NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 116 results Save | Export
Frank Morley; Emma Walland – Research Matters, 2025
The recent development of Large Language Models (LLMs) such as Claude, Gemini, and GPT has led to widespread attention on potential applications of these models. Marking exams is a domain which requires the ability to interpret and evaluate student responses (often consisting of written text), and the potential for artificial intelligence (AI)…
Descriptors: Ethics, Artificial Intelligence, Automation, Scoring
Peer reviewed Peer reviewed
PDF on ERIC Download full text
R. Ravichandran; Sonam Singh; P. Sasikala – Journal of Cybersecurity Education, Research and Practice, 2025
This study investigates the awareness and practices of cyber security among school teachers, exploring their understanding of cyber threats, online behaviours, and response mechanisms to cyber incidents. A structured questionnaire was administered to gather data on demographic information, cyber security training, online practices, and experiences…
Descriptors: Computer Security, Information Security, Teacher Characteristics, Training
Peer reviewed Peer reviewed
Direct linkDirect link
Basil Hanafi; Mohammad Ali; Devyaani Singh – Discover Education, 2025
Quantum computing is the beginning of a new age for diverse industries, and educational technologies will significantly benefit from such quantum developments. This is a novel approach, applying quantum algorithms to enhance educational technologies, with no previous studies addressing the integration of quantum computing for personalized…
Descriptors: Educational Technology, Computer Security, Ethics, Algorithms
Peer reviewed Peer reviewed
Direct linkDirect link
Hae Sun Jung; Haein Lee; Keon Chul Park – SAGE Open, 2025
This study investigates user experience (UX) priorities in early childhood education applications by analyzing Korean-language user reviews using Bidirectional Encoder Representations from Transformers topic modeling (BERTopic). Eighteen latent topics were extracted and systematically mapped to the eight software quality characteristics defined by…
Descriptors: Early Childhood Education, Computer Uses in Education, Computer Software, Usability
Peer reviewed Peer reviewed
Direct linkDirect link
Hendrickson, Peggy Bell – College and University, 2021
This article is the second of a two-part series on best practices in receiving digital documents. Part I focused on national databases, third-party digital repositories, institutional websites, and certified documents. Part II looks at a problematic and prevalent of digital records options: email attachments. It discusses the security of email and…
Descriptors: Electronic Mail, Computer Security, Computer Uses in Education, Information Management
Peer reviewed Peer reviewed
Direct linkDirect link
Noah Glaser; Zeinab Parishani; Amogh Chetankumar Joshi; Prasad Calyam – Technology, Knowledge and Learning, 2025
As Virtual Reality (VR) gains traction in education, its potential to support neurodivergent learners in cybersecurity training remains underexplored. This emerging technology report examines how VR can bridge the gap between STEM education and cybersecurity training for neurodivergent individuals, highlighting both its promise and the challenges…
Descriptors: Computer Simulation, Computer Uses in Education, Computer Science Education, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Topuz, Arif Cem; Saka, Eda; Fatsa, Ömer Faruk; Kursun, Engin – Smart Learning Environments, 2022
The COVID-19 pandemic caused many educational institutions in the world to switch to the distance education process, and this process was called "Emergency Remote Teaching". This urgent transition process has caused many problems in educational environments. One of the problems is the subject of measurement and evaluation. Along with the…
Descriptors: COVID-19, Pandemics, Distance Education, Student Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
R., Gurunath; Samanta, Debabrata – International Journal of Web-Based Learning and Teaching Technologies, 2022
Semantic Web technology is not new as most of us contemplate; it has evolved over the years. Linked Data web terminology is the name set recently to the Semantic Web. Semantic Web is a continuation of Web 2.0 and it is to replace existing technologies. It is built on Natural Language processing and provides solutions to most of the prevailing…
Descriptors: Semantics, Web 2.0 Technologies, Internet, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Moorefield-Lang, Heather – Knowledge Quest, 2020
Digital citizenship is defined as the responsible and appropriate behavior in technology and online use. This behavior can also include digital or online etiquette, ethics, and security. With online bullying and cyber safety a continuous concern, teaching students to be responsible and aware digital citizens is imperative (Phillips and Lee 2019).…
Descriptors: Computer Use, Internet, Social Behavior, Death
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Esra Merve Çaliskan; I?rem I?tegin – Journal of Cybersecurity Education, Research and Practice, 2024
With the development of technology, security, a core human concern throughout history, has changed and branched out into new areas. Novel security concepts, including environmental security, economic security, and cybersecurity, have emerged as a result of these expanding areas. The importance of cybersecurity has increased in the linked world of…
Descriptors: Gender Differences, Computer Security, Information Security, Sex Role
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Arikli, Güven – Turkish Online Journal of Educational Technology - TOJET, 2023
Real-life threats are at the root of all possible threats to be encountered on the Internet. All risk headings for the Internet are situations that can be encountered in real life. Therefore, we should pay attention to the risks of the virtual world by learning to use the internet consciously, safely and effectively, and by teaching our children…
Descriptors: Internet, Computer Use, Child Safety, Family Role
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nurten Gündüz; Mehmet Sincar – International Journal of Contemporary Educational Research, 2024
The metaverse which is considered as the digital big bang of humanity and the next evolution of the internet is anticipated to offer a living environment for civilization 5.0 and beyond in various domains including education. Each novice technology that enters our daily lives generates also fear, anxiety, and problems as well as hope, benefit, and…
Descriptors: Higher Education, Computer Simulation, Ethics, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Susanne Walan – International Journal of Technology and Design Education, 2025
Since the end of 2022, global discussions on Artificial Intelligence (AI) have surged, influencing diverse societal groups, such as teachers, students and policymakers. This case study focuses on Swedish primary school students aged 11-12. The aim is to examine their cognitive and affective perceptions of AI and their current usage. Data,…
Descriptors: Foreign Countries, Elementary School Students, Artificial Intelligence, Student Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ghosh, Swagata; Chauhan, Gajendra Singh; Kotwal, Renu – Digital Education Review, 2023
The COVID-19 pandemic has fast-tracked the development of digital applications and inspired everyone to adapt to the technologies to curb the spread of outbreak. As this crisis intensifies, the rapid usage of digital devices and apps has echoed the serious concerns about civil liberties, privacy, and data protection. Considering the situation,…
Descriptors: Foreign Countries, Youth, Digital Literacy, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jamal, Bakht; Rizvi, Syed Asad Abbas – Pakistan Journal of Distance and Online Learning, 2023
This paper intended to analyze the practices of digital citizenship among university student in Pakistan. The quantitative descriptive survey research design was adopted for this study. The population of the study was 800 students of BS (Education) program in ten public sector universities in Punjab, Pakistan. Simple random sampling technique was…
Descriptors: Foreign Countries, Technological Literacy, College Students, Computer Use
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8