Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 6 |
Descriptor
Classification | 6 |
Computer Security | 6 |
Computer Software | 6 |
Correlation | 4 |
Foreign Countries | 3 |
Knowledge Level | 3 |
Scores | 3 |
Video Technology | 3 |
Academic Achievement | 2 |
Academic Persistence | 2 |
Artificial Intelligence | 2 |
More ▼ |
Source
ProQuest LLC | 2 |
Education and Information… | 1 |
International Association for… | 1 |
International Educational… | 1 |
International Journal of… | 1 |
Author
Publication Type
Collected Works - Proceedings | 2 |
Dissertations/Theses -… | 2 |
Journal Articles | 2 |
Reports - Research | 2 |
Education Level
Audience
Location
Greece | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Finland | 1 |
Florida | 1 |
France | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 1 |
What Works Clearinghouse Rating
Vaiopoulou, Julie; Papadakis, Stamatios; Sifaki, Eirini; Kalogiannakis, Michail; Stamovlasis, Dimitrios – Education and Information Technologies, 2023
This study explored certain popular educational apps' vital characteristics and potential profiles (n1 = 50) for kindergarten kids. The profile analysis involved a categorization ascended from an evaluation process conducted by pre-service early childhood teachers' (n2 = 295) at the University of Crete, Greece, using a new instrument, validated in…
Descriptors: Foreign Countries, Young Children, Kindergarten, Educational Technology
Enfinger, Kerry Wayne – ProQuest LLC, 2016
The number of malicious files present in the public domain continues to rise at a substantial rate. Current anti-malware software utilizes a signature-based method to detect the presence of malicious software. Generating these pattern signatures is time consuming due to malicious code complexity and the need for expert analysis, however, by making…
Descriptors: Artificial Intelligence, Computer Software, Identification, Computer Security
Estes, Aaron – ProQuest LLC, 2016
Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…
Descriptors: Risk, Electronic Mail, Computer Security, Users (Information)
Lesnov, Roman Olegovich – International Journal of Computer-Assisted Language Learning and Teaching, 2018
This article compares second language test-takers' performance on an academic listening test in an audio-only mode versus an audio-video mode. A new method of classifying video-based visuals was developed and piloted, which used L2 expert opinions to place the video on a continuum from being content-deficient (not helpful for answering…
Descriptors: Second Language Learning, Second Language Instruction, Video Technology, Classification
Stamper, John, Ed.; Pardos, Zachary, Ed.; Mavrikis, Manolis, Ed.; McLaren, Bruce M., Ed. – International Educational Data Mining Society, 2014
The 7th International Conference on Education Data Mining held on July 4th-7th, 2014, at the Institute of Education, London, UK is the leading international forum for high-quality research that mines large data sets in order to answer educational research questions that shed light on the learning process. These data sets may come from the traces…
Descriptors: Information Retrieval, Data Processing, Data Analysis, Data Collection
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers