Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Bibiographic instruction (1)
- Charter Schools (1)
- Computer Skills (1)
- Curriculum innovation (1)
- Cyber Schools (1)
-
- ELearning (1)
- EOCT (1)
- Educational transformation (1)
- Emerging technologies (1)
- Game-based learning (1)
- Games (1)
- Gamification (1)
- Gaming (1)
- Information literacy (1)
- Learning Environments (1)
- Learning Outcomes (1)
- Media (1)
- Online Classes (1)
- Sciene Assessments (1)
- Student Performance (1)
- Technology integration (1)
- Virtual Learning (1)
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Education
A Comparison Of Online And Face-To-Face Achievement In Physical Science, Lisa F. Mozer
A Comparison Of Online And Face-To-Face Achievement In Physical Science, Lisa F. Mozer
Doctor of Education in Instructional Technology Dissertations
ABSTRACT
This study provided a descriptive analysis of learning outcomes in both online and face-to-face grades 9-12 physical science courses. Archived data from a single school system were used for a comparative analysis of learning outcomes in high school physical science between students enrolled in online classes and students enrolled in face-to-face classes. The study compared two years of summative assessment scores of two student groups and, overall, found equality between the two learning environments. Online learning outcomes and face-to-face learning outcomes were similar for both school years, 2013-2014 and 2014-2015. The overall comparison between learning environments was further examined …
Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan
Teaching Security Of Internet Of Things In Using Raspberrypi, Oliver Nichols, Li Yang, Xiaohong Yuan
KSU Proceedings on Cybersecurity Education, Research and Practice
The Internet of Things (IoTs) is becoming a reality in today’s society. The IoTs can find its application in multiple domains including healthcare, critical infrastructure, transportation, and home and personal use. It is important to teach students importance and techniques that are essential in protecting IoTs. We design a series of hands-on labs in a smart home setting, which can exercise attack and protection of IoTs. Our hands-on labs use a Raspberry Pi and several diverse smart things that communicate through Z-Wave technology. Using this environment, students can operate a home automation system and learn security concepts by performing these …
Developing And Using Evidence-Based E-Learning Videos For Cybersecurity Education, Wu He, Xin Tian, Mohd Anwar
Developing And Using Evidence-Based E-Learning Videos For Cybersecurity Education, Wu He, Xin Tian, Mohd Anwar
KSU Proceedings on Cybersecurity Education, Research and Practice
To help people improve their knowledge and security self-efficacy in dealing with malware attacks that are relevant and meaningful to their organizations, we recently developed over 30 e-learning videos based on the major types of malware attacks we captured using the state-of-the-art anti-malware solution. The preliminary evaluation results of the videos are quite positive and indicate that these evidence-based e-learning videos have great potential to increase users’ security self-efficacy.
Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard
Teaching Static Call Analysis To Detect Anomalous Software Behavior, Jordan Shropshire, Philip Menard
KSU Proceedings on Cybersecurity Education, Research and Practice
Malicious code detection is a critical part of any cyber security operation. Typically, the behavior of normal applications is modeled so that deviations from normal behavior can be identified. There are multiple approach to modeling good behavior but the most common approach is to observe applications’ system call activity. System calls are messages passed between user space applications and their underlying operating systems. The detection of irregular system call activity signals the presence of malicious software behavior. This method of malware-detection has been used successfully for almost two decades. Unfortunately, it can be difficult to cover this concept at the …
Can Library Research Be Fun? Using Games For Information Literacy Instruction In Higher Education, Jennifer Young
Can Library Research Be Fun? Using Games For Information Literacy Instruction In Higher Education, Jennifer Young
Georgia Library Quarterly
Collectively, the world's population spends about 3 billion hours a week playing video games. To reach game-playing audiences of all ages, educators, including library instructors, are embracing game-based learning to engage and motivate students the same way that games do. In looking at the collective wisdom on what makes a good game, and providing concrete examples of library gaming projects, this paper discusses the best practices for creating virtual and virtual-reality hybrid games for bibliographic instruction. The author explores the literature on gamification and games used for teaching information literacy in higher education, and provides recommendations gleaned from existing research …
The Role Of Educational Technology In Design And Delivery Of Curricula Programmes: A Case Of Steps At A University Of Technology, Patient Rambe Dr
The Role Of Educational Technology In Design And Delivery Of Curricula Programmes: A Case Of Steps At A University Of Technology, Patient Rambe Dr
The African Journal of Information Systems
While Universities of Technologies (UoTs) regard the adoption of educational technology for the creation of effective learning environments as one of their defining features, there is limited research on these universities’ innovative use of technologies to transform their curricula design and delivery. This research explores the extent to which educational technology has been integrated into the implementation of new and recurriculated educational programmes under the Strategic Transformation of Educational Programmes and Structures (STEPS) at a UoT. The research employed document analysis and interview data from middle level managers (Deans), curriculum designers and educational technologists. The findings suggest that, except for …