Publication Date
In 2025 | 0 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 27 |
Since 2006 (last 20 years) | 80 |
Descriptor
Source
Author
Adhikari, Koushik | 2 |
Bowring, James | 2 |
Burke, Quinn | 2 |
Cavanaugh, Cathy | 2 |
Hargis, Jace | 2 |
Hilburn, Thomas B. | 2 |
Lindshield, Brian L. | 2 |
Mayberry, John | 2 |
Abrizah, A. | 1 |
Ackovska, Nevena | 1 |
Ahamed, Sheikh | 1 |
More ▼ |
Publication Type
Journal Articles | 80 |
Reports - Research | 56 |
Reports - Descriptive | 17 |
Reports - Evaluative | 7 |
Tests/Questionnaires | 3 |
Education Level
Higher Education | 79 |
Postsecondary Education | 72 |
High Schools | 3 |
Secondary Education | 3 |
Adult Education | 2 |
Elementary Secondary Education | 1 |
High School Equivalency… | 1 |
Two Year Colleges | 1 |
Audience
Location
Spain | 8 |
California | 4 |
Canada | 4 |
Taiwan | 4 |
United Kingdom | 4 |
Africa | 3 |
New York | 3 |
China | 2 |
European Union | 2 |
Georgia | 2 |
India | 2 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Melina Verger; Chunyang Fan; Sébastien Lallé; François Bouchet; Vanda Luengo – Journal of Educational Data Mining, 2024
Predictive student models are increasingly used in learning environments due to their ability to enhance educational outcomes and support stakeholders in making informed decisions. However, predictive models can be biased and produce unfair outcomes, leading to potential discrimination against certain individuals and harmful long-term…
Descriptors: Algorithms, Prediction, Bias, Classification
Ainhoa Alvarez; Mikel Villamañe – Interactive Learning Environments, 2024
Assessment is a key element in any course, and providing students with a balance between formative and summative assessments is crucial. Defining such a process is a complex task for teachers and often entails a great workload. This makes it necessary to have tools to help in the assessment process definition and its monitoring. This paper first…
Descriptors: Open Source Technology, Learning Management Systems, Student Evaluation, College Students
Riad, A. B. M. Kamrul; Islam, Md Saiful; Shahriar, Hossain; Zhang, Chi; Valero, Maria; Sneha, Sweta; Ahamed, Sheikh – Information Systems Education Journal, 2021
Mobile device security has become increasingly important in mobile computing. Since the mobile devices and applications are growing rapidly, the security threats are intensified due to mobile app flaws and lack of security consideration in early stages of software development. The unsecure software development process creates a serious weak path…
Descriptors: Handheld Devices, Computer Security, Computer Software, Computer Science Education
Arjan J. F. Kok; Lex Bijlsma; Cornelis Huizing; Ruurd Kuiper; Harrie Passier – Informatics in Education, 2024
This paper presents the first experiences of the use of an online open-source repository with programming exercises. The repository is independent of any specific teaching approach. Students can search for and select an exercise that trains the programming concepts that they want to train and that only uses the programming concepts they already…
Descriptors: Programming Languages, Computer Science Education, Open Source Technology, Teaching Methods
Chenggui Duan – Asian Association of Open Universities Journal, 2024
Purpose: This study aims to examine the factors influencing university students' adoption of open-source software (OSS) within the context of open educational practices (OEP) by applying an extended Unified Theory of Acceptance and Use of Technology (UTAUT 2) model. Design/methodology/approach: The research employs a quantitative approach,…
Descriptors: Open Education, Open Source Technology, Computer Software, Influences
Frydenberg, Mark; Lorenz, Birgy – Information Systems Education Journal, 2020
Learning cybersecurity awareness builds on basic information technology concepts and digital literacy skills. In an effort to raise cybersecurity awareness among information technology students, this paper describes a series of three different interactive sessions offered to students of all levels at a business university. The sessions introduced…
Descriptors: Computer Security, Computer Science Education, Computer Literacy, Information Technology
Sarah McCorkle; Paul Whitener – International Journal of Designs for Learning, 2020
This case study describes a small-scale Lightboard pilot and a full-scale Lightboard build with accompanying studio at a small, private liberal arts college in the southern United States. This article will provide an overview of the Lightboard landscape in higher education, offer considerations for the construction of a Lightboard, and share the…
