Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Interfaces | 4 |
Information Retrieval | 4 |
Technology Uses in Education | 4 |
Undergraduate Students | 3 |
Access to Information | 2 |
Artificial Intelligence | 2 |
Foreign Countries | 2 |
Handheld Devices | 2 |
Information Security | 2 |
Information Storage | 2 |
Natural Language Processing | 2 |
More ▼ |
Source
Information and Learning… | 1 |
International Association for… | 1 |
International Journal of… | 1 |
Journal of Educational… | 1 |
Author
Abu-Al-Aish, Ahmad | 1 |
Dania Bilal | 1 |
Li-Min Cassandra Huang | 1 |
Mahajan, Asmita | 1 |
Mangla, Monika | 1 |
Sharma, Nonita | 1 |
Yadav, Sourabh | 1 |
Publication Type
Journal Articles | 3 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Reports - Descriptive | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Elementary Secondary Education | 1 |
Audience
Location
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
Hawaii | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dania Bilal; Li-Min Cassandra Huang – Information and Learning Sciences, 2025
Purpose: This paper aims to investigate user voice-switching behavior in voice assistants (VAs), embodiments and perceived trust in information accuracy, usefulness and intelligence. The authors addressed four research questions: RQ1. What is the nature of users' voice-switching behavior in VAs? RQ2: What are user preferences for embodied voice…
Descriptors: Undergraduate Students, Artificial Intelligence, Natural Language Processing, Information Retrieval
Yadav, Sourabh; Sharma, Nonita; Mangla, Monika; Mahajan, Asmita – Journal of Educational Multimedia and Hypermedia, 2021
The manuscript proposes a method based on Blockchain technology, IPFS, and asymmetric key algorithm to authenticate academic degrees and certificates. The proposed method employs decentralization and therefore provides a scalable, secure, transparent, and economical solution than existing methods. In the proposed framework, the degrees and…
Descriptors: Information Storage, Monetary Systems, Student Records, Information Security
Abu-Al-Aish, Ahmad – International Journal of Information and Communication Technology Education, 2021
Mobile learning (m-learning) has become an increasingly attractive solution for schools and universities that utilize new technologies in their teaching and learning setting. This study investigates the technical factors affecting the development of m-learning applications services from students' perspectives. It presents a model consisting of…
Descriptors: Computer Oriented Programs, Handheld Devices, Technology Uses in Education, Foreign Countries
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers