• DOI: 10.1111/jcal.12383
  • Corpus ID: 209070400

A systematic literature review on Internet of things in education: Benefits and challenges

  • M. Kassab , J. Defranco , P. Laplante
  • Published in Journal of Computer Assisted… 1 April 2020
  • Computer Science, Education

110 Citations

Transforming education with the internet of things: a journey into smarter learning environments.

  • Highly Influenced
  • 10 Excerpts

Investigating the impact of IoT-Based smart laboratories on students’ academic performance in higher education

The use of internet of things devices in early childhood education: a systematic review, identifying and prioritizing applications of internet of things (iot) in educational learning using interval best-worst method (bwm), cloud iot-oriented secure college physical education teaching platform vased on deep learning, exploring brazilian teachers’ perceptions and a priori needs to design smart classrooms, identifying popular, rejected and neglected children in chinese preschool: an exploratory study on the educational application of spatial positioning data., integration of internet of things (iot) technology in the management of educational facilities and infrastructure, hybrid learning integrated remote laboratory: a pedagogical strategy for future practicum learning, the prevalence of internet use as a source of information among patients with hypertension, 75 references, how do you create an internet of things workforce, utilearn: a personalised ubiquitous teaching and learning system for smart societies, stimulation methods for students' studies using wearables technology, introducing iot and wearable technologies into task-based language learning for young children, networks of 'things', cloud assisted iot based social door to boost student-professor interaction, analysis of student activities trajectory and design of attendance management based on internet of things, research and design of the future classroom based on big data and cloud processing, the story of things: awareness through happenstance interaction, a campus big-data platform architecture for data mining and business intelligence in education institutes, related papers.

Showing 1 through 3 of 0 Related Papers

To read this content please select one of the options below:

Please note you do not have access to teaching notes, investigating the impact of the internet of things on higher education: a systematic literature review.

Journal of Applied Research in Higher Education

ISSN : 2050-7003

Article publication date: 16 January 2024

The Internet of things (IoT), an emerging research field, offers solutions to several problems and may result in a paradigm shift in various areas, including education. However, this approach has been under-utilised. Therefore, this research investigates and highlights the primary factors that influence the impact of the IoT on education and reveals the current state of academic research to manage higher education (HE) resources effectively and efficiently.

Design/methodology/approach

Data from 35 academic papers were collected and analysed to understand the current situation and assess the readiness of HE to adopt IoT. A literature review is a well-established method for developing knowledge and interpreting issues under consideration. This study systematically analysed the various research methodologies used to adopt IoT, summarising the content of the studies and highlighting the main factors that may affect IoT adoption in HE.

The authors examined 95 papers; 35 were investigated and analysed. The literature review and analysis of academic papers revealed the factors influencing the adoption of IoT technology in HE.

Originality/value

By examining the evidence, this study contributes to understanding the context and supplements existing research. It conducts a systematic literature review to assess the impact of the IoT on the educational process, proposes future research directions and presents findings that aid the efficient management of HE resources.

  • Internet of things (IoT)
  • Higher education (HE)
  • Smart campus
  • Smart university
  • Digital transformation
  • Smart education
  • Systematic literature review

Acknowledgements

This article was financially supported by the State Research Agency of the Spanish Ministry of Science and Innovation (MCIN/AEI/10.13039/50110 0 011033), via the SPUR project (ref. PID2020-117021GB-I00).

Kandil, O. , Rosillo, R. , Abd El Aziz, R. and De La Fuente, D. (2024), "Investigating the impact of the Internet of Things on higher education: a systematic literature review", Journal of Applied Research in Higher Education , Vol. ahead-of-print No. ahead-of-print. https://doi.org/10.1108/JARHE-05-2023-0223

Emerald Publishing Limited

Copyright © 2023, Emerald Publishing Limited

Related articles

All feedback is valuable.

Please share your general feedback

Report an issue or find answers to frequently asked questions

Contact Customer Support

Internet of Things in Education: Opportunities and Challenges

  • Conference paper
  • First Online: 11 July 2023
  • Cite this conference paper

a systematic literature review on internet of things in education benefits and challenges

  • Krešimir Rakić   ORCID: orcid.org/0000-0003-3447-6253 7  

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1827))

Included in the following conference series:

  • International Conference on Digital Transformation in Education and Artificial Intelligence Application

345 Accesses

The basic concept of Internet of Things is the ability to upgrade everyday objects with identification, sensor, network, and processing capabilities that will enable them to communicate with each other, as well as with other devices and services via the Internet. Improved in this way, these objects become smart objects, because they require minimal or even no human intervention to generate, exchange, collect, analyze, and manage data. The numerous possibilities of IoT provide great potential for its application in various areas of human life. In this paper, a comprehensive review of IoT implementation research is given, with a special emphasis on its application in education. The opportunities and advantages that IoT provides to educational institutions and all stakeholders in the learning and teaching process are listed and categorized. Challenges that institutions face when introducing IoT in their daily work are also listed, as well as suggestions for possible solutions for each of the challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Castells, M.: The Information Age: Economy, Society and Culture. Blackwell, Oxford (1996). ISBN 978-0631215943

Google Scholar  

Zandbergen, D.: We live in an Information Age: What does that actually mean? (2013). https://waag.org/en/article/we-live-information-age-what-does-actually-mean . Accessed 25 Mar 2023

Zadeh, S.K., Veisi, A.G., Zadeh, M.K.: Do we live in an information society? Does it matter? Int. J. Adv. Res. 1 (3), 362–366 (2013). ISSN NO 2320-5407

Ou, M.S.: Do We Live in an “Information Society”? Library and Information Science Foundation, University of London (2016)

HealthIT Webpage. How Big is the Internet, and How Do We Measure It? (2020). https://healthit.com.au/how-big-is-the-internet-and-how-do-we-measure-it . Accessed 25 Mar 2023

Ashton, K.: That “Internet of things” thing. RFID J. 22 (7), 97–114 (2009)

Gubbi, J., Buyya, R., Marušić, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29 (7), 1645–1660 (2013)

Article   Google Scholar  

Stankovski, S., Ostojic, G., Laslo, T., Stanojevic, M., Babic, M.: Challenges of IoT payments in smart services. In: Katalinic, B. (ed.) Proceedings of the 30th DAAAM International Symposium, pp. 0004–0009. Published by DAAAM International, Vienna, Austria (2019). ISBN 978-3-902734-22-8, ISSN 1726-9679

Majstorovic, V., Rakic, K.: Internet of Things and social media: tools of a successful information organization. In: Katalinic, B. (ed.) Proceedings of the 28th DAAAM International Symposium, pp. 0295–0298. Published by DAAAM International, Vienna, Austria (2017). ISBN 978-3-902734-1-2, ISSN 1726-9679

Cisco Internet of Things. (2017). https://www.cisco.com/c/r/en/us/internet-of-everything-ioe/internet-of-things-iot/index.html . Accessed 27 Aug 2017

Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54 (15), 2787–2805 (2010)

Article   MATH   Google Scholar  

Efremov, S., Pilipenko, N., Voskov, L.: An integrated approach to common problems in the Internet of Things. Procedia Eng. 100 , 1215–1223 (2015)

Khanna, A., Kaur, S.: Internet of Things (IoT), applications and challenges: a comprehensive review. Wireless Pers. Commun. 114 (2), 1687–1762 (2020). https://doi.org/10.1007/s11277-020-07446-4

Shrouf, F., Ordieres, J., Miragliotta, G.: Smart factories in Industry 4.0: a review of the concept and of energy management approached in production based on the Internet of Things paradigm. In: Proceedings of the 2014 IEEE International Conference on Industrial Engineering and Engineering Management, pp. 697–701. IEEE (2014)

Zorzi, M., Gluhak, A., Lange, S., Bassi, A.: From today’s Intranet of things to a future Internet of things: a wireless-and mobility-related view. IEEE Wirel. Commun. 17 (6), 44–51 (2010)

Hank, P., Müller, S., Vermesan, O., Van Den Keybus, J.: Automotive ethernet: in-vehicle networking and smart mobility. In: Proceedings of the Conference on Design, Automation and Test in Europe, pp. 1735–1739, EDA Consortium (2013)

Kyriazis, D., Varvarigou, T., White, D., Rossi, A., Cooper, J.: Sustainable Smart City IoT applications: heat and electricity management & eco-conscious cruise control for public transportation. In: 2013 IEEE 14th International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–5. IEEE (2013)

Somov, A., Dupont, C., Giaffreda, R.: Supporting Smart-City mobility with cognitive Internet of Things. In: Future Network and Mobile Summit (FutureNetworkSummit), pp. 1–10. IEEE (2013)

Lee, S., Tewolde, G., Kwon, J.: Design and implementation of vehicle tracking system using GPS, GSM, GPRS technology and smartphone application. In: IEEE World Forum on Internet of Things (WF-IoT), pp. 353–358. IEEE (2014)

Vermesan, O., et al.: Internet of Things strategic research and innovation agenda. In: Vermesan, O., Friess, P. (eds.) Internet of Things - From Research and Innovation to Market Deployment, pp. 7–142. River Publishers, Aalborg (2014)

Ma, X., Yu, H., Wang, Y., Wang, Y.: Large-scale transportation network congestion evolution prediction using deep learning theory. PLoS ONE, 10 (3) (2015)

Karnouskos, S., De Holanda, T.N.: Simulation of a smart grid city with software agents. In: Third UKSim European Symposium on Computer Modeling and Simulation, EMS 2009, pp. 424–429. IEEE (2009)

Bressan, N., Bazzaco, L., Bui, N., Casari, P., Vangelista, L., Zorzi, M.: The deployment of a smart monitoring system using wireless sensor and actuator networks. In: 2010 First IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 49–54. IEEE (2010)

Zhang, Y., Yu, R., Nekovee, M., Liu, Y., Xie, S., Gjessing, S.: Cognitive machine-to-machine communications: visions and potentials for the smart grid. IEEE Network 26 (3), 6–13 (2012)

Yun, M., Yuxin, B.: Research on the architecture and key technology of Internet of Things (IoT) applied on smart grid. In: 2010 International Conference on Advances in Energy Engineering (ICAEE), pp. 69–72. IEEE (2010)

Darianian, M., Michael, M.P.: Smart home mobile RFID-based Internet-of-Things systems and services. In: International Conference on Advanced Computer Theory and Engineering, ICACTE 2008, pp. 116–120. IEEE (2008)

Jie, Y., Pei, J.Y., Jun, L., Yun, G., Wei, X.: Smart home system based on IoT technologies. In: 2013 Fifth International Conference on Computational and Information Sciences (ICCIS), pp. 1789–1791. IEEE (2013)

Chong, G., Zhihao, L., Yifeng, Y.: The research and implement of smart home system based on Internet of Things. In: 2011 International Conference on Electronics, Communications and Control (ICECC), pp. 2944–2947. IEEE (2011)

Li, X., Lu, R., Liang, X., Shen, X., Chen, J., Lin, X.: Smart community: an Internet of Things application. IEEE Commun. Mag. 49 (11), 68–75 (2011)

Soliman, M., Abiodun, T., Hamouda, T., Zhou, J., Lung, C.-H.: Smart home: integrating Internet of Things with web services and cloud computing. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), vol. 2, pp. 317–320. IEEE (2013)

Aazam, M., Khan, I., Alsaffar, A.A., Huh, E.N.: Cloud of Things: integrating Internet of Things and cloud computing and the issues involved. In: Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th–18th January 2014, pp. 414–419. IEEE (2014)

Wortmann, F., Flüchter, K.: Internet of things. Bus. Inf. Syst. Eng. 57 (3), 221–224 (2015)

Kelly, S.D.T., Suryadevara, N.K., Mukhopadhyay, S.C.: Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sens. J. 13 (10), 3846–3853 (2013)

Castellani, A.P., Gheda, M., Bui, N., Rossi, M., Zorzi, M.: Web services for the Internet of Things through CoAP and EXI. In: 2011 IEEE International Conference on Communications Workshops (ICC), pp. 1–6. IEEE (2011)

Oliveira, L.M., Rodrigues, J.J.: Wireless sensor networks: a survey on environmental monitoring. JCM 6 (2), 143–151 (2011)

Jia, X., Feng, Q., Fan, T., Lei, Q.: RFID technology and its applications in Internet of Things (IoT). In: 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet, pp. 1282–1285. IEEE (2012)

Swan, M.: Sensor Mania! The Internet of Things, wearable computing, objective metrics, and the quantified self 2.0. J. Sens. Actuator Netw. 1 (3), 217–253 (2012)

Kantarci, B., Mouftah, H.T.: Trustworthy sensing for public safety in cloud-centric Internet of Things. IEEE Internet Things J. 1 (4), 360–368 (2014)

Bui, N., Zorzi, M.: Health care applications: a solution based on the Internet of Things. In: Proceedings of the 4th International Symposium on Applied Sciences in BioMedical and Communication Technologies, p. 131. ACM (2011)

Doukas, C., Maglogiannis, I.: Bringing IoT and Cloud Computing towards pervasive healthcare. In: 2012 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 922–926. IEEE (2012)

Amendola, S., Lodato, R., Manzari, S., Occhiuzzi, C., Marrocco, G.: RFID technology for IoT-based personal healthcare in smart spaces. IEEE Internet Things J. 1 (2), 144–152 (2014)

Yang, G., Xie, L., Mäntysalo, M., Zhou, X., Pang, Z., Da Xu, L., et al.: A health-IoT platform based on the integration of intelligent packaging, unobtrusive bio-sensor, and intelligent medicine box. IEEE Trans. Industr. Inf. 10 (4), 2180–2191 (2014)

Hassanalieragh, M., et al.: Health monitoring and management using Internet-of-Things (IoT) sensing with cloud-based processing: opportunities and challenges. In: 2015 IEEE International Conference on Services Computing (SCC), pp. 285–292. IEEE (2015)

Ukil, A., Bandyoapdhyay, S., Puri, C., Pal, A.: IoT healthcare analytics: the importance of anomaly detection. In: 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp. 994–997. IEEE (2016)

Yan-e, D.: Design of intelligent agriculture management information system based on IoT. In: 2011 International Conference on Intelligent Computation Technology and Automation (ICICTA), vol. 1, pp. 1045–1049. IEEE (2011)

Liqiang, Z., Shouyi, Y., Leibo, L., Zhen, Z., Shaojun, W.: A crop monitoring system based on wireless sensor network. Procedia Environ. Sci. 11 , 558–565 (2011)

Li, S.: Application of the Internet of Things technology in precision agriculture irrigation systems. In: 2012 International Conference on Computer Science & Service System (CSSS), pp. 1009–1013. IEEE (2012)

Bo, Y., Wang, H.: The application of Cloud Computing and the Internet of Things in agriculture and forestry. In: 2011 International Joint Conference on Service Sciences (IJCSS), pp. 168–172. IEEE (2011)

Tong Ke, F.: Smart agriculture based on Cloud Computing and IOT. J. Convergence Inf. Technol. 8 (2) (2013)

Zhao, J., Zhang, J., Feng, Y., Guo, J.: The study and application of the IOT technology in agriculture. In: 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), vol. 2, pp. 462–465. IEEE (2010)

Kaloxylos, A., Eigenmann, R., Teye, F., Politopoulou, Z., Wolfert, S., Shrank, C., et al.: Farm management systems and the future internet era. Comput. Electron. Agric. 89 , 130–144 (2012)

Kovatsch, M., Mayer, S., Ostermaier, B.: Moving application logic from the firmware to the cloud: towards the thin server architecture for the Internet of Things. In: 2012 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), pp. 751–756. IEEE (2012)

Palattella, M.R., Accettura, N., Grieco, L.A., Boggia, G., Dohler, M., Engel, T.: On optimal scheduling in duty-cycled industrial IoT applications using IEEE802. 15.4 e TSCH. IEEE Sens. J. 13 (10), 3655–3666 (2013)

Bi, Z., Da Xu, L., Wang, C.: Internet of Things for enterprise systems of modern manufacturing. IEEE Trans. Industr. Inf. 10 (2), 1537–1546 (2014)

Reaidy, P.J., Gunasekaran, A., Spalanzani, A.: Bottom-up approach based on Internet of Things for order fulfillment in a collaborative warehousing environment. Int. J. Prod. Econ. 159 , 29–40 (2015)

Durkop, L., Trsek, H., Jasperneite, J., Wisniewski, L.: Towards autoconfiguration of industrial automation systems: a case study using Profinet IO. In: 2012 IEEE 17th Conference on Emerging Technologies & Factory Automation (ETFA), pp. 1–8. IEEE (2012)

He, W., Da Xu, L.: Integration of distributed enterprise applications: a survey. IEEE Trans. Industr. Inform. 10 (1), 35–42 (2014)

Qiu, X., Luo, H., Xu, G., Zhong, R., Huang, G.Q.: Physical assets and service sharing for IoT-enabled Supply Hub in Industrial Park (SHIP). Int. J. Prod. Econ. 159 , 4–15 (2015)

Veeramanickam, M.R.M., Mohanapriya, M.: IoT enabled futurus smart campus with effective e-learning: I-Campus. GSTF J. Eng. Technol. (JET) 3 (4), 8–87 (2016)

Elyamany, H.F., Al Khairi, A.H.: IoT-academia architecture: a profound approach. In 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 1–5. IEEE (2015)

Al-Emran, M., Malik, S.I., Al-Kabi, M.N.: A survey of Internet of Things (IoT) in education: opportunities and challenges. In: Hassanien, A.E., Bhatnagar, R., Khalifa, N.E.M., Taha, M.H.N. (eds.) Toward Social Internet of Things (SIoT): enabling technologies, architectures and applications. SCI, vol. 846, pp. 197–209. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-24513-9_12

Chapter   Google Scholar  

Maenpaa, H., Varjonen, S., Hellas, A., Tarkoma, S., Mannisto, T.: Assessing IoT projects in university education-a framework for problem-based learning. In: 2017 IEEE/ACM 39th International Conference on Software Engineering: Software Engineering Education and Training Track (ICSE-SEET, pp. 37–46. IEEE (2017)

Raikar, M.M., Desai, P., Naragund, J.G.: Active learning explored in open elective course: Internet of Things (IoT). In: Proceedings of IEEE 8th International Conference on Technology for Education, T4E 2016. IEEE (2017)

Silvis-Cividjian, N.: Teaching Internet of Things (IoT) literacy: a systems engineering approach. In: 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET), pp. 50–61. IEEE (2019)

Plaza, P., et al.: Arduino as an educational tool to introduce robotics. In: 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), pp. 1–8. IEEE (2018)

Bashir, A., Alhammadi, M., Awawdeh, M., Faisal, T.: Effectiveness of using Arduino platform for the hybrid engineering education learning model. In: 2019 Advances in Science and Engineering Technology International Conferences (ASET), pp. 1–6. IEEE (2019)

Zhong, X., Liang, Y.: Raspberry Pi: an effective vehicle in teaching the Internet of Things in computer science and engineering. Electronics 5 (3), 56 (2016)

Mullett, G.J.: Teaching the Internet of Things (IoT) using universally available Raspberry Pi and Arduino platforms. In: 2016 ASEE Annual Conference & Exposition (2016)

Caţă, M.: Smart University, a new concept in the Internet of Things. In: 2015 14th RoEduNet International Conference - Networking in Education and Research (RoEduNet NER), pp. 195–197. IEEE (2015)

Alhaddad, M.M.: Improving security performance in smart campuses. ResearchBerg Rev. Sci. Technol. 2 (4), 17–28 (2019)

Qiu, Y., Chen, J., Zhu, Q.: Campus access control system based on RFID. In: 2012 IEEE International Conference on Computer Science and Automation Engineering, pp. 407–410. IEEE (2012)

Campbell, A.: Role and Impact of IoT in Education (2022). https://www.helpwire.app/blog/iot-in-education/ . Accessed 25 Mar 2023

Van Hoojidonk, R., Zandbergen, D.: IoT in Education: A Better-Connected and More Collaborative Future for Students and Teachers (2022, 2013). https://blog.richardvanhooijdonk.com/en/iot-in-education-a-better-connected-and-more-collaborative-future-for-students-and-teachers/ . Accessed 25 Mar 2023

Shyr, W.J., Zeng, L.W., Lin, C.K., Lin, C.M., Hsieh, W.Y.: Application of an energy management system via the Internet of Things on a university campus. EURASIA J. Math. Sci. Technol. Educ. 14 (5), 1759–1766 (2018)

Moura, P., Moreno, J.I., López López, G., Alvarez-Campana, M.: IoT platform for energy sustainability in university campuses. Sensors 21 (2), 357 (2021)

Tanasiev, V., Pătru, G.C., Rosner, D., Sava, G., Necula, H., Badea, A.: Enhancing environmental and energy monitoring of residential buildings through IoT. Autom. Constr. 126 , 103662 (2021)

Shoup, D.: Parking on a Smart Campus: Lessons for Universities and Cities. UCLA (2005)

Anuar, F., Lingas, N.: Smart campus initiative: car entrance, exit and parking management prototype development. In: AIP Conference Proceedings, vol. 2643(1). AIP Publishing LLC (2023)

Sari, M.W., Ciptadi, P.W., Hardyanto, R.H.: Study of smart campus development using Internet of Things technology. IOP Conf. Ser. Mater. Sci. Eng. 190 (1) (2017). IOP Publishing

Kassab, M., DeFranco, J., Laplante, P.: A systematic literature review on Internet of Things in education: benefits and challenges. J. Comput. Assist. Learn. 36 (2), 115–127 (2020)

Rytivaara, A.: Collaborative classroom management in a co-taught primary school classroom. Int. J. Educ. Res. 53 , 182–191 (2012)

Cunningham, E.: IoT in Education: Tech Makes Gains in K-12 Schools. https://edtechmagazine.com/k12/article/2021/12/iot-education-tech-makes-gains-k-12-schools-perfcon . Accessed 25 Mar 2023

Chang, C.H.: Smart classroom roll caller system with IoT architecture. In: 2011 2nd International Conference on Innovations in Bio-Inspired Computing and Applications, pp. 356–360. IEEE (2011)

Santoso, B., Sari, M.W.: Design of student attendance system using Internet of Things (IoT) technology. J. Phys. Conf. Ser. 1254 (1) (2019). IOP Publishing

Kariapper, R.K.A.R.: Attendance system using RFID, IoT and machine learning: a two factor verification approach. Syst. Rev. Pharm. 12 (3), 314–321 (2021)

Alotaibi, S.J.: Attendance system based on the Internet of Things for supporting blended learning. In: 2015 World Congress on Internet Security (WorldCIS), p. 78 (2015)

Orehovački, T., Plantak Vukovac, D., Džeko, M., Stapić, Z.: Evaluating relevant UX dimensions with respect to IoT ecosystem intended for students’ activities tracking and success prediction. In: Zaphiris, P., Ioannou, A. (eds.) LCT 2018. LNCS, vol. 10924, pp. 279–293. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-91743-6_22

Cheng, Y.W., Wang, Y., Chen, N.S.: A framework for designing an immersive language learning environment integrated with educational robots and IoT-based toys. In: Foundations and Trends in Smart Learning: Proceedings of 2019 International Conference on Smart Learning Environments, pp. 1–4. Springer, Cham (2019). https://doi.org/10.1007/978-981-13-6908-7_1

Gligorić, N., Uzelac, A., Krco, S.: Smart classroom: real-time feedback on lecture quality. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 391–394. IEEE (2012)

Download references

Author information

Authors and affiliations.

Faculty of Mechanical Engineering, Computing and Electrical Engineering, University of Mostar, Matice hrvatske b.b., 88000, Mostar, Bosnia and Herzegovina

Krešimir Rakić

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Krešimir Rakić .

Editor information

Editors and affiliations.

University of Mostar, Mostar, Bosnia and Herzegovina

Daniel Vasić

Mirela Kundid Vasić

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Cite this paper.

Rakić, K. (2023). Internet of Things in Education: Opportunities and Challenges. In: Vasić, D., Kundid Vasić, M. (eds) Digital Transformation in Education and Artificial Intelligence Application. MoStart 2023. Communications in Computer and Information Science, vol 1827. Springer, Cham. https://doi.org/10.1007/978-3-031-36833-2_8

Download citation

DOI : https://doi.org/10.1007/978-3-031-36833-2_8

Published : 11 July 2023

Publisher Name : Springer, Cham

Print ISBN : 978-3-031-36832-5

Online ISBN : 978-3-031-36833-2

eBook Packages : Computer Science Computer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

U.S. flag

An official website of the United States government

The .gov means it’s official. Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

The site is secure. The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

  • Publications
  • Account settings

Preview improvements coming to the PMC website in October 2024. Learn More or Try it out now .

  • Advanced Search
  • Journal List
  • Springer Nature - PMC COVID-19 Collection

Logo of phenaturepg

Impacts of digital technologies on education and factors influencing schools' digital capacity and transformation: A literature review

Stella timotheou.

1 CYENS Center of Excellence & Cyprus University of Technology (Cyprus Interaction Lab), Cyprus, CYENS Center of Excellence & Cyprus University of Technology, Nicosia-Limassol, Cyprus

Ourania Miliou

Yiannis dimitriadis.

2 Universidad de Valladolid (UVA), Spain, Valladolid, Spain

Sara Villagrá Sobrino

Nikoleta giannoutsou, romina cachia.

3 JRC - Joint Research Centre of the European Commission, Seville, Spain

Alejandra Martínez Monés

Andri ioannou, associated data.

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

Digital technologies have brought changes to the nature and scope of education and led education systems worldwide to adopt strategies and policies for ICT integration. The latter brought about issues regarding the quality of teaching and learning with ICTs, especially concerning the understanding, adaptation, and design of the education systems in accordance with current technological trends. These issues were emphasized during the recent COVID-19 pandemic that accelerated the use of digital technologies in education, generating questions regarding digitalization in schools. Specifically, many schools demonstrated a lack of experience and low digital capacity, which resulted in widening gaps, inequalities, and learning losses. Such results have engendered the need for schools to learn and build upon the experience to enhance their digital capacity and preparedness, increase their digitalization levels, and achieve a successful digital transformation. Given that the integration of digital technologies is a complex and continuous process that impacts different actors within the school ecosystem, there is a need to show how these impacts are interconnected and identify the factors that can encourage an effective and efficient change in the school environments. For this purpose, we conducted a non-systematic literature review. The results of the literature review were organized thematically based on the evidence presented about the impact of digital technology on education and the factors that affect the schools’ digital capacity and digital transformation. The findings suggest that ICT integration in schools impacts more than just students’ performance; it affects several other school-related aspects and stakeholders, too. Furthermore, various factors affect the impact of digital technologies on education. These factors are interconnected and play a vital role in the digital transformation process. The study results shed light on how ICTs can positively contribute to the digital transformation of schools and which factors should be considered for schools to achieve effective and efficient change.

Introduction

Digital technologies have brought changes to the nature and scope of education. Versatile and disruptive technological innovations, such as smart devices, the Internet of Things (IoT), artificial intelligence (AI), augmented reality (AR) and virtual reality (VR), blockchain, and software applications have opened up new opportunities for advancing teaching and learning (Gaol & Prasolova-Førland, 2021 ; OECD, 2021 ). Hence, in recent years, education systems worldwide have increased their investment in the integration of information and communication technology (ICT) (Fernández-Gutiérrez et al., 2020 ; Lawrence & Tar, 2018 ) and prioritized their educational agendas to adapt strategies or policies around ICT integration (European Commission, 2019 ). The latter brought about issues regarding the quality of teaching and learning with ICTs (Bates, 2015 ), especially concerning the understanding, adaptation, and design of education systems in accordance with current technological trends (Balyer & Öz, 2018 ). Studies have shown that despite the investment made in the integration of technology in schools, the results have not been promising, and the intended outcomes have not yet been achieved (Delgado et al., 2015 ; Lawrence & Tar, 2018 ). These issues were exacerbated during the COVID-19 pandemic, which forced teaching across education levels to move online (Daniel, 2020 ). Online teaching accelerated the use of digital technologies generating questions regarding the process, the nature, the extent, and the effectiveness of digitalization in schools (Cachia et al., 2021 ; König et al., 2020 ). Specifically, many schools demonstrated a lack of experience and low digital capacity, which resulted in widening gaps, inequalities, and learning losses (Blaskó et al., 2021 ; Di Pietro et al, 2020 ). Such results have engendered the need for schools to learn and build upon the experience in order to enhance their digital capacity (European Commission, 2020 ) and increase their digitalization levels (Costa et al., 2021 ). Digitalization offers possibilities for fundamental improvement in schools (OECD, 2021 ; Rott & Marouane, 2018 ) and touches many aspects of a school’s development (Delcker & Ifenthaler, 2021 ) . However, it is a complex process that requires large-scale transformative changes beyond the technical aspects of technology and infrastructure (Pettersson, 2021 ). Namely, digitalization refers to “ a series of deep and coordinated culture, workforce, and technology shifts and operating models ” (Brooks & McCormack, 2020 , p. 3) that brings cultural, organizational, and operational change through the integration of digital technologies (JISC, 2020 ). A successful digital transformation requires that schools increase their digital capacity levels, establishing the necessary “ culture, policies, infrastructure as well as digital competence of students and staff to support the effective integration of technology in teaching and learning practices ” (Costa et al, 2021 , p.163).

Given that the integration of digital technologies is a complex and continuous process that impacts different actors within the school ecosystem (Eng, 2005 ), there is a need to show how the different elements of the impact are interconnected and to identify the factors that can encourage an effective and efficient change in the school environment. To address the issues outlined above, we formulated the following research questions:

a) What is the impact of digital technologies on education?

b) Which factors might affect a school’s digital capacity and transformation?

In the present investigation, we conducted a non-systematic literature review of publications pertaining to the impact of digital technologies on education and the factors that affect a school’s digital capacity and transformation. The results of the literature review were organized thematically based on the evidence presented about the impact of digital technology on education and the factors which affect the schools’ digital capacity and digital transformation.

Methodology

The non-systematic literature review presented herein covers the main theories and research published over the past 17 years on the topic. It is based on meta-analyses and review papers found in scholarly, peer-reviewed content databases and other key studies and reports related to the concepts studied (e.g., digitalization, digital capacity) from professional and international bodies (e.g., the OECD). We searched the Scopus database, which indexes various online journals in the education sector with an international scope, to collect peer-reviewed academic papers. Furthermore, we used an all-inclusive Google Scholar search to include relevant key terms or to include studies found in the reference list of the peer-reviewed papers, and other key studies and reports related to the concepts studied by professional and international bodies. Lastly, we gathered sources from the Publications Office of the European Union ( https://op.europa.eu/en/home ); namely, documents that refer to policies related to digital transformation in education.

Regarding search terms, we first searched resources on the impact of digital technologies on education by performing the following search queries: “impact” OR “effects” AND “digital technologies” AND “education”, “impact” OR “effects” AND “ICT” AND “education”. We further refined our results by adding the terms “meta-analysis” and “review” or by adjusting the search options based on the features of each database to avoid collecting individual studies that would provide limited contributions to a particular domain. We relied on meta-analyses and review studies as these consider the findings of multiple studies to offer a more comprehensive view of the research in a given area (Schuele & Justice, 2006 ). Specifically, meta-analysis studies provided quantitative evidence based on statistically verifiable results regarding the impact of educational interventions that integrate digital technologies in school classrooms (Higgins et al., 2012 ; Tolani-Brown et al., 2011 ).

However, quantitative data does not offer explanations for the challenges or difficulties experienced during ICT integration in learning and teaching (Tolani-Brown et al., 2011 ). To fill this gap, we analyzed literature reviews and gathered in-depth qualitative evidence of the benefits and implications of technology integration in schools. In the analysis presented herein, we also included policy documents and reports from professional and international bodies and governmental reports, which offered useful explanations of the key concepts of this study and provided recent evidence on digital capacity and transformation in education along with policy recommendations. The inclusion and exclusion criteria that were considered in this study are presented in Table ​ Table1 1 .

Inclusion and exclusion criteria for the selection of resources on the impact of digital technologies on education

Inclusion criteriaExclusion criteria

• Published in 2005 or later

• Review and meta-analysis studies

• Formal education K-12

• Peer-reviewed articles

• Articles in English

• Reports from professional/international bodies

• Governmental reports

• Book chapters

• Ph.D. dissertations and theses

• Conference poster papers

• Conference papers without proceedings

• Resources on higher education

• Resources on pre-school education

• Individual studies

To ensure a reliable extraction of information from each study and assist the research synthesis we selected the study characteristics of interest (impact) and constructed coding forms. First, an overview of the synthesis was provided by the principal investigator who described the processes of coding, data entry, and data management. The coders followed the same set of instructions but worked independently. To ensure a common understanding of the process between coders, a sample of ten studies was tested. The results were compared, and the discrepancies were identified and resolved. Additionally, to ensure an efficient coding process, all coders participated in group meetings to discuss additions, deletions, and modifications (Stock, 1994 ). Due to the methodological diversity of the studied documents we began to synthesize the literature review findings based on similar study designs. Specifically, most of the meta-analysis studies were grouped in one category due to the quantitative nature of the measured impact. These studies tended to refer to student achievement (Hattie et al., 2014 ). Then, we organized the themes of the qualitative studies in several impact categories. Lastly, we synthesized both review and meta-analysis data across the categories. In order to establish a collective understanding of the concept of impact, we referred to a previous impact study by Balanskat ( 2009 ) which investigated the impact of technology in primary schools. In this context, the impact had a more specific ICT-related meaning and was described as “ a significant influence or effect of ICT on the measured or perceived quality of (parts of) education ” (Balanskat, 2009 , p. 9). In the study presented herein, the main impacts are in relation to learning and learners, teaching, and teachers, as well as other key stakeholders who are directly or indirectly connected to the school unit.

The study’s results identified multiple dimensions of the impact of digital technologies on students’ knowledge, skills, and attitudes; on equality, inclusion, and social integration; on teachers’ professional and teaching practices; and on other school-related aspects and stakeholders. The data analysis indicated various factors that might affect the schools’ digital capacity and transformation, such as digital competencies, the teachers’ personal characteristics and professional development, as well as the school’s leadership and management, administration, infrastructure, etc. The impacts and factors found in the literature review are presented below.

Impacts of digital technologies on students’ knowledge, skills, attitudes, and emotions

The impact of ICT use on students’ knowledge, skills, and attitudes has been investigated early in the literature. Eng ( 2005 ) found a small positive effect between ICT use and students' learning. Specifically, the author reported that access to computer-assisted instruction (CAI) programs in simulation or tutorial modes—used to supplement rather than substitute instruction – could enhance student learning. The author reported studies showing that teachers acknowledged the benefits of ICT on pupils with special educational needs; however, the impact of ICT on students' attainment was unclear. Balanskat et al. ( 2006 ) found a statistically significant positive association between ICT use and higher student achievement in primary and secondary education. The authors also reported improvements in the performance of low-achieving pupils. The use of ICT resulted in further positive gains for students, namely increased attention, engagement, motivation, communication and process skills, teamwork, and gains related to their behaviour towards learning. Evidence from qualitative studies showed that teachers, students, and parents recognized the positive impact of ICT on students' learning regardless of their competence level (strong/weak students). Punie et al. ( 2006 ) documented studies that showed positive results of ICT-based learning for supporting low-achieving pupils and young people with complex lives outside the education system. Liao et al. ( 2007 ) reported moderate positive effects of computer application instruction (CAI, computer simulations, and web-based learning) over traditional instruction on primary school student's achievement. Similarly, Tamim et al. ( 2011 ) reported small to moderate positive effects between the use of computer technology (CAI, ICT, simulations, computer-based instruction, digital and hypermedia) and student achievement in formal face-to-face classrooms compared to classrooms that did not use technology. Jewitt et al., ( 2011 ) found that the use of learning platforms (LPs) (virtual learning environments, management information systems, communication technologies, and information- and resource-sharing technologies) in schools allowed primary and secondary students to access a wider variety of quality learning resources, engage in independent and personalized learning, and conduct self- and peer-review; LPs also provide opportunities for teacher assessment and feedback. Similar findings were reported by Fu ( 2013 ), who documented a list of benefits and opportunities of ICT use. According to the author, the use of ICTs helps students access digital information and course content effectively and efficiently, supports student-centered and self-directed learning, as well as the development of a creative learning environment where more opportunities for critical thinking skills are offered, and promotes collaborative learning in a distance-learning environment. Higgins et al. ( 2012 ) found consistent but small positive associations between the use of technology and learning outcomes of school-age learners (5–18-year-olds) in studies linking the provision and use of technology with attainment. Additionally, Chauhan ( 2017 ) reported a medium positive effect of technology on the learning effectiveness of primary school students compared to students who followed traditional learning instruction.

The rise of mobile technologies and hardware devices instigated investigations into their impact on teaching and learning. Sung et al. ( 2016 ) reported a moderate effect on students' performance from the use of mobile devices in the classroom compared to the use of desktop computers or the non-use of mobile devices. Schmid et al. ( 2014 ) reported medium–low to low positive effects of technology integration (e.g., CAI, ICTs) in the classroom on students' achievement and attitude compared to not using technology or using technology to varying degrees. Tamim et al. ( 2015 ) found a low statistically significant effect of the use of tablets and other smart devices in educational contexts on students' achievement outcomes. The authors suggested that tablets offered additional advantages to students; namely, they reported improvements in students’ notetaking, organizational and communication skills, and creativity. Zheng et al. ( 2016 ) reported a small positive effect of one-to-one laptop programs on students’ academic achievement across subject areas. Additional reported benefits included student-centered, individualized, and project-based learning enhanced learner engagement and enthusiasm. Additionally, the authors found that students using one-to-one laptop programs tended to use technology more frequently than in non-laptop classrooms, and as a result, they developed a range of skills (e.g., information skills, media skills, technology skills, organizational skills). Haßler et al. ( 2016 ) found that most interventions that included the use of tablets across the curriculum reported positive learning outcomes. However, from 23 studies, five reported no differences, and two reported a negative effect on students' learning outcomes. Similar results were indicated by Kalati and Kim ( 2022 ) who investigated the effect of touchscreen technologies on young students’ learning. Specifically, from 53 studies, 34 advocated positive effects of touchscreen devices on children’s learning, 17 obtained mixed findings and two studies reported negative effects.

More recently, approaches that refer to the impact of gamification with the use of digital technologies on teaching and learning were also explored. A review by Pan et al. ( 2022 ) that examined the role of learning games in fostering mathematics education in K-12 settings, reported that gameplay improved students’ performance. Integration of digital games in teaching was also found as a promising pedagogical practice in STEM education that could lead to increased learning gains (Martinez et al., 2022 ; Wang et al., 2022 ). However, although Talan et al. ( 2020 ) reported a medium effect of the use of educational games (both digital and non-digital) on academic achievement, the effect of non-digital games was higher.

Over the last two years, the effects of more advanced technologies on teaching and learning were also investigated. Garzón and Acevedo ( 2019 ) found that AR applications had a medium effect on students' learning outcomes compared to traditional lectures. Similarly, Garzón et al. ( 2020 ) showed that AR had a medium impact on students' learning gains. VR applications integrated into various subjects were also found to have a moderate effect on students’ learning compared to control conditions (traditional classes, e.g., lectures, textbooks, and multimedia use, e.g., images, videos, animation, CAI) (Chen et al., 2022b ). Villena-Taranilla et al. ( 2022 ) noted the moderate effect of VR technologies on students’ learning when these were applied in STEM disciplines. In the same meta-analysis, Villena-Taranilla et al. ( 2022 ) highlighted the role of immersive VR, since its effect on students’ learning was greater (at a high level) across educational levels (K-6) compared to semi-immersive and non-immersive integrations. In another meta-analysis study, the effect size of the immersive VR was small and significantly differentiated across educational levels (Coban et al., 2022 ). The impact of AI on education was investigated by Su and Yang ( 2022 ) and Su et al. ( 2022 ), who showed that this technology significantly improved students’ understanding of AI computer science and machine learning concepts.

It is worth noting that the vast majority of studies referred to learning gains in specific subjects. Specifically, several studies examined the impact of digital technologies on students’ literacy skills and reported positive effects on language learning (Balanskat et al., 2006 ; Grgurović et al., 2013 ; Friedel et al., 2013 ; Zheng et al., 2016 ; Chen et al., 2022b ; Savva et al., 2022 ). Also, several studies documented positive effects on specific language learning areas, namely foreign language learning (Kao, 2014 ), writing (Higgins et al., 2012 ; Wen & Walters, 2022 ; Zheng et al., 2016 ), as well as reading and comprehension (Cheung & Slavin, 2011 ; Liao et al., 2007 ; Schwabe et al., 2022 ). ICTs were also found to have a positive impact on students' performance in STEM (science, technology, engineering, and mathematics) disciplines (Arztmann et al., 2022 ; Bado, 2022 ; Villena-Taranilla et al., 2022 ; Wang et al., 2022 ). Specifically, a number of studies reported positive impacts on students’ achievement in mathematics (Balanskat et al., 2006 ; Hillmayr et al., 2020 ; Li & Ma, 2010 ; Pan et al., 2022 ; Ran et al., 2022 ; Verschaffel et al., 2019 ; Zheng et al., 2016 ). Furthermore, studies documented positive effects of ICTs on science learning (Balanskat et al., 2006 ; Liao et al., 2007 ; Zheng et al., 2016 ; Hillmayr et al., 2020 ; Kalemkuş & Kalemkuş, 2022 ; Lei et al., 2022a ). Çelik ( 2022 ) also noted that computer simulations can help students understand learning concepts related to science. Furthermore, some studies documented that the use of ICTs had a positive impact on students’ achievement in other subjects, such as geography, history, music, and arts (Chauhan, 2017 ; Condie & Munro, 2007 ), and design and technology (Balanskat et al., 2006 ).

More specific positive learning gains were reported in a number of skills, e.g., problem-solving skills and pattern exploration skills (Higgins et al., 2012 ), metacognitive learning outcomes (Verschaffel et al., 2019 ), literacy skills, computational thinking skills, emotion control skills, and collaborative inquiry skills (Lu et al., 2022 ; Su & Yang, 2022 ; Su et al., 2022 ). Additionally, several investigations have reported benefits from the use of ICT on students’ creativity (Fielding & Murcia, 2022 ; Liu et al., 2022 ; Quah & Ng, 2022 ). Lastly, digital technologies were also found to be beneficial for enhancing students’ lifelong learning skills (Haleem et al., 2022 ).

Apart from gaining knowledge and skills, studies also reported improvement in motivation and interest in mathematics (Higgins et. al., 2019 ; Fadda et al., 2022 ) and increased positive achievement emotions towards several subjects during interventions using educational games (Lei et al., 2022a ). Chen et al. ( 2022a ) also reported a small but positive effect of digital health approaches in bullying and cyberbullying interventions with K-12 students, demonstrating that technology-based approaches can help reduce bullying and related consequences by providing emotional support, empowerment, and change of attitude. In their meta-review study, Su et al. ( 2022 ) also documented that AI technologies effectively strengthened students’ attitudes towards learning. In another meta-analysis, Arztmann et al. ( 2022 ) reported positive effects of digital games on motivation and behaviour towards STEM subjects.

Impacts of digital technologies on equality, inclusion and social integration

Although most of the reviewed studies focused on the impact of ICTs on students’ knowledge, skills, and attitudes, reports were also made on other aspects in the school context, such as equality, inclusion, and social integration. Condie and Munro ( 2007 ) documented research interventions investigating how ICT can support pupils with additional or special educational needs. While those interventions were relatively small scale and mostly based on qualitative data, their findings indicated that the use of ICTs enabled the development of communication, participation, and self-esteem. A recent meta-analysis (Baragash et al., 2022 ) with 119 participants with different disabilities, reported a significant overall effect size of AR on their functional skills acquisition. Koh’s meta-analysis ( 2022 ) also revealed that students with intellectual and developmental disabilities improved their competence and performance when they used digital games in the lessons.

Istenic Starcic and Bagon ( 2014 ) found that the role of ICT in inclusion and the design of pedagogical and technological interventions was not sufficiently explored in educational interventions with people with special needs; however, some benefits of ICT use were found in students’ social integration. The issue of gender and technology use was mentioned in a small number of studies. Zheng et al. ( 2016 ) reported a statistically significant positive interaction between one-to-one laptop programs and gender. Specifically, the results showed that girls and boys alike benefitted from the laptop program, but the effect on girls’ achievement was smaller than that on boys’. Along the same lines, Arztmann et al. ( 2022 ) reported no difference in the impact of game-based learning between boys and girls, arguing that boys and girls equally benefited from game-based interventions in STEM domains. However, results from a systematic review by Cussó-Calabuig et al. ( 2018 ) found limited and low-quality evidence on the effects of intensive use of computers on gender differences in computer anxiety, self-efficacy, and self-confidence. Based on their view, intensive use of computers can reduce gender differences in some areas and not in others, depending on contextual and implementation factors.

Impacts of digital technologies on teachers’ professional and teaching practices

Various research studies have explored the impact of ICT on teachers’ instructional practices and student assessment. Friedel et al. ( 2013 ) found that the use of mobile devices by students enabled teachers to successfully deliver content (e.g., mobile serious games), provide scaffolding, and facilitate synchronous collaborative learning. The integration of digital games in teaching and learning activities also gave teachers the opportunity to study and apply various pedagogical practices (Bado, 2022 ). Specifically, Bado ( 2022 ) found that teachers who implemented instructional activities in three stages (pre-game, game, and post-game) maximized students’ learning outcomes and engagement. For instance, during the pre-game stage, teachers focused on lectures and gameplay training, at the game stage teachers provided scaffolding on content, addressed technical issues, and managed the classroom activities. During the post-game stage, teachers organized activities for debriefing to ensure that the gameplay had indeed enhanced students’ learning outcomes.

Furthermore, ICT can increase efficiency in lesson planning and preparation by offering possibilities for a more collaborative approach among teachers. The sharing of curriculum plans and the analysis of students’ data led to clearer target settings and improvements in reporting to parents (Balanskat et al., 2006 ).

Additionally, the use and application of digital technologies in teaching and learning were found to enhance teachers’ digital competence. Balanskat et al. ( 2006 ) documented studies that revealed that the use of digital technologies in education had a positive effect on teachers’ basic ICT skills. The greatest impact was found on teachers with enough experience in integrating ICTs in their teaching and/or who had recently participated in development courses for the pedagogical use of technologies in teaching. Punie et al. ( 2006 ) reported that the provision of fully equipped multimedia portable computers and the development of online teacher communities had positive impacts on teachers’ confidence and competence in the use of ICTs.

Moreover, online assessment via ICTs benefits instruction. In particular, online assessments support the digitalization of students’ work and related logistics, allow teachers to gather immediate feedback and readjust to new objectives, and support the improvement of the technical quality of tests by providing more accurate results. Additionally, the capabilities of ICTs (e.g., interactive media, simulations) create new potential methods of testing specific skills, such as problem-solving and problem-processing skills, meta-cognitive skills, creativity and communication skills, and the ability to work productively in groups (Punie et al., 2006 ).

Impacts of digital technologies on other school-related aspects and stakeholders

There is evidence that the effective use of ICTs and the data transmission offered by broadband connections help improve administration (Balanskat et al., 2006 ). Specifically, ICTs have been found to provide better management systems to schools that have data gathering procedures in place. Condie and Munro ( 2007 ) reported impacts from the use of ICTs in schools in the following areas: attendance monitoring, assessment records, reporting to parents, financial management, creation of repositories for learning resources, and sharing of information amongst staff. Such data can be used strategically for self-evaluation and monitoring purposes which in turn can result in school improvements. Additionally, they reported that online access to other people with similar roles helped to reduce headteachers’ isolation by offering them opportunities to share insights into the use of ICT in learning and teaching and how it could be used to support school improvement. Furthermore, ICTs provided more efficient and successful examination management procedures, namely less time-consuming reporting processes compared to paper-based examinations and smooth communications between schools and examination authorities through electronic data exchange (Punie et al., 2006 ).

Zheng et al. ( 2016 ) reported that the use of ICTs improved home-school relationships. Additionally, Escueta et al. ( 2017 ) reported several ICT programs that had improved the flow of information from the school to parents. Particularly, they documented that the use of ICTs (learning management systems, emails, dedicated websites, mobile phones) allowed for personalized and customized information exchange between schools and parents, such as attendance records, upcoming class assignments, school events, and students’ grades, which generated positive results on students’ learning outcomes and attainment. Such information exchange between schools and families prompted parents to encourage their children to put more effort into their schoolwork.

The above findings suggest that the impact of ICT integration in schools goes beyond students’ performance in school subjects. Specifically, it affects a number of school-related aspects, such as equality and social integration, professional and teaching practices, and diverse stakeholders. In Table ​ Table2, 2 , we summarize the different impacts of digital technologies on school stakeholders based on the literature review, while in Table ​ Table3 3 we organized the tools/platforms and practices/policies addressed in the meta-analyses, literature reviews, EU reports, and international bodies included in the manuscript.

The impact of digital technologies on schools’ stakeholders based on the literature review

ImpactsReferences
Students
  Knowledge, skills, attitudes, and emotions
    • Learning gains from the use of ICTs across the curriculumEng, ; Balanskat et al., ; Liao et al., ; Tamim et al., ; Higgins et al., ; Chauhan, ; Sung et al., ; Schmid et al., ; Tamim et al., ; Zheng et al., ; Haßler et al., ; Kalati & Kim, ; Martinez et al., ; Talan et al., ; Panet al., ; Garzón & Acevedo, ; Garzón et al., ; Villena-Taranilla, et al., ; Coban et al.,
    • Positive learning gains from the use of ICTs in specific school subjects (e.g., mathematics, literacy, language, science)Arztmann et al., ; Villena-Taranilla, et al., ; Chen et al., ; Balanskat et al., ; Grgurović, et al., ; Friedel et al., ; Zheng et al., ; Savva et al., ; Kao, ; Higgins et al., ; Wen & Walters, ; Liao et al., ; Cheung & Slavin, ; Schwabe et al., ; Li & Ma, ; Verschaffel et al., ; Ran et al., ; Liao et al., ; Hillmayr et al., ; Kalemkuş & Kalemkuş, ; Lei et al., ; Condie & Munro, ; Chauhan, ; Bado, ; Wang et al., ; Pan et al.,
    • Positive learning gains for special needs students and low-achieving studentsEng, ; Balanskat et al., ; Punie et al., ; Koh,
    • Oportunities to develop a range of skills (e.g., subject-related skills, communication skills, negotiation skills, emotion control skills, organizational skills, critical thinking skills, creativity, metacognitive skills, life, and career skills)Balanskat et al., ; Fu, ; Tamim et al., ; Zheng et al., ; Higgins et al., ; Verschaffel et al., ; Su & Yang, ; Su et al., ; Lu et al., ; Liu et al., ; Quah & Ng, ; Fielding & Murcia, ; Tang et al., ; Haleem et al.,
    • Oportunities to develop digital skills (e.g., information skills, media skills, ICT skills)Zheng et al., ; Su & Yang, ; Lu et al., ; Su et al.,
    • Positive attitudes and behaviours towards ICTs, positive emotions (e.g., increased interest, motivation, attention, engagement, confidence, reduced anxiety, positive achievement emotions, reduction in bullying and cyberbullying)Balanskat et al., ; Schmid et al., ; Zheng et al., ; Fadda et al., ; Higgins et al., ; Chen et al., ; Lei et al., ; Arztmann et al., ; Su et al.,
  Learning experience
    • Enhance access to resourcesJewitt et al., ; Fu,
    • Opportunities to experience various learning practices (e.g., active learning, learner-centred learning, independent and personalized learning, collaborative learning, self-directed learning, self- and peer-review)Jewitt et al., ; Fu,
    • Improved access to teacher assessment and feedbackJewitt et al.,
Equality, inclusion, and social integration
    • Improved communication, functional skills, participation, self-esteem, and engagement of special needs studentsCondie & Munro, ; Baragash et al., ; Koh,
    • Enhanced social interaction for students in general and for students with learning difficultiesIstenic Starcic & Bagon,
    • Benefits for both girls and boysZheng et al., ; Arztmann et al.,
Teachers
  Professional practice
    • Development of digital competenceBalanskat et al.,
    • Positive attitudes and behaviours towards ICTs (e.g., increased confidence)Punie et al., ,
    • Formalized collaborative planning between teachersBalanskat et al.,
    • Improved reporting to parentsBalanskat et al.,
Teaching practice
    • Efficiency in lesson planning and preparationBalanskat et al.,
    • Facilitate assessment through the provision of immediate feedbackPunie et al.,
    • Improvements in the technical quality of testsPunie et al.,
    • New methods of testing specific skills (e.g., problem-solving skills, meta-cognitive skills)Punie et al.,
    • Successful content delivery and lessonsFriedel et al.,
    • Application of different instructional practices (e.g., scaffolding, synchronous collaborative learning, online learning, blended learning, hybrid learning)Friedel et al., ; Bado, ; Kazu & Yalçin, ; Ulum,
Administrators
  Data-based decision-making
    • Improved data-gathering processesBalanskat et al.,
    • Support monitoring and evaluation processes (e.g., attendance monitoring, financial management, assessment records)Condie & Munro,
Organizational processes
    • Access to learning resources via the creation of repositoriesCondie & Munro,
    • Information sharing between school staffCondie & Munro,
    • Smooth communications with external authorities (e.g., examination results)Punie et al.,
    • Efficient and successful examination management proceduresPunie et al.,
  Home-school communication
    • Support reporting to parentsCondie & Munro,
    • Improved flow of communication between the school and parents (e.g., customized and personalized communications)Escueta et al.,
School leaders
  Professional practice
    • Reduced headteacher isolationCondie & Munro,
    • Improved access to insights about practices for school improvementCondie & Munro,
Parents
  Home-school relationships
    • Improved home-school relationshipsZheng et al.,
    • Increased parental involvement in children’s school lifeEscueta et al.,

Tools/platforms and practices/policies addressed in the meta-analyses, literature reviews, EU reports, and international bodies included in the manuscript

Technologies/tools/practices/policiesReferences
ICT general – various types of technologies

Eng, (review)

Moran et al., (meta-analysis)

Balanskat et al., (report)

Punie et al., (review)

Fu, (review)

Higgins et al., (report)

Chauhan, (meta-analysis)

Schmid et al., (meta-analysis)

Grgurović et al., (meta-analysis)

Higgins et al., (meta-analysis)

Wen & Walters, (meta-analysis)

Cheung & Slavin, (meta-analysis)

Li & Ma, (meta-analysis)

Hillmayr et al., (meta-analysis)

Verschaffel et al., (systematic review)

Ran et al., (meta-analysis)

Fielding & Murcia, (systematic review)

Tang et al., (review)

Haleem et al., (review)

Condie & Munro, (review)

Underwood, (review)

Istenic Starcic & Bagon, (review)

Cussó-Calabuig et al., (systematic review)

Escueta et al. ( ) (review)

Archer et al., (meta-analysis)

Lee et al., (meta-analysis)

Delgado et al., (review)

Di Pietro et al., (report)

Practices/policies on schools’ digital transformation

Bingimlas, (review)

Hardman, (review)

Hattie, (synthesis of multiple meta-analysis)

Trucano, (book-Knowledge maps)

Ređep, (policy study)

Conrads et al, (report)

European Commission, (EU report)

Elkordy & Lovinelli, (book chapter)

Eurydice, (EU report)

Vuorikari et al., (JRC paper)

Sellar, (review)

European Commission, (EU report)

OECD, (international paper)

Computer-assisted instruction, computer simulations, activeboards, and web-based learning

Liao et al., (meta-analysis)

Tamim et al., (meta-analysis)

Çelik, (review)

Moran et al., (meta-analysis)

Eng, (review)

Learning platforms (LPs) (virtual learning environments, management information systems, communication technologies and information and resource sharing technologies)Jewitt et al., (report)
Mobile devices—touch screens (smart devices, tablets, laptops)

Sung et al., (meta-analysis and research synthesis)

Tamim et al., (meta-analysis)

Tamim et al., (systematic review and meta-analysis)

Zheng et al., (meta-analysis and research synthesis)

Haßler et al., (review)

Kalati & Kim, (systematic review)

Friedel et al., (meta-analysis and review)

Chen et al., (meta-analysis)

Schwabe et al., (meta-analysis)

Punie et al., (review)

Digital games (various types e.g., adventure, serious; various domains e.g., history, science)

Wang et al., (meta-analysis)

Arztmann et al., (meta-analysis)

Martinez et al., (systematic review)

Talan et al., (meta-analysis)

Pan et al., (systematic review)

Chen et al., (meta-analysis)

Kao, (meta-analysis)

Fadda et al., (meta-analysis)

Lu et al., (meta-analysis)

Lei et al., (meta-analysis)

Koh, (meta-analysis)

Bado, (review)

Augmented reality (AR)

Garzón & Acevedo, (meta-analysis)

Garzón et al., (meta-analysis and research synthesis)

Kalemkuş & Kalemkuş, (meta-analysis)

Baragash et al., (meta-analysis)

Virtual reality (VR)

Immersive virtual reality (IVR)

Villena-Taranilla et al., (meta-analysis)

Chen et al., (meta-analysis)

Coban et al., (meta-analysis)

Artificial intelligence (AI) and robotics

Su & Yang, (review)

Su et al., (meta review)

Online learning/elearning

Ulum, (meta-analysis)

Cheok & Wong, (review)

Blended learningGrgurović et al., (meta-analysis)
Synchronous parallel participationFriedel et al., (meta-analysis and review)
Electronic books/digital storytelling

Savva et al., (meta-analysis)

Quah & Ng, (systematic review)

Multimedia technologyLiu et al., (meta-analysis)
Hybrid learningKazu & Yalçin, (meta-analysis)

Additionally, based on the results of the literature review, there are many types of digital technologies with different affordances (see, for example, studies on VR vs Immersive VR), which evolve over time (e.g. starting from CAIs in 2005 to Augmented and Virtual reality 2020). Furthermore, these technologies are linked to different pedagogies and policy initiatives, which are critical factors in the study of impact. Table ​ Table3 3 summarizes the different tools and practices that have been used to examine the impact of digital technologies on education since 2005 based on the review results.

Factors that affect the integration of digital technologies

Although the analysis of the literature review demonstrated different impacts of the use of digital technology on education, several authors highlighted the importance of various factors, besides the technology itself, that affect this impact. For example, Liao et al. ( 2007 ) suggested that future studies should carefully investigate which factors contribute to positive outcomes by clarifying the exact relationship between computer applications and learning. Additionally, Haßler et al., ( 2016 ) suggested that the neutral findings regarding the impact of tablets on students learning outcomes in some of the studies included in their review should encourage educators, school leaders, and school officials to further investigate the potential of such devices in teaching and learning. Several other researchers suggested that a number of variables play a significant role in the impact of ICTs on students’ learning that could be attributed to the school context, teaching practices and professional development, the curriculum, and learners’ characteristics (Underwood, 2009 ; Tamim et al., 2011 ; Higgins et al., 2012 ; Archer et al., 2014 ; Sung et al., 2016 ; Haßler et al., 2016 ; Chauhan, 2017 ; Lee et al., 2020 ; Tang et al., 2022 ).

Digital competencies

One of the most common challenges reported in studies that utilized digital tools in the classroom was the lack of students’ skills on how to use them. Fu ( 2013 ) found that students’ lack of technical skills is a barrier to the effective use of ICT in the classroom. Tamim et al. ( 2015 ) reported that students faced challenges when using tablets and smart mobile devices, associated with the technical issues or expertise needed for their use and the distracting nature of the devices and highlighted the need for teachers’ professional development. Higgins et al. ( 2012 ) reported that skills training about the use of digital technologies is essential for learners to fully exploit the benefits of instruction.

Delgado et al. ( 2015 ), meanwhile, reported studies that showed a strong positive association between teachers’ computer skills and students’ use of computers. Teachers’ lack of ICT skills and familiarization with technologies can become a constraint to the effective use of technology in the classroom (Balanskat et al., 2006 ; Delgado et al., 2015 ).

It is worth noting that the way teachers are introduced to ICTs affects the impact of digital technologies on education. Previous studies have shown that teachers may avoid using digital technologies due to limited digital skills (Balanskat, 2006 ), or they prefer applying “safe” technologies, namely technologies that their own teachers used and with which they are familiar (Condie & Munro, 2007 ). In this regard, the provision of digital skills training and exposure to new digital tools might encourage teachers to apply various technologies in their lessons (Condie & Munro, 2007 ). Apart from digital competence, technical support in the school setting has also been shown to affect teachers’ use of technology in their classrooms (Delgado et al., 2015 ). Ferrari et al. ( 2011 ) found that while teachers’ use of ICT is high, 75% stated that they needed more institutional support and a shift in the mindset of educational actors to achieve more innovative teaching practices. The provision of support can reduce time and effort as well as cognitive constraints, which could cause limited ICT integration in the school lessons by teachers (Escueta et al., 2017 ).

Teachers’ personal characteristics, training approaches, and professional development

Teachers’ personal characteristics and professional development affect the impact of digital technologies on education. Specifically, Cheok and Wong ( 2015 ) found that teachers’ personal characteristics (e.g., anxiety, self-efficacy) are associated with their satisfaction and engagement with technology. Bingimlas ( 2009 ) reported that lack of confidence, resistance to change, and negative attitudes in using new technologies in teaching are significant determinants of teachers’ levels of engagement in ICT. The same author reported that the provision of technical support, motivation support (e.g., awards, sufficient time for planning), and training on how technologies can benefit teaching and learning can eliminate the above barriers to ICT integration. Archer et al. ( 2014 ) found that comfort levels in using technology are an important predictor of technology integration and argued that it is essential to provide teachers with appropriate training and ongoing support until they are comfortable with using ICTs in the classroom. Hillmayr et al. ( 2020 ) documented that training teachers on ICT had an important effecton students’ learning.

According to Balanskat et al. ( 2006 ), the impact of ICTs on students’ learning is highly dependent on the teachers’ capacity to efficiently exploit their application for pedagogical purposes. Results obtained from the Teaching and Learning International Survey (TALIS) (OECD, 2021 ) revealed that although schools are open to innovative practices and have the capacity to adopt them, only 39% of teachers in the European Union reported that they are well or very well prepared to use digital technologies for teaching. Li and Ma ( 2010 ) and Hardman ( 2019 ) showed that the positive effect of technology on students’ achievement depends on the pedagogical practices used by teachers. Schmid et al. ( 2014 ) reported that learning was best supported when students were engaged in active, meaningful activities with the use of technological tools that provided cognitive support. Tamim et al. ( 2015 ) compared two different pedagogical uses of tablets and found a significant moderate effect when the devices were used in a student-centered context and approach rather than within teacher-led environments. Similarly, Garzón and Acevedo ( 2019 ) and Garzón et al. ( 2020 ) reported that the positive results from the integration of AR applications could be attributed to the existence of different variables which could influence AR interventions (e.g., pedagogical approach, learning environment, and duration of the intervention). Additionally, Garzón et al. ( 2020 ) suggested that the pedagogical resources that teachers used to complement their lectures and the pedagogical approaches they applied were crucial to the effective integration of AR on students’ learning gains. Garzón and Acevedo ( 2019 ) also emphasized that the success of a technology-enhanced intervention is based on both the technology per se and its characteristics and on the pedagogical strategies teachers choose to implement. For instance, their results indicated that the collaborative learning approach had the highest impact on students’ learning gains among other approaches (e.g., inquiry-based learning, situated learning, or project-based learning). Ran et al. ( 2022 ) also found that the use of technology to design collaborative and communicative environments showed the largest moderator effects among the other approaches.

Hattie ( 2008 ) reported that the effective use of computers is associated with training teachers in using computers as a teaching and learning tool. Zheng et al. ( 2016 ) noted that in addition to the strategies teachers adopt in teaching, ongoing professional development is also vital in ensuring the success of technology implementation programs. Sung et al. ( 2016 ) found that research on the use of mobile devices to support learning tends to report that the insufficient preparation of teachers is a major obstacle in implementing effective mobile learning programs in schools. Friedel et al. ( 2013 ) found that providing training and support to teachers increased the positive impact of the interventions on students’ learning gains. Trucano ( 2005 ) argued that positive impacts occur when digital technologies are used to enhance teachers’ existing pedagogical philosophies. Higgins et al. ( 2012 ) found that the types of technologies used and how they are used could also affect students’ learning. The authors suggested that training and professional development of teachers that focuses on the effective pedagogical use of technology to support teaching and learning is an important component of successful instructional approaches (Higgins et al., 2012 ). Archer et al. ( 2014 ) found that studies that reported ICT interventions during which teachers received training and support had moderate positive effects on students’ learning outcomes, which were significantly higher than studies where little or no detail about training and support was mentioned. Fu ( 2013 ) reported that the lack of teachers’ knowledge and skills on the technical and instructional aspects of ICT use in the classroom, in-service training, pedagogy support, technical and financial support, as well as the lack of teachers’ motivation and encouragement to integrate ICT on their teaching were significant barriers to the integration of ICT in education.

School leadership and management

Management and leadership are important cornerstones in the digital transformation process (Pihir et al., 2018 ). Zheng et al. ( 2016 ) documented leadership among the factors positively affecting the successful implementation of technology integration in schools. Strong leadership, strategic planning, and systematic integration of digital technologies are prerequisites for the digital transformation of education systems (Ređep, 2021 ). Management and leadership play a significant role in formulating policies that are translated into practice and ensure that developments in ICT become embedded into the life of the school and in the experiences of staff and pupils (Condie & Munro, 2007 ). Policy support and leadership must include the provision of an overall vision for the use of digital technologies in education, guidance for students and parents, logistical support, as well as teacher training (Conrads et al., 2017 ). Unless there is a commitment throughout the school, with accountability for progress at key points, it is unlikely for ICT integration to be sustained or become part of the culture (Condie & Munro, 2007 ). To achieve this, principals need to adopt and promote a whole-institution strategy and build a strong mutual support system that enables the school’s technological maturity (European Commission, 2019 ). In this context, school culture plays an essential role in shaping the mindsets and beliefs of school actors towards successful technology integration. Condie and Munro ( 2007 ) emphasized the importance of the principal’s enthusiasm and work as a source of inspiration for the school staff and the students to cultivate a culture of innovation and establish sustainable digital change. Specifically, school leaders need to create conditions in which the school staff is empowered to experiment and take risks with technology (Elkordy & Lovinelli, 2020 ).

In order for leaders to achieve the above, it is important to develop capacities for learning and leading, advocating professional learning, and creating support systems and structures (European Commission, 2019 ). Digital technology integration in education systems can be challenging and leadership needs guidance to achieve it. Such guidance can be introduced through the adoption of new methods and techniques in strategic planning for the integration of digital technologies (Ređep, 2021 ). Even though the role of leaders is vital, the relevant training offered to them has so far been inadequate. Specifically, only a third of the education systems in Europe have put in place national strategies that explicitly refer to the training of school principals (European Commission, 2019 , p. 16).

Connectivity, infrastructure, and government and other support

The effective integration of digital technologies across levels of education presupposes the development of infrastructure, the provision of digital content, and the selection of proper resources (Voogt et al., 2013 ). Particularly, a high-quality broadband connection in the school increases the quality and quantity of educational activities. There is evidence that ICT increases and formalizes cooperative planning between teachers and cooperation with managers, which in turn has a positive impact on teaching practices (Balanskat et al., 2006 ). Additionally, ICT resources, including software and hardware, increase the likelihood of teachers integrating technology into the curriculum to enhance their teaching practices (Delgado et al., 2015 ). For example, Zheng et al. ( 2016 ) found that the use of one-on-one laptop programs resulted in positive changes in teaching and learning, which would not have been accomplished without the infrastructure and technical support provided to teachers. Delgado et al. ( 2015 ) reported that limited access to technology (insufficient computers, peripherals, and software) and lack of technical support are important barriers to ICT integration. Access to infrastructure refers not only to the availability of technology in a school but also to the provision of a proper amount and the right types of technology in locations where teachers and students can use them. Effective technical support is a central element of the whole-school strategy for ICT (Underwood, 2009 ). Bingimlas ( 2009 ) reported that lack of technical support in the classroom and whole-school resources (e.g., failing to connect to the Internet, printers not printing, malfunctioning computers, and working on old computers) are significant barriers that discourage the use of ICT by teachers. Moreover, poor quality and inadequate hardware maintenance, and unsuitable educational software may discourage teachers from using ICTs (Balanskat et al., 2006 ; Bingimlas, 2009 ).

Government support can also impact the integration of ICTs in teaching. Specifically, Balanskat et al. ( 2006 ) reported that government interventions and training programs increased teachers’ enthusiasm and positive attitudes towards ICT and led to the routine use of embedded ICT.

Lastly, another important factor affecting digital transformation is the development and quality assurance of digital learning resources. Such resources can be support textbooks and related materials or resources that focus on specific subjects or parts of the curriculum. Policies on the provision of digital learning resources are essential for schools and can be achieved through various actions. For example, some countries are financing web portals that become repositories, enabling teachers to share resources or create their own. Additionally, they may offer e-learning opportunities or other services linked to digital education. In other cases, specific agencies of projects have also been set up to develop digital resources (Eurydice, 2019 ).

Administration and digital data management

The digital transformation of schools involves organizational improvements at the level of internal workflows, communication between the different stakeholders, and potential for collaboration. Vuorikari et al. ( 2020 ) presented evidence that digital technologies supported the automation of administrative practices in schools and reduced the administration’s workload. There is evidence that digital data affects the production of knowledge about schools and has the power to transform how schooling takes place. Specifically, Sellar ( 2015 ) reported that data infrastructure in education is developing due to the demand for “ information about student outcomes, teacher quality, school performance, and adult skills, associated with policy efforts to increase human capital and productivity practices ” (p. 771). In this regard, practices, such as datafication which refers to the “ translation of information about all kinds of things and processes into quantified formats” have become essential for decision-making based on accountability reports about the school’s quality. The data could be turned into deep insights about education or training incorporating ICTs. For example, measuring students’ online engagement with the learning material and drawing meaningful conclusions can allow teachers to improve their educational interventions (Vuorikari et al., 2020 ).

Students’ socioeconomic background and family support

Research show that the active engagement of parents in the school and their support for the school’s work can make a difference to their children’s attitudes towards learning and, as a result, their achievement (Hattie, 2008 ). In recent years, digital technologies have been used for more effective communication between school and family (Escueta et al., 2017 ). The European Commission ( 2020 ) presented data from a Eurostat survey regarding the use of computers by students during the pandemic. The data showed that younger pupils needed additional support and guidance from parents and the challenges were greater for families in which parents had lower levels of education and little to no digital skills.

In this regard, the socio-economic background of the learners and their socio-cultural environment also affect educational achievements (Punie et al., 2006 ). Trucano documented that the use of computers at home positively influenced students’ confidence and resulted in more frequent use at school, compared to students who had no home access (Trucano, 2005 ). In this sense, the socio-economic background affects the access to computers at home (OECD, 2015 ) which in turn influences the experience of ICT, an important factor for school achievement (Punie et al., 2006 ; Underwood, 2009 ). Furthermore, parents from different socio-economic backgrounds may have different abilities and availability to support their children in their learning process (Di Pietro et al., 2020 ).

Schools’ socioeconomic context and emergency situations

The socio-economic context of the school is closely related to a school’s digital transformation. For example, schools in disadvantaged, rural, or deprived areas are likely to lack the digital capacity and infrastructure required to adapt to the use of digital technologies during emergency periods, such as the COVID-19 pandemic (Di Pietro et al., 2020 ). Data collected from school principals confirmed that in several countries, there is a rural/urban divide in connectivity (OECD, 2015 ).

Emergency periods also affect the digitalization of schools. The COVID-19 pandemic led to the closure of schools and forced them to seek appropriate and connective ways to keep working on the curriculum (Di Pietro et al., 2020 ). The sudden large-scale shift to distance and online teaching and learning also presented challenges around quality and equity in education, such as the risk of increased inequalities in learning, digital, and social, as well as teachers facing difficulties coping with this demanding situation (European Commission, 2020 ).

Looking at the findings of the above studies, we can conclude that the impact of digital technologies on education is influenced by various actors and touches many aspects of the school ecosystem. Figure  1 summarizes the factors affecting the digital technologies’ impact on school stakeholders based on the findings from the literature review.

An external file that holds a picture, illustration, etc.
Object name is 10639_2022_11431_Fig1_HTML.jpg

Factors that affect the impact of ICTs on education

The findings revealed that the use of digital technologies in education affects a variety of actors within a school’s ecosystem. First, we observed that as technologies evolve, so does the interest of the research community to apply them to school settings. Figure  2 summarizes the trends identified in current research around the impact of digital technologies on schools’ digital capacity and transformation as found in the present study. Starting as early as 2005, when computers, simulations, and interactive boards were the most commonly applied tools in school interventions (e.g., Eng, 2005 ; Liao et al., 2007 ; Moran et al., 2008 ; Tamim et al., 2011 ), moving towards the use of learning platforms (Jewitt et al., 2011 ), then to the use of mobile devices and digital games (e.g., Tamim et al., 2015 ; Sung et al., 2016 ; Talan et al., 2020 ), as well as e-books (e.g., Savva et al., 2022 ), to the more recent advanced technologies, such as AR and VR applications (e.g., Garzón & Acevedo, 2019 ; Garzón et al., 2020 ; Kalemkuş & Kalemkuş, 2022 ), or robotics and AI (e.g., Su & Yang, 2022 ; Su et al., 2022 ). As this evolution shows, digital technologies are a concept in flux with different affordances and characteristics. Additionally, from an instructional perspective, there has been a growing interest in different modes and models of content delivery such as online, blended, and hybrid modes (e.g., Cheok & Wong, 2015 ; Kazu & Yalçin, 2022 ; Ulum, 2022 ). This is an indication that the value of technologies to support teaching and learning as well as other school-related practices is increasingly recognized by the research and school community. The impact results from the literature review indicate that ICT integration on students’ learning outcomes has effects that are small (Coban et al., 2022 ; Eng, 2005 ; Higgins et al., 2012 ; Schmid et al., 2014 ; Tamim et al., 2015 ; Zheng et al., 2016 ) to moderate (Garzón & Acevedo, 2019 ; Garzón et al., 2020 ; Liao et al., 2007 ; Sung et al., 2016 ; Talan et al., 2020 ; Wen & Walters, 2022 ). That said, a number of recent studies have reported high effect sizes (e.g., Kazu & Yalçin, 2022 ).

An external file that holds a picture, illustration, etc.
Object name is 10639_2022_11431_Fig2_HTML.jpg

Current work and trends in the study of the impact of digital technologies on schools’ digital capacity

Based on these findings, several authors have suggested that the impact of technology on education depends on several variables and not on the technology per se (Tamim et al., 2011 ; Higgins et al., 2012 ; Archer et al., 2014 ; Sung et al., 2016 ; Haßler et al., 2016 ; Chauhan, 2017 ; Lee et al., 2020 ; Lei et al., 2022a ). While the impact of ICTs on student achievement has been thoroughly investigated by researchers, other aspects related to school life that are also affected by ICTs, such as equality, inclusion, and social integration have received less attention. Further analysis of the literature review has revealed a greater investment in ICT interventions to support learning and teaching in the core subjects of literacy and STEM disciplines, especially mathematics, and science. These were the most common subjects studied in the reviewed papers often drawing on national testing results, while studies that investigated other subject areas, such as social studies, were limited (Chauhan, 2017 ; Condie & Munro, 2007 ). As such, research is still lacking impact studies that focus on the effects of ICTs on a range of curriculum subjects.

The qualitative research provided additional information about the impact of digital technologies on education, documenting positive effects and giving more details about implications, recommendations, and future research directions. Specifically, the findings regarding the role of ICTs in supporting learning highlight the importance of teachers’ instructional practice and the learning context in the use of technologies and consequently their impact on instruction (Çelik, 2022 ; Schmid et al., 2014 ; Tamim et al., 2015 ). The review also provided useful insights regarding the various factors that affect the impact of digital technologies on education. These factors are interconnected and play a vital role in the transformation process. Specifically, these factors include a) digital competencies; b) teachers’ personal characteristics and professional development; c) school leadership and management; d) connectivity, infrastructure, and government support; e) administration and data management practices; f) students’ socio-economic background and family support and g) the socioeconomic context of the school and emergency situations. It is worth noting that we observed factors that affect the integration of ICTs in education but may also be affected by it. For example, the frequent use of ICTs and the use of laptops by students for instructional purposes positively affect the development of digital competencies (Zheng et al., 2016 ) and at the same time, the digital competencies affect the use of ICTs (Fu, 2013 ; Higgins et al., 2012 ). As a result, the impact of digital technologies should be explored more as an enabler of desirable and new practices and not merely as a catalyst that improves the output of the education process i.e. namely student attainment.

Conclusions

Digital technologies offer immense potential for fundamental improvement in schools. However, investment in ICT infrastructure and professional development to improve school education are yet to provide fruitful results. Digital transformation is a complex process that requires large-scale transformative changes that presuppose digital capacity and preparedness. To achieve such changes, all actors within the school’s ecosystem need to share a common vision regarding the integration of ICTs in education and work towards achieving this goal. Our literature review, which synthesized quantitative and qualitative data from a list of meta-analyses and review studies, provided useful insights into the impact of ICTs on different school stakeholders and showed that the impact of digital technologies touches upon many different aspects of school life, which are often overlooked when the focus is on student achievement as the final output of education. Furthermore, the concept of digital technologies is a concept in flux as technologies are not only different among them calling for different uses in the educational practice but they also change through time. Additionally, we opened a forum for discussion regarding the factors that affect a school’s digital capacity and transformation. We hope that our study will inform policy, practice, and research and result in a paradigm shift towards more holistic approaches in impact and assessment studies.

Study limitations and future directions

We presented a review of the study of digital technologies' impact on education and factors influencing schools’ digital capacity and transformation. The study results were based on a non-systematic literature review grounded on the acquisition of documentation in specific databases. Future studies should investigate more databases to corroborate and enhance our results. Moreover, search queries could be enhanced with key terms that could provide additional insights about the integration of ICTs in education, such as “policies and strategies for ICT integration in education”. Also, the study drew information from meta-analyses and literature reviews to acquire evidence about the effects of ICT integration in schools. Such evidence was mostly based on the general conclusions of the studies. It is worth mentioning that, we located individual studies which showed different, such as negative or neutral results. Thus, further insights are needed about the impact of ICTs on education and the factors influencing the impact. Furthermore, the nature of the studies included in meta-analyses and reviews is different as they are based on different research methodologies and data gathering processes. For instance, in a meta-analysis, the impact among the studies investigated is measured in a particular way, depending on policy or research targets (e.g., results from national examinations, pre-/post-tests). Meanwhile, in literature reviews, qualitative studies offer additional insights and detail based on self-reports and research opinions on several different aspects and stakeholders who could affect and be affected by ICT integration. As a result, it was challenging to draw causal relationships between so many interrelating variables.

Despite the challenges mentioned above, this study envisaged examining school units as ecosystems that consist of several actors by bringing together several variables from different research epistemologies to provide an understanding of the integration of ICTs. However, the use of other tools and methodologies and models for evaluation of the impact of digital technologies on education could give more detailed data and more accurate results. For instance, self-reflection tools, like SELFIE—developed on the DigCompOrg framework- (Kampylis et al., 2015 ; Bocconi & Lightfoot, 2021 ) can help capture a school’s digital capacity and better assess the impact of ICTs on education. Furthermore, the development of a theory of change could be a good approach for documenting the impact of digital technologies on education. Specifically, theories of change are models used for the evaluation of interventions and their impact; they are developed to describe how interventions will work and give the desired outcomes (Mayne, 2015 ). Theory of change as a methodological approach has also been used by researchers to develop models for evaluation in the field of education (e.g., Aromatario et al., 2019 ; Chapman & Sammons, 2013 ; De Silva et al., 2014 ).

We also propose that future studies aim at similar investigations by applying more holistic approaches for impact assessment that can provide in-depth data about the impact of digital technologies on education. For instance, future studies could focus on different research questions about the technologies that are used during the interventions or the way the implementation takes place (e.g., What methodologies are used for documenting impact? How are experimental studies implemented? How can teachers be taken into account and trained on the technology and its functions? What are the elements of an appropriate and successful implementation? How is the whole intervention designed? On which learning theories is the technology implementation based?).

Future research could also focus on assessing the impact of digital technologies on various other subjects since there is a scarcity of research related to particular subjects, such as geography, history, arts, music, and design and technology. More research should also be done about the impact of ICTs on skills, emotions, and attitudes, and on equality, inclusion, social interaction, and special needs education. There is also a need for more research about the impact of ICTs on administration, management, digitalization, and home-school relationships. Additionally, although new forms of teaching and learning with the use of ICTs (e.g., blended, hybrid, and online learning) have initiated several investigations in mainstream classrooms, only a few studies have measured their impact on students’ learning. Additionally, our review did not document any study about the impact of flipped classrooms on K-12 education. Regarding teaching and learning approaches, it is worth noting that studies referred to STEM or STEAM did not investigate the impact of STEM/STEAM as an interdisciplinary approach to learning but only investigated the impact of ICTs on learning in each domain as a separate subject (science, technology, engineering, arts, mathematics). Hence, we propose future research to also investigate the impact of the STEM/STEAM approach on education. The impact of emerging technologies on education, such as AR, VR, robotics, and AI has also been investigated recently, but more work needs to be done.

Finally, we propose that future studies could focus on the way in which specific factors, e.g., infrastructure and government support, school leadership and management, students’ and teachers’ digital competencies, approaches teachers utilize in the teaching and learning (e.g., blended, online and hybrid learning, flipped classrooms, STEM/STEAM approach, project-based learning, inquiry-based learning), affect the impact of digital technologies on education. We hope that future studies will give detailed insights into the concept of schools’ digital transformation through further investigation of impacts and factors which influence digital capacity and transformation based on the results and the recommendations of the present study.

Acknowledgements

This project has received funding under Grant Agreement No Ref Ares (2021) 339036 7483039 as well as funding from the European Union’s Horizon 2020 Research and Innovation Program under Grant Agreement No 739578 and the Government of the Republic of Cyprus through the Deputy Ministry of Research, Innovation and Digital Policy. The UVa co-authors would like also to acknowledge funding from the European Regional Development Fund and the National Research Agency of the Spanish Ministry of Science and Innovation, under project grant PID2020-112584RB-C32.

Data availability statement

Declarations.

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

  • Archer K, Savage R, Sanghera-Sidhu S, Wood E, Gottardo A, Chen V. Examining the effectiveness of technology use in classrooms: A tertiary meta-analysis. Computers & Education. 2014; 78 :140–149. doi: 10.1016/j.compedu.2014.06.001. [ CrossRef ] [ Google Scholar ]
  • Aromatario O, Van Hoye A, Vuillemin A, Foucaut AM, Pommier J, Cambon L. Using theory of change to develop an intervention theory for designing and evaluating behavior change SDApps for healthy eating and physical exercise: The OCAPREV theory. BMC Public Health. 2019; 19 (1):1–12. doi: 10.1186/s12889-019-7828-4. [ PMC free article ] [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Arztmann, M., Hornstra, L., Jeuring, J., & Kester, L. (2022). Effects of games in STEM education: A meta-analysis on the moderating role of student background characteristics. Studies in Science Education , 1-37. 10.1080/03057267.2022.2057732
  • Bado N. Game-based learning pedagogy: A review of the literature. Interactive Learning Environments. 2022; 30 (5):936–948. doi: 10.1080/10494820.2019.1683587. [ CrossRef ] [ Google Scholar ]
  • Balanskat, A. (2009). Study of the impact of technology in primary schools – Synthesis Report. Empirica and European Schoolnet. Retrieved 30 June 2022 from: https://erte.dge.mec.pt/sites/default/files/Recursos/Estudos/synthesis_report_steps_en.pdf
  • Balanskat, A. (2006). The ICT Impact Report: A review of studies of ICT impact on schools in Europe, European Schoolnet. Retrieved 30 June 2022 from:  https://en.unesco.org/icted/content/ict-impact-report-review-studies-ict-impact-schools-europe
  • Balanskat, A., Blamire, R., & Kefala, S. (2006). The ICT impact report.  European Schoolnet . Retrieved from: http://colccti.colfinder.org/sites/default/files/ict_impact_report_0.pdf
  • Balyer, A., & Öz, Ö. (2018). Academicians’ views on digital transformation in education. International Online Journal of Education and Teaching (IOJET), 5 (4), 809–830. Retrieved 30 June 2022 from  http://iojet.org/index.php/IOJET/article/view/441/295
  • Baragash RS, Al-Samarraie H, Moody L, Zaqout F. Augmented reality and functional skills acquisition among individuals with special needs: A meta-analysis of group design studies. Journal of Special Education Technology. 2022; 37 (1):74–81. doi: 10.1177/0162643420910413. [ CrossRef ] [ Google Scholar ]
  • Bates, A. W. (2015). Teaching in a digital age: Guidelines for designing teaching and learning . Open Educational Resources Collection . 6. Retrieved 30 June 2022 from: https://irl.umsl.edu/oer/6
  • Bingimlas KA. Barriers to the successful integration of ICT in teaching and learning environments: A review of the literature. Eurasia Journal of Mathematics, Science and Technology Education. 2009; 5 (3):235–245. doi: 10.12973/ejmste/75275. [ CrossRef ] [ Google Scholar ]
  • Blaskó Z, Costa PD, Schnepf SV. Learning losses and educational inequalities in Europe: Mapping the potential consequences of the COVID-19 crisis. Journal of European Social Policy. 2022; 32 (4):361–375. doi: 10.1177/09589287221091687. [ CrossRef ] [ Google Scholar ]
  • Bocconi S, Lightfoot M. Scaling up and integrating the selfie tool for schools' digital capacity in education and training systems: Methodology and lessons learnt. European Training Foundation. 2021 doi: 10.2816/907029,JRC123936. [ CrossRef ] [ Google Scholar ]
  • Brooks, D. C., & McCormack, M. (2020). Driving Digital Transformation in Higher Education . Retrieved 30 June 2022 from: https://library.educause.edu/-/media/files/library/2020/6/dx2020.pdf?la=en&hash=28FB8C377B59AFB1855C225BBA8E3CFBB0A271DA
  • Cachia, R., Chaudron, S., Di Gioia, R., Velicu, A., & Vuorikari, R. (2021). Emergency remote schooling during COVID-19, a closer look at European families. Retrieved 30 June 2022 from  https://publications.jrc.ec.europa.eu/repository/handle/JRC125787
  • Çelik B. The effects of computer simulations on students’ science process skills: Literature review. Canadian Journal of Educational and Social Studies. 2022; 2 (1):16–28. doi: 10.53103/cjess.v2i1.17. [ CrossRef ] [ Google Scholar ]
  • Chapman, C., & Sammons, P. (2013). School Self-Evaluation for School Improvement: What Works and Why? . CfBT Education Trust. 60 Queens Road, Reading, RG1 4BS, England.
  • Chauhan S. A meta-analysis of the impact of technology on learning effectiveness of elementary students. Computers & Education. 2017; 105 :14–30. doi: 10.1016/j.compedu.2016.11.005. [ CrossRef ] [ Google Scholar ]
  • Chen, Q., Chan, K. L., Guo, S., Chen, M., Lo, C. K. M., & Ip, P. (2022a). Effectiveness of digital health interventions in reducing bullying and cyberbullying: a meta-analysis. Trauma, Violence, & Abuse , 15248380221082090. 10.1177/15248380221082090 [ PubMed ]
  • Chen B, Wang Y, Wang L. The effects of virtual reality-assisted language learning: A meta-analysis. Sustainability. 2022; 14 (6):3147. doi: 10.3390/su14063147. [ CrossRef ] [ Google Scholar ]
  • Cheok ML, Wong SL. Predictors of e-learning satisfaction in teaching and learning for school teachers: A literature review. International Journal of Instruction. 2015; 8 (1):75–90. doi: 10.12973/iji.2015.816a. [ CrossRef ] [ Google Scholar ]
  • Cheung, A. C., & Slavin, R. E. (2011). The Effectiveness of Education Technology for Enhancing Reading Achievement: A Meta-Analysis. Center for Research and reform in Education .
  • Coban, M., Bolat, Y. I., & Goksu, I. (2022). The potential of immersive virtual reality to enhance learning: A meta-analysis. Educational Research Review , 100452. 10.1016/j.edurev.2022.100452
  • Condie, R., & Munro, R. K. (2007). The impact of ICT in schools-a landscape review. Retrieved 30 June 2022 from: https://oei.org.ar/ibertic/evaluacion/sites/default/files/biblioteca/33_impact_ict_in_schools.pdf
  • Conrads, J., Rasmussen, M., Winters, N., Geniet, A., Langer, L., (2017). Digital Education Policies in Europe and Beyond: Key Design Principles for More Effective Policies. Redecker, C., P. Kampylis, M. Bacigalupo, Y. Punie (ed.), EUR 29000 EN, Publications Office of the European Union, Luxembourg, 10.2760/462941
  • Costa P, Castaño-Muñoz J, Kampylis P. Capturing schools’ digital capacity: Psychometric analyses of the SELFIE self-reflection tool. Computers & Education. 2021; 162 :104080. doi: 10.1016/j.compedu.2020.104080. [ CrossRef ] [ Google Scholar ]
  • Cussó-Calabuig R, Farran XC, Bosch-Capblanch X. Effects of intensive use of computers in secondary school on gender differences in attitudes towards ICT: A systematic review. Education and Information Technologies. 2018; 23 (5):2111–2139. doi: 10.1007/s10639-018-9706-6. [ CrossRef ] [ Google Scholar ]
  • Daniel SJ. Education and the COVID-19 pandemic. Prospects. 2020; 49 (1):91–96. doi: 10.1007/s11125-020-09464-3. [ PMC free article ] [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Delcker J, Ifenthaler D. Teachers’ perspective on school development at German vocational schools during the Covid-19 pandemic. Technology, Pedagogy and Education. 2021; 30 (1):125–139. doi: 10.1080/1475939X.2020.1857826. [ CrossRef ] [ Google Scholar ]
  • Delgado, A., Wardlow, L., O’Malley, K., & McKnight, K. (2015). Educational technology: A review of the integration, resources, and effectiveness of technology in K-12 classrooms. Journal of Information Technology Education Research , 14, 397. Retrieved 30 June 2022 from  http://www.jite.org/documents/Vol14/JITEv14ResearchP397-416Delgado1829.pdf
  • De Silva MJ, Breuer E, Lee L, Asher L, Chowdhary N, Lund C, Patel V. Theory of change: A theory-driven approach to enhance the Medical Research Council's framework for complex interventions. Trials. 2014; 15 (1):1–13. doi: 10.1186/1745-6215-15-267. [ PMC free article ] [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Di Pietro G, Biagi F, Costa P, Karpiński Z, Mazza J. The likely impact of COVID-19 on education: Reflections based on the existing literature and recent international datasets. Publications Office of the European Union; 2020. [ Google Scholar ]
  • Elkordy A, Lovinelli J. Competencies, Culture, and Change: A Model for Digital Transformation in K12 Educational Contexts. In: Ifenthaler D, Hofhues S, Egloffstein M, Helbig C, editors. Digital Transformation of Learning Organizations. Springer; 2020. pp. 203–219. [ Google Scholar ]
  • Eng TS. The impact of ICT on learning: A review of research. International Education Journal. 2005; 6 (5):635–650. [ Google Scholar ]
  • European Commission. (2020). Digital Education Action Plan 2021 – 2027. Resetting education and training for the digital age. Retrieved 30 June 2022 from  https://ec.europa.eu/education/sites/default/files/document-library-docs/deap-communication-sept2020_en.pdf
  • European Commission. (2019). 2 nd survey of schools: ICT in education. Objective 1: Benchmark progress in ICT in schools . Retrieved 30 June 2022 from: https://data.europa.eu/euodp/data/storage/f/2019-03-19T084831/FinalreportObjective1-BenchmarkprogressinICTinschools.pdf
  • Eurydice. (2019). Digital Education at School in Europe , Luxembourg: Publications Office of the European Union. Retrieved 30 June 2022 from: https://eacea.ec.europa.eu/national-policies/eurydice/content/digital-education-school-europe_en
  • Escueta, M., Quan, V., Nickow, A. J., & Oreopoulos, P. (2017). Education technology: An evidence-based review. Retrieved 30 June 2022 from  https://ssrn.com/abstract=3031695
  • Fadda D, Pellegrini M, Vivanet G, Zandonella Callegher C. Effects of digital games on student motivation in mathematics: A meta-analysis in K-12. Journal of Computer Assisted Learning. 2022; 38 (1):304–325. doi: 10.1111/jcal.12618. [ CrossRef ] [ Google Scholar ]
  • Fernández-Gutiérrez M, Gimenez G, Calero J. Is the use of ICT in education leading to higher student outcomes? Analysis from the Spanish Autonomous Communities. Computers & Education. 2020; 157 :103969. doi: 10.1016/j.compedu.2020.103969. [ CrossRef ] [ Google Scholar ]
  • Ferrari, A., Cachia, R., & Punie, Y. (2011). Educational change through technology: A challenge for obligatory schooling in Europe. Lecture Notes in Computer Science , 6964 , 97–110. Retrieved 30 June 2022  https://link.springer.com/content/pdf/10.1007/978-3-642-23985-4.pdf
  • Fielding, K., & Murcia, K. (2022). Research linking digital technologies to young children’s creativity: An interpretive framework and systematic review. Issues in Educational Research , 32 (1), 105–125. Retrieved 30 June 2022 from  http://www.iier.org.au/iier32/fielding-abs.html
  • Friedel, H., Bos, B., Lee, K., & Smith, S. (2013). The impact of mobile handheld digital devices on student learning: A literature review with meta-analysis. In Society for Information Technology & Teacher Education International Conference (pp. 3708–3717). Association for the Advancement of Computing in Education (AACE).
  • Fu JS. ICT in education: A critical literature review and its implications. International Journal of Education and Development Using Information and Communication Technology (IJEDICT) 2013; 9 (1):112–125. [ Google Scholar ]
  • Gaol FL, Prasolova-Førland E. Special section editorial: The frontiers of augmented and mixed reality in all levels of education. Education and Information Technologies. 2022; 27 (1):611–623. doi: 10.1007/s10639-021-10746-2. [ PMC free article ] [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Garzón J, Acevedo J. Meta-analysis of the impact of Augmented Reality on students’ learning gains. Educational Research Review. 2019; 27 :244–260. doi: 10.1016/j.edurev.2019.04.001. [ CrossRef ] [ Google Scholar ]
  • Garzón, J., Baldiris, S., Gutiérrez, J., & Pavón, J. (2020). How do pedagogical approaches affect the impact of augmented reality on education? A meta-analysis and research synthesis. Educational Research Review , 100334. 10.1016/j.edurev.2020.100334
  • Grgurović M, Chapelle CA, Shelley MC. A meta-analysis of effectiveness studies on computer technology-supported language learning. ReCALL. 2013; 25 (2):165–198. doi: 10.1017/S0958344013000013. [ CrossRef ] [ Google Scholar ]
  • Haßler B, Major L, Hennessy S. Tablet use in schools: A critical review of the evidence for learning outcomes. Journal of Computer Assisted Learning. 2016; 32 (2):139–156. doi: 10.1111/jcal.12123. [ CrossRef ] [ Google Scholar ]
  • Haleem A, Javaid M, Qadri MA, Suman R. Understanding the role of digital technologies in education: A review. Sustainable Operations and Computers. 2022; 3 :275–285. doi: 10.1016/j.susoc.2022.05.004. [ CrossRef ] [ Google Scholar ]
  • Hardman J. Towards a pedagogical model of teaching with ICTs for mathematics attainment in primary school: A review of studies 2008–2018. Heliyon. 2019; 5 (5):e01726. doi: 10.1016/j.heliyon.2019.e01726. [ PMC free article ] [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Hattie J, Rogers HJ, Swaminathan H. The role of meta-analysis in educational research. In: Reid AD, Hart P, Peters MA, editors. A companion to research in education. Springer; 2014. pp. 197–207. [ Google Scholar ]
  • Hattie J. Visible learning: A synthesis of over 800 meta-analyses relating to achievement. Routledge. 2008 doi: 10.4324/9780203887332. [ CrossRef ] [ Google Scholar ]
  • Higgins S, Xiao Z, Katsipataki M. The impact of digital technology on learning: A summary for the education endowment foundation. Education Endowment Foundation and Durham University; 2012. [ Google Scholar ]
  • Higgins, K., Huscroft-D’Angelo, J., & Crawford, L. (2019). Effects of technology in mathematics on achievement, motivation, and attitude: A meta-analysis. Journal of Educational Computing Research , 57(2), 283-319.
  • Hillmayr D, Ziernwald L, Reinhold F, Hofer SI, Reiss KM. The potential of digital tools to enhance mathematics and science learning in secondary schools: A context-specific meta-analysis. Computers & Education. 2020; 153 (1038):97. doi: 10.1016/j.compedu.2020.103897. [ CrossRef ] [ Google Scholar ]
  • Istenic Starcic A, Bagon S. ICT-supported learning for inclusion of people with special needs: Review of seven educational technology journals, 1970–2011. British Journal of Educational Technology. 2014; 45 (2):202–230. doi: 10.1111/bjet.12086. [ CrossRef ] [ Google Scholar ]
  • Jewitt C, Clark W, Hadjithoma-Garstka C. The use of learning platforms to organise learning in English primary and secondary schools. Learning, Media and Technology. 2011; 36 (4):335–348. doi: 10.1080/17439884.2011.621955. [ CrossRef ] [ Google Scholar ]
  • JISC. (2020). What is digital transformation?.  Retrieved 30 June 2022 from: https://www.jisc.ac.uk/guides/digital-strategy-framework-for-university-leaders/what-is-digital-transformation
  • Kalati, A. T., & Kim, M. S. (2022). What is the effect of touchscreen technology on young children’s learning?: A systematic review. Education and Information Technologies , 1-19. 10.1007/s10639-021-10816-5
  • Kalemkuş, J., & Kalemkuş, F. (2022). Effect of the use of augmented reality applications on academic achievement of student in science education: Meta-analysis review. Interactive Learning Environments , 1-18. 10.1080/10494820.2022.2027458
  • Kao C-W. The effects of digital game-based learning task in English as a foreign language contexts: A meta-analysis. Education Journal. 2014; 42 (2):113–141. [ Google Scholar ]
  • Kampylis P, Punie Y, Devine J. Promoting effective digital-age learning - a European framework for digitally competent educational organisations. JRC Technical Reports. 2015 doi: 10.2791/54070. [ CrossRef ] [ Google Scholar ]
  • Kazu IY, Yalçin CK. Investigation of the effectiveness of hybrid learning on academic achievement: A meta-analysis study. International Journal of Progressive Education. 2022; 18 (1):249–265. doi: 10.29329/ijpe.2022.426.14. [ CrossRef ] [ Google Scholar ]
  • Koh C. A qualitative meta-analysis on the use of serious games to support learners with intellectual and developmental disabilities: What we know, what we need to know and what we can do. International Journal of Disability, Development and Education. 2022; 69 (3):919–950. doi: 10.1080/1034912X.2020.1746245. [ CrossRef ] [ Google Scholar ]
  • König J, Jäger-Biela DJ, Glutsch N. Adapting to online teaching during COVID-19 school closure: Teacher education and teacher competence effects among early career teachers in Germany. European Journal of Teacher Education. 2020; 43 (4):608–622. doi: 10.1080/02619768.2020.1809650. [ CrossRef ] [ Google Scholar ]
  • Lawrence JE, Tar UA. Factors that influence teachers’ adoption and integration of ICT in teaching/learning process. Educational Media International. 2018; 55 (1):79–105. doi: 10.1080/09523987.2018.1439712. [ CrossRef ] [ Google Scholar ]
  • Lee, S., Kuo, L. J., Xu, Z., & Hu, X. (2020). The effects of technology-integrated classroom instruction on K-12 English language learners’ literacy development: A meta-analysis. Computer Assisted Language Learning , 1-32. 10.1080/09588221.2020.1774612
  • Lei, H., Chiu, M. M., Wang, D., Wang, C., & Xie, T. (2022a). Effects of game-based learning on students’ achievement in science: a meta-analysis. Journal of Educational Computing Research . 10.1177/07356331211064543
  • Lei H, Wang C, Chiu MM, Chen S. Do educational games affect students' achievement emotions? Evidence from a meta-analysis. Journal of Computer Assisted Learning. 2022; 38 (4):946–959. doi: 10.1111/jcal.12664. [ CrossRef ] [ Google Scholar ]
  • Liao YKC, Chang HW, Chen YW. Effects of computer application on elementary school student's achievement: A meta-analysis of students in Taiwan. Computers in the Schools. 2007; 24 (3–4):43–64. doi: 10.1300/J025v24n03_04. [ CrossRef ] [ Google Scholar ]
  • Li Q, Ma X. A meta-analysis of the effects of computer technology on school students’ mathematics learning. Educational Psychology Review. 2010; 22 (3):215–243. doi: 10.1007/s10648-010-9125-8. [ CrossRef ] [ Google Scholar ]
  • Liu, M., Pang, W., Guo, J., & Zhang, Y. (2022). A meta-analysis of the effect of multimedia technology on creative performance. Education and Information Technologies , 1-28. 10.1007/s10639-022-10981-1
  • Lu Z, Chiu MM, Cui Y, Mao W, Lei H. Effects of game-based learning on students’ computational thinking: A meta-analysis. Journal of Educational Computing Research. 2022 doi: 10.1177/07356331221100740. [ CrossRef ] [ Google Scholar ]
  • Martinez L, Gimenes M, Lambert E. Entertainment video games for academic learning: A systematic review. Journal of Educational Computing Research. 2022 doi: 10.1177/07356331211053848. [ CrossRef ] [ Google Scholar ]
  • Mayne J. Useful theory of change models. Canadian Journal of Program Evaluation. 2015; 30 (2):119–142. doi: 10.3138/cjpe.230. [ CrossRef ] [ Google Scholar ]
  • Moran J, Ferdig RE, Pearson PD, Wardrop J, Blomeyer RL., Jr Technology and reading performance in the middle-school grades: A meta-analysis with recommendations for policy and practice. Journal of Literacy Research. 2008; 40 (1):6–58. doi: 10.1080/10862960802070483. [ CrossRef ] [ Google Scholar ]
  • OECD. (2015). Students, Computers and Learning: Making the Connection . PISA, OECD Publishing, Paris. Retrieved from: 10.1787/9789264239555-en
  • OECD. (2021). OECD Digital Education Outlook 2021: Pushing the Frontiers with Artificial Intelligence, Blockchain and Robots. Retrieved from: https://www.oecd-ilibrary.org/education/oecd-digital-education-outlook-2021_589b283f-en
  • Pan Y, Ke F, Xu X. A systematic review of the role of learning games in fostering mathematics education in K-12 settings. Educational Research Review. 2022; 36 :100448. doi: 10.1016/j.edurev.2022.100448. [ CrossRef ] [ Google Scholar ]
  • Pettersson F. Understanding digitalization and educational change in school by means of activity theory and the levels of learning concept. Education and Information Technologies. 2021; 26 (1):187–204. doi: 10.1007/s10639-020-10239-8. [ CrossRef ] [ Google Scholar ]
  • Pihir, I., Tomičić-Pupek, K., & Furjan, M. T. (2018). Digital transformation insights and trends. In Central European Conference on Information and Intelligent Systems (pp. 141–149). Faculty of Organization and Informatics Varazdin. Retrieved 30 June 2022 from https://www.proquest.com/conference-papers-proceedings/digital-transformation-insights-trends/docview/2125639934/se-2
  • Punie, Y., Zinnbauer, D., & Cabrera, M. (2006). A review of the impact of ICT on learning. Working Paper prepared for DG EAC. Retrieved 30 June 2022 from: http://www.eurosfaire.prd.fr/7pc/doc/1224678677_jrc47246n.pdf
  • Quah CY, Ng KH. A systematic literature review on digital storytelling authoring tool in education: January 2010 to January 2020. International Journal of Human-Computer Interaction. 2022; 38 (9):851–867. doi: 10.1080/10447318.2021.1972608. [ CrossRef ] [ Google Scholar ]
  • Ran H, Kim NJ, Secada WG. A meta-analysis on the effects of technology's functions and roles on students' mathematics achievement in K-12 classrooms. Journal of computer assisted learning. 2022; 38 (1):258–284. doi: 10.1111/jcal.12611. [ CrossRef ] [ Google Scholar ]
  • Ređep, N. B. (2021). Comparative overview of the digital preparedness of education systems in selected CEE countries. Center for Policy Studies. CEU Democracy Institute .
  • Rott, B., & Marouane, C. (2018). Digitalization in schools–organization, collaboration and communication. In Digital Marketplaces Unleashed (pp. 113–124). Springer, Berlin, Heidelberg.
  • Savva M, Higgins S, Beckmann N. Meta-analysis examining the effects of electronic storybooks on language and literacy outcomes for children in grades Pre-K to grade 2. Journal of Computer Assisted Learning. 2022; 38 (2):526–564. doi: 10.1111/jcal.12623. [ CrossRef ] [ Google Scholar ]
  • Schmid RF, Bernard RM, Borokhovski E, Tamim RM, Abrami PC, Surkes MA, Wade CA, Woods J. The effects of technology use in postsecondary education: A meta-analysis of classroom applications. Computers & Education. 2014; 72 :271–291. doi: 10.1016/j.compedu.2013.11.002. [ CrossRef ] [ Google Scholar ]
  • Schuele CM, Justice LM. The importance of effect sizes in the interpretation of research: Primer on research: Part 3. The ASHA Leader. 2006; 11 (10):14–27. doi: 10.1044/leader.FTR4.11102006.14. [ CrossRef ] [ Google Scholar ]
  • Schwabe, A., Lind, F., Kosch, L., & Boomgaarden, H. G. (2022). No negative effects of reading on screen on comprehension of narrative texts compared to print: A meta-analysis. Media Psychology , 1-18. 10.1080/15213269.2022.2070216
  • Sellar S. Data infrastructure: a review of expanding accountability systems and large-scale assessments in education. Discourse: Studies in the Cultural Politics of Education. 2015; 36 (5):765–777. doi: 10.1080/01596306.2014.931117. [ CrossRef ] [ Google Scholar ]
  • Stock WA. Systematic coding for research synthesis. In: Cooper H, Hedges LV, editors. The handbook of research synthesis, 236. Russel Sage; 1994. pp. 125–138. [ Google Scholar ]
  • Su, J., Zhong, Y., & Ng, D. T. K. (2022). A meta-review of literature on educational approaches for teaching AI at the K-12 levels in the Asia-Pacific region. Computers and Education: Artificial Intelligence , 100065. 10.1016/j.caeai.2022.100065
  • Su J, Yang W. Artificial intelligence in early childhood education: A scoping review. Computers and Education: Artificial Intelligence. 2022; 3 :100049. doi: 10.1016/j.caeai.2022.100049. [ CrossRef ] [ Google Scholar ]
  • Sung YT, Chang KE, Liu TC. The effects of integrating mobile devices with teaching and learning on students' learning performance: A meta-analysis and research synthesis. Computers & Education. 2016; 94 :252–275. doi: 10.1016/j.compedu.2015.11.008. [ CrossRef ] [ Google Scholar ]
  • Talan T, Doğan Y, Batdı V. Efficiency of digital and non-digital educational games: A comparative meta-analysis and a meta-thematic analysis. Journal of Research on Technology in Education. 2020; 52 (4):474–514. doi: 10.1080/15391523.2020.1743798. [ CrossRef ] [ Google Scholar ]
  • Tamim, R. M., Bernard, R. M., Borokhovski, E., Abrami, P. C., & Schmid, R. F. (2011). What forty years of research says about the impact of technology on learning: A second-order meta-analysis and validation study. Review of Educational research, 81 (1), 4–28. Retrieved 30 June 2022 from 10.3102/0034654310393361
  • Tamim, R. M., Borokhovski, E., Pickup, D., Bernard, R. M., & El Saadi, L. (2015). Tablets for teaching and learning: A systematic review and meta-analysis. Commonwealth of Learning. Retrieved from: http://oasis.col.org/bitstream/handle/11599/1012/2015_Tamim-et-al_Tablets-for-Teaching-and-Learning.pdf
  • Tang C, Mao S, Xing Z, Naumann S. Improving student creativity through digital technology products: A literature review. Thinking Skills and Creativity. 2022; 44 :101032. doi: 10.1016/j.tsc.2022.101032. [ CrossRef ] [ Google Scholar ]
  • Tolani-Brown, N., McCormac, M., & Zimmermann, R. (2011). An analysis of the research and impact of ICT in education in developing country contexts. In ICTs and sustainable solutions for the digital divide: Theory and perspectives (pp. 218–242). IGI Global.
  • Trucano, M. (2005). Knowledge Maps: ICTs in Education. Washington, DC: info Dev / World Bank. Retrieved 30 June 2022 from  https://files.eric.ed.gov/fulltext/ED496513.pdf
  • Ulum H. The effects of online education on academic success: A meta-analysis study. Education and Information Technologies. 2022; 27 (1):429–450. doi: 10.1007/s10639-021-10740-8. [ PMC free article ] [ PubMed ] [ CrossRef ] [ Google Scholar ]
  • Underwood, J. D. (2009). The impact of digital technology: A review of the evidence of the impact of digital technologies on formal education. Retrieved 30 June 2022 from: http://dera.ioe.ac.uk/id/eprint/10491
  • Verschaffel, L., Depaepe, F., & Mevarech, Z. (2019). Learning Mathematics in metacognitively oriented ICT-Based learning environments: A systematic review of the literature. Education Research International , 2019 . 10.1155/2019/3402035
  • Villena-Taranilla R, Tirado-Olivares S, Cózar-Gutiérrez R, González-Calero JA. Effects of virtual reality on learning outcomes in K-6 education: A meta-analysis. Educational Research Review. 2022; 35 :100434. doi: 10.1016/j.edurev.2022.100434. [ CrossRef ] [ Google Scholar ]
  • Voogt J, Knezek G, Cox M, Knezek D, ten Brummelhuis A. Under which conditions does ICT have a positive effect on teaching and learning? A call to action. Journal of Computer Assisted Learning. 2013; 29 (1):4–14. doi: 10.1111/j.1365-2729.2011.00453.x. [ CrossRef ] [ Google Scholar ]
  • Vuorikari, R., Punie, Y., & Cabrera, M. (2020). Emerging technologies and the teaching profession: Ethical and pedagogical considerations based on near-future scenarios  (No. JRC120183). Joint Research Centre. Retrieved 30 June 2022 from: https://publications.jrc.ec.europa.eu/repository/handle/JRC120183
  • Wang LH, Chen B, Hwang GJ, Guan JQ, Wang YQ. Effects of digital game-based STEM education on students’ learning achievement: A meta-analysis. International Journal of STEM Education. 2022; 9 (1):1–13. doi: 10.1186/s40594-022-00344-0. [ CrossRef ] [ Google Scholar ]
  • Wen X, Walters SM. The impact of technology on students’ writing performances in elementary classrooms: A meta-analysis. Computers and Education Open. 2022; 3 :100082. doi: 10.1016/j.caeo.2022.100082. [ CrossRef ] [ Google Scholar ]
  • Zheng B, Warschauer M, Lin CH, Chang C. Learning in one-to-one laptop environments: A meta-analysis and research synthesis. Review of Educational Research. 2016; 86 (4):1052–1084. doi: 10.3102/0034654316628645. [ CrossRef ] [ Google Scholar ]

Penn State  Logo

  • Help & FAQ

A systematic literature review on Internet of things in education: Benefits and challenges

  • Engineering Division (Great Valley)
  • Institute for Computational and Data Sciences (ICDS)

Research output : Contribution to journal › Article › peer-review

With close to 20.4 billion devices connected to the Internet to be deployed by 2020, Internet of things (IoT) is already being leveraged in diverse sectors. Now, because of the ubiquitous nature of IoT devices, schools and academic institutions are looking to incorporate IoT in educational activities. With the increased use of IoT in the education domain, it is of utmost importance to study how this technology with its distinguished system functions such as sensing and decision making can support and challenge the pedagogical processes for all interrelated actors (faculty, students, and staff) as well as all involved assets (e.g., libraries, classrooms, and labs). Although there have been several contributions on the inclusion of IoT into the education domain, there is still a lack of consolidated and coherent views on this subject. Hence, we are motivated to close the gap of knowledge and embarked on mapping out the published studies available. This study presents the results of a systematic literature review focusing on the benefits and the challenges faced in education in integrating IoT into the curriculum and educational environments. Different mapping views of the extracted studies are provided as long as a summary of the already implemented tools and a list of gap research questions yet to be investigated.

Original languageEnglish (US)
Pages (from-to)115-127
Number of pages13
Journal
Volume36
Issue number2
DOIs
StatePublished - Apr 1 2020

All Science Journal Classification (ASJC) codes

  • Computer Science Applications

Access to Document

  • 10.1111/jcal.12383

Other files and links

  • Link to publication in Scopus
  • Link to the citations in Scopus

Fingerprint

  • Education Engineering & Materials Science 100%
  • Internet of things Engineering & Materials Science 98%
  • Internet Social Sciences 73%
  • literature Social Sciences 49%
  • education Social Sciences 36%
  • Curricula Engineering & Materials Science 20%
  • educational activities Social Sciences 17%
  • Students Engineering & Materials Science 14%

T1 - A systematic literature review on Internet of things in education

T2 - Benefits and challenges

AU - Kassab, Mohamad

AU - DeFranco, Joanna

AU - Laplante, Phillip

N1 - Publisher Copyright: © 2019 John Wiley & Sons, Ltd

PY - 2020/4/1

Y1 - 2020/4/1

N2 - With close to 20.4 billion devices connected to the Internet to be deployed by 2020, Internet of things (IoT) is already being leveraged in diverse sectors. Now, because of the ubiquitous nature of IoT devices, schools and academic institutions are looking to incorporate IoT in educational activities. With the increased use of IoT in the education domain, it is of utmost importance to study how this technology with its distinguished system functions such as sensing and decision making can support and challenge the pedagogical processes for all interrelated actors (faculty, students, and staff) as well as all involved assets (e.g., libraries, classrooms, and labs). Although there have been several contributions on the inclusion of IoT into the education domain, there is still a lack of consolidated and coherent views on this subject. Hence, we are motivated to close the gap of knowledge and embarked on mapping out the published studies available. This study presents the results of a systematic literature review focusing on the benefits and the challenges faced in education in integrating IoT into the curriculum and educational environments. Different mapping views of the extracted studies are provided as long as a summary of the already implemented tools and a list of gap research questions yet to be investigated.

AB - With close to 20.4 billion devices connected to the Internet to be deployed by 2020, Internet of things (IoT) is already being leveraged in diverse sectors. Now, because of the ubiquitous nature of IoT devices, schools and academic institutions are looking to incorporate IoT in educational activities. With the increased use of IoT in the education domain, it is of utmost importance to study how this technology with its distinguished system functions such as sensing and decision making can support and challenge the pedagogical processes for all interrelated actors (faculty, students, and staff) as well as all involved assets (e.g., libraries, classrooms, and labs). Although there have been several contributions on the inclusion of IoT into the education domain, there is still a lack of consolidated and coherent views on this subject. Hence, we are motivated to close the gap of knowledge and embarked on mapping out the published studies available. This study presents the results of a systematic literature review focusing on the benefits and the challenges faced in education in integrating IoT into the curriculum and educational environments. Different mapping views of the extracted studies are provided as long as a summary of the already implemented tools and a list of gap research questions yet to be investigated.

UR - http://www.scopus.com/inward/record.url?scp=85074992670&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85074992670&partnerID=8YFLogxK

U2 - 10.1111/jcal.12383

DO - 10.1111/jcal.12383

M3 - Article

AN - SCOPUS:85074992670

SN - 0266-4909

JO - Journal of Computer Assisted Learning

JF - Journal of Computer Assisted Learning

Implications Of Internet Of Things (IoT) On The Education For Students With Disabilities: A Systematic Literature Review

  • 102(1):419-448

Ruth Nthenya Wambua at University of Nairobi

  • University of Nairobi

Collins Oduor at United States International University

  • United States International University

Discover the world's research

  • 25+ million members
  • 160+ million publication pages
  • 2.3+ billion citations

Turki Alqarni

  • Malek Jdaitawi

Abdallah Namoun

  • Thalsa Syahda Aqilah

Aman Singh

  • Zhicheng Dai
  • Qianqian Zhang
  • Xiaoliang Zhu

Liang Zhao

  • Elson Ee Teng Kai

Mohamad Hanif Md Saad

  • Ammar Syafiq Sabaahul Ahmad

Dara Bright

  • Anusha Devi Rajkumar
  • Sirirat Sakaew
  • Thammaphon Yensook
  • Narong Aphiratsakun

Muthukumar Natarajan

  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

information-logo

Article Menu

a systematic literature review on internet of things in education benefits and challenges

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Earlier decision on detection of ransomware identification: a comprehensive systematic literature review.

a systematic literature review on internet of things in education benefits and challenges

1. Introduction

  • Provides a detailed overview of how ransomware has developed over time, focusing on its mechanisms, types, and the vectors used for attacks.
  • Conducts a comprehensive review of the current approaches in ransomware detection. In addition, emphasizes the techniques and methods used at various stages of detection.
  • Highlights how ML is being employed to improve ransomware detection.
  • Identifies the gaps in current research and suggests potential areas for future investigations to enhance the cybersecurity field’s defense against ransomware attacks.

2. Papers Selection for Literature Review

2.1. methodology, 2.2. search string, 2.3. data sources, 2.4. screening process, 3. background, 3.1. overview of ransomware attacks, 3.2. types of ransomware.

  • Encrypting Ransomware: This type is the most common and involves encrypting the victim’s files with a strong encryption algorithm, making them inaccessible without a decryption key. Notable examples include Cryptowall, WannaCry, and Cryptolocker. The victim can see the files but cannot open them unless they pay the ransom to obtain the decryption key.
  • Non-Encrypting Ransomware: Also known as locker ransomware, this type locks you out of your entire device, not just specific files. The data remain unharmed but inaccessible. To regain access, the victim must pay a ransom. Examples include CTB-Locker and Winlock.
  • Scareware: also known as fake antivirus, scareware tries to convince the victim that their device is infected by showing a false warning and then asking for payment to access the full version of the software to remove or mitigate the risk. Scareware typically uses social engineering methods rather than encrypting the files or devices to scare the victims and then force them to pay.
  • PC/Workstation ransomware: This type targets personal computers and workstations, exploiting vulnerabilities in Windows, macOS, or Linux systems. Examples include the infamous WannaCry attack, which specifically targeted Windows systems using a network exploit.
  • Mobile ransomware: Targeting mobile devices, this type of ransomware affects smartphones and tablets, primarily through malicious apps or compromised websites. Android devices are more frequently targeted due to the ease of installing apps from third-party sources.
  • IoT ransomware: IoT devices, such as smart home gadgets and industrial sensors, are increasingly being targeted due to their poor security measures. Attacks on these devices can lead to significant disruptions, especially when they affect critical infrastructure.
  • Individual users: This group is often the easiest target due to less stringent security practices. Attackers exploit this by using deceptive emails or malicious websites to initiate ransomware infections.
  • Enterprises: Businesses are targeted for their valuable data and deeper financial resources. Attacks may involve sophisticated strategies to infiltrate network defenses and encrypt critical business data.
  • Government and critical infrastructure: Attacks on government systems and critical infrastructure aim to cause significant disruption, often impacting national security, healthcare, and essential services.
  • Online Services: Cloud services and online platforms, such as social media and banking services, are also targeted, with attackers aiming to encrypt or steal large amounts of data to demand higher ransoms.

3.3. Ransomware Attack Vectors

3.4. evolution of ransomware, 3.5. ransomware encryption techniques.

  • Generate the key: A unique key is generated to be used in symmetric encryption.
  • Encrypt the files: The victim’s files are encrypted by ransomware using a single secret key. Ransomware targets the victim’s sensitive information and files, such as documents, photos, and videos.
  • Protect the key: To prevent key recovery by the victim, ransomware encrypts it until payment is made. Then, the encrypted key is saved on the attacker’s servers.
  • Advanced Encryption Standard (AES): AES is one example of a symmetric encryption algorithm. It is secure and cannot be cracked easily. The key length used in the AES algorithm to encrypt victims’ files is 128-, 192-, or 256-bit [ 25 ].
  • Generate the keys: a pair of keys is generated to be used in asymmetric encryption.
  • Encrypt the file using the public key: the victim’s files are encrypted using the public key.
  • Protect the private key: the private key is stored on the attacker’s servers until payment is made by the victim.
  • Examples of asymmetric encryption algorithms: RSA encryption: RSA is one example of an asymmetric encryption algorithm. It contains two keys, which are the public key and the private key. The public key is used for the encryption algorithm, which is used to encrypt the victim’s files, and the private key is used for the decryption algorithm, which is used for the decryption and stored remotely on the attacker’s servers [ 26 ]. Elliptic Curve Cryptography (ECC): ECC is another example of an asymmetric encryption algorithm. ECC key length is shorter than RSA and more secure. As with RSA, ECC consists of two keys, which are public and private—one for encrypting the files and another for decrypting [ 27 ].

3.6. Signs of a Ransomware Attack

3.7. challenges in early detection of ransomware, 3.8. the role of artificial intelligence to improve ransomware detection.

Click here to enlarge figure

AlgorithmDescription
Support vector machinesReliable ML method that can be used to detect and classify ransomware. It can be trained by different features to differentiate between goodware and ransomware, like network traffic, the behavior of the file, and system calls. It can be more beneficial when the data are non-linearly separable and high-dimensional [ ].
Decision treesIt is simple and can be utilized in classification to detect ransomware. The data are divided into subsets based on feature values to create a tree structure for decision-making. It can be trained based on different features like system calls, network traffic, and file modification [ ].
Random forestsAn extension of decision trees that reduce overfitting and enhance performance. Data and features are selected randomly to create multi-decision trees. It can handle high-dimensional data, but these could be difficult to interpret and computationally demanding [ ].
k-nearest neighborsIt is simple and operated by selecting the nearest points of data using the training set. Then, predicting the input label based on the common one among those k-neighbors. It is effective and can be used in different applications. Also, the primary use of this algorithm is in the tasks of regression and classification [ ].
Extreme Gradient Boosting “XGBoost”It is a powerful and popular algorithm for the tasks of gradient-boosting. It combines two algorithms, which are decision trees and gradient boosting, to come up with a more accurate model and enhances the scalability by handling large and complex datasets and extracting relevant features [ ].
Logistic regressionIt is used in the binary tasks of classification where the result could be one of the two possible outputs. It can be trained to discover the optimal parameters that maximize the possibility of the training data. It can be organized to prevent overfitting. It is simple, interpretable, and can be used with small datasets [ ].
  • Deep learning: Deep learning (DL) techniques are proposed to solve the restrictions of traditional ransomware detection methods, which help to improve reliability, accuracy, and performance. It is suitable for dealing with an unorganized dataset that requires minimal or no human intervention because of its self-learning capabilities. They operate particularly well at identifying text- and image-based ransomware because of how well they can categorize voice, text, and image data. DL methods can be problematic for general-purpose applications, especially those with tiny datasets or sizes, as they require a large quantity of data to train them. High processing power requirements and trouble adjusting to real-world datasets are two further issues with DL [ 46 ].
  • Artificial neural networks: Artificial neural network techniques are used in a broad range, which makes them suitable for detecting many kinds and variations of ransomware data, including variants that target images and text. Because of their capacity for ongoing learning, neural networks make an ideal choice for recognizing zero-day attacks and adjusting to new ransomware data. Neural networks can detect many types of ransomware data and adjust to new threats due to their versatility. However, because of the black-box nature of the technology and their reliance on hardware, these techniques can be susceptible to data dependencies, making it more difficult for human analysts to keep an eye on data processing and spot anomalies [ 47 ].
  • Ransomware behavioral analysis: One successful study used ML as a defense mechanism against ransomware attacks. The analysis considered seven ransomware and seven benign software samples to distinguish between benign and malicious software with low false negative and false positive rates. Values from different ransomware, such as Dynamic Link Libraries (DLLs), were extracted in this study. DLLs are a type of file used in Windows operating systems to hold multiple codes and procedures that are shared among various applications. Essentially, DLLs allow programs to use functionalities that are stored in separate files rather than having to include them within the program itself. This not only helps in saving space but also promotes code reuse and modular programming. When a program runs, it can call upon a DLL file to perform certain functions, which helps in efficient memory usage and reduces the application’s load time because it only loads the necessary parts. DLLs are crucial for the operating system to manage shared resources effectively, enabling smoother and more performance-efficient operation of software on your computer. Early detection of ransomware attacks and alerting the user about the existing threat are considered a main feature of this proposed system [ 48 ].
  • Anomaly detection in network traffic: In [ 49 ], AI algorithms and ML techniques were used to detect anomalies by analyzing network traffic. This process is performed by labeling normal and abnormal features and utilizing ML to detect the unusual status of the network. The system succeeded in isolating harmful activities, allowing early detection, and taking the necessary preventive measures.
  • Signature-based ransomware detection: ML models were used in some systems that aim to detect ransomware signatures. Ransomware tends to constantly change its signatures to prevent detection by traditional detection techniques. ML models are constantly updated to identify new forms of ransomware, which allows for early detection and appropriate decision-making [ 19 ].

3.9. Preventive Measures and Best Practices

  • Employee education and awareness: Increasing individuals’ awareness of the dangers of ransomware and educating them on cybersecurity best practices, such as detecting suspicious messages and avoiding downloading files or programs from suspicious or unreliable links [ 13 ].
  • Strong password policies: Forcing the user to use strong and complex passwords. In addition, it is necessary to change the passwords regularly and use password management programs for better management and security [ 50 ].
  • Multi-factor authentication (MFA): Using multi-layer protection to safeguard sensitive data or files such as passwords, voice recognition, and facial recognition [ 51 ].
  • Regular backups: Regular backups of sensitive data are made to mitigate the damage in case hackers gain access to the original data [ 52 ].
  • Timely updates: Ensure that all programs and operating systems are updated to the latest version and allow automatic updating of these preventive programs once connected to the Internet [ 22 ].
  • Network segmentation and access Control: Applying the principle of network segmentation to isolate important data from other data. In addition, implementing the least privilege principle by granting privileges to users as needed to perform tasks [ 53 ].

3.10. Regulatory and Legal Considerations

3.11. future trends in ransomware, 4. comprehensive analysis of ransomware: detection, prevention, and trends, 4.1. indicators of potential ransomware incidence.

  • Excessive File Operations: A noticeable rise in file access activities. For example, opening or attempting to open a large number of files in a short time frame. This may indicate an ongoing ransomware attack.
  • Altered Input/Output Behavior: The input and output patterns where the structure and volume of data being processed significantly change.
  • High Volume of Write Operations: A large increase in write or overwrite operations on the system could suggest that files are being encrypted by ransomware.
  • Use of Encryption Functions: The call of Application Programming Interfaces (APIs) by a process not typically associated with.
  • Rapid File Modification Requests: Frequent requests to read, modify, or delete files within a short period of time. These could be signs of ransomware attempting to encrypt or erase data.
  • Unusual Network Communications: Initiating communications with a command-and-control (C2) server. This is a common step for ransomware to receive instructions or transmit encryption keys.
  • Registry Key Modifications: Unexpected changes in the keys associated with system startup or file associations.

4.2. Ransomware Attack Framework

  • Target Identification: the initial phase involves selecting and identifying vulnerable systems or networks as potential targets for the attack.
  • Infection Vector Distribution: this step encompasses executing the ransomware through chosen delivery mechanisms—this could be by phishing emails, compromised websites, or malicious downloads.
  • Ransomware Installation: after successful entry into the system, the ransomware installs itself.
  • Encryption Key Generation and Retrieval: the ransomware then generates an encryption key to lock the victim’s files.
  • File Access: targeting the data that are valuable to the user.
  • Data Encryption: this phase encrypts the victim’s files, making them inaccessible without the decryption key.
  • Post-Encryption Operations: After encryption, the ransomware may perform additional actions, such as deleting system backups.
  • Ransom Demand: Finally, the attacker demands a ransom from the victim, often in a cryptocurrency.

4.3. Behavior Patterns of Ransomware Attacks

  • Type A Behavior: Ransomware directly encrypts the original files without creating copies. The steps include opening, reading, encrypting, and then closing the files. Sometimes, it may also rename the encrypted files to indicate they have been compromised.
  • Type B Behavior: Ransomware removes the original files from their location, creates encrypted copies, and then returns these encrypted versions to the original directory. The encrypted files might have different names from the originals, satisfying their encryption status.
  • Type C Behavior: Reading the original files and creating separate encrypted versions. The original files are deleted to eliminate any trace of the unencrypted data. The deletion is typically achieved through file movement operations that overwrite the originals.

4.4. Comparison of Ransomware Detection Methods

4.5. effectiveness of current ransomware detection approaches, 4.6. taxonomy of ransomware detection technique.

  • Static Analysis: This involves checking the code of a suspicious file without running it [ 5 ]. The process includes examining the file structure, identifying any embedded strings (like text), and looking for known malicious patterns. To detect ransomware, some tools and studies focus on analyzing the parts of a file that do not change. However, as ransomware evolves, these static methods might not always work, especially with ransomware that hides its true nature [ 13 ].
  • Dynamic Analysis: The suspicious file is actually run in a controlled environment to observe what it does [ 5 ]. This might include looking at the file’s behavior, which files it tries to change [ 5 ], and how it interacts with the computer’s system. Various studies have used dynamic analysis to understand how ransomware behaves during an attack. This approach has been effective in detecting new types of ransomware but requires careful setup to avoid actual damage [ 13 ].
  • Hybrid Analysis: Combines static and dynamic methods for a more comprehensive examination by looking at both the file’s code and its behavior when executed. This approach aims to detect ransomware that might pass through with just one type of analysis. Hybrid analysis has shown promise in identifying ransomware early in the infection process. It benefits from the strengths of both static and dynamic analysis. Therefore, it offers a stronger detection method.

4.7. Emerging Trends in Ransomware

4.8. ransomware avoidance strategies.

  • Keep software up to date: Regularly updating the operating system and all applications is crucial. These updates often include patches for security vulnerabilities that ransomware attackers exploit.
  • Unknown emails and downloads: Avoid opening emails or downloading attachments from unknown or suspicious sources. Cybercriminals often use phishing emails to spread ransomware.
  • Use browser security features: Enable security features in web browsers that can block malicious websites and downloads. Disabling JavaScript and Java on untrusted sites can also help prevent ransomware from being downloaded on your device.
  • Limit access to important files: Use features like “Controlled Folder Access” on Windows to prevent unauthorized applications from modifying protected folders. This step is particularly effective in stopping ransomware from encrypting your files.
  • Backup your data: Regularly back up your data and ensure that backups are stored in a secure location and disconnected from your main network. As a result, if you do fall victim to a ransomware attack, you can restore your data from the backup without paying the ransom.
  • Use security software: Employ antivirus and anti-ransomware software to detect and prevent ransomware threats. Keep this software up to date to protect against the latest ransomware variants.

5. Real-World Ransomware Incidents

  • WannaCry Global Ransomware Attack (2017): In May 2017, the WannaCry ransomware attack spread across over 150 countries and infected more than 250,000 computers [ 64 ]. The attack exploited a vulnerability in Microsoft Windows in which a patch had been released but not widely applied [ 64 ]. One of the victims of this attack was the UK’s National Health Service (NHS). The ransomware encrypted files and demanded Bitcoin payments to release the encrypted data [ 64 ]. The attack highlighted the importance of regular software updated and the strong impact of ransomware on critical infrastructure and services. It also marked a turning point in encouraging global awareness and efforts to combat cyber threats.
  • Colonial Pipeline Attack (2021) The Colonial Pipeline ransomware attack in May 2021 underscored the vulnerability of critical infrastructure to cyberattacks [ 65 ]. The Colonial Pipeline, which carries gasoline and jet fuel over 5500 miles (about 8850 km) between Texas and New York [ 65 ], was forced to shut down operations due to a ransomware attack by a group known as DarkSide [ 65 ]. This disruption led to a significant increase in gas prices, panic buying, and fuel shortages across the Eastern United States [ 65 ]. The company paid a ransom of nearly USD 5 million in cryptocurrency to regain access to their systems [ 65 ]. This incident encouraged the U.S. government to issue new cybersecurity directives for pipeline operators [ 65 ]; moreover, it emphasized the national security implications of ransomware attacks.
  • Atlanta City Government Attack (2018) In March 2018, the city government of Atlanta, Georgia, was hit by a ransomware attack [ 66 ]. This attack hit a big part of its digital infrastructure [ 66 ]. The SamSam ransomware attack affected multiple city services, which included court proceedings, bill payments, and law enforcement activities [ 66 ]. These affected services demonstrated how ransomware could damage the day-to-day operations of a city. They demanded a ransom of USD 51,000 in Bitcoin but the city chose not to pay [ 66 ]. The recovery and mitigation efforts cost the city an estimated USD 17 million [ 66 ]. This incident provided motivation to other cities across the United States to strengthen their cybersecurity defenses.
  • University of California, San Francisco (UCSF) Attack (2020): The University of California, San Francisco (UCSF), fell victim to a ransomware attack in June 2020. This attack targeted the School of Medicine’s IT infrastructure [ 67 ]. They faced the potential loss of critical academic research data, including work related to COVID-19 [ 67 ]. UCSF chose to pay a ransom of over USD 1.14 million [ 67 ]. The NetWalker ransomware group was responsible for the attack [ 67 ]. They exploited vulnerabilities in unsecured networks [ 67 ]. This incident satisfied the complex ethical and financial decisions ransomware victims must take when critical scientific research is in danger.

6. Comparison with Other Review Papers

7. related study.

ReferenceKey FindingsLimitations/Research GapsSuggested Mitigation
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ ]

8. Open Challenges and Limitations

9. future directions, 9.1. development of new detection algorithms, 9.2. integration of ai and ml, 9.3. impact of emerging technologies, 9.4. improved data collection and sharing, 9.5. development of resilient backup solutions, 10. conclusions, author contributions, institutional review board statement, informed consent statement, data availability statement, acknowledgments, conflicts of interest, abbreviations.

