NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 133,775 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Peer reviewed Peer reviewed
Direct linkDirect link
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Nuno Verdelho Trindade; Lidia Custodio; Alfredo Ferreira; Joao Madeiras Pereira – IEEE Transactions on Learning Technologies, 2024
Ray tracing is a computer graphics technique used to produce realistic visuals by physically simulating the behavior of light. Although this technique can be described straightforwardly, fully comprehending it might be challenging. It is typically taught in the classroom using the 2-D formats, such as paper or a blackboard. We propose using…
Descriptors: Computer Simulation, Computer Graphics, Visualization, Computer Assisted Instruction
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nurten Gündüz; Mehmet Sincar – International Journal of Contemporary Educational Research, 2024
The metaverse which is considered as the digital big bang of humanity and the next evolution of the internet is anticipated to offer a living environment for civilization 5.0 and beyond in various domains including education. Each novice technology that enters our daily lives generates also fear, anxiety, and problems as well as hope, benefit, and…
Descriptors: Higher Education, Computer Simulation, Ethics, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Ishant Singhal; Guru Ratan Satsangee; Lakshya Bhardwaj; Gaurang S. Sharma; Anand Swarup Chandrakar; Hritav Gupta; Gargi Malik; Bobby Tyagi; Ankit Sahai; Rahul Swarup Sharma – IEEE Transactions on Learning Technologies, 2024
3D-printing (3DP) is a rapidly evolving sector and is advancing at an unmatched pace. Integrating digital-based approaches to disseminate knowledge within institutional curricula is crucial for mainstreaming knowledge. This work explores the development of a virtual lab (VL) for additive manufacturing (AM), using an interactive VL simulator. The…
Descriptors: Computer Peripherals, Printing, Laboratories, Computer Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Li Jin; Dawei Shang – Interactive Learning Environments, 2024
Massive open online courses (MOOC) have become important in the learning process and have been adopted in higher education, especially during the COVID-19 pandemic. However, few studies investigated MOOC continuance intention (CI) for arts disciplines. Thus, an integrated framework was proposed based on the expectation-confirmation model (ECM) and…
Descriptors: Art Education, MOOCs, Computer System Design, Continuing Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Krish Pillai; Marcia Lovas – International Society for Technology, Education, and Science, 2023
A typical first computer science course (CS1) introduces the student to coding conventions, variables, methods, control structures, conditionals, and the semantics of classes and objects. Advanced concepts of inheritance, polymorphism, abstract classes, interfaces, and their use in the design process, are covered in a second-level course (CS2).…
Descriptors: Computer Games, Educational Games, Teaching Methods, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Davis Krumins; Sandra Schumann; Veiko Vunder; Rauno Põlluäär; Kristjan Laht; Renno Raudmäe; Alvo Aabloo; Karl Kruusamäe – IEEE Transactions on Learning Technologies, 2024
Teaching robotics with the robot operating system (ROS) is valuable for instating good programming practices but requires significant setup steps from the learner. Providing a ready-made ROS learning environment over the web can make robotics more accessible; however, most of the previous remote labs have abstracted the authentic ROS developer…
Descriptors: Teaching Methods, Robotics, Programming, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sehla Ertan; T. Volkan Yüzer – Journal of Educational Technology and Online Learning, 2024
Open and distance learning (ODL) activities aim to meet the expectations and needs of different individuals, societies, and systems by ensuring the continuation of learning with a lifelong learning philosophy and an egalitarian policy for everyone, regardless of time and place. Support services, which address the differentiated expectations and…
Descriptors: Computer Security, Open Education, Distance Education, Technical Support
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Cyril Brom; Tereza Hannemann; Tereza Tetourová; Anna Drobná; Nikol Kopánková; Kristina Volná; Katerina Kacerovská; Filip Dechterenko; Pavel Ježek; Tereza Stárková – International Journal of Technology and Design Education, 2024
Primary school children frequently use digital devices, which can be infected by computer viruses. In this mixed methods paper with two studies (N = 278 + 114), we examined 8-year-olds' preconceptions about computer viruses and protection against them; how to teach these children about said topics using three different, 30-min-long,…
Descriptors: Computers, Children, Computer Security, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Sarthak Punj; Poorvi Kejriwal; S. P. Raja – International Journal of Learning and Change, 2024
Technology is advancing and metaverse is gaining popularity. The magic of metaverse is beyond our imagination. In simple terms, the metaverse refers to a virtual shared space that exists online, where people can interact, socialise, work, and play using digital avatars, just like they do in the real world. It is a combination of virtual reality,…
Descriptors: Computer Simulation, Computer Mediated Communication, Health Services, Social Media
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  8919