Publication Date
| In 2026 | 0 |
| Since 2025 | 129 |
| Since 2022 (last 5 years) | 909 |
| Since 2017 (last 10 years) | 1948 |
| Since 2007 (last 20 years) | 5012 |
Descriptor
| Information Technology | 8959 |
| Foreign Countries | 3252 |
| Educational Technology | 2208 |
| Computer Uses in Education | 2144 |
| Higher Education | 2106 |
| Internet | 1801 |
| Computer Software | 1775 |
| Computer Mediated… | 1403 |
| Teaching Methods | 1361 |
| Technology Integration | 1073 |
| Computer Assisted Instruction | 956 |
| More ▼ | |
Source
Author
| Selwyn, Neil | 17 |
| Villano, Matt | 16 |
| Hawkins, Brian L. | 12 |
| Schaffhauser, Dian | 11 |
| Lim, Cher Ping | 10 |
| Waters, John K. | 10 |
| Clarke, Alan | 9 |
| McClure, Charles R. | 9 |
| Panettieri, Joseph C. | 9 |
| Raths, David | 9 |
| Asuncion, Jennison V. | 8 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 427 |
| Teachers | 245 |
| Administrators | 215 |
| Policymakers | 111 |
| Media Staff | 98 |
| Researchers | 83 |
| Students | 45 |
| Parents | 17 |
| Community | 8 |
| Counselors | 4 |
| Support Staff | 4 |
| More ▼ | |
Location
| Australia | 296 |
| United Kingdom | 274 |
| Turkey | 210 |
| United States | 200 |
| Canada | 175 |
| China | 111 |
| Spain | 109 |
| South Africa | 107 |
| California | 92 |
| India | 87 |
| United Kingdom (England) | 84 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Miguel Sicart – American Journal of Play, 2025
To Brian Sutton-Smith's catalogue of seven play rhetorics in his influential work, "The Ambiguity of Play," the author adds an eighth category--the rhetoric of computational play, connecting the research field of game studies with other forms of play studies. By proposing this rhetoric, Sicart seeks to consolidate the relation between…
Descriptors: Play, Game Based Learning, Computer Games, Corporations
Jordi Guitart; Juan José Costa – Interactive Learning Environments, 2024
The pandemic situation banned the presence of teachers and students in the classrooms disrupting the typical teaching process. Videoconferencing services have been used successfully for lectures, but they are insufficient for hands-on laboratories where the physical presence is a requirement (i.e. to access specific hardware). Enabling remote…
Descriptors: Distance Education, Laboratories, Computer Networks, Videoconferencing
Türkan Karakus Yilmaz; Zafer Yilmaz; Ömer Arpacik – Journal of Educational Computing Research, 2025
This study compares museum-related knowledge, museum learning experiences and cognitive load based on task types presented via a mobile application during a museum virtual tour. The study involved three experiments, each examining the effects of different task types. In the first experiment, tasks varied by difficulty (easy vs. difficult), in the…
Descriptors: Cognitive Ability, Museums, Computer Simulation, Information Technology
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2025
This paper, based on data from our second nationwide survey of cybersecurity among local or grassroots governments in the U.S., examines how these governments manage this important function. As we have shown elsewhere, local government cybersecurity is increasingly important because these governments are under constant or nearly constant…
Descriptors: Computer Security, Local Government, Information Security, Computer Networks
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Sehla Ertan; T. Volkan Yüzer – Journal of Educational Technology and Online Learning, 2024
Open and distance learning (ODL) activities aim to meet the expectations and needs of different individuals, societies, and systems by ensuring the continuation of learning with a lifelong learning philosophy and an egalitarian policy for everyone, regardless of time and place. Support services, which address the differentiated expectations and…
Descriptors: Computer Security, Open Education, Distance Education, Technical Support
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security
Christiana Karousiou – Educational Media International, 2025
This research study explores the challenges and barriers in school digital transformation based on the perspectives and experiences of school leaders within the Republic of Cyprus. This study employs a qualitative research approach, using interviews to collect insights from 11 purposively selected primary and secondary school leaders. The…
Descriptors: Administrators, Elementary Secondary Education, Foreign Countries, Information Technology
Sarthak Punj; Poorvi Kejriwal; S. P. Raja – International Journal of Learning and Change, 2024
Technology is advancing and metaverse is gaining popularity. The magic of metaverse is beyond our imagination. In simple terms, the metaverse refers to a virtual shared space that exists online, where people can interact, socialise, work, and play using digital avatars, just like they do in the real world. It is a combination of virtual reality,…
Descriptors: Computer Simulation, Computer Mediated Communication, Health Services, Social Media
Incorporating Coding into the Classroom: An Important Component of Modern Bioinformatics Instruction
Nichole Orench-Rivera; April Bednarski; Paul Craig; Austin Talbot – Journal of College Science Teaching, 2025
Advancements in computation and machine learning have revolutionized science, enabling researchers to address once insurmountable challenges. Bioinformatics, a field that heavily relies on computer-driven analysis of biological data, has greatly benefited from these developments. However, traditional bioinformatics instruction frequently lacks the…
Descriptors: Coding, Computer Science Education, Integrated Curriculum, Programming
Mohammed Ahmed Kofahi; Anas Jebreen Atyeh Husain – Journal of Information Technology Education: Research, 2025
Aim/Purpose: In this study, we propose an AI technology-based learning model using ChatGPT and investigate its effect on students' higher-order thinking (HOT) ability in an operating systems (OS) course. Background: A critical requirement for IT and engineering students is supporting them in understanding advanced OS concepts and fostering their…
Descriptors: Artificial Intelligence, Computer Science Education, Thinking Skills, Computer System Design
Frank Xavier Gearhart – ProQuest LLC, 2024
Digital systems are pervasive in modern societies -- augmenting personal and commercial driving, detecting cancer, and exploiting transitory events in financial markets. Attacks on these systems are growing in number, sophistication, and impact. Current cyber defenses are proving inadequate against some of these attacks. Cyber defense tools that…
Descriptors: Artificial Intelligence, Information Security, Man Machine Systems, Natural Language Processing

Peer reviewed
Direct link
