Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Author
Alverez, Omar | 1 |
Bettati, Riccardo | 1 |
Cifuentes, Laurent | 1 |
Danielle S. McNamara | 1 |
Elizabeth Reilley | 1 |
Ishrat Ahmed | 1 |
Mercer, Rene | 1 |
Paul Alvarado | 1 |
Rowe, Neil C. | 1 |
Schiavo, Sandra | 1 |
Siddharth Jain | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 3 |
Journal Articles | 2 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Arizona | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Ishrat Ahmed; Paul Alvarado; Siddharth Jain; Tracy Arner; Elizabeth Reilley; Danielle S. McNamara – Grantee Submission, 2025
The rapid evolution of artificial intelligence (AI) has created an unprecedented opportunity for innovation across industries, but its complexity often presents a steep learning curve for many (Roberts & Candi, 2024; Gunner, 2025). This highlights the need for user-friendly tools that bridge the gap between AI's potential and its practical…
Descriptors: State Universities, Artificial Intelligence, Usability, Innovation
Cifuentes, Laurent; Mercer, Rene; Alverez, Omar; Bettati, Riccardo – TechTrends: Linking Research and Practice to Improve Learning, 2010
We report on the design, development, implementation, and evaluation of a case-based instructional environment designed for learning network engineering skills for cybersecurity. We describe the societal problem addressed, the theory-based solution, and the preliminary testing and evaluation of that solution. We identify an architecture for…
Descriptors: Case Method (Teaching Technique), Problem Solving, Scaffolding (Teaching Technique), Instructional Design

Rowe, Neil C.; Schiavo, Sandra – Computers & Education, 1998
Describes an intelligent tutor incorporating a program using artificial-intelligence planning methods to generate realistic audit files reporting actions of simulated users and intruders of a UNIX system, and a program simulating the system afterwards that asks students to inspect the audit and fix problems. Experiments show that students using…
Descriptors: Alarm Systems, Artificial Intelligence, Computer Assisted Instruction, Computer Networks