NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Family Educational Rights and…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 98 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Tian Luo; Pauline S. Muljana; Xinyue Ren; Dara Young – Educational Technology Research and Development, 2025
The emergence of generative artificial intelligence (GenAI) has caused significant disruptions on a global scale in various workplace settings, including the field of instructional design (ID). Given the paucity of research investigating the impact of GenAI on ID work, we conducted a mixed methods study to understand instructional designers (IDs)'…
Descriptors: Artificial Intelligence, Familiarity, Instructional Design, Brainstorming
Peer reviewed Peer reviewed
Direct linkDirect link
Anna Filighera; Sebastian Ochs; Tim Steuer; Thomas Tregel – International Journal of Artificial Intelligence in Education, 2024
Automatic grading models are valued for the time and effort saved during the instruction of large student bodies. Especially with the increasing digitization of education and interest in large-scale standardized testing, the popularity of automatic grading has risen to the point where commercial solutions are widely available and used. However,…
Descriptors: Cheating, Grading, Form Classes (Languages), Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ally, Said – International Journal of Education and Development using Information and Communication Technology, 2022
Moodle software has become the heart of teaching and learning services in education. The software is viewed as a trusted modern platform for transforming learning and teaching modes from conventional face-to-face to fully online classes. However, its use for online examination is very limited despite having a state-of-the-art Quiz Module with…
Descriptors: Integrated Learning Systems, Computer Assisted Testing, Information Security, Evaluation Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Daire Maria Ni Uanachain; Lila Ibrahim Aouad – Thresholds in Education, 2025
This chapter investigates the dual role of Generative AI (GenAI) in providing support and feedback to students and in reshaping formative and summative educational assessments, addressing both the burgeoning opportunities for enhancing teaching methodologies and the associated ethical challenges. There is a focus on the necessity for balanced…
Descriptors: Artificial Intelligence, Computer Software, Technology Integration, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Simpson, Joseph; Brantly, Aaron – Journal of Cybersecurity Education, Research and Practice, 2022
Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related…
Descriptors: Information Security, Undergraduate Students, Gamification, Literature Reviews
Peer reviewed Peer reviewed
Direct linkDirect link
Vaiopoulou, Julie; Papadakis, Stamatios; Sifaki, Eirini; Kalogiannakis, Michail; Stamovlasis, Dimitrios – Education and Information Technologies, 2023
This study explored certain popular educational apps' vital characteristics and potential profiles (n1 = 50) for kindergarten kids. The profile analysis involved a categorization ascended from an evaluation process conducted by pre-service early childhood teachers' (n2 = 295) at the University of Crete, Greece, using a new instrument, validated in…
Descriptors: Foreign Countries, Young Children, Kindergarten, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Livinus Obiora Nweke; Uchenna Franklin Okebanama; Gibson Uwaezuoke Mba – Discover Education, 2025
The integration of Internet of Things (IoT), Artificial Intelligence (AI), and cybersecurity presents new opportunities for innovation and entrepreneurship, yet traditional educational approaches often lack the interdisciplinary and applied focus required to develop these competencies. This study evaluates the impact of an experiential learning…
Descriptors: Entrepreneurship, Artificial Intelligence, Internet, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Muhammad Farrukh Shahzad; Shuo Xu; Iqra Javed – International Journal of Educational Technology in Higher Education, 2024
As technology continues to advance, the integration of generative artificial intelligence tools in various sectors, including education, has gained momentum. ChatGPT, an extensively recognized language model created by OpenAI, has gained significant importance, particularly in education. This study investigates the awareness, acceptance, and…
Descriptors: Artificial Intelligence, Computer Software, College Students, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Huiling Ma; Lilliati Ismail; Weijing Han – Education and Information Technologies, 2024
The advancement and application of Artificial Intelligence (AI) has introduced innovative changes in language learning and teaching. In particular, the widespread utilization of various chatbots as foreign language learning partners showcases their remarkable potential contribution to the field. Nevertheless, there are currently few studies that…
Descriptors: Bibliometrics, Artificial Intelligence, Computer Software, Second Language Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Blažic, Borka Jerman – Education and Information Technologies, 2022
Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour…
Descriptors: Foreign Countries, Computer Science Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7