing
Chen, Yong; He, Wu – International Review of Research in Open and Distance Learning, 2013
This paper describes a survey of online learning which attempts to determine online learning providers' awareness of potential security risks and the protection measures that will diminish them. The authors use a combination of two methods: blog mining and a traditional literature search. The findings indicate that, while scholars have…
Descriptors: Computer Security, Risk, Online Courses, Electronic Publishing

Peer reviewed
