NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)9
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 9 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Rashkovits, Rami; Lavy, Ilana – Journal of Information Technology Education, 2011
This study discusses and presents various strategies employed by novice programmers concerning exception handling. The main contributions of this paper are as follows: we provide an analysis tool to measure the level of assimilation of exception handling mechanism; we present and analyse strategies to handle exceptions; we present and analyse…
Descriptors: Foreign Countries, Programming Languages, Computer Software, Computer Software Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Christ, Oliver; Weber, Christoph; Sato, Toshihiko – Behaviour & Information Technology, 2012
In this study, the electronic revision and recapitulation tools 2.0 (EREP 2.0) were used to foster creative moments while creating aided recalls (ARs) (pictures electronic notes etc.). Creative and critical thinking is associated with vital skills which enable students to deal with often complex knowledge domains through an informal way of…
Descriptors: Foreign Countries, Comprehension, Creativity, Classification
Peer reviewed Peer reviewed
Direct linkDirect link
Maabreh, Majdi A.; Al-Kabi, Mohammed N.; Alsmadi, Izzat M. – Program: Electronic Library and Information Systems, 2012
Purpose: This study is an attempt to develop an automatic identification method for Arabic web queries and divide them into several query types using data mining. In addition, it seeks to evaluate the impact of the academic environment on using the internet. Design/methodology/approach: The web log files were collected from one of the higher…
Descriptors: Semitic Languages, Web Sites, Search Engines, Classification
Peer reviewed Peer reviewed
Direct linkDirect link
Angus, Emma; Stuart, David; Thelwall, Mike – Journal of Librarianship and Information Science, 2010
Many web 2.0 sites are extremely popular and contain vast amounts of content, but how much of this content is useful in academia? This exploratory paper investigates the potential use of the popular web 2.0 image site Flickr as an academic image resource. The study identified images tagged with any one of 12 subject names derived from recognized…
Descriptors: Citation Indexes, Content Analysis, Internet, Scientific and Technical Information
Peer reviewed Peer reviewed
Direct linkDirect link
Magnisalis, I.; Demetriadis, S.; Karakostas, A. – IEEE Transactions on Learning Technologies, 2011
This study critically reviews the recently published scientific literature on the design and impact of adaptive and intelligent systems for collaborative learning support (AICLS) systems. The focus is threefold: 1) analyze critical design issues of AICLS systems and organize them under a unifying classification scheme, 2) present research evidence…
Descriptors: Evidence, Instructional Design, Bibliographic Databases, Classification
Peer reviewed Peer reviewed
Direct linkDirect link
Lavoue, Elise; George, Sebastien; Prevot, Patrick – Behaviour & Information Technology, 2012
In this article, we present a co-adaptive design approach named TE-Cap (Tutoring Experience Capitalisation) that we applied for the development of an assistance environment for tutors. Since tasks assigned to tutors in educational contexts are not well defined, we are developing an environment which responds to needs which are not precisely…
Descriptors: Foreign Countries, Tutors, Tutoring, College Faculty
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Djajadikerta, Hadrian G.; Trireksani, Terri; Djajadikerta, Hamfri – International Education Studies, 2008
Today's institutions of higher education are facing an increased number of significant challenges taking place in the political, economic, social and technological environment. Accordingly, the issues of performance, accountability, and marketing strategies have become ever more important. It has been suggested that universities that are more…
Descriptors: Quality Assurance, Web Sites, Accounting, User Satisfaction (Information)
Peer reviewed Peer reviewed
Direct linkDirect link
Robbins, Russell W.; Butler, Brian S. – Journal of Information Systems Education, 2009
Like any infrastructure technology, Virtual World (VW) platforms provide affordances that facilitate some activities and hinder others. Although it is theoretically possible for a VW platform to support all types of activities, designers make choices that lead technologies to be more or less suited for different learning objectives. Virtual World…
Descriptors: Computer Assisted Instruction, Barriers, Educational Objectives, Teaching Methods