NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 448 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Bushra Hamid; Naveed Ikram – Education and Information Technologies, 2024
Regarding the caliber of newly-graduated professionals, the software industry expresses discontent. Therefore, software industries spend on training these individuals to improve software development process-related skills. According to various research studies, one reason for the lack of skilled graduates is a gap between industry and academia.…
Descriptors: Computer Software, Theory Practice Relationship, Novices, Information Technology
II. Douglas R. Allen – ProQuest LLC, 2023
The problem addressed in this study was whether real or perceived barriers exist among higher education finance professionals, which may influence their perceptions of risk and trustworthiness to adopt FinTech. The purpose of this study was to address whether or not perceptions of the risks and trustworthiness of software applications used in…
Descriptors: Risk, Trust (Psychology), Credibility, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ludovica Mastrobattista; María Muñoz-Rico; José Antonio Cordón-García – Journal of Technology and Science Education, 2024
The main objective of this article is to highlight the importance of training in digital tools at the university level to foster the development of innovative and efficient data analysis from a scientific perspective. In an increasingly digitised world, the acquisition of digital skills has become a fundamental requirement for success in various…
Descriptors: Digital Literacy, Data Analysis, Computer Software, Computer Uses in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hua Thi Toan; Trinh Thanh Hai; Do Trung Kien – Asian Journal of Education and Training, 2024
The professional work of today's agricultural and forestry engineers is changing dramatically under the impact of the 4th industrial revolution. In that context, the competence to apply information technology (IT) is one of the core and significant competencies. Therefore, in order for training products to meet the needs of society, one of the…
Descriptors: Information Technology, Forestry, Agricultural Education, Technological Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Deborah J. Rogers; Brennan P. Bergeron; Glen M. Watson; Karen Müller Smith – Journal of Biological Education, 2024
Live cell imaging is a standard technique in experimental biology that enables the observation of isolated cells and tissue slices in real time and the testing of cellular responses to changes in buffer composition. However, most live cell imaging devices require the use of dedicated microscopes and/or specialised stage adaptors, and come at a…
Descriptors: Laboratory Procedures, Science Instruction, Teaching Methods, Cytology
Peer reviewed Peer reviewed
Direct linkDirect link
F. Lozano-Galant; R. Porras; B. Mobaraki; F. Calderón; J. Gonzalez-Arteaga; J. A. Lozano-Galant – Journal of Civil Engineering Education, 2024
Traditionally, civil engineering infrastructures have been represented through two-dimensional (2D) drawings, which can lead to interpretation errors and jeopardize engineers' understanding of complex projects. However, with the development of building information modeling (BIM) methodology, civil engineering projects can now be virtually modeled…
Descriptors: Civil Engineering, Physical Environment, Simulated Environment, Synthesis
Peer reviewed Peer reviewed
Direct linkDirect link
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Peer reviewed Peer reviewed
Direct linkDirect link
Bsharat, Marwan; Bsharat, Sawsan – Education and Information Technologies, 2023
Cloud computing service has been found to be effective in increasing the capacity of Higher Education Institutions (HEIs) since it delivers services through enhanced information technology capabilities. Quality of Service (QoS) in cloud service is considered a rapidly growing phenomenon to guarantee a high level of service and is identified as an…
Descriptors: Foreign Countries, Information Technology, Computer Software, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Mohammed Ahmed Kofahi; Anas Jebreen Atyeh Husain – Journal of Information Technology Education: Research, 2025
Aim/Purpose: In this study, we propose an AI technology-based learning model using ChatGPT and investigate its effect on students' higher-order thinking (HOT) ability in an operating systems (OS) course. Background: A critical requirement for IT and engineering students is supporting them in understanding advanced OS concepts and fostering their…
Descriptors: Artificial Intelligence, Computer Science Education, Thinking Skills, Computer System Design
Peer reviewed Peer reviewed
Direct linkDirect link
Lou, Hao; Chang, Samuel; Chen, Yining – Journal of Information Systems Education, 2023
Using a paperless patient registration project, this teaching case demonstrates an application of the six-step approach in developing a business case for an IT investment. More specifically, this case familiarizes students with the process of developing a solid business case by defining business drivers and investment objectives, identifying and…
Descriptors: Universities, Medical Services, Hospitals, Patients
Peer reviewed Peer reviewed
Direct linkDirect link
Johnson, Clare; Davies, Ross; Reddy, Mike – International Journal for Educational Integrity, 2022
Academic misconduct in all its various forms is a challenge for degree-granting institutions. Whilst text-based plagiarism can be detected using tools such as Turnitin™, Plagscan™ and Urkund™ (amongst others), contract cheating and collusion can be more difficult to detect, and even harder to prove, often falling to no more than a 'balance of…
Descriptors: Student Behavior, College Students, Plagiarism, Cheating
Peer reviewed Peer reviewed
Direct linkDirect link
Dhruv Grewal; Abhijit Guha; Cinthia Beccacece Satornino; Marc Becker – Journal of Marketing Education, 2025
Employers expect university graduates seeking entry-level marketing jobs to be well-versed in contemporary topics, such as sustainable development, digital marketing, big data, analytics, and the role of artificial intelligence (AI) in both traditional and contemporary marketing domains. Because many of today's cutting-edge technological advances…
Descriptors: Futures (of Society), Marketing, Business Education, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Verma, Amit; Purohit, Pratibha; Thornton, Timothy; Lamsal, Kamal – Industry and Higher Education, 2023
The fields of augmented reality (AR) and virtual reality (VR) have seen massive growth in recent years. Numerous degree programs have started to redesign their curricula to meet the high market demand for people qualified to fill related job positions. In this paper, the authors perform a content analysis of online job postings hosted on…
Descriptors: Physical Environment, Simulated Environment, Synthesis, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Moses Kumi Asamoah; Patricia Ananga; Francis Annor – Journal of Adult and Continuing Education, 2024
This study aimed to investigate students' digital (ICT) skills, perceived relevance (usefulness), and actual use of digital (ICTs) skills for learning. Data were obtained via Google Forms from 325 students who were conveniently sampled from two public universities in Ghana. The results from the multivariate analysis of variance showed that age and…
Descriptors: Foreign Countries, College Students, Public Colleges, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kerstin Wagner; Agathe Merceron; Petra Sauer; Niels Pinkwart – Journal of Educational Data Mining, 2024
In this paper, we present an extended evaluation of a course recommender system designed to support students who struggle in the first semesters of their studies and are at risk of dropping out. The system, which was developed in earlier work using a student-centered design, is based on the explainable k-nearest neighbor algorithm and recommends a…
Descriptors: At Risk Students, Algorithms, Foreign Countries, Course Selection (Students)
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  30