NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Michelle M. Neumann; Eunjae Park; Hannah Soong; Sue Nichols; Nadia Selim – Education 3-13, 2024
Social media apps are being increasingly used by primary school children and this has influenced how they connect and communicate with others. Child use of social media has raised societal concerns about its impact on early development. To gain a deeper understanding of children's experiences with social media, children in grade 5 (N = 28; girls:…
Descriptors: Social Media, Social Networks, Elementary School Students, Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Valentine, Andrew; Van der Veen, Tom; Kenworthy, Patrick; Hassan, Ghulam Mubashar; Guzzomi, Andrew; Khan, R. Nazim; Male, Sally A. – Australasian Journal of Educational Technology, 2021
A barrier to using head mounted display (HMD) virtual reality (VR) in education is access to hardware for large classes. This paper compares students' learning when engaging with an HMD VR simulation as the operator and as the observer, to evaluate whether benefits of HMD VR can be achieved without requiring all students to operate the equipment.…
Descriptors: Educational Technology, Technology Uses in Education, Computer Simulation, Graduate Students
Office of Educational Technology, US Department of Education, 2024
The U.S. Department of Education is committed to supporting innovative advances in educational technology to improve teaching and learning across the nation's education systems and to support educators as they incorporate emerging technology into their learning communities. Artificial Intelligence (AI) in education is a complex and rapidly…
Descriptors: Equal Education, Artificial Intelligence, Computer Software, Technology Integration
Manzano, Debbie L. – ProQuest LLC, 2012
The importance of information security is understated and theory-based empirical research that explains computer users voluntary IT threat avoidance behavior is lacking. Most existing information security research on individual behaviors has been focused in organizational settings where the threat avoidance behavior is mandatory and dictated by…
Descriptors: Information Security, Behavior, Safety, Statistical Analysis