NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nicoletti, Maria do Carmo; de Oliveira, Osvaldo Luiz – Higher Education Studies, 2020
In the literature related to higher education, the concept of dropout has been approached from several perspectives and, over the years, its definition has been influenced by the use of diversified semantic interpretations. In a general higher education environment dropout can be broadly characterized as the act of a student engaged in a course…
Descriptors: Artificial Intelligence, Man Machine Systems, Computation, Prediction
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Victoria – Online Journal of Distance Learning Administration, 2018
Protection of academic integrity in online environments can be challenging. Understanding how the technology works and concerns about each of the methods for monitoring online interactions can assist in the selection of the best proctoring tools. Depending on the content, the type of assessment and the comfort level with the technology, a…
Descriptors: Integrity, Online Courses, Technology Uses in Education, Identification
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Peer reviewed Peer reviewed
Direct linkDirect link
Heather, James – Assessment & Evaluation in Higher Education, 2010
In recent times, "plagiarism detection software" has become popular in universities and colleges, in an attempt to stem the tide of plagiarised student coursework. Such software attempts to detect any copied material and identify its source. The most popular such software is Turnitin, a commercial system used by thousands of institutions…
Descriptors: Plagiarism, Computer Software, Computer Software Evaluation, Computer System Design
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces
Peer reviewed Peer reviewed
Direct linkDirect link
Chang, Wen-Chih; Yang, Hsuan-Che; Shih, Timothy K.; Chao, Louis R. – International Journal of Distance Education Technologies, 2009
E-learning provides a convenient and efficient way for learning. Formative assessment not only guides student in instruction and learning, diagnose skill or knowledge gaps, but also measures progress and evaluation. An efficient and convenient e-learning formative assessment system is the key character for e-learning. However, most e-learning…
Descriptors: Electronic Learning, Student Evaluation, Formative Evaluation, Educational Objectives