NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 46 to 60 of 139,360 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Seungmin Lee – Educational Technology Research and Development, 2025
This study investigated the effectiveness of localized learning content (LLC) in enhancing computational thinking (CT) skills and learning motivation among 6th-grade elementary school students in Busan, South Korea. In contrast to conventional methodological approaches, our research focuses on the transformative power of culturally and…
Descriptors: Computer Software, Computer Uses in Education, Computer Science Education, Computation
Peer reviewed Peer reviewed
Direct linkDirect link
Andreas Marougkas; Christos Troussas; Akrivi Krouska; Cleo Sgouropoulou – Smart Learning Environments, 2025
Virtual Reality has proven to be highly promising within the field of learning. Most VR learning methods do not effectively implement pedagogical models or adapt to the individual's learning style. This research aims to bridge this gap by integrating Fuzzy Cognitive Maps (FCMs), Flow Theory and Gamification within an educational Virtual Reality…
Descriptors: Computer Simulation, Computer Games, Educational Games, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Krish Pillai; Marcia Lovas – International Society for Technology, Education, and Science, 2023
A typical first computer science course (CS1) introduces the student to coding conventions, variables, methods, control structures, conditionals, and the semantics of classes and objects. Advanced concepts of inheritance, polymorphism, abstract classes, interfaces, and their use in the design process, are covered in a second-level course (CS2).…
Descriptors: Computer Games, Educational Games, Teaching Methods, Technology Uses in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to data theft or other malicious activities. While various methods exist for combating wormhole…
Descriptors: Telecommunications, Computer Networks, Computer Security, Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Davis Krumins; Sandra Schumann; Veiko Vunder; Rauno Põlluäär; Kristjan Laht; Renno Raudmäe; Alvo Aabloo; Karl Kruusamäe – IEEE Transactions on Learning Technologies, 2024
Teaching robotics with the robot operating system (ROS) is valuable for instating good programming practices but requires significant setup steps from the learner. Providing a ready-made ROS learning environment over the web can make robotics more accessible; however, most of the previous remote labs have abstracted the authentic ROS developer…
Descriptors: Teaching Methods, Robotics, Programming, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sehla Ertan; T. Volkan Yüzer – Journal of Educational Technology and Online Learning, 2024
Open and distance learning (ODL) activities aim to meet the expectations and needs of different individuals, societies, and systems by ensuring the continuation of learning with a lifelong learning philosophy and an egalitarian policy for everyone, regardless of time and place. Support services, which address the differentiated expectations and…
Descriptors: Computer Security, Open Education, Distance Education, Technical Support
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Herminio Bodon; Vishesh Kumar; Marcelo Worsley – ACM Transactions on Computing Education, 2025
Objectives: Athletics and sports represent a focal part of adolescence for millions of youth around the world. However, opportunities to engage in computer science (CS) learning experiences are less prevalent, particularly among Hispanic and low-income communities. Recently, researchers have explored ways to bridge these, seemingly, disparate…
Descriptors: Design, Computer Science Education, Physical Education, Athletics
Peer reviewed Peer reviewed
Direct linkDirect link
Jacob Davidsen; Rolf Steier – International Journal of Research & Method in Education, 2025
Methodological advancements for the study of learning processes are both shaped by and drivers of technology developments. Interaction Analysis (IA), as a core methodological approach over the past three decades is reflective of this relationship and can be understood by examining moves from analogue video tapes, to digital media, computational…
Descriptors: Educational Research, Interaction, Research Methodology, Computer Use
Peer reviewed Peer reviewed
Direct linkDirect link
Cyril Brom; Tereza Hannemann; Tereza Tetourová; Anna Drobná; Nikol Kopánková; Kristina Volná; Katerina Kacerovská; Filip Dechterenko; Pavel Ježek; Tereza Stárková – International Journal of Technology and Design Education, 2024
Primary school children frequently use digital devices, which can be infected by computer viruses. In this mixed methods paper with two studies (N = 278 + 114), we examined 8-year-olds' preconceptions about computer viruses and protection against them; how to teach these children about said topics using three different, 30-min-long,…
Descriptors: Computers, Children, Computer Security, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Christiana Karousiou – Educational Media International, 2025
This research study explores the challenges and barriers in school digital transformation based on the perspectives and experiences of school leaders within the Republic of Cyprus. This study employs a qualitative research approach, using interviews to collect insights from 11 purposively selected primary and secondary school leaders. The…
Descriptors: Administrators, Elementary Secondary Education, Foreign Countries, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Sarthak Punj; Poorvi Kejriwal; S. P. Raja – International Journal of Learning and Change, 2024
Technology is advancing and metaverse is gaining popularity. The magic of metaverse is beyond our imagination. In simple terms, the metaverse refers to a virtual shared space that exists online, where people can interact, socialise, work, and play using digital avatars, just like they do in the real world. It is a combination of virtual reality,…
Descriptors: Computer Simulation, Computer Mediated Communication, Health Services, Social Media
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Eng How Lim; Sompatu Vungthong; Wannapa Trakulkasemsuk – LEARN Journal: Language Education and Acquisition Research Network, 2024
With the advent of online gaming becoming such an inherent part of popular culture, the issue of toxicity, particularly in online competitive games, has never been more relevant. In the /all chat, however, where communication between players of opposing teams is expected to be hostile, there have been debates in community forums about whether that…
Descriptors: Synchronous Communication, Negative Attitudes, Video Games, Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Sai Ho Yip; Adrian K. T. Ng; Henry Y. K. Lau; Jeffrey A. Saunders – Cognitive Research: Principles and Implications, 2024
Recent findings suggest that adding a visual depiction of a nose to virtual reality displays (virtual nose) can reduce motion sickness. If so, this would be a simple intervention that could improve the experience of a variety of VR applications. However, only one peer-reviewed study has reported a benefit from a virtual nose, and the effect was…
Descriptors: Human Body, Visual Aids, Computer Simulation, Motion
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  9291