Publication Date
| In 2026 | 15 |
| Since 2025 | 3588 |
| Since 2022 (last 5 years) | 17347 |
| Since 2017 (last 10 years) | 36192 |
| Since 2007 (last 20 years) | 68939 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 9874 |
| Teachers | 6668 |
| Researchers | 2553 |
| Administrators | 1790 |
| Policymakers | 1067 |
| Students | 681 |
| Media Staff | 653 |
| Parents | 264 |
| Counselors | 125 |
| Community | 101 |
| Support Staff | 62 |
| More ▼ | |
Location
| Australia | 2756 |
| Turkey | 2564 |
| United Kingdom | 2289 |
| Canada | 2244 |
| China | 1588 |
| United States | 1523 |
| Taiwan | 1442 |
| California | 1189 |
| Spain | 1036 |
| Germany | 961 |
| Japan | 880 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 62 |
| Meets WWC Standards with or without Reservations | 81 |
| Does not meet standards | 60 |
Budak, Sirin – Australian Mathematics Education Journal, 2022
The author, Sirin Budak, discusses how to model the problem of a frog climbing out of a well using piecewise functions and GeoGebra.
Descriptors: Mathematics Instruction, Computer Uses in Education, Mathematical Applications, Class Activities
Demir, Suleyman – International Journal of Assessment Tools in Education, 2022
This study aims to compare normality tests in different sample sizes in data with normal distribution under different kurtosis and skewness coefficients obtained simulatively. To this end, firstly, simulative data were produced using the MATLAB program for different skewness/kurtosis coefficients and different sample sizes. The normality analysis…
Descriptors: Sample Size, Comparative Analysis, Computer Software, Evaluation Methods
Kwon, Hyunji; Morrill, Kenneth – Art Education, 2022
Due to the science, technology, engineering, and mathematics movement and the immersive aspects of virtual reality technology, the use of virtual reality in education has grown rapidly. In the field of art education, many researchers have demonstrated the potential of using digital art and virtual worlds. Based on how technology and convincing…
Descriptors: Computer Simulation, Art Education, Situated Learning, Photography
Khajonmote, Withamon; Chinsook, Kittipong; Klintawon, Sununta; Sakulthai, Chaiyan; Leamsakul, Wicha; Jansawang, Natchanok; Jantakoon, Thada – Journal of Education and Learning, 2022
The system architecture of big data in massive open online courses (BD-MOOCs System Architecture) is composed of six components. The first component was comprised of big data tools and technologies such as Hadoop, YARN, HDFS, Spark, Hive, Sqoop, and Flume. The second component was educational data science, which is composed of the following four…
Descriptors: MOOCs, Data Collection, Student Behavior, Computer Software
Temirbekova, Zh. E.; Pyrkova, A. Yu. – Education and Information Technologies, 2022
Currently, the study of microcontroller and microcircuits by students is becoming very important and in demand when acquiring competencies in the computer engineering educational program. This knowledge and skills will be necessary for the employment of graduates in industry, science and education. There are more and more large technical systems…
Descriptors: Electronic Equipment, Skill Development, Computer Science Education, Engineering Education
Noorbehbahani, Fakhroddin; Mohammadi, Azadeh; Aminazadeh, Mohammad – Education and Information Technologies, 2022
In recent years, online learning has received more attention than ever before. One of the most challenging aspects of online education is the students' assessment since academic integrity could be violated due to various cheating behaviors in online examinations. Although a considerable number of literature reviews exist about online learning,…
Descriptors: Cheating, Computer Assisted Testing, Electronic Learning, Educational Trends
Popovska, Viktoria – New England Journal of Higher Education, 2022
Some of the most common cybersecurity threats are malware, ransomware, phishing and spam. For their victims, including higher education institutions (HEIs), cybercrimes range from inconveniences to data breaches to grand heists. The threat that cyberattacks pose for HEIs is extremely costly and increasingly frequent, according to April 2022…
Descriptors: Higher Education, Information Security, Computer Security, Majors (Students)
Tan, Teck Kiang – Practical Assessment, Research & Evaluation, 2022
Power analysis based on the analytical t-test is an important aspect of a research study to determine the sample size required to detect the effect for the comparison of two means. The current paper presents a reader-friendly procedure for carrying out the t-test power analysis using the various R add-on packages. While there is a growing of R…
Descriptors: Programming Languages, Sample Size, Bayesian Statistics, Intervention
Bradfield, Michael K. – ProQuest LLC, 2022
Education and training activities have utilized many technologies including extended reality. This generic qualitative inquiry study looks at the lessons learned from implementing extended reality in education and training with the intent of identifying what areas should be looked at that will assist in implementing this advanced technology that…
Descriptors: Computer Simulation, Technology Uses in Education, Job Training, Education
Brannon, Megan E. – ProQuest LLC, 2022
The purpose of this study was to explore the impact of design thinking instruction on the creativity of preservice teachers. Preservice teachers took part in a two-week unit on 3D printing as a part of their regular instruction in an educational technology course. The experimental group was introduced to design thinking instruction as a framework…
Descriptors: Design, Creativity, Preservice Teachers, Educational Technology
Ziqian Xu – Grantee Submission, 2022
With the prevalence of missing data in social science research, it is necessary to use methods for handling missing data. One framework in which data with missing values can still be used for parameter estimation is the Bayesian framework. In this tutorial, different missing data mechanisms including Missing Completely at Random, Missing at…
Descriptors: Research Problems, Bayesian Statistics, Structural Equation Models, Data Analysis
Raymond Todd Schenk – ProQuest LLC, 2022
This study sought to understand the "influence of robotics on self-efficacy and interest in computer science." It provides the background that has led to the current research need. The study conducted was a double pre-test, repeated measures post-test quasi-experimental study, performed by the researcher to determine the effects of a…
Descriptors: Robotics, Self Efficacy, Computer Science Education, Student Interests
Jamaine Mungo – ProQuest LLC, 2022
The purpose of this generic qualitative inquiry research study is to examine the features that need to be improved in self-paced cybersecurity awareness training to educate retail employees to identify phishing attacks. Malicious phishing attacks are a significant threat to retail corporations' business operations and confidential data. Employees'…
Descriptors: Computer Security, Information Security, Training, Employees
Nancy Spear Owen – ProQuest LLC, 2022
The COVID pandemic led to a sudden expansion of telehealth in the delivery of nursing services. At the same time, nursing education was forced to extend clinical learning to online approaches. However, telehealth clinical experiences are limited in the nursing curricula of entry-level programs. Nursing simulation is an educational activity that…
Descriptors: Videoconferencing, Access to Health Care, Medicine, Telecommunications
Steven C. Anton – ProQuest LLC, 2022
The purpose of this study was to investigate the impact of time in Mixed-Reality Simulations (MRS) on anxiety levels and coping for pre-service teachers (PSTs). A convergent parallel mixed-methods design was utilized for this study. The quantitative portion of the study used a convenience sample of 10 PSTs enrolled in one of two practice-based…
Descriptors: Preservice Teachers, Coping, Anxiety, Computer Simulation

Peer reviewed
Direct link
