Publication Date
| In 2026 | 0 |
| Since 2025 | 3180 |
| Since 2022 (last 5 years) | 16931 |
| Since 2017 (last 10 years) | 35775 |
| Since 2007 (last 20 years) | 68522 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 9870 |
| Teachers | 6649 |
| Researchers | 2547 |
| Administrators | 1786 |
| Policymakers | 1056 |
| Students | 675 |
| Media Staff | 652 |
| Parents | 263 |
| Counselors | 125 |
| Community | 101 |
| Support Staff | 62 |
| More ▼ | |
Location
| Australia | 2745 |
| Turkey | 2559 |
| United Kingdom | 2282 |
| Canada | 2234 |
| China | 1562 |
| United States | 1518 |
| Taiwan | 1439 |
| California | 1186 |
| Spain | 1029 |
| Germany | 955 |
| Japan | 876 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 62 |
| Meets WWC Standards with or without Reservations | 81 |
| Does not meet standards | 60 |
Paulo Henrique Siqueira – Journal of Education and Learning, 2025
This article presents the adaptations for creating a set of Dragon Curve fractals using the Platonic polyhedra. The modeled fractals were inserted into environments programmed with Virtual Reality (VR) resources, which allow the visitor to manipulate and visualize each iteration used to construct these fractals. The structures of HTML page…
Descriptors: Geometric Concepts, Computer Simulation, Telecommunications, Handheld Devices
Gina Childers; Weverton Ataide Pinheiro; Oluwatosin Daramola; C. Lindsay Linsky; Bryson Payne; Jack Byers; Daniel Baker – Journal of Cybersecurity Education, Research and Practice, 2025
Because K-12 teachers have access to private educational data, they are increasingly at risk of being affected by cybersecurity threats. Examining how teachers conceptualize cybersecurity is vital so that cybersecurity training can be tailored to teachers' understanding of cybersecurity. This study examined K-12 teachers' (n = 255) personalized…
Descriptors: Teacher Attitudes, Knowledge Level, Definitions, Computer Security
Gareth W. Young; Neill O'Dwyer; Nicholas Johnson; Aljosa Smolic – Arts and Humanities in Higher Education: An International Journal of Theory, Research and Practice, 2025
Online virtual worlds have increasingly become meeting places for students and teachers to discuss and collaborate on diverse academic subjects and practices. Furthermore, in response to the recent global COVID-19 pandemic, there has also been a heightened drive to provide online educational facilities that harness immersive virtual environments…
Descriptors: Computer Simulation, Computer Uses in Education, Film Study, Drama Education
Amanda Ross; Andrew Katz – Journal of Engineering Education, 2025
Background: Computer science faces a persistent attrition problem, with people leaving the field at a rate that exceeds new entrants. Given the increasing demand for computing jobs, it is essential to focus on reducing the number of individuals exiting the field. Purpose: This study investigates why individuals leave the computer science field…
Descriptors: Artificial Intelligence, Social Media, Computer Mediated Communication, Computer Science
Serdar Tekin – Journal of Learning and Teaching in Digital Age, 2024
The enormous developments in technology and hence the widespread use of hand-held devices in the last few decades have led to great interest in mobile-assisted language learning (MALL) as a new way of language education. MALL is considered an effective method particularly for young language learners due to their higher level of familiarity with…
Descriptors: Computer Assisted Instruction, Second Language Learning, Ethics, Quasiexperimental Design
William Belzak; J. R. Lockwood; Yigal Attali – Educational Measurement: Issues and Practice, 2024
Remote proctoring, or monitoring test takers through internet-based, video-recording software, has become critical for maintaining test security on high-stakes assessments. The main role of remote proctors is to make judgments about test takers' behaviors and decide whether these behaviors constitute rule violations. Variability in proctor…
Descriptors: Computer Security, High Stakes Tests, English (Second Language), Second Language Learning
Godfrey F. Mendes – ProQuest LLC, 2024
This Praxis develops a machine learning (ML) model to address ransomware threats in higher education institutions (HEIs). HEIs are vulnerable to cyberattacks due to their open-access environments, diverse user bases, and decentralized IT systems. These vulnerabilities are compounded by limited budgets, heightened risks from increased digital…
