Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Descriptor
Correlation | 3 |
Training Methods | 3 |
Workplace Learning | 2 |
Adult Education | 1 |
Adult Learning | 1 |
Aggression | 1 |
Algorithms | 1 |
Artificial Intelligence | 1 |
Behavior Patterns | 1 |
Computer Science Education | 1 |
Computer Security | 1 |
More ▼ |
Author
Amanda Griffiths | 1 |
Iain A. Smith | 1 |
Jakub Rudolf Mlynárik | 1 |
Karolína Dockalová Burská | 1 |
Radek Ošlejšek | 1 |
Robert Lesley | 1 |
Publication Type
Journal Articles | 2 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Education Level
Adult Education | 2 |
Audience
Location
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Iain A. Smith; Amanda Griffiths – International Journal of Training and Development, 2024
The need for workplace training about diversity, equity and inclusion is widely acknowledged. To date, however, there is conflicting evidence as to its effectiveness. Various aspects of design and content may be influential. This study explored the relationship between the terminology used in diversity training and trainee reactions. It employed…
Descriptors: Aggression, Emotional Response, Workplace Learning, Correlation
Robert Lesley – ProQuest LLC, 2024
The focus of this study was derived from staggering attrition rates that it calls centers year over year. At times call centers post-COVID-19 pandemic saw attrition rates fluctuating between 30%-50%. With any job there are challenges that are faced. These attrition rates stand 28%-40% higher than the United States 2023 national attrition rates of…
Descriptors: Staff Orientation, Performance Based Assessment, Quality Assurance, Utilities
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods