Skip to content

Research at St Andrews

Requirements for educational support tools in Virtual Worlds

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Virtual Worlds have been used for online gaming, socialising, business advertising and education. As the educational uses become more sophisticated from early information advertising and teaching resources to simulated laboratory and scenarios, it is necessary to determine requirements for tools and virtual systems to achieve the optimal support possible. This paper discusses the current educational uses of Virtual Worlds and applies this to a set of support requirements derived for an evaluated support tool for learning to program. The result is a layered approach, or checklist, to support learning and evaluation for effective and adaptive online educational support tools including virtual world educational systems.
Close

Details

Original languageEnglish
Title of host publicationInternational Conference on Computer Supported Education
Subtitle of host publicationCSEDU 2012
EditorsMarkus Helfert, Mario Joao Martins, Jose Cordeiro
PublisherINSTICC-Institute for Systems and Technologies of Information, Control and Communication
Pages141-145
Number of pages6
Publication statusPublished - 18 Apr 2012
Event4th International Conference on Computer Supported Education - Porto, Portugal
Duration: 16 Apr 201218 Apr 2012

Conference

Conference4th International Conference on Computer Supported Education
CountryPortugal
CityPorto
Period16/04/1218/04/12

    Research areas

  • Requirements, Evaluation, Educational tools, Virtual Worlds

Discover related content
Find related publications, people, projects and more using interactive charts.

View graph of relations

Related by author

  1. A novel method to prevent phishing by using OCR technology

    Wang, Y. & Duncan, I. M. M., 31 Oct 2019, 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security). IEEE Computer Society, p. 1-5 5 p. 8885101

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Improving intrusion detection model prediction by threshold adaptation

    Al Tobi, A. M. H. & Duncan, I. M. M., 30 Apr 2019, In : Information. 10, 5, p. 1-42 42 p., 159.

    Research output: Contribution to journalArticle

  3. Human visual based perception of steganographic images

    Fyffe, B., Wang, Y. & Duncan, I., 2019, In : Journal of Cyber Security Technology. 3, 2, p. 61-107 47 p.

    Research output: Contribution to journalArticle

  4. KDD 1999 generation faults: a review and analysis

    Al Tobi, A. M. & Duncan, I., 2018, In : Journal of Cyber Security Technology. 2, 3-4, p. 164-200 37 p.

    Research output: Contribution to journalArticle

  5. Aerial Virtual Reality: Remote Tourism With Drones

    Fabola, A. E., Miller, A. & Duncan, I. M. M., Nov 2017.

    Research output: Contribution to conferencePaper

ID: 20032661

Top