NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Ting Ding; Mengqi Zhang – International Journal of Web-Based Learning and Teaching Technologies, 2024
The level of information technology is increasing, and technology is developed. University English teaching has also changed under its influence. Different from the traditional teaching in the past, more and more students adopt the mode of "Internet + Smartphone" to learn English. This paper proposes a teaching mode evaluation method in…
Descriptors: English for Special Purposes, Educational Change, Business Administration Education, Data
Luke Keele; Matthew Lenard; Lindsay Page – Annenberg Institute for School Reform at Brown University, 2021
In education settings, treatments are often non-randomly assigned to clusters, such as schools or classrooms, while outcomes are measured for students. This research design is called the clustered observational study (COS). We examine the consequences of common support violations in the COS context. Common support violations occur when the…
Descriptors: Cluster Grouping, Educational Environment, Outcomes of Treatment, Compliance (Psychology)