NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Damjan Fujs; Simon Vrhovec; Tomaž Hovelja; Damjan Vavpotic – Education and Information Technologies, 2025
An increasingly aging population, widespread internet connectivity, and an increasing number of cybersecurity incidents bring many challenges for the future of information security. Older adults, in particular, are a highly vulnerable demographic, often targeted by cyber attackers. This paper aims to develop an approach that enables the…
Descriptors: Foreign Countries, Older Adults, Digital Literacy, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Yulu Cui; Hai Zhang – Education and Information Technologies, 2025
With the development of artificial intelligence technology, it has become increasingly difficult to distinguish between Artificial Intelligence Generated Content (AIGC) and non-AIGC. Inaccuracies in identifying AIGC in higher education may lead to academic misconduct and risks, and the credibility of AIGC is also subject to certain doubts. Users…
Descriptors: Artificial Intelligence, Technology Uses in Education, Educational Technology, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Hui-Zhi Hu; Li-Guo Zhang; Jia-Hua Zhang; Di Zhang; Jia-Rui Xie – Education and Information Technologies, 2025
Computer Science (CS) is a vital subject in K-12 education, and acquiring proficiency in CS is essential for nurturing talent. However, current teaching practices often rely on standardized tests to evaluate academic performance, which may not offer a comprehensive and multidimensional assessment of students' competency in learning CS.…
Descriptors: Evaluation Methods, Student Evaluation, Competence, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Wei Wei; BinBin Zhu; Ning Ding – Education and Information Technologies, 2025
The promotion and implementation of programming education in primary and secondary schools in the intelligent era are associated with high-quality information technology (IT) teachers who possess programming literacy. IT teachers' programming literacy requires a scientific and reasonable index system for quantitative evaluation. On the basis of…
Descriptors: Information Technology, Computer Science Education, Programming, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Weixin Qi; Yawen Yu; Jie Liu; Jinfa Liu – Education and Information Technologies, 2025
In the wake of the COVID-19 pandemic, the demand for online learning has surged, driving rapid developments in online education. This technological advancement aligns with the global push to achieve the United Nations Sustainable Development Agenda for 2030. Despite extensive research on online learning efficacy, there is a gap in understanding…
Descriptors: College Students, COVID-19, Pandemics, In Person Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Rasha Noureddine; David Boote; Laurie O. Campbell – Education and Information Technologies, 2025
A meta-analytic study was conducted of the "Unified Theory of Acceptance and Use of Technology" to understand higher education instructors use of technology in teaching and learning. Through broad searches of the years 2003-2023, 117 records were identified for initial review. After reviewing the studies and removing those studies that…
Descriptors: College Faculty, Teacher Attitudes, Technological Literacy, Computer Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Alison Lui; Catharina Womack; Penny Orton – Education and Information Technologies, 2025
This article critically evaluates the effects of the ACU Virtual Mobility (VM) Project Digital Information Security Course (DISC) programme on improving students' awareness of cyber security skills, pre and post the educational intervention. Our selected VM tool is Collaborative Online International Learning (COIL). Building on a conceptual…
Descriptors: Cooperative Learning, Electronic Learning, Foreign Countries, Information Security