Open Access. Powered by Scholars. Published by Universities.®

Online and Distance Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Online and Distance Education

Community Science As Adult Learning: Using Theory To Understand Volunteers’ Experiences, Lauren Vilen, Jill Zarestky Jun 2024

Community Science As Adult Learning: Using Theory To Understand Volunteers’ Experiences, Lauren Vilen, Jill Zarestky

Adult Education Research Conference

This study explores volunteer learning in an online community science program. Findings indicate alignment with self-directed and experiential learning theory, with implications for learner feedback and engagement.


Improving Educational Delivery And Content In Juvenile Detention Centers, Yomna Elmousalami Mar 2024

Improving Educational Delivery And Content In Juvenile Detention Centers, Yomna Elmousalami

Undergraduate Research Symposium

Students in juvenile detention centers have the greatest need to receive improvements in educational delivery and content; however, they are one of the “truly disadvantaged” populations in terms of receiving those improvements. This work presents a qualitative data analysis based on a focus group meeting with stakeholders at a local Juvenile Detention Center. The current educational system in juvenile detention centers is based on paper worksheets, single-room style teaching methods, outdated technology, and a shortage of textbooks and teachers. In addition, detained students typically have behavioral challenges that are deemed "undesired" in society. As a result, many students miss classes …


How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim Dec 2023

How Chatgpt Can Be Used As A Defense Mechanism For Cyber Attacks, Michelle Ayaim

Cybersecurity Undergraduate Research Showcase

The powers of OpenAI's groundbreaking AI language model, ChatGPT, startled millions of users when it was released in November. But for many, the tool's ability to further accomplish the goals of evil actors swiftly replaced their initial excitement with significant concerns. ChatGPT gives malicious actors additional ways to possibly compromise sophisticated cybersecurity software. Leaders in a sector that is currently suffering from a 38% global spike in data breaches in 2022 must acknowledge the rising influence of AI and take appropriate action. Cybercriminals are writing more complex and focused business email compromise (BEC) and other phishing emails with the assistance …


Adapting An Online Learning Quality Assurance Framework In A Developing Country Setting: The Case Of A Hei In Malawi, Bennett Kankuzi, Menard Phiri, Robert Chanunkha, Jonathan Makuwira, Paul Makocho Aug 2022

Adapting An Online Learning Quality Assurance Framework In A Developing Country Setting: The Case Of A Hei In Malawi, Bennett Kankuzi, Menard Phiri, Robert Chanunkha, Jonathan Makuwira, Paul Makocho

African Conference on Information Systems and Technology

Covid-19 prompted many higher education institutions (HEIs), even in developing countries like Malawi, to abruptly shift from their traditional face-to-face mode of delivery to online learning. However, quality issues with online learning remain one of the greatest challenges to acceptance of online learning by many students and stakeholders. This paper presents an action research based study at the Malawi University of Science and Technology, in which an online learning quality assurance framework is adapted to a developed country setting. The adapted framework builds on the Online Learning Consortium (OLC) Quality Scorecard for the Administration of Online Programs. The contextualization and …


The Right To Repair: (Re)Building A Better Future, Jumana Labib Aug 2021

The Right To Repair: (Re)Building A Better Future, Jumana Labib

Undergraduate Student Research Internships Conference

The goal of this research project was to take a multi-faceted, interdisciplinary approach to research and examine the Right to Repair movement’s progress, current repair practices, impediments, and imperatives, and the various large-scale implications (environmental, economic, social, etc.) stemming from diminished consumer freedom as a result of increased corporate greed and lack of governmental regulations with regards to repair and the environment. This poster exhibits the highlights of my general research project on the Right to Repair movement over the course of this four month internship, and aims to disseminate information about the movement to the wider public in an …


A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad Oct 2020

A Survey Of Serious Games For Cybersecurity Education And Training, Winston Anthony Hill Jr., Mesafint Fanuel, Xiaohong Yuan, Jinghua Zhang, Sajad Sajad

KSU Proceedings on Cybersecurity Education, Research and Practice

Serious games can challenge users in competitive and entertaining ways. Educators have used serious games to increase student engagement in cybersecurity education. Serious games have been developed to teach students various cybersecurity topics such as safe online behavior, threats and attacks, malware, and more. They have been used in cybersecurity training and education at different levels. Serious games have targeted different audiences such as K-12 students, undergraduate and graduate students in academic institutions, and professionals in the cybersecurity workforce. In this paper, we provide a survey of serious games used in cybersecurity education and training. We categorize these games into …


Transforming Learning With Information And Communication Technologies: Insights From Three Decades Of Research, Romina Jamieson-Proctor Aug 2018

Transforming Learning With Information And Communication Technologies: Insights From Three Decades Of Research, Romina Jamieson-Proctor

2009 - 2019 ACER Research Conferences

Since computers first appeared in classrooms, educators have sought to integrate information communication technologies (ICT) into teaching and learning. In Australia, as elsewhere, ICT are widely regarded as critical facilitators of student learning. The ability to use ICT effectively is specified in Australia’s national curriculum as a required general capability. However, despite the educational environment being replete with ICT related programs, our understanding of how students use ICT for learning is still limited. This paper presents insights from the past 30 years of research, which suggest that even though the current ‘climate’ in Australian schools is favourable, teacher confidence and …


Self-Coaching With Ai: Developing Thinking Skills, Thinking Dispositions, And Well-Being, Olivier Malafronte, Isla Reddin, Roy Van Den Brink-Budgen May 2018

Self-Coaching With Ai: Developing Thinking Skills, Thinking Dispositions, And Well-Being, Olivier Malafronte, Isla Reddin, Roy Van Den Brink-Budgen

ICOT 18 - International Conference on Thinking - Cultivating Mindsets for Global Citizens

Being motivated by the need to address the challenges of our Volatile Uncertain Complex Ambiguous world, we strive to create tools to improve people’s lives and help them become more resilient, resourceful, self-confidant, and successful.

In a digital world, we must understand how to efficiently connect to digital systems. Connecting “with AI” doesn’t mean spending more time on digital devices, but spending time in a deliberate way with purpose and intentional learning outcomes.

As a society, we want to see graduates with emotional intelligence and reflective skills in order to address global economic and social issues. As for jobs …


Stealth Assessment In Video Games, Val Shute Aug 2015

Stealth Assessment In Video Games, Val Shute

2009 - 2019 ACER Research Conferences

Games can be powerful vehicles to support learning, but their success in education hinges on getting the assessment part right. In this presentation, I will explore how games can use stealth assessment to measure and support the learning of competencies critical for the future. I will discuss what stealth assessment is, why it is important, and how to develop and accomplish it. I will also provide examples within the context of a game called Physics Playground that I designed and developed with my team. I’ll share what has been learned by recent research on stealth assessments in games, including: Does …