Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Author
Blessing, Stephen B. | 1 |
Deb, Arpana Sandhya | 1 |
Fong, Letila | 1 |
Gandole, Yogendra Babarao | 1 |
Gilbert, Stephen B. | 1 |
Hunt, Jared | 1 |
Hussein, Mohammed Juned | 1 |
Kleckner, Michelle | 1 |
Li, Yang | 1 |
Naidu, Som | 1 |
Ourada, Stephen | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 3 |
Reports - Evaluative | 2 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Two Year Colleges | 1 |
Location
Fiji | 1 |
India | 1 |
Iowa | 1 |
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hussein, Mohammed Juned; Yusuf, Javed; Deb, Arpana Sandhya; Fong, Letila; Naidu, Som – Open Praxis, 2020
COVID-19 is hastening the adoption of online learning and teaching worldwide, and across all levels of education. While many of the typical learning and teaching transactions such as lecturing and communicating are easily handled by contemporary online learning technologies, others, such as assessment of learning outcomes with closed book…
Descriptors: Computer Assisted Testing, Computer Software Evaluation, Supervision, Distance Education
Ozgur, Ceyhun; Kleckner, Michelle; Li, Yang – SAGE Open, 2015
The need for analysts with expertise in big data software is becoming more apparent in today's society. Unfortunately, the demand for these analysts far exceeds the number available. A potential way to combat this shortage is to identify the software taught in colleges or universities. This article will examine four data analysis software--Excel…
Descriptors: Computer Software Selection, Computer Software Evaluation, Statistics, Spreadsheets
Hunt, Jared; Tompkins, Patrick – Inquiry, 2014
The plagiarism detection programs SafeAssign and Turnitin are commonly used at the collegiate level to detect improper use of outside sources. In order to determine whether either program is superior, this study evaluated the programs using four standards: (1) the ability to detect legitimate plagiarism, (2) the ability to avoid false positives,…
Descriptors: Comparative Analysis, Computer Software, Plagiarism, Computational Linguistics
Gandole, Yogendra Babarao – Journal of Educational Technology, 2011
The roles of teachers and students are changing, and there are undoubtedly ways of learning not yet discovered. However, the computer and software technology may provide a significant role to identify the problems, to present solutions and life-long learning. It is clear that the computer based educational technology has reached the point where…
Descriptors: Electronics, Laboratory Experiments, Computer Software, Computer Simulation
Blessing, Stephen B.; Gilbert, Stephen B.; Ourada, Stephen; Ritter, Steven – International Journal of Artificial Intelligence in Education, 2009
Intelligent Tutoring Systems (ITSs) that employ a model-tracing methodology have consistently shown their effectiveness. However, what evidently makes these tutors effective, the cognitive model embedded within them, has traditionally been difficult to create, requiring great expertise and time, both of which come at a cost. Furthermore, an…
Descriptors: Intelligent Tutoring Systems, Cognitive Processes, Models, Expertise