Publication Date
In 2025 | 0 |
Since 2024 | 10 |
Since 2021 (last 5 years) | 13 |
Since 2016 (last 10 years) | 16 |
Since 2006 (last 20 years) | 17 |
Descriptor
Artificial Intelligence | 18 |
Computer Security | 18 |
Computer Software | 18 |
Information Security | 10 |
Computer Science Education | 6 |
Teaching Methods | 6 |
Information Technology | 5 |
Technology Uses in Education | 5 |
Computer Simulation | 4 |
Faculty Development | 4 |
Foreign Countries | 4 |
More ▼ |
Source
Author
Alina A. von Davier | 1 |
Bonnie Stewart | 1 |
Brandi Robinson | 1 |
Deborah J. Harris | 1 |
Enfinger, Kerry Wayne | 1 |
Frank Xavier Gearhart | 1 |
He, Jonathan | 1 |
Huaibo Wang | 1 |
Huiling Ma | 1 |
Jakub Rudolf Mlynárik | 1 |
Jiangang Hao | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Research | 9 |
Dissertations/Theses -… | 3 |
Information Analyses | 3 |
Reports - Descriptive | 3 |
Speeches/Meeting Papers | 3 |
Collected Works - Proceedings | 2 |
Education Level
Higher Education | 6 |
Postsecondary Education | 6 |
Elementary Secondary Education | 2 |
Adult Education | 1 |
Elementary Education | 1 |
High Schools | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Audience
Location
Turkey | 3 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Cambodia | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jiangang Hao; Alina A. von Davier; Victoria Yaneva; Susan Lottridge; Matthias von Davier; Deborah J. Harris – Educational Measurement: Issues and Practice, 2024
The remarkable strides in artificial intelligence (AI), exemplified by ChatGPT, have unveiled a wealth of opportunities and challenges in assessment. Applying cutting-edge large language models (LLMs) and generative AI to assessment holds great promise in boosting efficiency, mitigating bias, and facilitating customized evaluations. Conversely,…
Descriptors: Evaluation Methods, Artificial Intelligence, Educational Change, Computer Software
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security
Frank Xavier Gearhart – ProQuest LLC, 2024
Digital systems are pervasive in modern societies -- augmenting personal and commercial driving, detecting cancer, and exploiting transitory events in financial markets. Attacks on these systems are growing in number, sophistication, and impact. Current cyber defenses are proving inadequate against some of these attacks. Cyber defense tools that…
Descriptors: Artificial Intelligence, Information Security, Man Machine Systems, Natural Language Processing
Philip Newton; Maira Xiromeriti – Assessment & Evaluation in Higher Education, 2024
Media coverage suggests that ChatGPT can pass examinations based on multiple choice questions (MCQs), including those used to qualify doctors, lawyers, scientists etc. This poses a potential risk to the integrity of those examinations. We reviewed current research evidence regarding the performance of ChatGPT on MCQ-based examinations in higher…
Descriptors: Multiple Choice Tests, Artificial Intelligence, Integrity, Computer Software
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Yishen Song; Qianta Zhu; Huaibo Wang; Qinhua Zheng – IEEE Transactions on Learning Technologies, 2024
Manually scoring and revising student essays has long been a time-consuming task for educators. With the rise of natural language processing techniques, automated essay scoring (AES) and automated essay revising (AER) have emerged to alleviate this burden. However, current AES and AER models require large amounts of training data and lack…
Descriptors: Scoring, Essays, Writing Evaluation, Computer Software
Huiling Ma; Lilliati Ismail; Weijing Han – Education and Information Technologies, 2024
The advancement and application of Artificial Intelligence (AI) has introduced innovative changes in language learning and teaching. In particular, the widespread utilization of various chatbots as foreign language learning partners showcases their remarkable potential contribution to the field. Nevertheless, there are currently few studies that…
Descriptors: Bibliometrics, Artificial Intelligence, Computer Software, Second Language Learning
Mengkorn Pum; Sarin Sok – Asian Journal of Distance Education, 2024
With current state-of-the-art advances in artificial intelligence (AI), especially large language models, such as Google's Gemini, Microsoft's Copilot, and ChatGPT, among others, a plethora of research on this phenomenon has been conducted worldwide aiming to examine its limitations, benefits and ethical implications. Nonetheless, such a…
Descriptors: Foreign Countries, Artificial Intelligence, Technology Uses in Education, Computer Software
Brandi Robinson – International Journal on E-Learning, 2024
The integration of artificial intelligence in e-learning presents promising avenues for scalable, efficient content creation. However, the prevailing content-first approach in AI course design often compromises educational quality for speed, leading to courses that lack coherence, cognitive alignment, and structured progression. This article…
Descriptors: Artificial Intelligence, Computer Software, Technology Uses in Education, Ethics
He, Jonathan; Xin, ChunSheng – Journal of Cybersecurity Education, Research and Practice, 2021
Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails,…
Descriptors: Information Security, Computer Security, Computer Software, Summer Programs
Juliana E. Raffaghelli; Bonnie Stewart – OTESSA Conference Proceedings, 2021
In the higher education context, an increasing concern on the technical or instrumental approach permeates attention to academics' data literacies and faculty development. The need for data literacy to deal specifically with the rise of learning analytics in higher education has been raised by some authors, though in spite of some focus on the…
Descriptors: Statistics Education, Faculty Development, Higher Education, Learning Analytics
Kahraman, Deniz; Koc, Mustafa – International Society for Technology, Education, and Science, 2022
It is considered important for school principals to have technology leadership competencies in digital age conditions in order to carry out education and training efficiently and effectively. Since teachers see school principals as role models, how teachers perceive the technology use skills of school principals is an important factor for the…
Descriptors: Instructional Leadership, Educational Technology, Information Technology, Technology Integration
Payne, Bryson R. – Journal of Cybersecurity Education, Research and Practice, 2019
With the rapid adoption of internet-connected and driver-assist technologies, and the spread of semiautonomous to self-driving cars on roads worldwide, cybersecurity for smart cars is a timely concern and one worth exploring both in the classroom and in the real world. Highly publicized hacks against production cars, and a relatively small number…
Descriptors: Computer Security, Motor Vehicles, Information Security, Artificial Intelligence
Enfinger, Kerry Wayne – ProQuest LLC, 2016
The number of malicious files present in the public domain continues to rise at a substantial rate. Current anti-malware software utilizes a signature-based method to detect the presence of malicious software. Generating these pattern signatures is time consuming due to malicious code complexity and the need for expert analysis, however, by making…
Descriptors: Artificial Intelligence, Computer Software, Identification, Computer Security
Selami Aydin; Maryam Zeinolabedini – Online Submission, 2024
In line with the rapid advancement in educational technology, and the application of artificial intelligence (AI) in particular, the teaching and learning of the English language has undergone a significant transformation. This paper aims to explore students' perceptions of integrating AI into the English as a foreign language (EFL) learning…
Descriptors: Artificial Intelligence, Computer Software, Second Language Instruction, Second Language Learning
Previous Page | Next Page »
Pages: 1 | 2