Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 4 |
Descriptor
| Computer Software | 4 |
| Training Methods | 4 |
| Artificial Intelligence | 2 |
| Computer Science Education | 2 |
| Correlation | 2 |
| Cues | 2 |
| Instructional Effectiveness | 2 |
| Time Management | 2 |
| Visual Aids | 2 |
| Air Transportation | 1 |
| Algorithms | 1 |
| More ▼ | |
Source
| Applied Cognitive Psychology | 1 |
| Education and Information… | 1 |
| Grantee Submission | 1 |
| Interactive Technology and… | 1 |
Author
| Bender, Angela D. | 1 |
| Black, Stephanie C. | 1 |
| Elizabeth Chason | 1 |
| Erin Wilson | 1 |
| Jakub Rudolf Mlynárik | 1 |
| Karasavvidis, Ilias | 1 |
| Karolína Dockalová Burská | 1 |
| Kristin Mullen | 1 |
| Loft, Shayne | 1 |
| Meiyi Ma | 1 |
| Noah Mladenovski | 1 |
| More ▼ | |
Publication Type
| Reports - Research | 4 |
| Journal Articles | 3 |
| Speeches/Meeting Papers | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| Tennessee (Nashville) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Black, Stephanie C.; Bender, Angela D.; Whitney, Susannah J.; Loft, Shayne; Visser, Troy A. W. – Applied Cognitive Psychology, 2022
Increasingly higher demands are being made on the capacity-limited cognitive capabilities of human operators as they strive to maintain situation awareness (i.e., understanding "what is going on") and performance in complex tasks. In the current study we asked whether: (a) training administered via a mobile phone-based app could improve…
Descriptors: Time Management, Executive Function, Difficulty Level, Performance
Ragazou, Vasiliki; Karasavvidis, Ilias – Interactive Technology and Smart Education, 2023
Purpose: Software training is a new trend in software applications. A key problem with software training is that video tutorials are developed without considering the target audience. Although video tutorials are popular, little attention is given to their design features. This study aims to investigate how two multimedia research principles,…
Descriptors: Visual Aids, Cues, Task Analysis, Video Technology
Peer reviewedZirong Chen; Elizabeth Chason; Noah Mladenovski; Erin Wilson; Kristin Mullen; Stephen Martini; Meiyi Ma – Grantee Submission, 2025
Emergency response services are vital for enhancing public safety by safeguarding the environment, property, and human lives. As frontline members of these services, 9-1-1 dispatchers have a direct impact on response times and the overall effectiveness of emergency operations. However, traditional dispatcher training methods, which rely on…
Descriptors: Computational Linguistics, Cues, Emergency Programs, Safety

Direct link
