NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Vasco Rikkers; Dipti Kapoor Sarmah – Journal of Computing in Higher Education, 2025
In recent years, gamification has seen a rise in usage for cyber-security training, with some of the most used elements being story and narrative. Yet there seems to be a lack of research on story-based gamification as well as how this type of gamification affects a training's effectiveness. The goal of this study was to test the effectiveness of…
Descriptors: Gamification, Computer Security, Training Methods, Foreign Countries
Peer reviewed Peer reviewed
Roddy, Kevin – Library Hi Tech, 1991
Discussion of accessing visual resources focuses on possibilities for subject access. Projects in North America and Europe that represent current trends in accessing visual resources are described; computer-aided retrieval strategies are reviewed, including key words, comprehensive descriptors, and optical scanning; and user needs are considered.…
Descriptors: Computer Storage Devices, Foreign Countries, Information Retrieval, Optical Scanners