Publication Date
In 2025 | 2 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 6 |
Descriptor
Source
Grantee Submission | 1 |
Journal of Cybersecurity… | 1 |
Journal of Educational Data… | 1 |
Journal of Learning and… | 1 |
Online Submission | 1 |
ProQuest LLC | 1 |
Author
Danielle S. McNamara | 1 |
Edwards, John | 1 |
Elizabeth Reilley | 1 |
Gary A. Harris | 1 |
Hart, Kaden | 1 |
Ishrat Ahmed | 1 |
Maryam Zeinolabedini | 1 |
Mehmet Fatih Yigit | 1 |
Paul Alvarado | 1 |
Selami Aydin | 1 |
Shrestha, Raj | 1 |
More ▼ |
Publication Type
Reports - Research | 4 |
Journal Articles | 3 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 6 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
ACT Assessment | 1 |
What Works Clearinghouse Rating

Ishrat Ahmed; Paul Alvarado; Siddharth Jain; Tracy Arner; Elizabeth Reilley; Danielle S. McNamara – Grantee Submission, 2025
The rapid evolution of artificial intelligence (AI) has created an unprecedented opportunity for innovation across industries, but its complexity often presents a steep learning curve for many (Roberts & Candi, 2024; Gunner, 2025). This highlights the need for user-friendly tools that bridge the gap between AI's potential and its practical…
Descriptors: State Universities, Artificial Intelligence, Usability, Innovation
Gary A. Harris – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity threats have been a serious and growing problem for decades. In addition, a severe shortage of cybersecurity professionals has been proliferating for nearly as long. These problems exist in the United States and globally and are well documented in literature. This study examined what state universities are doing to help address the…
Descriptors: State Universities, Computer Security, Professional Personnel, Labor Supply
Mehmet Fatih Yigit – Journal of Learning and Teaching in Digital Age, 2025
Technology, while enhancing efficiency and effectiveness, also poses significant cyber threats and risks. Overcoming these challenges necessitates individuals to have high levels of cybersecurity awareness and to exhibit proper cybersecurity behaviors. Correspondingly, in recent years, the exploration of individual factors influencing…
Descriptors: Metacognition, Computer Security, Information Security, Student Behavior
Yuli Deng – ProQuest LLC, 2021
Personalized learning is gaining popularity in online computer science education due to its characteristics of pacing the learning progress and adapting the instructional approach to each individual learner from a diverse background. Among various instructional methods in computer science education, hands-on labs have unique requirements of…
Descriptors: Individualized Instruction, Experiential Learning, Computer Science Education, Electronic Learning
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Selami Aydin; Maryam Zeinolabedini – Online Submission, 2024
In line with the rapid advancement in educational technology, and the application of artificial intelligence (AI) in particular, the teaching and learning of the English language has undergone a significant transformation. This paper aims to explore students' perceptions of integrating AI into the English as a foreign language (EFL) learning…
Descriptors: Artificial Intelligence, Computer Software, Second Language Instruction, Second Language Learning