Articles | Open Access | DOI: https://doi.org/10.37547/ijp/Volume04Issue11-03

CHARACTERISTICS OF CLOUD TECHNOLOGIES IN CYBER PEDAGOGY

Shoira Bekchonova , PhD, Associate Professor, New Century University" General Education Sciences" Department Manager, Uzbekistan

Abstract

This in the article pedagogy and in cyber pedagogy cloudy of technologies features, cloudy of technologies advantages, disadvantages and education to give in the process pedagogy and in cyber pedagogy differences light up given.

Keywords

Pedagogy, feature, disadvantage

References

Chong Li, Meikang Qiu. Reinforcement Learning for Cyber-Physical Systems. https://doi.org/10.1201/9781351006620. New York -2019.256 p

Lee Chao. Handbook of Research on Cloud-Based STEM Education for Improved Learning Outcomes. University of Houston - Victoria, USA-2016. 518 p

Lee Chao. Cloud Computing for Teaching and Learning: Strategies for Design and Implementation. University of Houston-Victoria, USA. SCOPUS. April, 2012. Pages: 357

Prof. Dr. Anis Bajrektarevic, Professor and Chairperson in International Law and Global Political Studies, International Institute IFIMES, Vienna. Cyberspace: Between Legal and Security Challenges, Socio-economic Opportunities and Moral Dilemmas. https://www.thomas-schmitz-yogyakarta.id/Events/Guest-lecture_cyberspace-challenges.htm

Melda Kamil Ariadno; Anis H. Bajrektarevic, Twinning Europe and Asia in Cyberspace: The EU legislation, ASEAN and its transformative power, AEI Insights 5 (2019). no. 1; Anis H. Bajrektarevic; Melda Kamil Ariadno, GDPR: Humanizing cyberspace, The Jakarta Post 02.01.2019, p. 6

Aufzählung Right to privacy in cyberspace: special website of the OHCHR, Resolution 68/167 of the UN General Assembly on "The right to privacy in the digital age", Juliane Damen; Lena Köhler; Sean Woodard, The Human Right of Privacy in the Digital Age, 2017

Aufzählung Cybersecurity policy: European Council, Reform of cybersecurity in Europe, last updated 03.2019; ASEAN Declaration to Prevent and Combat Cybercrime of 13.11.2017;

Aufzählung Cybercrime: special websites of Europol, Interpol, Combattingcybercrime.org; Cybercrime Repository (UNODC);

Lennon Chang, Cybercrime and Cyber Security in ASEAN, in: Jianhong Liu; Max Travers; Lennon Chang (editors), Comparative criminology, 2017, p. 135 ff.

https://www.routledge.com/Cloud-Computing-Networking-Theory-Practice-and-Development/Chao/p/book/9781482254815.

Mukhiddinova, M. (2023). ABOUT THE PRAGMATICS OF DEACTIVE PRONOUNS IN THE KOREAN LANGUAGE. SPAST Abstracts, 2(02).

Mukhiddinova, M. (2021). A question about pronouns in a Korean sentence. Asian Journal of Multidimensional Research, 10(9), 208-211.

Dek-Khenovna, K. N., & Batirovna, M. M. (2019). To the study of the role of pronouns and pronominal words in Korean language (on elementary level teaching material). Вестник науки и образования, (19-1 (73)), 47-52.

Mukhiddinova, M. PRONOUNS IN COMMUNICATIVE SENTENCES IN KOREAN. ТОШКЕНТ-2021, 52.

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

Shoira Bekchonova. (2024). CHARACTERISTICS OF CLOUD TECHNOLOGIES IN CYBER PEDAGOGY. International Journal of Pedagogics, 4(11), 12–18. https://doi.org/10.37547/ijp/Volume04Issue11-03