Descriptors: Educational Technology, Video Technology, Technology Uses in Education, Higher Education
Colvard, Nicholas B.; Watson, C. Edward; Park, Hyojin – International Journal of Teaching and Learning in Higher Education, 2018
There are multiple indicators which suggest that completion, quality, and affordability are the three greatest challenges for higher education today in terms of students, student learning, and student success. Many colleges, universities, and state systems are seeking to adopt a portfolio of solutions that address these challenges. This article…
Descriptors: Success, Educational Resources, Open Source Technology, Adoption (Ideas)
Hussein, Mohammed Juned; Yusuf, Javed; Deb, Arpana Sandhya; Fong, Letila; Naidu, Som – Open Praxis, 2020
COVID-19 is hastening the adoption of online learning and teaching worldwide, and across all levels of education. While many of the typical learning and teaching transactions such as lecturing and communicating are easily handled by contemporary online learning technologies, others, such as assessment of learning outcomes with closed book…
Descriptors: Computer Assisted Testing, Computer Software Evaluation, Supervision, Distance Education
Braught, Grant; MacCormick, John; Bowring, James; Burke, Quinn; Cutler, Barbara; Goldschmidt, David; Krishnamoorthy, Mukkai; Turner, Wesley; Huss-Lederman, Steven; Mackellar, Bonnie; Tucker, Allen – ACM Transactions on Computing Education, 2018
Many computer science programs have capstone experiences or project courses that allow students to integrate knowledge from the full breadth of their major. Such capstone projects may be student-designed, instructor-designed, designed in conjunction with outside companies, or integrated with ongoing free and open source (FOSS) projects. The…
Descriptors: Computer Science Education, Open Source Technology, Computer Software, Social Values
Smith, David; Qayyum, M. Aslm; Hard, Natascha – International Journal for Transformative Research, 2017
Studying via the Internet using information tools is a common activity for students in higher education. With students accessing their subject material via the Internet, studies have shown that students have difficulty understanding the complete purpose of an assessment which leads to poor information search practices. The selection of relevant…
Descriptors: Case Studies, Cues, Computer Assisted Testing, Higher Education
Magdin, Martin – Turkish Online Journal of Educational Technology - TOJET, 2016
In the last decade, e-learning has been a standard part of the educational process at all types of schools--primary, secondary, and high schools. When used, e-learning can achieve significant savings not only in terms of time as well as operating costs. However, e-learning is also often criticized. This is mainly due to direct absence of teachers…
Descriptors: Electronic Learning, Notetaking, Courseware, Usability
Cleveland, Simon; Jackson, Barcus C.; Dawson, Maurice – E-Learning and Digital Media, 2016
With the rise of Web 2.0, microblogging has become a widely accepted phenomenon for sharing information. Moreover, the Twitter platform has become the tool of choice for universities looking to increase their digital footprint. However, scant research addresses the viability of microblogging as a tool to facilitate knowledge creation practices…
Descriptors: Web 2.0 Technologies, Privacy, Electronic Publishing, Social Media
Bradley, Elizabeth G. – Journal of Educational Technology Systems, 2015
In this increasingly digital age, student plagiarism is rampant. Roughly half of college students admit to plagiarizing using content found online, directly copying and pasting the work of others. Digital technology and social media have greatly changed the landscape of how knowledge is acquired and disseminated; thus, students must be explicitly…
Descriptors: Prevention, Plagiarism, Computer Simulation, Teaching Methods
Sudaryono; Padeli; Febriyanto, Erick – Universal Journal of Educational Research, 2017
Raharja College is one of the universities who apply a learning method that is quite different which does not only rely on the conventional learning system in which Teaching and Learning Activity is done by students and lecturers are required to come face to face directly, but also applying e-learning method learning or better known as iLearning…
Descriptors: Foreign Countries, Models, Electronic Learning, Independent Study