NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 196 to 210 of 21,334 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Trung Chi Nguyen; Thang Chien Nguyen; Hau Bui Nguyen – Asian Journal of Education and Training, 2024
The ubiquity of IT (Information technology) for teaching at large is a reality that can be observed, including STEM education, which is the field of study of this research. In view of this situation, this work is intended to determine the role of IT in STEM (Science, Technology, Engineering, Mathematics) education. It was decided to conduct a…
Descriptors: Information Technology, Technology Uses in Education, STEM Education, Educational Trends
Peer reviewed Peer reviewed
Direct linkDirect link
Monica Tatasciore; Luke Strickland; Shayne Loft – Cognitive Research: Principles and Implications, 2024
Increased automation transparency can improve the accuracy of automation use but can lead to increased bias towards agreeing with advice. Information about the automation's confidence in its advice may also increase the predictability of automation errors. We examined the effects of providing automation transparency, automation confidence…
Descriptors: Automation, Access to Information, Information Technology, Bias
Peer reviewed Peer reviewed
Direct linkDirect link
Leslie Neely; Amarie Carnett; John Quarles; Se-Woong Park; Michelle Kelly – Journal of Developmental and Physical Disabilities, 2024
This review synthesizes the literature base evaluating the effects of behavior analytic interventions delivered via augmented reality (AR) technology for individuals with autism. We also conducted a quality review. We identified 14 studies with a majority of the studies (n = 11; 79%) utilizing single-case research design. Of the 14 studies, three…
Descriptors: Computer Simulation, Autism Spectrum Disorders, Evaluation Methods, Applied Behavior Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Mari-Liisa Parder; Pieter Gryffroy; Marten Juurik – Research Ethics, 2024
The growing importance of researching online activities, such as cyber-deviance and cyber-crime, as well as the use of online tools (e.g. questionnaires, games, and other interactive tools) has created new ethical and legal challenges for researchers, which can be even more complicated when researching adolescents. In this article, we highlight…
Descriptors: Foreign Countries, Crime Prevention, Ethics, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Cecilia Latorre-Cosculluela; Verónica Sierra-Sánchez; Pilar Rivera-Torres; Marta Liesa-Orús – Journal of Computing in Higher Education, 2024
Digital competence is considered to be a crucial learning outcome in education in the 21st century. In this context, research highlights the fact that the perceptions that instructors manifest about different aspects of Information and Communication Technologies (ICTs) condition these professionals' behaviour towards these learning resources. In…
Descriptors: College Faculty, Teacher Attitudes, Foreign Countries, Information Technology
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security
Lisa Claudine Jenkins – ProQuest LLC, 2024
This quantitative non-experimental correlational study aimed to examine the significant association between Information System (IS)/Information Technology (IT)/Business Intelligence System (BIS) project managers' digital leadership skills and BIS project success. It also sought to determine if PMP® certification moderated this relationship. The…
Descriptors: Certification, Leadership Styles, Information Systems, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Drew Hwang; Hui Shi; Larisa Preiser-Houy – Information Systems Education Journal, 2024
Modern digital technologies are advancing rapidly, driving transformative changes. For Information Systems (IS) educators, maintaining curricula that prepare graduates for the digital economy is imperative. This study developed a knowledge pool of 121 common keywords in digital transformation through literature review and investigated their…
Descriptors: Information Systems, Computer Science Education, Course Descriptions, Undergraduate Study
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Thomas, O. A.; Abanikannda, M. O. – International Journal of Education and Development using Information and Communication Technology, 2023
Technology is fast reshaping the entire landscape of education and academics are charged with more responsibilities as they navigate through the new normal in education. The initial transformation which the ICT trend has brought to teaching and learning in educational institutions in scope and content, has made teaching a challenging profession…
Descriptors: Information Technology, Technology Uses in Education, Teacher Role, Educational Change
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Junhe; Kinshuk; An, Yunjo – Education and Information Technologies, 2023
The massive amount of text related to education provides rich information to support education in many aspects. In the meantime, the vast yet increasing volume of text makes it impossible to analyze manually. Text mining is a powerful tool to automatically analyze large-scaled texts and generate insights from the texts. However, many educational…
Descriptors: Scholarship, Educational Researchers, Information Retrieval, Pattern Recognition
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gökal, Hüseyin; Buzun, Mustafa; Adalier, Ahmet – Turkish Online Journal of Educational Technology - TOJET, 2023
This study aims to make a descriptive analysis and evaluation of postgraduate theses on blockchain technology conducted in Turkey between 2017 and 2021. Qualitative research methods were used in this research, and theses were analysed with the descriptive content analysis technique. It has been observed that 111 studies have been carried out on…
Descriptors: Content Analysis, Masters Theses, Graduate Students, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Trumbach, Cherie C.; Payne, Dinah M.; Walsh, Kenneth – Industry and Higher Education, 2023
Cybersecurity threats have been intensifying and becoming more diverse. Social engineering can enable or enhance these technical attacks. This interplay between technical attacks and social engineering, when used, makes every employee, manager and board member a part of the security infrastructure of an organization. As such, it is incumbent upon…
Descriptors: Computer Security, Information Security, Business Education, Higher Education
Arslan Isaac – ProQuest LLC, 2023
This nonexperimental, survey-based online quantitative study on nonprofit managers' technical training measures the extent of the influence on big data technology use. The unified theory of acceptance and use of technology is a theoretical framework to determine whether business managers are trained to have know-how in using big data technology.…
Descriptors: Nonprofit Organizations, Administrators, Data Use, Information Technology
Paul Majett – ProQuest LLC, 2023
In this study, I investigated how information technology (IT) professionals learn/acquire soft skills. Little is understood about how IT professionals describe and apply the soft skills that they consider necessary for their own employability. Exploring how IT professionals describe and apply soft skills is important to their future work and…
Descriptors: Soft Skills, Information Technology, Data Processing Occupations, Family Influence
Roger Anthony White – ProQuest LLC, 2023
The purpose of this transcendental phenomenological study was to describe the experiences of history doctoral candidates at Liefrig University with technology and information overload. The theory guiding this study was Sweller's cognitive load theory, as it explains the characteristics of the information received using technology and the effect of…
Descriptors: History Instruction, Doctoral Students, Cognitive Processes, Difficulty Level
Pages: 1  |  ...  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  18  |  ...  |  1423