NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 91 to 105 of 139,650 results Save | Export
Billur Aksoy; Lester R. Lusher; Scott E. Carrell – National Bureau of Economic Research, 2025
Phone usage in the classroom has been linked to worsened academic outcomes. We present findings from a field experiment conducted at a large public university in partnership with an app marketed as a soft commitment device that provides incentives to reduce phone use in the classroom. We find that app usage led to improvements in classroom focus,…
Descriptors: Attention Control, Telecommunications, Handheld Devices, Universities
Frank Morley; Emma Walland – Research Matters, 2025
The recent development of Large Language Models (LLMs) such as Claude, Gemini, and GPT has led to widespread attention on potential applications of these models. Marking exams is a domain which requires the ability to interpret and evaluate student responses (often consisting of written text), and the potential for artificial intelligence (AI)…
Descriptors: Ethics, Artificial Intelligence, Automation, Scoring
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Afaf A. Baabdullah; ChanMin Kim – International Association for Development of the Information Society, 2025
Understanding of code is critical for debugging computer programs. Chunking, breaking code into smaller parts, has been proven to be an effective strategy for analyzing code at various levels of abstraction. Novice debuggers struggle to comprehend code and recognize its underlying structure and components. They often debug code in an arbitrary and…
Descriptors: Computer Science Education, Programming, Novices, Cooperative Learning
James McGibney – ProQuest LLC, 2024
This phenomenological study's objective was to review the existing initiatives for cybersecurity awareness and training that are in place for the K-12 education system throughout the United States. Every facet of life is now plagued by the potential, perceived, and real threat of cyber warfare, which includes, but is not limited to, K-12 schools…
Descriptors: Information Security, Computer Security, Crime, Kindergarten
Peer reviewed Peer reviewed
Direct linkDirect link
Miguel Ángel Rodriguez-Florido; José Juan Reyes-Cabrera; Aday Melián; Carmen Nieves Hernández-Flores; Juan Ruiz-Azola; Manuel Maynar – Journal of New Approaches in Educational Research, 2024
The metaverse is known as the hypothetical iteration of the Internet as a single, connected, universal and immersive virtual world that can be accessed via immersive technology devices. One approach to this concept can be achieved through the use of multi-user immersive virtual reality applications. Immersive virtual reality (IVR), which uses…
Descriptors: Medical Education, Medical Students, Internet, Computer Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Rebecka Weegar; Peter Idestam-Almquist – International Journal of Artificial Intelligence in Education, 2024
Machine learning methods can be used to reduce the manual workload in exam grading, making it possible for teachers to spend more time on other tasks. However, when it comes to grading exams, fully eliminating manual work is not yet possible even with very accurate automated grading, as any grading mistakes could have significant consequences for…
Descriptors: Grading, Computer Assisted Testing, Introductory Courses, Computer Science Education
Jordan Christopher Williams – ProQuest LLC, 2024
The purpose of this quantitative correlational study was to determine if and to what extent statistically significant correlations exist between high school STEM teachers' attitudes toward the use of computer technology and the duration of software utilization in their classrooms in the United States. This research was based on the Unified Theory…
Descriptors: High School Teachers, STEM Education, Teacher Attitudes, Computer Attitudes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nicolai Plintz; Dirk Ifenthaler – International Association for Development of the Information Society, 2024
This study aims to develop a preliminary model for the content validation of serious games, specifically to assess two cybersecurity games designed for children aged 8-13 years as part of the Erasmus+ project "SuperCyberKids". Using a scoping review of databases from pedagogy, psychology, and computer science, we identified current…
Descriptors: Computer Security, Educational Games, Computer Uses in Education, Game Based Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Debora Lui; Deborah A. Fields; Yasmin B. Kafai – Cognition and Instruction, 2024
Debugging (or troubleshooting) provides a rich context to foster problem-solving. Yet, while we know much about some problems and strategies that novices face in programming on-screen, we know far less about debugging and troubleshooting in the context of physical computing, where coding issues may overlap with materially embedded problems. In…
Descriptors: Grade 9, STEM Education, Troubleshooting, Public Schools
Peer reviewed Peer reviewed
Direct linkDirect link
Brittney Heibel; Ryan Anderson; Marshall Swafford; Bradley Borges – Journal of Agricultural Education, 2024
Incorporating virtual reality (VR) technology into training environments has been effective as it allows training to remain safe, efficient, and meaningful. Welding training is no exception, with research highlighting benefits such as decreased welder anxiety, increased cost- and time-efficiency, reduction in material usage, and advanced levels of…
Descriptors: Computer Simulation, Computer Uses in Education, Computer Assisted Instruction, Welding
Peer reviewed Peer reviewed
Direct linkDirect link
Sinem Aslan; Lenitra M. Durham; Nese Alyuz; Rebecca Chierichetti; Pete A. Denman; Eda Okur; David I. Gonzalez Aguirre; Julio C. Zamora Esquivel; Hector A. Cordourier Maruri; Sangita Sharma; Giuseppe Raffa; Richard E. Mayer; Lama Nachman – British Journal of Educational Technology, 2024
Previous research showed that the parents acknowledged the technology's benefits for their young children's learning, however, they are still worried about the extended screen time, lack of physical activity and lack of social interactions. To address these concerns, we developed Kid Space to enable pedagogically appropriate technology use for…
Descriptors: Parents, Young Children, Artificial Intelligence, Interpersonal Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Nurdayana Mohamad Noor – Asian Association of Open Universities Journal, 2024
Purpose: The purpose of this paper is to articulate how the user experience (UX) approach was initiated and integrated into the centre's scope of operations with the objective of improving the e-learning layout on the D2L learning management system (LMS). One of the most effective ways to collect user feedback has historically been to evaluate…
Descriptors: Learning Management Systems, Usability, Computer Interfaces, Electronic Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Esmail Mohebbi – Decision Sciences Journal of Innovative Education, 2025
Microsoft Excel and Access are widely used in introductory courses designed to teach the fundamentals of spreadsheet and relational database modeling skills in various disciplines. To achieve the targeted learning outcomes, instructors of these courses strive to provide students with guided, frequent, and incrementally fruitful practice with the…
Descriptors: Teaching Methods, Instructional Effectiveness, Spreadsheets, Computer Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Sarah Alturkustani; Ashley Durfee; Olivia F. O'Leary; Siobhain M. O'Mahony; Conor O'Mahony; Mutahira Lone; Andreea Factor – Anatomical Sciences Education, 2025
Anatomy is fundamental to medical disciplines. However, its complexity can be challenging to learners, and traditional anatomy teaching may not be easily accessible. Virtual Reality has the potential to supplement anatomy education, but its effectiveness depends on students' willingness to accept it. This study aimed to measure students'…
Descriptors: Student Attitudes, Computer Simulation, Anatomy, Electronic Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Zhihan Wang – Education and Information Technologies, 2025
The integration of classical and modern teaching strategies enables the creation of an effective educational environment that meets the needs of various types of learners. The aim of this study is to explore the potential for integrating mobile applications into vocal education by analyzing their accessibility and effectiveness as learning tools,…
Descriptors: Educational Technology, Technology Uses in Education, Technology Integration, Computer Oriented Programs
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  9310