Publication Date
| In 2026 | 0 |
| Since 2025 | 3 |
Descriptor
Author
| Amogh Chetankumar Joshi | 1 |
| Basil Hanafi | 1 |
| Devyaani Singh | 1 |
| Hae Sun Jung | 1 |
| Haein Lee | 1 |
| Keon Chul Park | 1 |
| Mohammad Ali | 1 |
| Noah Glaser | 1 |
| Prasad Calyam | 1 |
| Zeinab Parishani | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 2 |
| Reports - Descriptive | 1 |
Education Level
| Early Childhood Education | 1 |
Audience
Location
| South Korea | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Basil Hanafi; Mohammad Ali; Devyaani Singh – Discover Education, 2025
Quantum computing is the beginning of a new age for diverse industries, and educational technologies will significantly benefit from such quantum developments. This is a novel approach, applying quantum algorithms to enhance educational technologies, with no previous studies addressing the integration of quantum computing for personalized…
Descriptors: Educational Technology, Computer Security, Ethics, Algorithms
Hae Sun Jung; Haein Lee; Keon Chul Park – SAGE Open, 2025
This study investigates user experience (UX) priorities in early childhood education applications by analyzing Korean-language user reviews using Bidirectional Encoder Representations from Transformers topic modeling (BERTopic). Eighteen latent topics were extracted and systematically mapped to the eight software quality characteristics defined by…
Descriptors: Early Childhood Education, Computer Uses in Education, Computer Software, Usability
Noah Glaser; Zeinab Parishani; Amogh Chetankumar Joshi; Prasad Calyam – Technology, Knowledge and Learning, 2025
As Virtual Reality (VR) gains traction in education, its potential to support neurodivergent learners in cybersecurity training remains underexplored. This emerging technology report examines how VR can bridge the gap between STEM education and cybersecurity training for neurodivergent individuals, highlighting both its promise and the challenges…
Descriptors: Computer Simulation, Computer Uses in Education, Computer Science Education, Computer Security

Peer reviewed
Direct link
