NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Vasco Rikkers; Dipti Kapoor Sarmah – Journal of Computing in Higher Education, 2025
In recent years, gamification has seen a rise in usage for cyber-security training, with some of the most used elements being story and narrative. Yet there seems to be a lack of research on story-based gamification as well as how this type of gamification affects a training's effectiveness. The goal of this study was to test the effectiveness of…
Descriptors: Gamification, Computer Security, Training Methods, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Shih, Ching-Hsiang; Chang, Man-Ling – Research in Developmental Disabilities: A Multidisciplinary Journal, 2012
This study extended Battery-free wireless mouse functionality to assess whether two people with developmental disabilities would be able to actively perform designated simple occupational activities according to simple instructions by controlling their favorite environmental stimulation using Battery-free wireless mice with a newly developed…
Descriptors: Assistive Technology, Training Methods, Intervention, Stimulation