Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 13 |
Descriptor
Computer Science | 15 |
Identification | 15 |
Computer Software | 5 |
Computers | 5 |
Foreign Countries | 5 |
Information Technology | 5 |
Prediction | 5 |
Evaluation Methods | 4 |
Feedback (Response) | 4 |
Models | 4 |
Probability | 4 |
More ▼ |
Source
ProQuest LLC | 7 |
IEEE Transactions on Learning… | 2 |
AEDS Monitor | 1 |
Education | 1 |
Gender and Education | 1 |
International Association for… | 1 |
International Society for… | 1 |
Author
Publication Type
Dissertations/Theses -… | 7 |
Journal Articles | 4 |
Reports - Research | 3 |
Collected Works - Proceedings | 2 |
Books | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 4 |
Secondary Education | 2 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Grade 8 | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Audience
Location
Florida | 2 |
Turkey | 2 |
Albania | 1 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
China (Beijing) | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
An Early Feedback Prediction System for Learners At-Risk within a First-Year Higher Education Course
Baneres, David; Rodriguez-Gonzalez, M. Elena; Serra, Montse – IEEE Transactions on Learning Technologies, 2019
Identifying at-risk students as soon as possible is a challenge in educational institutions. Decreasing the time lag between identification and real at-risk state may significantly reduce the risk of failure or disengage. In small courses, their identification is relatively easy, but it is impractical on larger ones. Current Learning Management…
Descriptors: Prediction, Feedback (Response), At Risk Students, College Freshmen
Wan, Han; Liu, Kangxu; Yu, Qiaoye; Gao, Xiaopeng – IEEE Transactions on Learning Technologies, 2019
Most educational institutions adopted the hybrid teaching mode through learning management systems. The logging data/clickstream could describe learners' online behavior. Many researchers have used them to predict students' performance, which has led to a diverse set of findings, but how to use insights from captured data to enhance learning…
Descriptors: Educational Practices, Learner Engagement, Identification, Study Habits
Tennyson, Matthew F. – ProQuest LLC, 2013
Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…
Descriptors: Authors, Programming, Computer Software, Plagiarism
Chinnappa Gounder Periaswamy, Senthilkumar – ProQuest LLC, 2010
Radio frequency identification (RFID) tags are low-cost devices that are used to uniquely identify the objects to which they are attached. Due to the low cost and size that is driving the technology, a tag has limited computational capabilities and resources. This limitation makes the implementation of conventional security protocols to prevent…
Descriptors: Identification, Probability, Computation, Engineering
Abbiss, Jane – Gender and Education, 2011
Students negotiate their masculine and feminine identities as students of information and communication technology (ICT) and computer users as they participate in specialist ICT courses and in other areas of their lives. As they negotiate these roles, they are established in relations of power and authority with the technology and with each other.…
Descriptors: Computers, Foreign Countries, Specialists, Gender Issues
Shelley, Mack, Ed.; Akcay, Hakan, Ed.; Ozturk, Omer Tayfur, Ed. – International Society for Technology, Education, and Science, 2022
"Proceedings of International Conference on Research in Education and Science" includes full papers presented at the International Conference on Research in Education and Science (ICRES) which took place on March 24-27, 2022 in Antalya, Turkey. The aim of the conference is to offer opportunities to share ideas, to discuss theoretical and…
Descriptors: Educational Technology, Technology Uses in Education, Computer Peripherals, Equipment
Lin, Yu-Ru – ProQuest LLC, 2010
My research interest has been in understanding the human communities formed through interpersonal social activities. Participation in online communities on social network sites such as Twitter has been observed to influence people's behavior in diverse ways including financial decision-making and political choices, suggesting the rich potential…
Descriptors: Community Study, Interpersonal Relationship, Social Behavior, Social Networks
Reinert, Gregory J. – ProQuest LLC, 2010
Apparently fraud is a growth industry. The monetary losses from Internet fraud have increased every year since first officially reported by the Internet Crime Complaint Center (IC3) in 2000. Prior research studies and third-party reports of fraud show rates substantially higher than eBay's reported negative feedback rate of less than 1%. The…
Descriptors: Feedback (Response), Labor, Identification, Probability
Krishnamurthy, Janaki – ProQuest LLC, 2010
Given the increasing competition in the software industry and the critical consequences of software errors, it has become important for companies to achieve high levels of software quality. While cost reduction and timeliness of projects continue to be important measures, software companies are placing increasing attention on identifying the user…
Descriptors: Program Evaluation, Opinions, Privacy, Prediction
San Nicolas-Rocca, Tonia – ProQuest LLC, 2010
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Descriptors: Higher Education, Action Research, Observation, Identification
Barnes, Cynthia; Cavaliere, Frank – Education, 2009
Metadata is information about computer-generated documents that is often inadvertently transmitted to others. The problems associated with metadata have become more acute over time as word processing and other popular programs have become more receptive to the concept of collaboration. As more people become involved in the preparation of…
Descriptors: Metadata, Ethics, Internet, Word Processing
Umarji, Medha – ProQuest LLC, 2009
Software metrics are measures of software products and processes. Metrics are widely used by software organizations to help manage projects, improve product quality and increase efficiency of the software development process. However, metrics programs tend to have a high failure rate in organizations, and developer pushback is one of the sources…
Descriptors: Metric System, Motivation, Computer Software, Fear
Ray, John R. – AEDS Monitor, 1973
A brief look at the potential of the computer as an educational research tool. (HB)
Descriptors: Computer Assisted Instruction, Computer Science, Computers, Educational Research

Wood, Helen M. – 1977
This paper considers the generation of passwords and their effective application to the problem of controlling access to computer resources. After describing the need for and uses of passwords, password schemes are categorized according to selection technique, lifetime, physical characteristics, and information content. Password protection, both…
Descriptors: Annotated Bibliographies, Computer Science, Dial Access Information Systems, Identification
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers