Pathology of Learning in Cyber Space Concepts, Structures and Processes

Most other discussions are general and present the overall benefits of e-learning and e-teaching that is formally carried out in universities and schools through cyberspace. But, unfortunately, none of them fully explores the learning, education and cyber-training resources which should be used by i...

Full description

Bibliographic Details
Main Author: Sadeghi, Sayed Hadi
Format: eBook
Language:English
Published: Cham Springer International Publishing 2019, 2019
Series:Studies in Systems, Decision and Control
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03740nmm a2200313 u 4500
001 EB001824127
003 EBX01000000000000000990573
005 00000000000000.0
007 cr|||||||||||||||||||||
008 180604 ||| eng
020 |a 9783319914497 
100 1 |a Sadeghi, Sayed Hadi 
245 0 0 |a Pathology of Learning in Cyber Space  |h Elektronische Ressource  |b Concepts, Structures and Processes  |c by Sayed Hadi Sadeghi 
260 |a Cham  |b Springer International Publishing  |c 2019, 2019 
300 |a XIV, 112 p. 13 illus., 1 illus. in color  |b online resource 
505 0 |a Concepts -- Cyber space and Real space -- Training in cyberspace -- Learning Objectives in Cyberspace -- Pathology Caused by Cyber Education -- Reduce and deal with injuries by Training in cyberspace -- Conclusions 
653 |a Engineering 
653 |a Computational intelligence 
653 |a Computational Intelligence 
653 |a Educational technology 
653 |a Technology and Digital Education 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Studies in Systems, Decision and Control 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-91449-7?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 006.3 
520 |a Most other discussions are general and present the overall benefits of e-learning and e-teaching that is formally carried out in universities and schools through cyberspace. But, unfortunately, none of them fully explores the learning, education and cyber-training resources which should be used by individuals, groups, organizations, governments, and others in pursuing to achieve their goals. In addition to this, they do not pay much attention to the challenges and injuries caused by learning and teaching in cyberspace. This has led the authors to investigate these and other issues related to learning and training in cyberspace more widely and comprehensively, and also consider them beyond official formal learning and education. Most importantly they address issues such as the injuries and challenges that, in different ways and at different levels result from learning and education in this space.  
520 |a As such this book goes beyond simple and repetitive issues that have been raised concerning cyberspace, and underlines the challenges it poses. Although intended for scholars and students from the fields of science education, information technology, sociology and educational technology as well as interested parties and related authorities, this book is also helpful for people wishing to better understand new topics, such as cyberspace, learning and training in cyberspace, and related issues. It is of interest to a wide range of enthusiasts, with different educational, specialist and executive backgrounds, including academics, policymakers, managers and planners from educational and cultural institutions 
520 |a This book is divided into seven chapters, beginning with discussions of the main concepts of cyberspace, the relationship between cyberspace and real space, learning and education. It describes the relationship between cyberspace and real space, and presents capacities, judiciary, and concepts related to cyberspace. Cyber curricular education forms are then described in terms of teaching and learning resources in cyberspace. The discussion presented in this book consists of two main sections: The first section, outlines the objectives of training in cyberspace at different levels, while the second section describes the injuries caused by learning and training in cyberspace at different levels, and then highlights how cyber training is handled and receives feedback. Lastly, the authors provide a summary of the topics presented.