Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 4 |
Descriptor
Source
| IEEE Transactions on Learning… | 1 |
| Journal of Educational… | 1 |
| Journal of Science Education… | 1 |
| ProQuest LLC | 1 |
Author
| Crippen, Kent J. | 1 |
| Ibrahim, Sara | 1 |
| Jevremovic, Aleksandar | 1 |
| Kern, Cindy L. | 1 |
| Kumari, Neeraj | 1 |
| Ristic, Nenad | 1 |
| Shimic, Goran | 1 |
| Veinovic, Mladen | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 2 |
| Dissertations/Theses -… | 1 |
| Reports - Evaluative | 1 |
Education Level
| Grade 10 | 1 |
| Grade 9 | 1 |
| High Schools | 1 |
| Higher Education | 1 |
| Junior High Schools | 1 |
| Middle Schools | 1 |
| Postsecondary Education | 1 |
| Secondary Education | 1 |
Audience
Location
| Indiana | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jevremovic, Aleksandar; Shimic, Goran; Veinovic, Mladen; Ristic, Nenad – IEEE Transactions on Learning Technologies, 2017
The case study presented in this paper describes the pedagogical aspects and experience gathered while using an e-learning tool named IPA-PBL. Its main purpose is to provide additional motivation for adopting theoretical principles and procedures in a computer networks course. In the proposed model, the sequencing of activities of the learning…
Descriptors: Problem Based Learning, Computer Networks, Case Studies, Electronic Learning
Using SPSS to Find the Factors Affecting the Quality of Education in Private Universities in Haryana
Kumari, Neeraj – Journal of Educational Technology, 2019
The objective of the study is to examine the current education system present in private technical education universities in Haryana from the faculty members' perspective. It is a descriptive research. The data has been collected with the help of Questionnaire Based Survey. The sample size is 180 comprising of the faculty respondents. The sample…
Descriptors: Statistical Analysis, Computer Software, Educational Quality, Higher Education
Ibrahim, Sara – ProQuest LLC, 2017
The insider security threat causes new and dangerous dimensions in cloud computing. Those internal threats are originated from contractors or the business partners' input that have access to the systems. A study of trustworthiness and transparency might assist the organizations to monitor employees' activity more cautiously on cloud technologies…
Descriptors: Trust (Psychology), Accountability, Regression (Statistics), Computer Security
Kern, Cindy L.; Crippen, Kent J. – Journal of Science Education and Technology, 2017
Scientific inscriptions--graphs, diagrams, and data--and argumentation are integral to learning and communicating science and are common elements in cyberlearning environments--those involving the use of networked learning technologies. However, previous research has indicated that learners struggle to use inscriptions and when they engage in…
Descriptors: Scaffolding (Teaching Technique), Internet, Electronic Learning, Web Based Instruction

Peer reviewed
Direct link
