Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 5 |
| Since 2017 (last 10 years) | 9 |
Descriptor
| Computer Security | 9 |
| Difficulty Level | 9 |
| Information Security | 5 |
| Test Items | 4 |
| Scores | 3 |
| Test Format | 3 |
| Barriers | 2 |
| Cheating | 2 |
| College Students | 2 |
| Computer Science Education | 2 |
| Computer Software | 2 |
| More ▼ | |
Source
Author
| Antonenko, Pavlo | 1 |
| Becker, Benjamin | 1 |
| Becker, Kirk | 1 |
| Connor David Nelson | 1 |
| D'Mello, Sidney K. | 1 |
| Dawson, Kara | 1 |
| DeLatte, David | 1 |
| Debeer, Dries | 1 |
| Eckerly, Carol | 1 |
| Graesser, Art | 1 |
| Herman, Geoffrey L. | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 7 |
| Reports - Research | 7 |
| Dissertations/Theses -… | 1 |
| Reports - Descriptive | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
| Higher Education | 5 |
| Postsecondary Education | 4 |
| Early Childhood Education | 1 |
| Elementary Education | 1 |
| Grade 3 | 1 |
| Grade 4 | 1 |
| Grade 5 | 1 |
| Intermediate Grades | 1 |
| Middle Schools | 1 |
| Primary Education | 1 |
Audience
Location
| Asia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Liu, Jinghua; Becker, Kirk – Journal of Educational Measurement, 2022
For any testing programs that administer multiple forms across multiple years, maintaining score comparability via equating is essential. With continuous testing and high-stakes results, especially with less secure online administrations, testing programs must consider the potential for cheating on their exams. This study used empirical and…
Descriptors: Cheating, Item Response Theory, Scores, High Stakes Tests
Connor David Nelson – ProQuest LLC, 2024
This dissertation introduces a comprehensive framework aimed at reshaping applied cybersecurity education to significantly ease the learning curve, at scale, through three synergistic innovations. These methods address the daunting educational barriers in cybersecurity, enabling learners at all levels to understand complex security concepts more…
Descriptors: Computer Security, Information Security, Computer Science Education, Models
Item Order and Speededness: Implications for Test Fairness in Higher Educational High-Stakes Testing
Becker, Benjamin; van Rijn, Peter; Molenaar, Dylan; Debeer, Dries – Assessment & Evaluation in Higher Education, 2022
A common approach to increase test security in higher educational high-stakes testing is the use of different test forms with identical items but different item orders. The effects of such varied item orders are relatively well studied, but findings have generally been mixed. When multiple test forms with different item orders are used, we argue…
Descriptors: Information Security, High Stakes Tests, Computer Security, Test Items
Liew, Tze Wei; Pang, Wei Ming; Leow, Meng Chew; Tan, Su-Mae – Smart Learning Environments, 2022
Emotional design refers to imbuing a multimedia learning environment with design attributes that promote learners' positive affect and motivation to enhance learning. One such feature is anthropomorphism, in which human-like attributes are infused into learning elements in a multimedia learning environment. This study examines the affective,…
Descriptors: Multimedia Instruction, Instructional Design, Multimedia Materials, Human Body
Olney, Andrew M.; Hosman, Eric; Graesser, Art; D'Mello, Sidney K. – Grantee Submission, 2017
We conducted a pilot study that used kernel-level packet capture to record the web pages visited by college students and the reading difficulty of those pages. Our results indicate that i) no students were fully compliant in their participation, ii) the number of texts encountered by participants was highly skewed, iii) the reading difficulty of…
Descriptors: College Students, Electronic Publishing, Web Sites, Difficulty Level
Xu, Zhen; Dawson, Kara; Antonenko, Pavlo; Koh, Do Hyong; Wusylko, Christine – Journal of Online Learning Research, 2022
This convergent mixed method study investigates learner engagement during a blended, transmedia curriculum called CryptoComics, which is designed to teach 3rd-5th graders about cryptology and cybersecurity. Curriculum design is presented through the lens of four engagement facilitators: (1) anchoring the curriculum with a comic book, (2) blending…
Descriptors: Learner Engagement, Elementary School Students, Curriculum Design, Cartoons
Eckerly, Carol; Smith, Russell; Sowles, John – Practical Assessment, Research & Evaluation, 2018
The Discrete Option Multiple Choice (DOMC) item format was introduced by Foster and Miller (2009) with the intent of improving the security of test content. However, by changing the amount and order of the content presented, the test taking experience varies by test taker, thereby introducing potential fairness issues. In this paper we…
Descriptors: Culture Fair Tests, Multiple Choice Tests, Testing, Test Items
Parekh, Geet; DeLatte, David; Herman, Geoffrey L.; Oliva, Linda; Phatak, Dhananjay; Scheponik, Travis; Sherman, Alan T. – IEEE Transactions on Education, 2018
This paper presents and analyzes results of two Delphi processes that polled cybersecurity experts to rate cybersecurity topics based on importance, difficulty, and timelessness. These ratings can be used to identify core concepts--cross-cutting ideas that connect knowledge in the discipline. The first Delphi process identified core concepts that…
Descriptors: Delphi Technique, Specialists, Fundamental Concepts, Computer Security
Lesnov, Roman Olegovich – International Journal of Computer-Assisted Language Learning and Teaching, 2018
This article compares second language test-takers' performance on an academic listening test in an audio-only mode versus an audio-video mode. A new method of classifying video-based visuals was developed and piloted, which used L2 expert opinions to place the video on a continuum from being content-deficient (not helpful for answering…
Descriptors: Second Language Learning, Second Language Instruction, Video Technology, Classification

Peer reviewed
Direct link
