Publication Date
In 2025 | 3 |
Since 2024 | 4 |
Descriptor
Source
Education and Information… | 1 |
Interactive Learning… | 1 |
Journal of Information… | 1 |
Knowledge Management &… | 1 |
Author
Agus Wedi | 1 |
Bo-Yang Shan | 1 |
Daniel L. Segal | 1 |
David Kocsis | 1 |
Ence Surahman | 1 |
Izzul Fatawi | 1 |
Jiangyue Liu | 1 |
Jing Ma | 1 |
Morgan Shepherd | 1 |
Rex Bringula | 1 |
Saida Ulfa | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 4 |
Tests/Questionnaires | 3 |
Education Level
Secondary Education | 2 |
Elementary Education | 1 |
High Schools | 1 |
Higher Education | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Postsecondary Education | 1 |
Audience
Location
Taiwan | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Tutorial Programs, Computer Science Education, Computer Security, Programming
Saida Ulfa; Ence Surahman; Agus Wedi; Izzul Fatawi; Rex Bringula – Knowledge Management & E-Learning, 2025
Online assessment is one of the important factors in online learning today. An online summary assessment is an example of an open-ended question, offering the advantage of probing students' understanding of the learning materials. However, grading students' summary writings is challenging due to the time-consuming process of evaluating students'…
Descriptors: Knowledge Management, Automation, Documentation, Feedback (Response)
Shian-Shyong Tseng; Tsung-Yu Yang; Wen-Chung Shih; Bo-Yang Shan – Interactive Learning Environments, 2024
In this paper, to handle the problem of the quick evolution of cyber-security attacks, we developed the iMonsters board game and proposed the attack and defense knowledge self-evolving algorithm. Three versions of the iMonsters were launched in 2013, 2017, and 2019, respectively. Accordingly, the cyber-security ontology can be refined by the…
Descriptors: Educational Games, Computer Security, Computer Science Education, Game Based Learning
Jiangyue Liu; Jing Ma; Siran Li – Education and Information Technologies, 2025
This study developed a school-based AI curriculum suitable for senior high school students, with the primary objective of enhancing their mastery of knowledge and proficiency in AI, as well as their computational thinking abilities. The curriculum was designed with an awareness of the practical challenges encountered by the subject school in their…
Descriptors: Artificial Intelligence, Technology Uses in Education, Curriculum Design, Computation