Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Information Technology | 3 |
Computer Security | 1 |
Computer Simulation | 1 |
Computers | 1 |
Crime Prevention | 1 |
Distance Education | 1 |
Educational Technology | 1 |
Electronic Learning | 1 |
Feedback (Response) | 1 |
Games | 1 |
Grading | 1 |
More ▼ |
Source
IEEE Transactions on Learning… | 3 |
Author
Africa Lopez-Rey | 1 |
Ahmed, Nafis | 1 |
Calyam, Prasad | 1 |
Chandra, Surendar | 1 |
Felix Garcia-Loro | 1 |
Gustavo R. Alves | 1 |
Manuel Castro | 1 |
Payyavula, Ramya | 1 |
Ricardo Martin Fernandez | 1 |
Rockey, Matthew | 1 |
Russ Meier | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Evaluative | 3 |
Education Level
Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ricardo Martin Fernandez; Felix Garcia-Loro; Gustavo R. Alves; Africa Lopez-Rey; Russ Meier; Manuel Castro – IEEE Transactions on Learning Technologies, 2024
For educational institutions in science, technology, engineering and mathematics (STEM) areas, the provision of practical learning scenarios is, traditionally, a major concern. In the 21st century, the explosion of information and communication technology (ICTs), as well as the universalization of low-cost hardware, has allowed the proliferation…
Descriptors: STEM Education, Vignettes, Teaching Methods, Information Technology
Vekaria, Komal Bhupendra; Calyam, Prasad; Wang, Songjie; Payyavula, Ramya; Rockey, Matthew; Ahmed, Nafis – IEEE Transactions on Learning Technologies, 2021
There is an increasing trend in cloud adoption of enterprise applications in, for example, manufacturing, healthcare, and finance. Such applications are routinely subject to targeted cyberattacks, which result in significant loss of sensitive data (e.g., due to data exfiltration in advanced persistent threats) or valuable utilities (e.g., due to…
Descriptors: Computer Security, Training, Crime Prevention, Information Technology
Chandra, Surendar – IEEE Transactions on Learning Technologies, 2011
The ability of lecture videos to capture the different modalities of a class interaction make them a good review tool. Multimedia capable devices are ubiquitous among contemporary students. Many lecturers are leveraging this popularity by distributing videos of lectures. They depend on the university to provide the video capture infrastructure.…
Descriptors: Computers, Educational Technology, Information Technology, Distance Education