Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Descriptor
Instructional Design | 3 |
Training Methods | 3 |
Algorithms | 1 |
Artificial Intelligence | 1 |
Attitudes | 1 |
Behavior Patterns | 1 |
Beliefs | 1 |
Best Practices | 1 |
Computer Science Education | 1 |
Computer Security | 1 |
Computer Simulation | 1 |
More ▼ |
Author
Fei Wang | 1 |
Jakub Rudolf Mlynárik | 1 |
Karolína Dockalová Burská | 1 |
Radek Ošlejšek | 1 |
Ruggiero Lovreglio | 1 |
Song Lu | 1 |
Stephen Francis Fick | 1 |
Xiaoming Yuan | 1 |
Zhenan Feng | 1 |
Publication Type
Journal Articles | 2 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Stephen Francis Fick – ProQuest LLC, 2024
Instructional designers and professional trainers conduct many different types of training. However, some topics are job- and- task-specific and are more effectively taught by subject matter expert (SME) trainers. In some cases, these SMEs are given training and/or instructional design (ID) resources, and in other cases they have to learn best…
Descriptors: Instructional Design, Expertise, Pedagogical Content Knowledge, Intellectual Disciplines
Song Lu; Zhenan Feng; Ruggiero Lovreglio; Fei Wang; Xiaoming Yuan – Journal of Computer Assisted Learning, 2024
Background Study: Virtual reality (VR) is becoming a popular technology for safety training in construction. Several VR training prototypes have been designed and tested, which show they can perform better than traditional training tools. However, most of these existing tools are not underpinned by clear pedagogical theory, and studies assessing…
Descriptors: Computer Simulation, Safety Education, Technology Uses in Education, Construction Industry
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods