NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Vasco Rikkers; Dipti Kapoor Sarmah – Journal of Computing in Higher Education, 2025
In recent years, gamification has seen a rise in usage for cyber-security training, with some of the most used elements being story and narrative. Yet there seems to be a lack of research on story-based gamification as well as how this type of gamification affects a training's effectiveness. The goal of this study was to test the effectiveness of…
Descriptors: Gamification, Computer Security, Training Methods, Foreign Countries
Bowles, William, Jr. – ProQuest LLC, 2012
The goal of this study was to determine whether the Revised NIOSH Lifting Equation (RNLE) CD-ROM training program, when used without an instructor, could adequately train RNLE users to properly understand and correctly apply the RNLE. If so, then it can be used to fill a current gap in delivering training to both health and safety professionals,…
Descriptors: Educational Technology, Training, Training Methods, Computer Peripherals
Peer reviewed Peer reviewed
Direct linkDirect link
Shih, Ching-Hsiang; Chang, Man-Ling – Research in Developmental Disabilities: A Multidisciplinary Journal, 2012
This study extended Battery-free wireless mouse functionality to assess whether two people with developmental disabilities would be able to actively perform designated simple occupational activities according to simple instructions by controlling their favorite environmental stimulation using Battery-free wireless mice with a newly developed…
Descriptors: Assistive Technology, Training Methods, Intervention, Stimulation