NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 117 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Hsiao, Hsien-Sheng; Chen, Jyun-Chen; Chen, Jhen-Han; Chien, Yu-Hung; Chang, Chung-Pu; Chung, Guang-Han – Educational Technology Research and Development, 2023
Since the late twentieth century, with the development of the Internet of Things (IoT), the IoT covers the application of comprehensive knowledge and technology in the fields of circuitry, physics, mechanics, and information, making it a suitable topic for hands-on science, technology, engineering, and mathematics (STEM) activities. The IoT covers…
Descriptors: Gamification, Models, High School Students, Programming
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sopapradit, Sunti; Wannapiroon, Panita – International Education Studies, 2022
This research developed a model of steam learning with digital fabrication laboratory on cloud computing model to enhance creative product. The objectives of the study were: 1) To create the model, and 2) To evaluate a model. This research method was two parts. The first part about the design's model had four subs: 1) to study and synthesize the…
Descriptors: Models, Internet, Computer Software, Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Mangiero, George A.; Qayyum, Arif; Cante, Charles J. – Journal of Education for Business, 2022
In this paper the authors present a unique approach to teaching introductory statistics at both the undergraduate and graduate levels. The approach uses a feature in Excel called "spinners" to dynamically adjust key variables, such as sample size, confidence levels, and probabilities, among others, to enable an expanded discussion of…
Descriptors: Statistics Education, Teaching Methods, Introductory Courses, Online Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Patience Atukunda; Simon Peter Khabusi; John Othieno – Discover Education, 2024
This study investigates user satisfaction with e-learning systems in higher education institutions, examining the perspectives of students, lecturers, and elearning officers and heads of the department of Information Technology as key informants. A total of 375 student respondents from Diploma, Bachelor, and Masters levels, 51 lecturers, and 15…
Descriptors: Electronic Learning, Access to Education, Usability, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Neidigh, Robert O.; Langella, Ian M. – Journal of Education for Business, 2020
The fictitious online retailer "Elbe" faces a deterministic demand for products over a geographic area and fulfills this demand using supply nodes and fulfillment centers. Experiential learning using provided solver and ILOG models (available upon request from the authors) for this supply chain allows students to experiment with…
Descriptors: Supply and Demand, Internet, Retailing, Mathematical Applications
Peer reviewed Peer reviewed
Direct linkDirect link
Raj, Gaurav; Mahajan, Manish; Singh, Dheerendra – International Journal of Web-Based Learning and Teaching Technologies, 2020
In secure web application development, the role of web services will not continue if it is not trustworthy. Retaining customers with applications is one of the major challenges if the services are not reliable and trustworthy. This article proposes a trust evaluation and decision model where the authors have defined indirect attribute, trust,…
Descriptors: Trust (Psychology), Models, Decision Making, Computer Software
Mbaziira, Alex Vincent – ProQuest LLC, 2017
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
Descriptors: Crime, Information Security, Models, Networks
Boggs, James D. – ProQuest LLC, 2013
First responders are continuously moving at an incident site and this movement requires them to access Service-Oriented Architecture services, such as a Web Map Service, via mobile wireless networks. First responders from inside a building often have problems in communicating to devices outside that building due to propagation obstacles. Dynamic…
Descriptors: Geographic Information Systems, Geographic Location, Computer Software, Computer Simulation
Roumani, Yaman – ProQuest LLC, 2012
Software vulnerabilities have been regarded as one of the key reasons for computer security breaches that have resulted in billions of dollars in losses per year (Telang and Wattal 2005). With the growth of the software industry and the Internet, the number of vulnerability attacks and the ease with which an attack can be made have increased. From…
Descriptors: Computer Software, Risk, Computer Security, Information Technology
Duan, Yuchao – International Association for Development of the Information Society, 2016
Cloud computing is considered a new frontier in the field of computing, as this technology comprises three major entities namely: software, hardware and network. The collective nature of all these entities is known as the Cloud. This research aims to examine the impacts of various aspects namely: cloud computing, sustainability, performance…
Descriptors: Higher Education, Internet, Educational Technology, Technology Uses in Education
Sokal, Laura – Canadian Journal of Counselling and Psychotherapy, 2012
Many school counsellors have identified "cyber-bullying" among adolescent girls as a growing concern. In order to respond to this issue, this article begins with a new model of cyber-communications from the unique perspective of adolescent girls. Next, it explores the limitations of responding to this model, based on current understandings of…
Descriptors: Bullying, Females, Adolescents, School Psychology
Peer reviewed Peer reviewed
Direct linkDirect link
Ramineni, Chaitanya – Assessing Writing, 2013
In this paper, I describe the design and evaluation of automated essay scoring (AES) models for an institution's writing placement program. Information was gathered on admitted student writing performance at a science and technology research university in the northeastern United States. Under timed conditions, first-year students (N = 879) were…
Descriptors: Validity, Comparative Analysis, Internet, Student Placement
Bogdanovic, Zorica; Simic, Konstantin; Milutinovic, Miloš; Radenkovic, Božidar; Despotovic-Zrakic, Marijana – International Association for Development of the Information Society, 2014
This paper presents a model for conducting Internet of Things (IoT) classes based on a web-service oriented cloud platform. The goal of the designed model is to provide university students with knowledge about IoT concepts, possibilities, and business models, and allow them to develop basic system prototypes using general-purpose microdevices and…
Descriptors: Web Based Instruction, Educational Technology, College Students, Information Technology
Dutt, Abhijit – ProQuest LLC, 2013
Improvements in Information Technology (IT) infrastructure and standardization of interoperability standards among heterogeneous Information System (IS) applications have brought a paradigm shift in the way an IS application could be used and delivered. Not only an IS application can be built using standardized component but also parts of it can…
Descriptors: Essays, Economic Factors, Information Technology, Technology Integration
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Fancott, Terrill; Kamthan, Pankaj; Shahmir, Nazlie – Electronic Journal of e-Learning, 2012
In recent years, user stories have emerged in academia, as well as industry, as a notable approach for expressing user requirements of interactive software systems that are developed using agile methodologies. There are social aspects inherent to software development, in general, and user stories, in particular. This paper presents directions and…
Descriptors: Computer Software, Web 2.0 Technologies, Internet, Social Networks
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8