Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 3 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 3 |
Descriptor
Source
| Education and Information… | 3 |
Author
| Aditi Padhiyar | 1 |
| Amara, Nedra | 1 |
| Azam, Sikandar | 1 |
| Celeda, Pavel | 1 |
| Dhatri Pandya | 1 |
| Keyur Rana | 1 |
| Latif, Abdul | 1 |
| Muhammad, Sajjad | 1 |
| Popovic, Daniel | 1 |
| Sayed, Nasir | 1 |
| Shoaib, Muhammad | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 3 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dhatri Pandya; Keyur Rana; Aditi Padhiyar – Education and Information Technologies, 2025
With the advent of closed-circuit television systems (CCTV) in the era of technology, a massive amount of video data is generated daily. CCTV are installed at several educational institutions to monitor students' behavior and ensure their safety. Human activity monitoring is done manually. Abnormal human actions refer to rare or unusual actions in…
Descriptors: Technology Uses in Education, Handheld Devices, Telecommunications, Classroom Environment
Shoaib, Muhammad; Sayed, Nasir; Amara, Nedra; Latif, Abdul; Azam, Sikandar; Muhammad, Sajjad – Education and Information Technologies, 2022
Technology and data analysis have evolved into a resource-rich tool for collecting, researching and comparing student achievement levels in the classroom. There are sufficient resources to discover student success through data analysis by routinely collecting extensive data on student behaviour and curriculum structure. Educational Data Mining…
Descriptors: Prediction, Artificial Intelligence, Student Behavior, Academic Achievement
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Tkácik, Kristián; Popovic, Daniel – Education and Information Technologies, 2022
Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows…
Descriptors: Computer Security, Information Security, Training, Data Collection

Peer reviewed
Direct link
