NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblum, Jason; Hughes, Joan E. – Journal of Ethnographic & Qualitative Research, 2017
Using a phenomenological study of educational games, this article describes how computer-based digital tools were used to simultaneously record computer applications (such as games), voice and sounds, participant facial expressions, and gestures to enliven phenomenological interviews and provide rich, thickly described data. In a study,…
Descriptors: Phenomenology, Educational Games, Recall (Psychology), Protocol Analysis
Cooper, Paul K. – ProQuest LLC, 2017
There has been a significant growth of portable devices capable of storing both personal data as well as sensitive organizational data. This growth of these portable devices has led to an increased threat of cyber-criminal activity. The purpose of this study was to gain a better understanding of security threats to the data assets of organizations…
Descriptors: Information Security, Crime, Computer Security, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
An, Pengcheng; Bakker, Saskia; Eggen, Berry – Education and Information Technologies, 2017
Secondary school teachers have quite busy and complex routines in their classrooms. However, present classroom technologies usually require focused attention from teachers while being interacted with, which restricts their use in teachers' daily routines. Peripheral interaction is a human-computer interaction style that aims to enable interaction…
Descriptors: Teaching Methods, Educational Technology, Technology Uses in Education, Classroom Techniques