NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 17 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Muhammad Farrukh Shahzad; Shuo Xu; Iqra Javed – International Journal of Educational Technology in Higher Education, 2024
As technology continues to advance, the integration of generative artificial intelligence tools in various sectors, including education, has gained momentum. ChatGPT, an extensively recognized language model created by OpenAI, has gained significant importance, particularly in education. This study investigates the awareness, acceptance, and…
Descriptors: Artificial Intelligence, Computer Software, College Students, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Raza, Syed Ali; Khan, Komal Akram – Interactive Technology and Smart Education, 2022
Purpose: Collaboration, communication, critical thinking and creativity are the most essential Cs of education. However, at present, these Cs are interlinked with technology to make it more effective and reliable. Educational technology infuses higher education, many people use it on a daily basis. Students are eager to adopt such technologies…
Descriptors: Academic Achievement, Educational Technology, Higher Education, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Christian Metaxas; Terry Greene; Jessica Malcolm; Njoki Muriithi; Esther Schacter; Mollie Schnurr – OTESSA Journal, 2024
As we enter a new age of technological innovation and subsequent educational instrumentation change, there is increasing demand for innovative methods that encourage student learning experiences in virtual, online spaces. ePortfolios and e-book projects are designed and owned by students and are centered within the student's learning. They provide…
Descriptors: Electronic Publishing, Educational Change, Books, Portfolios (Background Materials)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chinsook, Kittipong; Khajonmote, Withamon; Klintawon, Sununta; Sakulthai, Chaiyan; Leamsakul, Wicha; Jantakoon, Thada – Higher Education Studies, 2022
Big data is an important part of innovation that has recently attracted a lot of interest from academics and practitioners alike. Given the importance of the education industry, there is a growing trend to investigate the role of big data in this field. Much research has been undertaken to date in order to better understand the use of big data in…
Descriptors: Student Behavior, Learning Analytics, Computer Software, Rating Scales
Peer reviewed Peer reviewed
Direct linkDirect link
Marachi, Roxana; Quill, Lawrence – Teaching in Higher Education, 2020
The Canvas Learning Management System (LMS) is used in thousands of universities across the United States and internationally, with a strong and growing presence in K-12 and higher education markets. Analyzing the development of the Canvas LMS, we examine 1) 'frictionless' data transitions that bridge K12, higher education, and workforce data 2)…
Descriptors: Management Systems, Longitudinal Studies, Data Analysis, Higher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim – Information Systems Education Journal, 2018
Academics are responding to the call from industry for graduates armed with cybersecurity skills. A common challenge that educators face is creating effective cybersecurity curriculum that prepares students with practical skills upon graduation. While hands-on exercises are a powerful method for teaching and assessing cybersecurity skills, these…
Descriptors: Information Security, Information Science Education, Teaching Methods, Skill Development
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alharbi, Wafa Owaydhah; Alturki, Khaled Ibrahim – English Language Teaching, 2018
The study aimed to identify the degree of social media contribution to reinforcing digital citizenship meaning from the viewpoint of female students at Imam Mohammed bin Saud Islamic University in Riyadh. The study was an attempt to answer the following two questions in order to achieve the objectives of the study: To which extent does SnapChat…
Descriptors: Social Media, Females, Foreign Countries, College Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zaza, Christine; McKenzie, Amanda – Canadian Journal for the Scholarship of Teaching and Learning, 2018
While the text-matching tool, Turnitin®, has traditionally been used to deter and detect plagiarism, more recently, instructors have started to use this tool for formative self-assessment. To describe Turnitin®'s use in practice and to explore perceptions of this tool, we surveyed 940 students, teaching assistants, and instructors at a Canadian…
Descriptors: Computer Software, Plagiarism, College Students, Formative Evaluation
Brown, David A. – ProQuest LLC, 2017
Information security is a concern for managers implementing protection measures. Implementing information security measures requires communicating both the reason and remediation for the protection measure. Examining how an anti-spyware security communication affects an individual's intention to implement a protection measure could help improve…
Descriptors: College Students, Fear, Intention, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Changchit, Chuleeporn – International Journal of Information and Communication Technology Education, 2015
Cloud computing has become increasingly popular among users and businesses around the world, and education is no exception. Cloud computing can bring an increased number of benefits to an educational setting, not only for its cost effectiveness, but also for the thirst for technology that college students have today, which allows learning and…
Descriptors: Internet, Information Storage, Computer Software, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security
Previous Page | Next Page »
Pages: 1  |  2