NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Vasco Rikkers; Dipti Kapoor Sarmah – Journal of Computing in Higher Education, 2025
In recent years, gamification has seen a rise in usage for cyber-security training, with some of the most used elements being story and narrative. Yet there seems to be a lack of research on story-based gamification as well as how this type of gamification affects a training's effectiveness. The goal of this study was to test the effectiveness of…
Descriptors: Gamification, Computer Security, Training Methods, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Berson, Michael J.; Berson, Ilene R. – Social Education, 2020
The reality is that digital archives are fragile. Many people appreciate how information technology has revolutionized their lives but have spent little time reflecting on the historical significance of the migration from a print-based to a digital society. In the 100th year of the National Council for the Social Studies (NCSS), it seems timely to…
Descriptors: History, Memory, Obsolescence, Technology