Publication Date
In 2025 | 8 |
Since 2024 | 27 |
Since 2021 (last 5 years) | 107 |
Since 2016 (last 10 years) | 260 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Researchers | 4 |
Teachers | 2 |
Policymakers | 1 |
Practitioners | 1 |
Students | 1 |
Laws, Policies, & Programs
Assessments and Surveys
Edinburgh Handedness Inventory | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Graphical Tools for Visualizing the Results of Network Meta-Analysis of Multicomponent Interventions
Seitidis, Georgios; Tsokani, Sofia; Christogiannis, Christos; Kontouli, Katerina-Maria; Fyraridis, Alexandros; Nikolakopoulos, Stavros; Veroniki, Areti Angeliki; Mavridis, Dimitris – Research Synthesis Methods, 2023
Network meta-analysis (NMA) is an established method for assessing the comparative efficacy and safety of competing interventions. It is often the case that we deal with interventions that consist of multiple, possibly interacting, components. Examples of interventions' components include characteristics of the intervention, mode (face-to-face,…
Descriptors: Networks, Network Analysis, Meta Analysis, Intervention
Ragan, Daniel T.; Osgood, D. Wayne; Ramirez, Nayan G.; Moody, James; Gest, Scott D. – Sociological Methods & Research, 2022
The current study compares estimates of peer influence from an analytic approach that explicitly address network processes with those from traditional approaches that do not. Using longitudinal network data from the PROmoting School-community-university Partnerships to Enhance Resilience peers project, we obtain estimates of social influence on…
Descriptors: Peer Influence, Social Networks, Network Analysis, Regression (Statistics)
Anna R. Leach – ProQuest LLC, 2024
This dissertation examines the interaction patterns that happen in an online learning environment. While many studies look at online learning through the lens of the learner or the learning environment, few studies look at the interaction patterns that happen through the digital traces captured by computational tools. Based on the conceptual…
Descriptors: Learning Management Systems, Protocol Analysis, Student Attitudes, Teacher Attitudes
Hanqiang Liu; Xiao Chen; Feng Zhao – Education and Information Technologies, 2024
Massive open online courses (MOOCs) have become one of the most popular ways of learning in recent years due to their flexibility and convenience. However, high dropout rate has become a prominent problem that hinders the further development of MOOCs. Therefore, the prediction of student dropouts is the key to further enhance the MOOCs platform.…
Descriptors: MOOCs, Video Technology, Behavior Patterns, Prediction
Paul Meara; Imma Miralpeix – Vocabulary Learning and Instruction, 2024
This paper is part 4 in a series of workshops that examine the properties of some simple models of vocabulary networks. This Workshop explores how the overall activity level of a vocabulary network can be altered by changing the connections in the network (i.e., by implementing relinking events). The Workshop is linked to an online practice room…
Descriptors: Vocabulary Development, Models, Simulation, Workshops
Wang, Cheng; Butts, Carter T.; Hipp, John; Lakon, Cynthia M. – Sociological Methods & Research, 2022
The recent popularity of models that capture the dynamic coevolution of both network structure and behavior has driven the need for summary indices to assess the adequacy of these models to reproduce dynamic properties of scientific or practical importance. Whereas there are several existing indices for assessing the ability of the model to…
Descriptors: Models, Goodness of Fit, Comparative Analysis, Computer Software
Cowhitt, Thomas; Butler, Timothy; Wilson, Elaine – International Journal of Social Research Methodology, 2020
Literature reviews are required at early stages of a traditional research progression. Many systematic approaches help researchers identify relevant literature. However, there is far less support for interpreting large collections of references. Understanding the evolution of knowledge within a discipline requires an awareness of the collaborative…
Descriptors: Social Networks, Network Analysis, Literature Reviews, Systems Approach
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Shan, JunHao; Wang, Wei – Interactive Learning Environments, 2023
Collaboration is the key element of maker movement. Online maker community is a new environment for makers to collaborate with one another voluntarily. This article selected one of the largest open online maker communities in China as the research sample. A total of 1292 postings selected from 19 threads were coded using Schaefer et al.'s (2019,…
Descriptors: Communities of Practice, Creativity, Entrepreneurship, Computer Mediated Communication
Irina Tursunkulova; Suzanne de Castell; Jennifer Jenson – International Association for Development of the Information Society, 2023
The exponential growth of scholarly publications in recent years has presented a daunting challenge for researchers to keep track of relevant articles within their research field. To address this issue, we examined the capabilities of InfraNodus, an AI-Powered text network analysis platform. InfraNodus promises to provide insights into any…
Descriptors: Research, Journal Articles, Artificial Intelligence, Evaluation Methods
Koster, Jeremy; Leckie, George; Aven, Brandy – Field Methods, 2020
The multilevel social relations model (SRM) is a commonly used statistical method for the analysis of social networks. In this article and accompanying supplemental materials, we demonstrate the estimation and interpretation of the SRM using Stat-JR software. Multiple software templates permit the analysis of different response types, including…
Descriptors: Statistical Analysis, Computer Software, Hierarchical Linear Modeling, Social Networks
Frank Xavier Gearhart – ProQuest LLC, 2024
Digital systems are pervasive in modern societies -- augmenting personal and commercial driving, detecting cancer, and exploiting transitory events in financial markets. Attacks on these systems are growing in number, sophistication, and impact. Current cyber defenses are proving inadequate against some of these attacks. Cyber defense tools that…
Descriptors: Artificial Intelligence, Information Security, Man Machine Systems, Natural Language Processing
Aguilar, J.; Buendia, O.; Pinto, A.; Gutiérrez, J. – Interactive Learning Environments, 2022
Social Learning Analytics (SLA) seeks to obtain hidden information in large amounts of data, usually of an educational nature. SLA focuses mainly on the analysis of social networks (Social Network Analysis, SNA) and the Web, to discover patterns of interaction and behavior of educational social actors. This paper incorporates the SLA in a smart…
Descriptors: Learning Analytics, Cognitive Style, Socialization, Social Networks
Marcel R. Haas; Colin Caprani; Benji T. van Beurden – Journal of Learning Analytics, 2023
We present an innovative modelling technique that simultaneously constrains student performance, course difficulty, and the sensitivity with which a course can differentiate between students by means of grades. Grade lists are the only necessary ingredient. Networks of courses will be constructed where the edges are populations of students that…
Descriptors: Bayesian Statistics, Computer Software, Learning Analytics, Grades (Scholastic)
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes