Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 7 |
Descriptor
Identification | 7 |
Information Technology | 7 |
Computer Science | 5 |
Computer Science Education | 3 |
Computer Software | 3 |
Feedback (Response) | 3 |
Foreign Countries | 3 |
Higher Education | 3 |
Probability | 3 |
Student Motivation | 3 |
Teaching Methods | 3 |
More ▼ |
Source
ProQuest LLC | 3 |
ACM Transactions on Computing… | 1 |
IEEE Transactions on Education | 1 |
International Association for… | 1 |
International Society for… | 1 |
Author
Publication Type
Dissertations/Theses -… | 3 |
Collected Works - Proceedings | 2 |
Journal Articles | 2 |
Books | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 3 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Grade 8 | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Audience
Location
Estonia | 2 |
Turkey | 2 |
Albania | 1 |
Arkansas | 1 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Florida | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Academic Motivation Scale | 1 |
What Works Clearinghouse Rating
Kori, Külli; Pedaste, Margus; Must, Olev – ACM Transactions on Computing Education, 2018
Low retention rates in higher education Information Technology (IT) studies have led to an unmet demand for IT specialists. Therefore, universities need to apply interventions to increase retention rates and provide the labor market with more IT graduates. However, students with different characteristics may need different types of interventions.…
Descriptors: Information Technology, Computer Science Education, Intervention, School Holding Power
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Chinnappa Gounder Periaswamy, Senthilkumar – ProQuest LLC, 2010
Radio frequency identification (RFID) tags are low-cost devices that are used to uniquely identify the objects to which they are attached. Due to the low cost and size that is driving the technology, a tag has limited computational capabilities and resources. This limitation makes the implementation of conventional security protocols to prevent…
Descriptors: Identification, Probability, Computation, Engineering
Shelley, Mack, Ed.; Akcay, Hakan, Ed.; Ozturk, Omer Tayfur, Ed. – International Society for Technology, Education, and Science, 2022
"Proceedings of International Conference on Research in Education and Science" includes full papers presented at the International Conference on Research in Education and Science (ICRES) which took place on March 24-27, 2022 in Antalya, Turkey. The aim of the conference is to offer opportunities to share ideas, to discuss theoretical and…
Descriptors: Educational Technology, Technology Uses in Education, Computer Peripherals, Equipment
Reinert, Gregory J. – ProQuest LLC, 2010
Apparently fraud is a growth industry. The monetary losses from Internet fraud have increased every year since first officially reported by the Internet Crime Complaint Center (IC3) in 2000. Prior research studies and third-party reports of fraud show rates substantially higher than eBay's reported negative feedback rate of less than 1%. The…
Descriptors: Feedback (Response), Labor, Identification, Probability
San Nicolas-Rocca, Tonia – ProQuest LLC, 2010
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Descriptors: Higher Education, Action Research, Observation, Identification
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers