Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Algorithms | 2 |
| Behavior Patterns | 2 |
| Accuracy | 1 |
| Artificial Intelligence | 1 |
| COVID-19 | 1 |
| Cognitive Style | 1 |
| Computer Science Education | 1 |
| Computer Security | 1 |
| Computer Simulation | 1 |
| Computer Software | 1 |
| Correlation | 1 |
| More ▼ | |
Source
| Education and Information… | 2 |
Author
| Abdelhadi Raihani | 1 |
| Bouchaib Cherradi | 1 |
| Jakub Rudolf Mlynárik | 1 |
| Karolína Dockalová Burská | 1 |
| Mohammed Jebbari | 1 |
| Radek Ošlejšek | 1 |
| Soufiane Hamida | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Research | 2 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mohammed Jebbari; Bouchaib Cherradi; Soufiane Hamida; Abdelhadi Raihani – Education and Information Technologies, 2024
With the advancements in technology and the growing demand for online education, Virtual Learning Environments (VLEs) have experienced rapid development in recent years. This demand was especially evident during the COVID-19 pandemic. The incorporation of new technologies in VLEs provides new opportunities to better understand the behaviors of…
Descriptors: MOOCs, Algorithms, Computer Simulation, COVID-19
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods

Peer reviewed
Direct link
