Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 9 |
Descriptor
Coding | 9 |
Computer Uses in Education | 9 |
Data Analysis | 9 |
Qualitative Research | 4 |
Research Methodology | 4 |
Content Analysis | 3 |
Cooperative Learning | 3 |
Educational Technology | 3 |
Classification | 2 |
College Instruction | 2 |
College Students | 2 |
More ▼ |
Source
Author
Anderson, Jessica, Ed. | 1 |
Blikstein, Paulo | 1 |
Fernandez, Amanda | 1 |
Fischer, Frank | 1 |
Gonder, Jennifer, Ed. | 1 |
Hahn, Chris | 1 |
Hoffman, Bobby | 1 |
Howell-Carter, Marya, Ed. | 1 |
Huang, Ronghuai | 1 |
Lee, Young | 1 |
Mayfield, Elijah | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Research | 6 |
Books | 1 |
Collected Works - Proceedings | 1 |
Guides - Classroom - Learner | 1 |
Reports - Descriptive | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Elementary Secondary Education | 1 |
Grade 7 | 1 |
Grade 8 | 1 |
Middle Schools | 1 |
Audience
Researchers | 1 |
Students | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yang, Jeong; Lee, Young; Fernandez, Amanda; Sanchez, Joshua – Journal of Cybersecurity Education, Research and Practice, 2020
As the cyber security landscape dynamically evolves and security professionals work to keep apace, modern-day educators face the issue of equipping a new generation for this dynamic landscape. With cyber-attacks and vulnerabilities substantially increased over the past years in frequency and severity, it is important to design and build secure…
Descriptors: Computer Security, Programming Languages, Programming, Computer Uses in Education
Worsley, Marcelo; Blikstein, Paulo – Journal of Learning Analytics, 2014
Learning analytics and educational data mining are introducing a number of new techniques and frameworks for studying learning. The scalability and complexity of these novel techniques has afforded new ways for enacting education research and has helped scholars gain new insights into human cognition and learning. Nonetheless, there remain some…
Descriptors: Data Analysis, Data Collection, Engineering, Design
Mu, Jin; Stegmann, Karsten; Mayfield, Elijah; Rose, Carolyn; Fischer, Frank – International Journal of Computer-Supported Collaborative Learning, 2012
Research related to online discussions frequently faces the problem of analyzing huge corpora. Natural Language Processing (NLP) technologies may allow automating this analysis. However, the state-of-the-art in machine learning and text mining approaches yields models that do not transfer well between corpora related to different topics. Also,…
Descriptors: Semantics, Classification, Syntax, Coding
Ryan, Mary – Issues in Educational Research, 2009
Qualitative research methods require transparency to ensure the "trustworthiness" of the data analysis. The intricate processes of organising, coding and analysing the data are often rendered invisible in the presentation of the research findings, which requires a "leap of faith" for the reader. Computer assisted data analysis software can be used…
Descriptors: Qualitative Research, Research Methodology, Computer Software, Coding
Turgut, Guliz – Online Submission, 2012
One-to-one laptop programs, where each student has their own laptop to use in classroom, are becoming popular in schools especially in Australia and the United States. The purpose of the study was to contribute to the limited knowledge base explaining the implementation of laptop programs specifically with English language learners. Four ESL…
Descriptors: Foreign Countries, Second Language Learning, Laptop Computers, Case Studies
Zheng, Lanqin; Yang, Kaicheng; Huang, Ronghuai – Educational Technology & Society, 2012
This study proposes a new method named the IIS-map-based method for analyzing interactions in face-to-face collaborative learning settings. This analysis method is conducted in three steps: firstly, drawing an initial IIS-map according to collaborative tasks; secondly, coding and segmenting information flows into information items of IIS; thirdly,…
Descriptors: Foreign Countries, Computer Uses in Education, Program Effectiveness, Research Methodology
Hoffman, Bobby; Spatariu, Alexandru – Journal of Interactive Learning Research, 2011
A grounded theory approach was employed to explore the variation in strategies used by students when solving mental multiplication problems. Metacognitive prompts, externally generated stimuli that activate thoughtful cognition, were automatically generated via computer during the solving of mental multiplication problems to elicit awareness,…
Descriptors: Grounded Theory, Prompting, Multiplication, Preservice Teachers
Hahn, Chris – SAGE Publications (CA), 2008
This book is a practical, hands-on guide to using commonly available everyday technology, including Microsoft software, to manage and streamline research projects. It uses straight-forward, everyday language to walk readers through this process, drawing on a wide range of examples to demonstrate how easy it is to use such software. This guide is…
Descriptors: Qualitative Research, Research Projects, Computer Software, Educational Technology
Gonder, Jennifer, Ed.; Howell-Carter, Marya, Ed.; Anderson, Jessica, Ed. – Online Submission, 2013
Included herein is the conference proceedings of the 27th Annual Conference on the Teaching of Psychology: Ideas and Innovations, sponsored by the Psychology Department of the State University of New York at Farmingdale. The conference theme for 2013 was: The Science of Learning. The Conference featured a keynote address by Victor Benassi, Ph.D.…
Descriptors: Psychology, College Instruction, Conferences (Gatherings), Undergraduate Students