NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
National Longitudinal Survey…1
What Works Clearinghouse Rating
Showing 1 to 15 of 31 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Shoaib, Muhammad; Sayed, Nasir; Amara, Nedra; Latif, Abdul; Azam, Sikandar; Muhammad, Sajjad – Education and Information Technologies, 2022
Technology and data analysis have evolved into a resource-rich tool for collecting, researching and comparing student achievement levels in the classroom. There are sufficient resources to discover student success through data analysis by routinely collecting extensive data on student behaviour and curriculum structure. Educational Data Mining…
Descriptors: Prediction, Artificial Intelligence, Student Behavior, Academic Achievement
Peer reviewed Peer reviewed
Direct linkDirect link
Michael Yao Wodui Serwornoo; Samuel Danso; Benedine Azanu; Eric Opoku-Mensah – Journalism and Mass Communication Educator, 2024
The digital era has significantly reshaped journalism, emphasizing the pivotal role of data-driven reporting. This review delves into the nexus of data journalism and journalism education, investigating dominant study characteristics, challenges, and gaps for future research. Examining 41 relevant articles through the Arksey and O'Malley…
Descriptors: Journalism Education, Data Analysis, Journalism, Decision Making
Peer reviewed Peer reviewed
Direct linkDirect link
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Tkácik, Kristián; Popovic, Daniel – Education and Information Technologies, 2022
Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows…
Descriptors: Computer Security, Information Security, Training, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Cannistrà, Marta; Masci, Chiara; Ieva, Francesca; Agasisti, Tommaso; Paganoni, Anna Maria – Studies in Higher Education, 2022
This paper combines a theoretical-based model with a data-driven approach to develop an Early Warning System that detects students who are more likely to dropout. The model uses innovative multilevel statistical and machine learning methods. The paper demonstrates the validity of the approach by applying it to administrative data from a leading…
Descriptors: Dropouts, Potential Dropouts, Dropout Prevention, Dropout Characteristics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
So, Joseph Chi-ho; Wong, Adam Ka-lok; Tsang, Kia Ho-yin; Chan, Ada Pui-ling; Wong, Simon Chi-wang; Chan, Henry C. B. – Journal of Technology and Science Education, 2023
The project presented in this paper aims to formulate a recommendation framework that consolidates the higher education students' particulars such as their academic background, current study and student activity records, their attended higher education institution's expectations of graduate attributes and self-assessment of their own generic…
Descriptors: Pattern Recognition, Artificial Intelligence, Higher Education, College Students
Peer reviewed Peer reviewed
Direct linkDirect link
Williamson, Ben – European Educational Research Journal, 2016
This article analyses the rise of software systems in education governance, focusing on digital methods in the collection, calculation and circulation of educational data. It examines how software-mediated methods intervene in the ways educational institutions and actors are seen, known and acted upon through an analysis of the methodological…
Descriptors: Governance, Educational Administration, Data Analysis, Data Collection
Koc, Levent – ProQuest LLC, 2013
With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…
Descriptors: Bayesian Statistics, Computer Security, Computer Networks, Data Collection
Mejia, Felipe – ProQuest LLC, 2012
Structural health monitoring (SHM) has gained significant popularity in the last decade. This growing interest, coupled with new sensing technologies, has resulted in an overwhelming amount of data in need of management and useful interpretation. Acoustic emission (AE) testing has been particularly fraught by the problem of growing data and is…
Descriptors: Structural Elements (Construction), Acoustics, Pattern Recognition, Computation
Peer reviewed Peer reviewed
Direct linkDirect link
Gemici, Sinan; Rojewski, Jay W.; Lee, In Heok – Career and Technical Education Research, 2012
Most quantitative analyses in workforce education are affected by missing data. Traditional approaches to remedy missing data problems often result in reduced statistical power and biased parameter estimates due to systematic differences between missing and observed values. This article examines the treatment of missing data in pertinent…
Descriptors: Research Methodology, Statistical Analysis, Data Collection, Pattern Recognition
Peer reviewed Peer reviewed
Direct linkDirect link
Valsamidis, Stavros; Kontogiannis, Sotirios; Kazanidis, Ioannis; Theodosiou, Theodosios; Karakos, Alexandros – Educational Technology & Society, 2012
Learning Management Systems (LMS) collect large amounts of data. Data mining techniques can be applied to analyse their web data log files. The instructors may use this data for assessing and measuring their courses. In this respect, we have proposed a methodology for analysing LMS courses and students' activity. This methodology uses a Markov…
Descriptors: Foreign Countries, Electronic Learning, College Mathematics, Integrated Learning Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Doolan, Stephen M. – Written Communication, 2013
Recently, scholars have suggested that "second-language writers" are made up of two distinct groups: Generation 1.5 (long-term U.S.-resident language learners) and more traditional L2 students (e.g., international or recently arrived immigrants). To investigate that claim, this study compares the first-year composition writing of…
Descriptors: Writing (Composition), Freshman Composition, College Freshmen, English (Second Language)
Peer reviewed Peer reviewed
Direct linkDirect link
Meade, Adam W.; Craig, S. Bartholomew – Psychological Methods, 2012
When data are collected via anonymous Internet surveys, particularly under conditions of obligatory participation (such as with student samples), data quality can be a concern. However, little guidance exists in the published literature regarding techniques for detecting careless responses. Previously several potential approaches have been…
Descriptors: Online Surveys, Data Collection, Research Problems, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Wong, Andrew D.; Wu, Lan – Marketing Education Review, 2012
Despite an increasing demand for marketing researchers familiar with ethnographic methods, ethnographic consumer research has received little coverage in current marketing curricula. The innovation discussed in the present paper addresses this problem: it introduces the notion of "cultural relativism" and gives students hands-on experience in…
Descriptors: Marketing, Ethnography, Cultural Pluralism, Curriculum Development
Zhu, Zutao – ProQuest LLC, 2010
In recent years, the concerns about the privacy for the electronic data collected by government agencies, organizations, and industries are increasing. They include individual privacy and knowledge privacy. Privacy-preserving data publishing is a research branch that preserves the privacy while, at the same time, withholding useful information in…
Descriptors: Public Agencies, Models, Data Collection, Vignettes
Peer reviewed Peer reviewed
Direct linkDirect link
Blikstein, Paulo; Worsley, Marcelo; Piech, Chris; Sahami, Mehran; Cooper, Steven; Koller, Daphne – Journal of the Learning Sciences, 2014
New high-frequency, automated data collection and analysis algorithms could offer new insights into complex learning processes, especially for tasks in which students have opportunities to generate unique open-ended artifacts such as computer programs. These approaches should be particularly useful because the need for scalable project-based and…
Descriptors: Programming, Computer Science Education, Learning Processes, Introductory Courses
Previous Page | Next Page »
Pages: 1  |  2  |  3