Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 3D VR anatomy (1)
- Cognitive biases (1)
- Cognitive heuristics (1)
- Convergent mixed method (1)
- Education (1)
-
- Flow theory (1)
- Foreign Language (1)
- Foreign language education (1)
- Grammar Acquisiton (1)
- Human-computer interaction (1)
- Middle School (1)
- Middle school education (1)
- Security compliance (1)
- Security education (1)
- Spanish (1)
- Student Created Video Podcasts (1)
- UNIX administrator (1)
- Usability (1)
- User experience (1)
- Videopodcasting (1)
Articles 1 - 3 of 3
Full-Text Articles in Education
Investigating The User Experience With A 3d Virtual Anatomy Application, Winnyanne Kunkle
Investigating The User Experience With A 3d Virtual Anatomy Application, Winnyanne Kunkle
CCE Theses and Dissertations
Decreasing hours dedicated to teaching anatomy courses and declining use of human cadavers have spurred the need for innovative solutions in teaching anatomy in medical schools. Advancements in virtual reality (VR), 3D visualizations, computer graphics, and medical graphic images have enabled the development of highly interactive 3D virtual applications. Over recent years, variations of interactive systems on computer-mediated environments have been used as supplementary resource for learners. However, despite the growing sophistication of these resources for learning anatomy, studies show that students predominantly prefer traditional methods of learning and hands-on cadaver-based learning over computer-mediated platforms.
There is limited research on …
Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell
Unix Administrator Information Security Policy Compliance: The Influence Of A Focused Seta Workshop And Interactive Security Challenges On Heuristics And Biases, John Palmer Mcconnell
CCE Theses and Dissertations
Information Security Policy (ISP) compliance is crucial to the success of healthcare organizations due to security threats and the potential for security breaches. UNIX Administrators (UXAs) in healthcare Information Technology (IT) maintain critical servers that house Protected Health Information (PHI). Their compliance with ISP is crucial to the confidentiality, integrity, and availability of PHI data housed or accessed by their servers. The use of cognitive heuristics and biases may negatively influence threat appraisal, coping appraisal, and ultimately ISP compliance behavior. These failures may result in insufficiently protected servers and put organizations at greater risk of data breaches and financial loss. …
Use Of Student Created Video Podcasts To Promote Foreign Language Grammar Acquisition In Middle School, Sergio Parra
Use Of Student Created Video Podcasts To Promote Foreign Language Grammar Acquisition In Middle School, Sergio Parra
CCE Theses and Dissertations
The use of video podcasts in education has emerged as a phenomenon that has gained a considerable amount of attention over the last few years. Although video podcasting is becoming a well-established technology in higher education, new multimedia instructional strategies such as student-created video podcasts in grades K-12 are under-researched.
The study investigated the effects of video podcasts created by students to promote foreign language grammar acquisition at the middle school level and find how students described such experience. The current investigation was conducted by using the explanatory sequential design, which is a mixed methods research design that occurs in …