Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 6 |
| Since 2017 (last 10 years) | 9 |
| Since 2007 (last 20 years) | 46 |
Descriptor
Source
Author
| Cohen, Malcolm S. | 2 |
| Hample, Stephen R. | 2 |
| Kearsley, Greg P. | 2 |
| Adalier, Ahmet | 1 |
| Adams Becker, S. | 1 |
| Alexander, George D. | 1 |
| Alexander, Melody W. | 1 |
| Aley, James | 1 |
| Aljarrah, Abdul | 1 |
| Allen, David F. | 1 |
| Alvaro, Elsa | 1 |
| More ▼ | |
Publication Type
Education Level
| Higher Education | 16 |
| Postsecondary Education | 10 |
| Elementary Education | 8 |
| Elementary Secondary Education | 4 |
| Grade 8 | 4 |
| Junior High Schools | 4 |
| Middle Schools | 4 |
| Secondary Education | 4 |
| Grade 6 | 3 |
| Adult Education | 2 |
| Grade 4 | 2 |
| More ▼ | |
Location
| United States | 6 |
| Maryland | 5 |
| Australia | 4 |
| Canada | 4 |
| Taiwan | 4 |
| Turkey | 4 |
| Hawaii | 3 |
| New Zealand | 3 |
| Florida | 2 |
| Germany | 2 |
| Japan | 2 |
| More ▼ | |
Laws, Policies, & Programs
| Goals 2000 | 1 |
Assessments and Surveys
| Computer Anxiety Scale | 1 |
| Estes Attitude Scale | 1 |
| Motivated Strategies for… | 1 |
| National Assessment of… | 1 |
What Works Clearinghouse Rating
Patrick P. Weis; Wilfried Kunde – Cognitive Research: Principles and Implications, 2023
With ubiquitous computing, problems can be solved using more strategies than ever, though many strategies feature subpar performance. Here, we explored whether and how simple advice regarding when to use which strategy can improve performance. Specifically, we presented unfamiliar alphanumeric equations (e.g., A + 5 = F) and asked whether counting…
Descriptors: Information Retrieval, Information Technology, Computers, Data Processing
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Jens Roeser; Sven De Maeyer; Mariëlle Leijten; Luuk Van Waes – Reading and Writing: An Interdisciplinary Journal, 2024
To writing anything on a keyboard at all requires us to know first what to type, then to activate motor programmes for finger movements, and execute these. An interruption in the information flow at any of these stages leads to disfluencies. To capture this combination of fluent typing and typing hesitations, researchers calculate different…
Descriptors: Keyboarding (Data Entry), Bayesian Statistics, Writing (Composition), Writing Evaluation
Revilla, Melanie; Couper, Mick P.; Paura, Ezequiel; Ochoa, Carlos – Field Methods, 2021
Passive data from a tracking application (or "meter") installed on participants' devices to register the URLs visited have great potential for studying people's online activities. However, given privacy concerns, obtaining cooperation installing a meter can be difficult and lead to selection bias. Therefore, in this article, we address…
Descriptors: Participation, Computer Use, Internet, Data Collection
Li, Maximilian Xiling; Nadj, Mario; Maedche, Alexander; Ifenthaler, Dirk; Wöhler, Johannes – Technology, Knowledge and Learning, 2022
With the advent of physiological computing systems, new avenues are emerging for the field of learning analytics related to the potential integration of physiological data. To this end, we developed a physiological computing infrastructure to collect physiological data, surveys, and browsing behavior data to capture students' learning journey in…
Descriptors: Physiology, Computation, Artificial Intelligence, Psychological Patterns
Mengxiao Zhu; Mo Zhang; Lin Gu – Language Assessment Quarterly, 2023
Recent technology advances have enabled the collection of keystroke logs during writing, a non-intrusive approach to collecting writing process data that could provide insights into writers' editing and revising behaviors in the writing process. Using keystroke logs from 761 middle school students in the US, this study investigated the association…
Descriptors: Editing, Revision (Written Composition), Writing Attitudes, Middle School Students
Sara Srygley; Nurfadila Khairunnisa; Diana Elliott – Appalachian Regional Commission, 2024
This chartbook is the 14th version to be produced for the Appalachian Regional Commission (ARC) by the Population Reference Bureau (PRB). The Chartbook describes the diversity of the Appalachian Region on a host of demographic and economic measures and provides an important annual view of the area and its people. The data contained in the…
Descriptors: Demography, Geographic Location, Community Surveys, Data Analysis
Zhang, Ruofei; Zou, Di; Xie, Haoran; Au, Oliver Tat Sheung; Wang, Fu Lee – Knowledge Management & E-Learning, 2020
This study presents a systematic review of previous research on ebook-based language learning. E-book-based language learning has been increasingly investigated in the field of language education, whereas previous review studies of relevant literature were relatively low in volume and incomprehensive from aspects of research participants and…
Descriptors: Second Language Learning, English (Second Language), Electronic Learning, Handheld Devices
Ghergulescu, Ioana; Muntean, Cristina Hava – International Journal of Artificial Intelligence in Education, 2016
Engagement influences participation, progression and retention in game-based e-learning (GBeL). Therefore, GBeL systems should engage the players in order to support them to maximize their learning outcomes, and provide the players with adequate feedback to maintain their motivation. Innovative engagement monitoring solutions based on players'…
Descriptors: Case Studies, Questionnaires, Electronic Learning, Educational Games
Yilmaz, Ozkan – Journal of Education and Learning, 2016
A variety of e-learning theories, models, and strategy have been developed to support educational settings. There are many factors for designing good instructional settings. This study set out to determine functionality of mobile devices, students who already have, and the student needs and views in relation to e-learning settings. The study…
Descriptors: Electronic Learning, Educational Technology, Handheld Devices, Technology Uses in Education
Valdés Aguirre, Benjamín; Ramírez Uresti, Jorge A.; du Boulay, Benedict – International Journal of Artificial Intelligence in Education, 2016
Sharing user information between systems is an area of interest for every field involving personalization. Recommender Systems are more advanced in this aspect than Intelligent Tutoring Systems (ITSs) and Intelligent Learning Environments (ILEs). A reason for this is that the user models of Intelligent Tutoring Systems and Intelligent Learning…
Descriptors: Intelligent Tutoring Systems, Models, Open Source Technology, Computers
Dadey, Nathan; Lyons, Susan; DePascale, Charles – Applied Measurement in Education, 2018
Evidence of comparability is generally needed whenever there are variations in the conditions of an assessment administration, including variations introduced by the administration of an assessment on multiple digital devices (e.g., tablet, laptop, desktop). This article is meant to provide a comprehensive examination of issues relevant to the…
Descriptors: Evaluation Methods, Computer Assisted Testing, Educational Technology, Technology Uses in Education
Galeriu, Calin – Physics Teacher, 2013
It is hard to imagine teaching physics without doing experimental measurements of position as a function of time. These measurements, needed for the determination of velocity and acceleration, are most easily performed with the help of photogates. Unfortunately, commercial photogates are rather expensive. Many require the purchase of an additional…
Descriptors: Physics, Measurement, Time, Electronics
Ashmarina, Svetlana I.; Khasaev, Gabibulla R.; Mantulenko, Valentina V.; Kasarin, Stanislav V.; Dorozhkin, Evgenij M. – International Journal of Environmental and Science Education, 2016
The relevance of the investigated problem is caused by the need to assess the implementation of informatization level of the region and the insufficient development of the theoretical, content-technological, scientific and methodological aspects of the assessment of the region's information potential. The aim of the research work is to develop a…
Descriptors: Information Technology, Communications, Information Networks, Information Security
Wernholm, Marina; Vigmo, Sylvi – International Journal of Research & Method in Education, 2015
The aim of this article is to address how online tools and digital technologies can influence data collection opportunities. We are still at the early stages of piecing together a more holistic picture of the role of digital media in young people's everyday lives, especially regarding digital gaming among younger children. Digital technologies…
Descriptors: Foreign Countries, Computer Games, Data Collection, Cooperation

Peer reviewed
Direct link
