Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 8 |
Descriptor
Source
Continuing Higher Education… | 2 |
Campus Technology | 1 |
Discover Education | 1 |
International Association for… | 1 |
International Journal for… | 1 |
Journal of Educational Data… | 1 |
Language Assessment Quarterly | 1 |
Author
Aceves, Patricia A. | 1 |
Aceves, Robert I. | 1 |
Ashley Kenway | 1 |
Edwards, John | 1 |
Gale, Doug | 1 |
Gibson Uwaezuoke Mba | 1 |
Hart, Kaden | 1 |
Kieron Dowden-Smith | 1 |
Livinus Obiora Nweke | 1 |
McNabb, Lori | 1 |
Murray, Neil | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 4 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Information Analyses | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 8 |
Adult Education | 1 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Australia | 2 |
United Kingdom (England) | 2 |
Asia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
More ▼ |
Laws, Policies, & Programs
Higher Education Act 1965 | 1 |
Assessments and Surveys
ACT Assessment | 1 |
What Works Clearinghouse Rating
Livinus Obiora Nweke; Uchenna Franklin Okebanama; Gibson Uwaezuoke Mba – Discover Education, 2025
The integration of Internet of Things (IoT), Artificial Intelligence (AI), and cybersecurity presents new opportunities for innovation and entrepreneurship, yet traditional educational approaches often lack the interdisciplinary and applied focus required to develop these competencies. This study evaluates the impact of an experiential learning…
Descriptors: Entrepreneurship, Artificial Intelligence, Internet, Information Security
Students as Contested: Exploring Issues of Student Identity and Identification in Educational Spaces
Ashley Kenway; Phil Wilkinson; Kieron Dowden-Smith – International Journal for Students as Partners, 2019
This article explores issues of student identity and identification through a third-space theory lens. In addition, it positions this use of third-space theory as contributory to Students-as-Partners (SaP) approaches to teaching and learning. Naturally, this research was constructed as a SaP project, and research was undertaken as a collaboration…
Descriptors: Self Concept, Undergraduate Students, Student Attitudes, Resistance (Psychology)
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Murray, Neil – Language Assessment Quarterly, 2014
The growing number of students from increasingly diverse backgrounds--both English speaking and non-English speaking--entering English-medium institutions of higher education has put unprecedented pressure on universities to think creatively about efficient and cost-effective ways of identifying students at risk linguistically. Having done so,…
Descriptors: Language Tests, English (Second Language), Second Language Learning, Models
McNabb, Lori – Continuing Higher Education Review, 2010
This article discusses the implementation this year of the Department of Education's Higher Education Opportunity Act of 2008 (HEOA), which requires accreditors to ensure that an institution that offers distance or correspondence education has a process in place to establish that a student who registers in a course or program is also the same…
Descriptors: Distance Education, Higher Education, College Students, Identification
Aceves, Patricia A.; Aceves, Robert I. – Continuing Higher Education Review, 2009
Since the signing of the Higher Education Opportunity Act (HEOA) in August 2008, providers of distance education courses and programs have been looking into procedures and technologies that will satisfy the accrediting agencies responsible for enforcing the law. Continuing education administrators are at the forefront because of the pervasiveness…
Descriptors: Distance Education, Continuing Education, Higher Education, Educational Legislation
Gale, Doug – Campus Technology, 2007
The basics of authentication are straightforward. One can prove his or her identity in three ways: (1) something one "has" (for example, a key or a birth certificate); (2) something one "knows" (such as a password); or (3) something one "is" (such as one's fingerprints, used in biometric technologies). In the world of computers and networks, the…
Descriptors: Computer Security, Prevention, Guidelines, Higher Education
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers