NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Media Staff1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 66 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Tian Luo; Pauline S. Muljana; Xinyue Ren; Dara Young – Educational Technology Research and Development, 2025
The emergence of generative artificial intelligence (GenAI) has caused significant disruptions on a global scale in various workplace settings, including the field of instructional design (ID). Given the paucity of research investigating the impact of GenAI on ID work, we conducted a mixed methods study to understand instructional designers (IDs)'…
Descriptors: Artificial Intelligence, Familiarity, Instructional Design, Brainstorming
Peer reviewed Peer reviewed
Direct linkDirect link
Anna Filighera; Sebastian Ochs; Tim Steuer; Thomas Tregel – International Journal of Artificial Intelligence in Education, 2024
Automatic grading models are valued for the time and effort saved during the instruction of large student bodies. Especially with the increasing digitization of education and interest in large-scale standardized testing, the popularity of automatic grading has risen to the point where commercial solutions are widely available and used. However,…
Descriptors: Cheating, Grading, Form Classes (Languages), Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ally, Said – International Journal of Education and Development using Information and Communication Technology, 2022
Moodle software has become the heart of teaching and learning services in education. The software is viewed as a trusted modern platform for transforming learning and teaching modes from conventional face-to-face to fully online classes. However, its use for online examination is very limited despite having a state-of-the-art Quiz Module with…
Descriptors: Integrated Learning Systems, Computer Assisted Testing, Information Security, Evaluation Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alexandra Rysul'ova – NORDSCI, 2023
Virtual worlds, like Second Life, are transformative innovations in education. These immersive 3D environments offer teachers and students unique opportunities beyond traditional classrooms. They foster active learning, allowing students to interact, manipulate objects, and engage with diverse content. This multimodal approach accommodates various…
Descriptors: Information Security, Computer Simulation, Barriers, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Vaiopoulou, Julie; Papadakis, Stamatios; Sifaki, Eirini; Kalogiannakis, Michail; Stamovlasis, Dimitrios – Education and Information Technologies, 2023
This study explored certain popular educational apps' vital characteristics and potential profiles (n1 = 50) for kindergarten kids. The profile analysis involved a categorization ascended from an evaluation process conducted by pre-service early childhood teachers' (n2 = 295) at the University of Crete, Greece, using a new instrument, validated in…
Descriptors: Foreign Countries, Young Children, Kindergarten, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Livinus Obiora Nweke; Uchenna Franklin Okebanama; Gibson Uwaezuoke Mba – Discover Education, 2025
The integration of Internet of Things (IoT), Artificial Intelligence (AI), and cybersecurity presents new opportunities for innovation and entrepreneurship, yet traditional educational approaches often lack the interdisciplinary and applied focus required to develop these competencies. This study evaluates the impact of an experiential learning…
Descriptors: Entrepreneurship, Artificial Intelligence, Internet, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Muhammad Farrukh Shahzad; Shuo Xu; Iqra Javed – International Journal of Educational Technology in Higher Education, 2024
As technology continues to advance, the integration of generative artificial intelligence tools in various sectors, including education, has gained momentum. ChatGPT, an extensively recognized language model created by OpenAI, has gained significant importance, particularly in education. This study investigates the awareness, acceptance, and…
Descriptors: Artificial Intelligence, Computer Software, College Students, Student Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mustafa Koc; Sema Golcukcu – International Society for Technology, Education, and Science, 2024
While there are many conveniences that the widespread use of the Internet provides us today, there are also some risks that come with these conveniences. One of these risks is the disclosure of personal data. Personal data can be defined as any information regarding an identified or identifiable real person. It can be argued that wide use of…
Descriptors: Preservice Teachers, Teacher Education Programs, Privacy, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Blažic, Borka Jerman – Education and Information Technologies, 2022
Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour…
Descriptors: Foreign Countries, Computer Science Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Abrantes, Bruno F.; Venkataraman, Anuradha – International Journal of Learning and Change, 2022
Strategy theory recognises outer general environmental mutations in the legal landscape as compelling dynamic forces of business competition. Thus, the latest EU directive on data protection constitutes an uncharted event for testing organisational adaptability. This research aims to understand the impact of GDPR and the endeavours towards the…
Descriptors: Foreign Countries, Content Analysis, Generalization, Business Administration
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5