Publication Date
In 2025 | 1 |
Since 2024 | 6 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 111 |
Descriptor
Computer System Design | 165 |
Information Technology | 165 |
Computer Software | 128 |
Educational Technology | 58 |
Programming | 48 |
Foreign Countries | 42 |
Internet | 42 |
Instructional Design | 35 |
Computer Software Evaluation | 33 |
Computer Uses in Education | 31 |
Computer Assisted Instruction | 28 |
More ▼ |
Source
Author
Lunin, Lois F. | 2 |
Yang, Yu-Fen | 2 |
Abu, Mohd. Salleh Bin | 1 |
Ahmed, Pervaiz K. | 1 |
Akar, Gozde B. | 1 |
Alexander, Bryan | 1 |
Ali, Qasim | 1 |
Almeroth, Kevin | 1 |
Alodhaibi, Khalid | 1 |
Alsadoon, Abeer | 1 |
Amanda Konet | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 54 |
Postsecondary Education | 39 |
Elementary Secondary Education | 13 |
Adult Education | 6 |
Secondary Education | 2 |
Elementary Education | 1 |
High Schools | 1 |
Location
United Kingdom | 6 |
Spain | 5 |
Taiwan | 5 |
Germany | 3 |
Australia | 2 |
California | 2 |
Greece | 2 |
Indiana | 2 |
Latvia | 2 |
Lithuania | 2 |
Malaysia | 2 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Amanda Konet; Ian Thomas; Gerald Gartlehner; Leila Kahwati; Rainer Hilscher; Shannon Kugley; Karen Crotty; Meera Viswanathan; Robert Chew – Research Synthesis Methods, 2024
Accurate data extraction is a key component of evidence synthesis and critical to valid results. The advent of publicly available large language models (LLMs) has generated interest in these tools for evidence synthesis and created uncertainty about the choice of LLM. We compare the performance of two widely available LLMs (Claude 2 and GPT-4) for…
Descriptors: Data Collection, Artificial Intelligence, Computer Software, Computer System Design
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security
Mohammed Ahmed Kofahi; Anas Jebreen Atyeh Husain – Journal of Information Technology Education: Research, 2025
Aim/Purpose: In this study, we propose an AI technology-based learning model using ChatGPT and investigate its effect on students' higher-order thinking (HOT) ability in an operating systems (OS) course. Background: A critical requirement for IT and engineering students is supporting them in understanding advanced OS concepts and fostering their…
Descriptors: Artificial Intelligence, Computer Science Education, Thinking Skills, Computer System Design
Marisol Cruz Cain; Kaelin Kuhn, Contributor; Nicole Jarvis, Contributor; David Matcham, Contributor; Jillian Clouse, Contributor; Rebecca Eyler, Contributor; Ashley Mattson, Contributor; Brandon Mitchell, Contributor; Walter Vance, Contributor – US Government Accountability Office, 2024
For decades, the Free Application for Federal Student Aid (FAFSA) forms were processed electronically by the legacy Central Processing System. In 2021 the Office of Federal Student Aid (FSA) initiated a system development effort and in December 2023 deployed a new system to process forms for the 2024-2025 school year. However, student aid…
Descriptors: Student Financial Aid, Federal Programs, Audits (Verification), Information Systems
Maria R. Ebling – ACM Transactions on Computing Education, 2024
Objectives: Faculty new to teaching operating systems or those looking to refresh their course need to understand the state of the art in operating system education. Toward this goal, we conducted a survey of operating system instructors to understand how they approach teaching the course and what textbook and software platforms they use in their…
Descriptors: Literature Reviews, Surveys, Teacher Attitudes, Information Technology
Melissa Emrey-Arras – US Government Accountability Office, 2024
The Free Application for Federal Student Aid (FAFSA) is the entry ramp to federal grants and loans that many students depend on to afford college. Congress passed the FAFSA Simplification Act in 2020 in part to make it easier to apply for federal aid. However, Education's rollout of the new FAFSA has suffered from numerous challenges and delays.…
Descriptors: Student Financial Aid, Federal Programs, Audits (Verification), Information Systems
Alsadoon, Abeer; Prasad, P. W. C.; Beg, Azam – European Journal of Engineering Education, 2017
Making the students understand the theoretical concepts of digital logic design concepts is one of the major issues faced by the academics, therefore the teachers have tried different techniques to link the theoretical information to the practical knowledge. Use of software simulations is a technique for learning and practice that can be applied…
Descriptors: Computer Software, Information Technology, Computer Simulation, Student Surveys
Uysal, Murat Pasa – Turkish Online Journal of Distance Education, 2012
Developments in computer and information technologies continue to give opportunities for designing advanced E-learning systems while entailing objective and technical evaluation methodologies. Design and development of E-learning systems require time-consuming and labor-intensive processes; therefore any decision about these systems and their…
Descriptors: Educational Technology, Information Technology, Computer System Design, Decision Support Systems
Seyed, Ali Patrice – ProQuest LLC, 2012
The Open Biomedical Ontology (OBO) Foundry initiative is a collaborative effort for developing interoperable, science-based ontologies. The Basic Formal Ontology (BFO) serves as the upper ontology for the domain-level ontologies of OBO. BFO is an upper ontology of types as conceived by defenders of realism. Among the ontologies developed for OBO…
Descriptors: Evaluation Criteria, Computer Software, Expertise, Programming
Kramer, Aleksey – ProQuest LLC, 2013
The topic of software security has become paramount in information technology (IT) related scholarly research. Researchers have addressed numerous software security topics touching on all phases of the Software Development Life Cycle (SDLC): requirements gathering phase, design phase, development phase, testing phase, and maintenance phase.…
Descriptors: Computer Software, Computer Security, Information Technology, Demography
An, Ho – ProQuest LLC, 2012
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in…
Descriptors: Confidentiality, Information Security, Resource Allocation, Computer System Design
Kharabe, Amol T. – ProQuest LLC, 2012
Over the last two decades, firms have operated in "increasingly" accelerated "high-velocity" dynamic markets, which require them to become "agile." During the same time frame, firms have increasingly deployed complex enterprise systems--large-scale packaged software "innovations" that integrate and automate…
Descriptors: Computer Software, Computer System Design, Innovation, Organizational Effectiveness
Cechinel, Cristian; Sanchez-Alonso, Salvador; Garcia-Barriocanal, Elena – Computers & Education, 2011
The continuously growth of learning resources available in on-line repositories has raised the concern for the development of automated methods for quality assessment. The current existence of on-line evaluations in such repositories has opened the possibility of searching for statistical profiles of highly-rated resources that can be used as…
Descriptors: Discriminant Analysis, Educational Resources, Classification, Automation
Kirsch, Jonathan – ProQuest LLC, 2010
Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…
Descriptors: Computer Networks, Computer System Design, Computer Software, Computer Security
Nordin, Norazah; Ibrahim, Sham; Mohd. Hamzah, Mohd. Izham; Embi, Mohamed Amin; Din, Rosseni – Turkish Online Journal of Educational Technology - TOJET, 2012
The development in information technology has now moved from the first wave that emphasises on computer technical skills to the second wave which focuses on the application and management aspects. This paper aims to investigate the use of learning management system among future school heads in education management and leadership. The study was…
Descriptors: Educational Technology, Information Technology, Leadership, Learning Strategies