NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 286 to 300 of 30,397 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Cheers, Hayden; Lin, Yuqing – Computer Science Education, 2023
Background and Context: Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, such tools do not identify plagiarism, nor suggest what assignment submissions are suspicious of plagiarism. Source code plagiarism…
Descriptors: Plagiarism, Programming, Computer Science Education, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Pearce, Julia M.; Lindekilde, Lasse; Parker, David – British Educational Research Journal, 2023
Higher education institutions in England, Scotland and Wales have an obligation under the 2015 Counter Terrorism and Security Act to protect students from being drawn into terrorism. This legislation has proved controversial, with concerns about the securitisation of education, as well as fears of over-reporting which could stigmatise individuals…
Descriptors: Foreign Countries, College Faculty, Teacher Attitudes, Terrorism
Sarker Monojit Asish – ProQuest LLC, 2023
Virtual Reality (VR) has been found useful to improve engagement and retention level of students, for some topics, compared to traditional learning tools such as books, and videos. However, a student could still get distracted and disengaged due to a variety of factors including stress, mind-wandering, unwanted noise, external alerts, and internal…
Descriptors: Students, Attention Control, Computer Simulation, Artificial Intelligence
Kelli Bird – Association for Institutional Research, 2023
Colleges are increasingly turning to predictive analytics to identify "at-risk" students in order to target additional supports. While recent research demonstrates that the types of prediction models in use are reasonably accurate at identifying students who will eventually succeed or not, there are several other considerations for the…
Descriptors: Prediction, Data Analysis, Artificial Intelligence, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Boatswain-Kyte, Alicia; David, Syndie; Mitchell, Nicole – Journal of Teaching in Social Work, 2022
In 2019, three Black social work instructors simultaneously taught a required anti-oppressive practice (AOP) course to a cohort of undergraduate social work students. Through collective autoethnography (CAE), we sought to deepen our understanding of our experience within the classroom and how our identity as Black women was negotiated within the…
Descriptors: Racism, Social Work, Social Justice, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Saraqini, Dea; Nesmith, Blake L.; Stear, Cassie; Rath, Hannah J.; Moore, Kara N. – Applied Cognitive Psychology, 2022
People have difficulty sighting missing persons, partially because the task requires people's limited cognitive resources. We examined whether empathy increases search behaviors and performance. We manipulated empathy felt toward a formerly (E1) and actively (E2) missing person. We measured willingness to volunteer to search for missing people in…
Descriptors: Empathy, Identification, Victims of Crime, Investigations
Peer reviewed Peer reviewed
Direct linkDirect link
Laxton, Victoria; Mackenzie, Andrew K.; Crundall, David – Applied Cognitive Psychology, 2022
Lifeguard drowning detection in swimming pools and beach settings is influenced by experience. The current experiment explores the cognitive skills that might underlie this experience effect. Lifeguard and non-lifeguard performance in a domain-free multiple object avoidance (MOA) task and a partially domain-free functional field of view (FFOV)…
Descriptors: Cognitive Processes, Safety, Identification, Victims
Peer reviewed Peer reviewed
Direct linkDirect link
Bettaieb, Donia M.; Alawad, Abeer A.; Malek, Raif B. – International Journal for Educational Integrity, 2022
This study aims to remove some of the ambiguities of visual plagiarism in interior design (those related to the visual composition of space represented by line, form, shape, texture, time, colour, light, etc.) by examining the main detection methods, the extent of the issue, and the experiences and roles of academic interior designers. Two main…
Descriptors: Plagiarism, Interior Design, Identification, Foreign Countries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chaumba, Josphine; Chaumba, Jeff – Journal of Community Engagement and Higher Education, 2022
This paper reports on a service-learning component introduced in an upper-level undergraduate geology course. Students identified rock types used by a local countertop manufacturing company and made fliers describing their mode of formation. Students then completed a final rock identification exam. To assess the effect of participating in the…
Descriptors: Mineralogy, Geology, Identification, Service Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Sung, Sooyeon; Fenoglio, Angela; Wolff, Jason J.; Schultz, Robert T.; Botteron, Kelly N.; Dager, Stephen R.; Estes, Annette M.; Hazlett, Heather C.; Zwaigenbaum, Lonnie; Piven, Joseph; Elison, Jed T. – Child Development, 2022
Using the Infant Behavior Questionnaire--Revised in a longitudinal sample of infant siblings of autistic children (HR; n = 427, 171 female, 83.4% White) and a comparison group of low-risk controls (LR, n = 200, 86 female, 81.5% White), collected between 2007 and 2017, this study identified an invariant factor structure of temperament traits across…
Descriptors: Factor Structure, Infants, Behavior, Siblings
Peer reviewed Peer reviewed
Direct linkDirect link
Riden, Benjamin S.; Snyder, Sara M.; Fowkes, Colleen L.; Yuschak, Anastasia E. – Education and Treatment of Children, 2022
The purpose of this review is to identify the application of eye-gaze stimulus preference assessment as well as the various characteristics of those assessments in the research literature. We conducted a systematic review that identified 18 articles using eye gaze to identify preferred stimuli. Of those studies, seven were used to determine a…
Descriptors: Eye Movements, Visual Stimuli, Preferences, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Sternberg, Robert J. – Gifted Education International, 2022
The focus of the field of giftedness is on the wrong thing. Instead of focusing on identifying who is gifted, the field should identify how people will deploy their gifts and educate students to deploy their gifts in ways that will make the world a better place. In this article, I present at least a partial taxonomy of how gifts can be deployed…
Descriptors: Taxonomy, Interpersonal Relationship, Gifted, Identification
Chenchen Ma; Gongjun Xu – Grantee Submission, 2022
Cognitive Diagnosis Models (CDMs) are a special family of discrete latent variable models widely used in educational, psychological and social sciences. In many applications of CDMs, certain hierarchical structures among the latent attributes are assumed by researchers to characterize their dependence structure. Specifically, a directed acyclic…
Descriptors: Vertical Organization, Models, Evaluation, Statistical Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Pan, Yiqin; Wollack, James A. – Journal of Educational Measurement, 2021
As technologies have been improved, item preknowledge has become a common concern in the test security area. The present study proposes an unsupervised-learning-based approach to detect compromised items. The unsupervised-learning-based compromised item detection approach contains three steps: (1) classify responses of each examinee as either…
Descriptors: Test Items, Cheating, Artificial Intelligence, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Deeb, Haneen; Vrij, Aldert; Leal, Sharon; Mann, Samantha – Applied Cognitive Psychology, 2021
The current experiment examined the effects of combining two interview techniques on information elicitation and lie detection in multiple interviews. Participants were interviewed online over three weeks. Two-thirds of the participants (n = 114) were presented with the model statement (MS) interview technique in Interview 1 and were asked to…
Descriptors: Interviews, Deception, Freehand Drawing, Models
Pages: 1  |  ...  |  16  |  17  |  18  |  19  |  20  |  21  |  22  |  23  |  24  |  ...  |  2027