About application during lectures on protection of the information and information security of the method of "the round table"

In article the analysis of one of passive methods of transfer of knowledge – lecture is resulted. Experience of teaching of a subject on protection of the information and information security shows that students acquire a teaching material if during lecture to apply an active method of transfer of k...

Full description

Bibliographic Details
Main Author: Simon Zh. Simavoryan
Format: Article
Language:Russian
Published: Academic Publishing House Researcher 2011-05-01
Series:Evropejskij Issledovatelʹ
Subjects:
Online Access:http://www.erjournal.ru/journals_n/1309444586.pdf
id doaj-73d2c4c47f34423990b027cb1a02fde3
record_format Article
spelling doaj-73d2c4c47f34423990b027cb1a02fde32020-11-25T01:08:48ZrusAcademic Publishing House ResearcherEvropejskij Issledovatelʹ2219-82292224-01362011-05-015-1760762About application during lectures on protection of the information and information security of the method of "the round table"Simon Zh. SimavoryanIn article the analysis of one of passive methods of transfer of knowledge – lecture is resulted. Experience of teaching of a subject on protection of the information and information security shows that students acquire a teaching material if during lecture to apply an active method of transfer of knowledge – a method of "a round table" is better.http://www.erjournal.ru/journals_n/1309444586.pdflectureinformation protectioninformation securitya method of transfer of knowledgea method of "a round table"
collection DOAJ
language Russian
format Article
sources DOAJ
author Simon Zh. Simavoryan
spellingShingle Simon Zh. Simavoryan
About application during lectures on protection of the information and information security of the method of "the round table"
Evropejskij Issledovatelʹ
lecture
information protection
information security
a method of transfer of knowledge
a method of "a round table"
author_facet Simon Zh. Simavoryan
author_sort Simon Zh. Simavoryan
title About application during lectures on protection of the information and information security of the method of "the round table"
title_short About application during lectures on protection of the information and information security of the method of "the round table"
title_full About application during lectures on protection of the information and information security of the method of "the round table"
title_fullStr About application during lectures on protection of the information and information security of the method of "the round table"
title_full_unstemmed About application during lectures on protection of the information and information security of the method of "the round table"
title_sort about application during lectures on protection of the information and information security of the method of "the round table"
publisher Academic Publishing House Researcher
series Evropejskij Issledovatelʹ
issn 2219-8229
2224-0136
publishDate 2011-05-01
description In article the analysis of one of passive methods of transfer of knowledge – lecture is resulted. Experience of teaching of a subject on protection of the information and information security shows that students acquire a teaching material if during lecture to apply an active method of transfer of knowledge – a method of "a round table" is better.
topic lecture
information protection
information security
a method of transfer of knowledge
a method of "a round table"
url http://www.erjournal.ru/journals_n/1309444586.pdf
work_keys_str_mv AT simonzhsimavoryan aboutapplicationduringlecturesonprotectionoftheinformationandinformationsecurityofthemethodoftheroundtable
_version_ 1725181572524539904