Descriptors: Colleges, Artificial Intelligence, Users (Information), Risk Assessment
Nicholas O. Awuor; Cathy Weng; Isaac M. Matere; Jeng-Hu Chen; Dani Puspitasari; Khanh Nguyen Phuong Tran – Interactive Learning Environments, 2024
Engineering drawing is valuable in capturing geometric features, conveying engineering ideas, and creating a blueprint of the intended product. Engineering students usually perform orthographic projections, imagining a 3D situation and sketching its 2D representation. That requires imagination and mental visualization, determined by the learner's…
Descriptors: Foreign Countries, Vocational High Schools, High School Students, Engineering Education
Qian Fu; Wenjing Tang; Yafeng Zheng; Haotian Ma; Tianlong Zhong – Interactive Learning Environments, 2024
In this study, a predictive model is constructed to analyze learners' performance in programming tasks using data of programming behavioral events and behavioral sequences. First, this study identifies behavioral events from log data and applies lag sequence analysis to extract behavioral sequences that reflect learners' programming strategies.…
Descriptors: Predictor Variables, Psychological Patterns, Programming, Self Management
Sini Davies; Pirita Seitamaa-Hakkarainen; Kai Hakkarainen – International Journal of Computer-Supported Collaborative Learning, 2024
This study analyzed collaborative invention projects by teams of lower-secondary (13-14-year-old) Finnish students. In invention projects, student teams design and make materially embodied collaborative inventions using traditional and digital fabrication technologies. This investigation focused on the student teams' knowledge creation processes…
Descriptors: Cooperative Learning, Foreign Countries, Secondary School Students, Intellectual Property
Raffaele Di Fuccio; Joanna Kic-Drgas; Joanna Wozniak – Smart Learning Environments, 2024
This paper addresses the limited exploration of the impact of virtual and augmented reality on the learning process, particularly within the context of foreign language learning among young learners. Motivated by this research gap, the EULALIA, conducted from 2019 to 2023 (2019-1-IT02-KA203-063228), sought to evaluate the efficacy of integrating…
Descriptors: Computer Simulation, Computer Oriented Programs, Second Language Learning, Cultural Awareness
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Jingyuan Chen; Hongfeng Liu – International Journal of Web-Based Learning and Teaching Technologies, 2024
This meta-analysis examines the influence of smart classrooms on students' learning outcome, synthesizing findings from 21 empirical studies. The results indicate a significant overall effect size (SMD = 1.10), suggesting that smart classrooms positively affect learning outcomes more than traditional settings. Cognitive development (SMD = 1.014)…
Descriptors: Computer Uses in Education, Computer Assisted Instruction, Computer Assisted Testing, Influence of Technology
Dongyu Yu; Xing Yao; Kaidi Yu; Dandan Du; Jinyi Zhi; Chunhui Jing – Interactive Learning Environments, 2024
The objective of this study was to determine the differential effects of the presentation position of the augmented reality--head worn display (AR-HWD) interface and the audiovisual-dominant multimodal learning material on learning performance and cognitive load across different learning tasks in training for high-speed train driving. We selected…
Descriptors: Artificial Intelligence, Computer Simulation, Computer Peripherals, Computer Interfaces
André de Sá Braga Oliveira; Luciano César P. C. Leonel; Edward R. LaHood; Bachtri T. Nguyen; Anahid Ehtemami; Stephen P. Graepel; Michael J. Link; Carlos D. Pinheiro-Neto; Nirusha Lachman; Jonathan M. Morris; Maria Peris-Celda – Anatomical Sciences Education, 2024
The 3D stereoscopic technique consists in providing the illusional perception of depth of a given object using two different images mimicking how the right and left eyes capture the object. Both images are slightly different and when overlapped gives a three-dimensional (3D) experience. Considering the limitations for establishing surgical…
Descriptors: Computer Simulation, Photography, Visualization, Models

Peer reviewed
Direct link
