NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 22 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Moraes, Eduardo Baldo; Kipper, Liane Mahlmann; Hackenhaar Kellermann, Ana Clara; Austria, Leonardo; Leivas, Pedro; Moraes, Jorge André Ribas; Witczak, Marcus – Interactive Technology and Smart Education, 2023
Purpose: The purpose of this study is to identify the uses of Industry 4.0 technologies in the area of education and how they contribute to learning in addition to highlighting at what educational level they are used. Design/methodology/approach: A systematic literature review was carried out in the Scopus (Elsevier), Web of Science and…
Descriptors: Educational Technology, Internet, Computer Simulation, Higher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alexandra Rysul'ova – NORDSCI, 2023
Virtual worlds, like Second Life, are transformative innovations in education. These immersive 3D environments offer teachers and students unique opportunities beyond traditional classrooms. They foster active learning, allowing students to interact, manipulate objects, and engage with diverse content. This multimodal approach accommodates various…
Descriptors: Information Security, Computer Simulation, Barriers, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nurten Gündüz; Mehmet Sincar – International Journal of Contemporary Educational Research, 2024
The metaverse which is considered as the digital big bang of humanity and the next evolution of the internet is anticipated to offer a living environment for civilization 5.0 and beyond in various domains including education. Each novice technology that enters our daily lives generates also fear, anxiety, and problems as well as hope, benefit, and…
Descriptors: Higher Education, Computer Simulation, Ethics, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Simpson, Joseph; Brantly, Aaron – Journal of Cybersecurity Education, Research and Practice, 2022
Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related…
Descriptors: Information Security, Undergraduate Students, Gamification, Literature Reviews
Peer reviewed Peer reviewed
Direct linkDirect link
Chander, Romesh; Dhar, Meghna; Bhatt, Ketan – Journal of Access Services, 2022
With the rising cases of theft, vandalism, mutilation, infiltration, and other fraudulent practices at academic libraries, the matter of library security has become a matter of greater concern for modern-day library professionals as well as scholars in the field of library and information science. Considering the seriousness of the issue, the…
Descriptors: Bibliometrics, Academic Libraries, Information Security, Crime
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Workman, Michael D. – Journal of Cybersecurity Education, Research and Practice, 2021
Cybersecurity capabilities in organizations and governmental agencies continue to lag behind the threats. Given the current environment, these entities have placed renewed emphasis on cybersecurity education. However, education appears to lack its full potential in most settings. Few empirical studies have systematically tested the efficacy of…
Descriptors: Computer Security, Information Security, Computer Science Education, Instructional Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Huang, Wanju – TechTrends: Linking Research and Practice to Improve Learning, 2023
A design case is a form of scholarly writing in which the author embarks on a reflective journey sharing rich descriptions of their design, design processes, challenges, etc. This paper presents two design cases that demonstrate how learning theories and instructional design concepts were purposefully incorporated in two instructional applications…
Descriptors: Learning Processes, Instructional Design, Learning Theories, Artificial Intelligence
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nonkanyiso Pamella Shabalala – Research in Social Sciences and Technology, 2024
The integration of Artificial Intelligence (AI) into Open Distance eLearning (ODeL) represents a significant evolution in STEM education, offering transformative benefits in teaching, learning and administrative processes. This conceptual paper explores how AI-driven platforms are revolutionising ODeL by providing personalised learning…
Descriptors: STEM Education, Distance Education, Artificial Intelligence, Educational Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ravendran, Saravnesvaran; Karpudewan, Mageswary; Ali, Mohd Norawi; Lay, Yoon Fah – Malaysian Online Journal of Educational Sciences, 2023
The Fourth Industrial Revolution (4IR) refers to the current rapid technological growth that fundamentally changes how humans live. 4IR is essential to improve higher education worldwide and develop crucial skills such as e-learning and innovation, information and media technology, and life and career skills. This study aims to assess the…
Descriptors: Technological Advancement, Foreign Countries, Technological Literacy, Pedagogical Content Knowledge
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Abdul-Alim, Jamaal – Journal of College Admission, 2021
College advisers were forced by COVID-19 to adapt the services they offer to effectively reach students online. While many say they have discovered more innovative and efficient ways to reach students, they also report a fair amount of challenges that have made certain tasks--such as protecting student privacy or working through the Free…
Descriptors: Academic Advising, Educational Change, Barriers, COVID-19
Goger, Annelies; Parco, Allyson; Vegas, Emiliana – Brookings Institution, 2022
The rapid expansion of new technologies into every sector has contributed to the proliferation of alternative models of education, learning, and skill signaling in global labor markets. From digital badges to bootcamps to learning and employment records (LERs), a wide range of public, private, and nonprofit initiatives and platforms have emerged…
Descriptors: Technological Literacy, Information Technology, Credentials, Information Storage
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim – Information Systems Education Journal, 2018
Academics are responding to the call from industry for graduates armed with cybersecurity skills. A common challenge that educators face is creating effective cybersecurity curriculum that prepares students with practical skills upon graduation. While hands-on exercises are a powerful method for teaching and assessing cybersecurity skills, these…
Descriptors: Information Security, Information Science Education, Teaching Methods, Skill Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Serapiglia, Anthony – Information Systems Education Journal, 2016
Through industry news as well as contemporary reporting, the topic of computer security has become omnipresent in our daily lives. Whether the news is about corporate data breaches, international cyber espionage, or personal data compromises and identity theft--EVERYONE has had to deal with digital security in some way. Because of this, one of the…
Descriptors: Competition, Undergraduate Students, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Calhoun, Cheryl D. – Community College Journal of Research and Practice, 2017
The main goal of this project is to expand cybersecurity curriculum. This was accomplished by developing six new courses. The curriculum for each course utilized a common online course for all class formats including web-enhanced, hybrid, or online. In this article, we will discuss the online components used, faculty professional development, and…
Descriptors: Blended Learning, Information Security, Community Colleges, Information Technology
Previous Page | Next Page »
Pages: 1  |  2