SLRSystematic Literature Review
SMBServer Message Block
AESAdvanced Encryption Standard
ECCElliptic Curve Cryptography
DLLsDynamic Link Libraries
MFAMulti-factor authentication
APIsApplication programming Interfaces
DAMDetection, Avoidance, and Mitigation
CNNConvolutional Neural Networks
LSTMLong Short-Term Memory
AIArtificial Intelligence
NLPNatural Language Processing
3LSThree-Layer Security
MLMachine Learning
BCSBinary Cuckoo Search
MOGWOMulti Objective GreyWolf Optimization
HSRHighly Survivable Ransomware
TF-IDFTerm Frequency-Inverse Document Frequency
ANNArtificial Neural Network
SVMSupport Vector Machine
PEPortable Executable
SSFSimplified Silhouette Filter
DLDeep Learning
VMVirtual Machine
CRFConditional Random Fields
  • Ozer, M.; Varlioglu, S.; Gonen, B.; Bastug, M. A prevention and a traction system for ransomware attacks. In Proceedings of the 2019 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 5–7 December 2019; pp. 150–154. [ Google Scholar ]
  • Xia, T.; Sun, Y.; Zhu, S.; Rasheed, Z.; Shafique, K. Toward a network-assisted approach for effective ransomware detection. arXiv 2020 , arXiv:2008.12428. [ Google Scholar ] [ CrossRef ]
  • Alqahtani, A.; Sheldon, F.T. A survey of crypto ransomware attack detection methodologies: An evolving outlook. Sensors 2022 , 22 , 1837. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Beaman, C.; Barkworth, A.; Akande, T.D.; Hakak, S.; Khan, M.K. Ransomware: Recent advances, analysis, challenges and future research directions. Comput. Secur. 2021 , 111 , 102490. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Razaulla, S.; Fachkha, C.; Markarian, C.; Gawanmeh, A.; Mansoor, W.; Fung, B.C.; Assi, C. The age of ransomware: A survey on the evolution, taxonomy, and research directions. IEEE Access 2023 , 11 , 40698–40723. [ Google Scholar ] [ CrossRef ]
  • The Latest Ransomware Statistics (Updated June 2024)|AAG IT Support. Available online: https://aag-it.com/the-latest-ransomware-statistics/ (accessed on 19 June 2024).
  • Altulaihan, E.; Alismail, A.; Hafizur Rahman, M.; Ibrahim, A.A. Email Security Issues, Tools, and Techniques Used in Investigation. Sustainability 2023 , 15 , 10612. [ Google Scholar ] [ CrossRef ]
  • The PRISMA 2020 Statement: An Updated Guideline for Reporting Systematic Reviews. Available online: https://www.bmj.com/content/372/bmj.n71 (accessed on 19 June 2024).
  • Alraizza, A.; Algarni, A. Ransomware detection using machine learning: A survey. Big Data Cogn. Comput. 2023 , 7 , 143. [ Google Scholar ] [ CrossRef ]
  • Ransomware Payments Exceed 1 Billion in 2023, Hitting Record High after 2022 Decline. Available online: https://databreaches.net/2024/02/09/ransomware-payments-exceed-1-billion-in-2023-hitting-record-high-after-2022-decline/ (accessed on 7 February 2024).
  • Arslanian, M.; Roberts, H.; Welfer, J.; Xie, S.; Chen, B. The WannaCry Ransomware. Available online: https://verifythesource.org/posts/wannacry (accessed on 20 April 2024).
  • Permana, G.R.; Trowbridge, T.E.; Sherborne, B. Ransomware mitigation: An analytical investigation into the effects and trends of ransomware attacks on global business. PsyArXiv 2022 . [ Google Scholar ] [ CrossRef ]
  • Kapoor, A.; Gupta, A.; Gupta, R.; Tanwar, S.; Sharma, G.; Davidson, I.E. Ransomware detection, avoidance, and mitigation scheme: A review and future directions. Sustainability 2021 , 14 , 8. [ Google Scholar ] [ CrossRef ]
  • Cen, M.; Jiang, F.; Qin, X.; Jiang, Q.; Doss, R. Ransomware early detection: A survey. Comput. Netw. 2024 , 239 , 110138. [ Google Scholar ] [ CrossRef ]
  • Kovács, A. Ransomware: A comprehensive study of the exponentially increasing cybersecurity threat. Insights Reg. Dev. 2022 , 4 , 96–104. [ Google Scholar ] [ CrossRef ]
  • DS, K.P.; HR, P.K. A Systematic Study on Ransomware Attack: Types, Phases and Recent Variants. In Proceedings of the 2024 5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), Tirunelveli, India, 11–12 March 2024; pp. 661–668. [ Google Scholar ]
  • Chaithanya, B.; Brahmananda, S. Detecting ransomware attacks distribution through phishing URLs Using Machine Learning. In Computer Networks and Inventive Communication Technologies: Proceedings of Fourth ICCNCT 2021 ; Springer: Singapore, 2022; pp. 821–832. [ Google Scholar ]
  • Fuertes, W.; Arévalo, D.; Castro, J.D.; Ron, M.; Estrada, C.A.; Andrade, R.; Peña, F.F.; Benavides, E. Impact of social engineering attacks: A literature review. In Developments and Advances in Defense and Security: Proceedings of MICRADS 2021 ; Springer: Singapore, 2022; pp. 25–35. [ Google Scholar ]
  • Ren, A.; Liang, C.; Hyug, I.; Broh, S.; Jhanjhi, N. A three-level ransomware detection and prevention mechanism. EAI Endorsed Trans. Energy Web 2020 , 7 , e6. [ Google Scholar ] [ CrossRef ]
  • Fernando, D.W.; Komninos, N.; Chen, T. A study on the evolution of ransomware detection using machine learning and deep learning techniques. IoT 2020 , 1 , 551–604. [ Google Scholar ] [ CrossRef ]
  • Mohammad, A.H. Ransomware evolution, growth and recommendation for detection. Mod. Appl. Sci. 2020 , 14 , 68. [ Google Scholar ] [ CrossRef ]
  • Humayun, M.; Jhanjhi, N.; Alsayat, A.; Ponnusamy, V. Internet of things and ransomware: Evolution, mitigation and prevention. Egypt. Inform. J. 2021 , 22 , 105–117. [ Google Scholar ] [ CrossRef ]
  • Dand, P.; Chudasama, D. A Comparative Study about the Ransomware. J. Adv. Database Manag. Syst. 2021 , 8 , 8–15. [ Google Scholar ]
  • Begovic, K.; Al-Ali, A.; Malluhi, Q. Cryptographic ransomware encryption detection: Survey. Comput. Secur. 2023 , 132 , 103349. [ Google Scholar ] [ CrossRef ]
  • Cicala, F.; Bertino, E. Analysis of encryption key generation in modern crypto ransomware. IEEE Trans. Dependable Secur. Comput. 2020 , 19 , 1239–1253. [ Google Scholar ] [ CrossRef ]
  • Reshmi, T. Information security breaches due to ransomware attacks—A systematic literature review. Int. J. Inf. Manag. Data Insights 2021 , 1 , 100013. [ Google Scholar ] [ CrossRef ]
  • Mohammad, A.H. Analysis of ransomware on windows platform. Int. J. Comput. Sci. Netw. Secur. 2020 , 20 , 21–27. [ Google Scholar ]
  • Vasoya, S.; Bhavsar, K.; Patel, N. A systematic literature review on Ransomware attacks. arXiv 2022 , arXiv:2212.04063. [ Google Scholar ]
  • Bae, S.I.; Lee, G.B.; Im, E.G. Ransomware detection using machine learning algorithms. Concurr. Comput. Pract. Exp. 2020 , 32 , e5422. [ Google Scholar ] [ CrossRef ]
  • Lemmou, Y.; Lanet, J.L.; Souidi, E.M. A behavioural in-depth analysis of ransomware infection. IET Inf. Secur. 2021 , 15 , 38–58. [ Google Scholar ] [ CrossRef ]
  • Anand, V.K.; Bamanjogi, K.; Shaw, A.R.; Faheem, M. Comparative study of ransomwares. In Proceedings of the 2022 7th International Conference on Computing, Communication and Security (ICCCS), Seoul, Republic of Korea, 3–5 November 2022; pp. 1–9. [ Google Scholar ]
  • Olaimat, M.N.; Maarof, M.A.; Al-rimy, B.A.S. Ransomware anti-analysis and evasion techniques: A survey and research directions. In Proceedings of the 2021 3rd International Cyber Resilience Conference (CRC), Langkawi Island, Malaysia, 29–31 January 2021; pp. 1–6. [ Google Scholar ]
  • August, T.; Dao, D.; Niculescu, M.F. Economics of ransomware: Risk interdependence and large-scale attacks. Manag. Sci. 2022 , 68 , 8979–9002. [ Google Scholar ] [ CrossRef ]
  • Lee, I.; Roh, H.; Lee, W. Encrypted malware traffic detection using incremental learning. In Proceedings of the IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Toronto, ON, Canada, 6–9 July 2020; pp. 1348–1349. [ Google Scholar ]
  • Mahajan, A.; Chakrabarty, N.; Majithia, J.; Ahuja, A.; Agarwal, U.; Suryavanshi, S.; Biradar, M.; Sharma, P.; Raghavan, B.; Arafath, R.; et al. Multisystem imaging recommendations/guidelines: In the pursuit of precision oncology. Indian J. Med. Paediatr. Oncol. 2023 , 44 , 002–025. [ Google Scholar ] [ CrossRef ]
  • Ghouti, L.; Imam, M. Malware classification using compact image features and multiclass support vector machines. IET Inf. Secur. 2020 , 14 , 419–429. [ Google Scholar ] [ CrossRef ]
  • Akhtar, M.S.; Feng, T. Malware analysis and detection using machine learning algorithms. Symmetry 2022 , 14 , 2304. [ Google Scholar ] [ CrossRef ]
  • Hwang, J.; Kim, J.; Lee, S.; Kim, K. Two-stage ransomware detection using dynamic analysis and machine learning techniques. Wirel. Pers. Commun. 2020 , 112 , 2597–2609. [ Google Scholar ] [ CrossRef ]
  • Mezquita, Y.; Alonso, R.S.; Casado-Vara, R.; Prieto, J.; Corchado, J.M. A review of k-nn algorithm based on classical and quantum machine learning. In Distributed Computing and Artificial Intelligence, Special Sessions, 17th International Conference ; Springer: Cham, Switzerland, 2021; pp. 189–198. [ Google Scholar ]
  • Saadat, S.; Joseph Raymond, V. Malware classification using CNN-XGBoost model. In Artificial Intelligence Techniques for Advanced Computing Applications: Proceedings of ICACT 2020 ; Springer: Cham, Switzerland, 2021; pp. 191–202. [ Google Scholar ]
  • Shah, K.; Patel, H.; Sanghvi, D.; Shah, M. A comparative analysis of logistic regression, random forest and KNN models for the text classification. Augment. Hum. Res. 2020 , 5 , 12. [ Google Scholar ] [ CrossRef ]
  • Faruk, M.J.H.; Shahriar, H.; Valero, M.; Barsha, F.L.; Sobhan, S.; Khan, M.A.; Whitman, M.; Cuzzocrea, A.; Lo, D.; Rahman, A.; et al. Malware detection and prevention using artificial intelligence techniques. In Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), Orlando, FL, USA, 15–18 December 2021; pp. 5369–5377. [ Google Scholar ]
  • Stoian, N.A. Machine Learning for Anomaly Detection in Iot Networks: Malware Analysis on the Iot-23 Data Set. Bachelor’s Thesis, University of Twente, Enschede, The Netherlands, 2020. [ Google Scholar ]
  • Goyal, M.; Kumar, R. The pipeline process of signature-based and behavior-based malware detection. In Proceedings of the 2020 IEEE 5th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, 30–31 October 2020; pp. 497–502. [ Google Scholar ]
  • Sun, N.; Ding, M.; Jiang, J.; Xu, W.; Mo, X.; Tai, Y.; Zhang, J. Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives. IEEE Commun. Surv. Tutor. 2023 , 25 , 1748–1774. [ Google Scholar ] [ CrossRef ]
  • Sharmeen, S.; Ahmed, Y.A.; Huda, S.; Koçer, B.Ş.; Hassan, M.M. Avoiding future digital extortion through robust protection against ransomware threats using deep learning based adaptive approaches. IEEE Access 2020 , 8 , 24522–24534. [ Google Scholar ] [ CrossRef ]
  • Swami, S.; Swami, M.; Nidhi, N. Ransomware Detection System and Analysis Using Latest Tool. Int. J. Adv. Res. Sci. Commun. Technol. 2021 , 7 , 2581–9429. [ Google Scholar ] [ CrossRef ]
  • Arabo, A.; Dijoux, R.; Poulain, T.; Chevalier, G. Detecting ransomware using process behavior analysis. Procedia Comput. Sci. 2020 , 168 , 289–296. [ Google Scholar ] [ CrossRef ]
  • Manavi, F.; Hamzeh, A. A new method for ransomware detection based on PE header using convolutional neural networks. In Proceedings of the 2020 17th International ISC Conference on Information Security and Cryptology (ISCISC), Tehran, Iran, 9–10 September 2020; pp. 82–87. [ Google Scholar ]
  • Singh, D.; Mohanty, N.P.; Swagatika, S.; Kumar, S. Cyber-hygiene: The key concept for cyber security in cyberspace. Test Eng. Manag. 2020 , 83 , 8145–8152. [ Google Scholar ]
  • Kitchen, D.E.; Valach, A.P. How to Avoid the Ransomware Onslaught. Natl. Def. 2020 , 105 , 18–19. [ Google Scholar ]
  • Möller, D.P. Ransomware Attacks and Scenarios: Cost Factors and Loss of Reputation. In Guide to Cybersecurity in Digital Transformation: Trends, Methods, Technologies, Applications and Best Practices ; Springer: Cham, Switzerland, 2023; pp. 273–303. [ Google Scholar ]
  • Berrueta, E.; Morato, D.; Magaña, E.; Izal, M. Crypto-ransomware detection using machine learning models in file-sharing network scenarios with encrypted traffic. Expert Syst. Appl. 2022 , 209 , 118299. [ Google Scholar ] [ CrossRef ]
  • Lubin, A. The Law and Politics of Ransomware. Vand. J. Transnat’l L. 2022 , 55 , 1177. [ Google Scholar ]
  • Uandykova, M.; Lisin, A.; Stepanova, D.; Baitenova, L.; Mutaliyeva, L.; Yüksel, S.; Dincer, H. The social and legislative principles of counteracting ransomware crime. Entrep. Sustain. Issues 2020 , 8 , 777–798. [ Google Scholar ] [ CrossRef ]
  • Force, R.T. Combating Ransomware ; Intel Security Group: Plano, TX, USA, 2021. [ Google Scholar ]
  • Ryan, P.; Fokker, J.; Healy, S.; Amann, A. Dynamics of targeted ransomware negotiation. IEEE Access 2022 , 10 , 32836–32844. [ Google Scholar ] [ CrossRef ]
  • AlSabeh, A.; Safa, H.; Bou-Harb, E.; Crichigno, J. Exploiting ransomware paranoia for execution prevention. In Proceedings of the ICC 2020-2020 IEEE International Conference on Communications (ICC), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [ Google Scholar ]
  • Urooj, U.; Al-rimy, B.A.S.; Zainal, A.; Ghaleb, F.A.; Rassam, M.A. Ransomware detection using the dynamic analysis and machine learning: A survey and research directions. Appl. Sci. 2021 , 12 , 172. [ Google Scholar ] [ CrossRef ]
  • Chittooparambil, H.J.; Shanmugam, B.; Azam, S.; Kannoorpatti, K.; Jonkman, M.; Samy, G.N. A review of ransomware families and detection methods. In Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd International Conference of Reliable Information and Communication Technology (IRICT 2018) ; Springer: Cham, Switzerland, 2019; pp. 588–597. [ Google Scholar ]
  • Sechel, S. A comparative assessment of obfuscated ransomware detection methods. Inform. Econ. 2019 , 23 , 45–62. [ Google Scholar ] [ CrossRef ]
  • Bijitha, C.; Sukumaran, R.; Nath, H.V. A survey on ransomware detection techniques. In Secure Knowledge Management in Artificial Intelligence Era: 8th International Conference, SKM 2019, Goa, India, 21–22 December 2019 ; Proceedings 8; Springer: Cham, Switzerland, 2020; pp. 55–68. [ Google Scholar ]
  • Ramesh, G.; Menen, A. Automated dynamic approach for detecting ransomware using finite-state machine. Decis. Support Syst. 2020 , 138 , 113400. [ Google Scholar ] [ CrossRef ]
  • Puat, H.A.M.; Abd Rahman, N.A. Ransomware as a service and public awareness. PalArch’s J. Archaeol. Egypt/Egyptol. 2020 , 17 , 5277–5292. [ Google Scholar ]
  • Beerman, J.; Berent, D.; Falter, Z.; Bhunia, S. A review of colonial pipeline ransomware attack. In Proceedings of the 2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW), Bangalore, India, 1–4 May 2023; pp. 8–15. [ Google Scholar ]
  • Zimba, A.; Chishimba, M. On the economic impact of crypto-ransomware attacks: The state of the art on enterprise systems. Eur. J. Secur. Res. 2019 , 4 , 3–31. [ Google Scholar ] [ CrossRef ]
  • Liluashvili, G.B. Cyber risk mitigation in higher education. Law World 2021 , 17 , 15. [ Google Scholar ]
  • Khammas, B.M. Ransomware detection using random forest technique. ICT Express 2020 , 6 , 325–331. [ Google Scholar ] [ CrossRef ]
  • Poudyal, S.; Dasgupta, D. AI-powered ransomware detection framework. In Proceedings of the 2020 IEEE Symposium Series on Computational Intelligence (SSCI), Canberra, ACT, Australia, 1–4 December 2020; pp. 1154–1161. [ Google Scholar ]
  • Alqahtani, A.; Gazzan, M.; Sheldon, F.T. A proposed crypto-ransomware early detection (CRED) model using an integrated deep learning and vector space model approach. In Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 6–8 January 2020; pp. 0275–0279. [ Google Scholar ]
  • Khan, F.; Ncube, C.; Ramasamy, L.K.; Kadry, S.; Nam, Y. A digital DNA sequencing engine for ransomware detection using machine learning. IEEE Access 2020 , 8 , 119710–119719. [ Google Scholar ] [ CrossRef ]
  • Ahmed, Y.A.; Kocer, B.; Al-rimy, B.A.S. Automated analysis approach for the detection of high survivable ransomware. KSII Trans. Internet Inf. Syst. (TIIS) 2020 , 14 , 2236–2257. [ Google Scholar ]
  • Davies, S.R.; Macfarlane, R.; Buchanan, W.J. Differential area analysis for ransomware attack detection within mixed file datasets. Comput. Secur. 2021 , 108 , 102377. [ Google Scholar ] [ CrossRef ]
  • Noorbehbahani, F.; Saberi, M. Ransomware detection with semi-supervised learning. In Proceedings of the 2020 10th International Conference on Computer and Knowledge Engineering (ICCKE), Mashhad, Iran, 29–30 October 2020; pp. 024–029. [ Google Scholar ]
  • Bello, I.; Chiroma, H.; Abdullahi, U.A.; Gital, A.Y.; Jauro, F.; Khan, A.; Okesola, J.O.; Abdulhamid, S.M. Detecting ransomware attacks using intelligent algorithms: Recent development and next direction from deep learning and big data perspectives. J. Ambient. Intell. Humaniz. Comput. 2021 , 12 , 8699–8717. [ Google Scholar ] [ CrossRef ]
  • van Boven, L.S.; Kusters, R.W.; Tin, D.; van Osch, F.H.; De Cauwer, H.; Ketelings, L.; Rao, M.; Dameff, C.; Barten, D.G. Hacking acute care: A qualitative study on the health care impacts of ransomware attacks against hospitals. Ann. Emerg. Med. 2024 , 83 , 46–56. [ Google Scholar ] [ CrossRef ]
  • Urooj, U.; Maarof, M.A.B.; Al-rimy, B.A.S. A proposed adaptive pre-encryption crypto-ransomware early detection model. In Proceedings of the 2021 3rd International Cyber Resilience Conference (CRC), Langkawi Island, Malaysia, 29–31 January 2021. [ Google Scholar ]
  • Roy, K.C.; Chen, Q. Deepran: Attention-based bilstm and crf for ransomware early detection and classification. Inf. Syst. Front. 2021 , 23 , 299–315. [ Google Scholar ] [ CrossRef ]
YearTargeted OrganizationRansomware UsedImpact of Attack
2020University of CaliforniaNetWalker1.14 million paid and academic data encrypted
2020GarminWastedLockerMajor service outage and 10 million reportedly paid
2020Software AGClopData stolen and leaked, and 20 million demanded
2021Colonial PipelineDarkSideFuel supply disruption and 4.4 million paid
2021JBS Foods (one of the world’s largest meat processors)REvil/SodinokibiGlobal meat supply affected and 11 million paid
2021KaseyaREvil/SodinokibiManaged Service Provider and their clients affected globally
2022Costa Rica GovernmentContiNational healthcare and finance systems disrupted
2022KronosUnknownPayroll and HR services for numerous companies disrupted
2023HorizonHealthcareEncrypting patient data and disrupting medical services, highlighting the vulnerability of the healthcare sector
StatisticValue
Global ransomware attacks (2021)623.3 million
Global ransomware attacks (H1 2022)236.1 million
Drop in ransomware attacks (2022 vs. 2021)23%
Percentage of cyber crimes attributed to ransomware (2022)20%
Ransomware attributed to Windows-based executables93%
Common entry point for ransomwarePhishing
US share of global ransomware attacks47%
Manufacturing industry attacks attributed to ransomware (2021)Most common
Ransomware attacks that fail or result in zero losses90%
Average ransomware payment (2021)USD 570,000
Increase in average ransomware payment (2020 to 2021)82%
REvil ransomware group’s share of attacks (2021)37%
Top affected countries (ransomware attacks)Israel, South Korea, Vietnam, China, Singapore, India, Kazakhstan, Philippines, Iran, UK
Top affected organizations’ countries (ransomware attacks)USA, Italy, Australia, Brazil, Germany
Number of ransomware families identified130
Percentage of ransomware attacks due to phishing41%
Estimated global successful ransomware attacks (May 2021–June 2022)3640
Organizations expecting ransomware attack (Canada)65%
Largest ransom paid (JBS, 2021)USD 11 million
Ransomware incidents reported to FBI (Jan–July 2021)2084 incidents, USD 16.8 million losses
Predicted frequency of ransomware attacks by 2031Every 2 s
Healthcare sector losses due to ransomware (US, 2021)USD 7.8 billion
YearKey DevelopmentsImpact
1980sIntroduction of AIDS Trojan via floppy disksFirst known ransomware; limited in scope.
2000sUse of advanced encryption to lock filesIncreased difficulty in decrypting files without payment.
2010sRise of cryptocurrency; notable attacks like WannaCryGlobal spread; significant financial and operational impacts.
2020sTargeted attacks on businesses and governmentsLarger ransoms and higher stakes in disruptions.
YearNotable RansomwareMain FeaturesImpact
1989AIDS TrojanFirst ransomwareAsked for payment through the mail; locked file names, not the files themselves.
2005GpcodeUses weak RSA encryptionEarly use of asymmetric encryption but with weak key sizes, allowing decryption without paying.
2013CryptoLockerStrong RSA-2048 encryptionStarted using very strong encryption, causing big losses and marking the start of modern ransomware.
2015Locky, TeslaCryptWidespread use, targeted various file typesAdvanced on previous attacks by improving encryption strength and targeting a wider array of file types; became highly profitable.
2016Petya, NotPetyaDisk encryption and wiping capabilitiesInnovated by encrypting entire disks and spreading within networks; NotPetya masqueraded as ransomware but primarily caused disruption.
2017WannaCry, Bad RabbitExploited EternalBlue vulnerabilityCaused global panic due to rapid spread through networks by exploiting unpatched Windows Server Message Block (SMB) protocol vulnerabilities—SMB is a network protocol used for file sharing; prompted urgent global security updates.
2019MazeDouble extortion techniqueStarted the trend of stealing data before encrypting devices, threatening to release the data if the ransom was not paid.
2020SodinokibiTargeted big companies, used a partner modelAimed at large, important targets and expanded the idea of ransomware-as-a-service, allowing more attackers to participate.
2021DarkSide, REvilHit supply chains and crucial servicesMajor incidents like the Colonial Pipeline attack highlighted the threat to critical infrastructure and supply chains.
2022LockBitAutomated and sophisticated operationsIntroduced automated attack systems to maximize impact and efficiency, further refining the ransomware-as-a-service model.
Detection MethodAdvantagesDisadvantages
Signature-based
Heuristic-based
Anomaly-based
Machine Learning-based
Hybrid
Mentioned CriteriaOur Paper[ ][ ][ ]Suggestions for Improvements
Overview of ransomware attacks
Types of ransomware Identify the types of ransomware attacks
Ransomware attack vectors Explain in more detail
Signs of a ransomware attack Elaborate the different signs of ransomware attacks
Challenges in early detection of ransomware Explain the challenges in detail
Advanced technologies in detection Explain the role of advanced technologies in detection
Taxonomy of ransomware Explain in more detail
Preventive, avoidance, mitigation measures
Regulatory and legal considerations Discuss regulatory and legal considerations
Ransomware framework Explain in more detail
Effectiveness and limitations of current detection methods
Real-world incidents Provide some real-world incidents
Ref.AIML/DLSemi-Supervised LearningStatic/Dynamic AnalysisBehavioral AnalysisAnomaly/Signature-Based DetectionDifferential Area Analysis
[ ]
[ ]
[ , , , , , ]
[ , ]
[ ]
[ ]
[ ]
[ ]
[ ]
[ , , , , ]N/AN/AN/AN/AN/AN/AN/A
Ref.Proposed Method NameMethodologyParametersPlatformObjectiveSolutionResults
[ ]CREDProcess and data-centric detection techniques and DLPerformanceCross-validation of k foldEnhanced the accuracy of the detection and reduced false alarm rates.Accurate determination of pre-encryption stage boundaries.Only proposal, not implemented yet.
[ ]3LSSignature and anomaly-based detectionSecurityN/ADecrease, identify, and prevent different types of attacks.Virtual machine (VM), browser extension, and anti-malware solutions are used within the VM.Their proposed model can isolate suspicious files before executing any harmful activity, but it will be difficult for a computer to run multiple VMs simultaneously.
[ ]Not identifiedFinite-state machine modelAccuracyNET Framework 4.5.2Detect different types of ransomware accurately with low numbers of false predictions.Identifying ransomware attacks based on the current state of the computer system.The experiment results show that the proposed model can identify ransomware attacks efficiently with 99.55% accuracy and 0% FPR.
[ ]Not identifiedMLSecurity and performanceRandom forest, decision tree, and neural networkPredetection of ransomware attacks.Applying the analysis on 7 ransomware, 41 benign software, and 34 malware samples.The experiment results show that the proposed method can differentiate between benign apps and ransomware with low false-positive and -negative rates.
[ ]Not identifiedUsing Shannon entropy to distinguish between high-entropy files and encrypted filesPerformanceIsolated target machineDetermine the time when the encrypted files are created.Model to classify encrypted files reliably even if we have a dataset that consists of high-entropy files.The experiment results prove that the proposed model has a high level of accuracy with a success rate higher than 99.96% when examining the first 192 bytes of a file.
[ ]DNAact-RanDigital DNA sequencing design constraints and k-mer frequency vectorPerformance and accuracyJava (version 1.8)Predetection of ransomware before occurs.Ransomware detection using ML and a Digital DNA sequencing engine.The experiment results show that the proposed method can accurately and effectively detect ransomware.
[ ]An adaptive pre-encryption modelDynamic analysis and Annotated term frequency-inverse document frequency techniqueAccuracyNot implemented yetThe ability to detect different types of ransomware that change their behavior continuously and have updated knowledge about the behavior of the attack.Ransomware predetection model before encryption by using different datasets and different chosen features, which help to train this model in the detection process.Not implemented yet.
[ ]DeepRanUtilizing TF-IDF and Conditional Random Fields (CRF) model and incremental learning methodAccuracyThe LSTM model is used to train the processed data to detect suspicious logsDL-based detector DeepRan is developed to detect and classify ransomware early to prevent network-wide data encryption.Using a fully connected (FC) layer and attention-based bi-directional Long Short-Term Memory (BiLSTM), DeepRan models the normalcy of hosts in an enterprise system in operation and identifies anomalous activity from massive amounts of data.According to experimental results, DeepRan generates an F1-score of 99.02 percent, or 99.87% detection accuracy, for early ransomware detection.
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Albshaier, L.; Almarri, S.; Rahman, M.M.H. Earlier Decision on Detection of Ransomware Identification: A Comprehensive Systematic Literature Review. Information 2024 , 15 , 484. https://doi.org/10.3390/info15080484

Albshaier L, Almarri S, Rahman MMH. Earlier Decision on Detection of Ransomware Identification: A Comprehensive Systematic Literature Review. Information . 2024; 15(8):484. https://doi.org/10.3390/info15080484

Albshaier, Latifa, Seetah Almarri, and M. M. Hafizur Rahman. 2024. "Earlier Decision on Detection of Ransomware Identification: A Comprehensive Systematic Literature Review" Information 15, no. 8: 484. https://doi.org/10.3390/info15080484

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Implications of Internet of Things (IoT) on the Education for students with disabilities: A Systematic Literature Review

Profile image of Collins Oduor

International Journal of Research Publications

Related Papers

Ruth Nthenya Wambua

Ruth N Wambua

The purpose of this study is to provide a comprehensive systematic literature review of digital learning strategies within universities (institutions of higher learning) in developing countries. Further, the paper seeks to identify gaps for further research, as well as point out future research agenda for digital learning strategies within universities in developing countries. A structured literature review method was used in this study. Journal articles published between year 2011 and 2021 were reviewed to inform this study. A total of 16 articles were identified and reviewed. From the findings, strategies for digital learning are not to be ignored for optimal delivery of digital learning both for the student and for the instructor. Future research should leverage big data produced from the use of the learning platforms and investigate how the incorporation of advanced learning technologies could advance institutional value.

a systematic literature review on internet of things in education benefits and challenges

International journal of research publications

Sergia Pangan

Dorothy Fabian

Nilda San Miguel

JOHN KHARLO ARQUIZA

Mary Grace Lim

Maria Lea San Mateo

Covid-19 Pandemic had brought drastic changes in the Philippine education system, schools shifted from the traditional face to face to blended distance learning. One of the major concerns to these new normal modalities is enhancing the performance of the students in the least learned competencies. This study assessed the effectiveness of the DOST course ware modules on the least learned competencies in Arithmetic and Geometric sequences as remediation materials to enhance students’ performance in Grade 10 Mathematics in the “New Normal” educational setting. An evaluation of the motivational effectiveness of the DOST courseware modules on Arithmetic and Geometric sequences was conducted among the Grade 10 students of Los Banos NHS-BM. Instructional Materials Motivation Survey (IMMS), open ended questions and one sample pretest-posttest design were used in this study. The results were analyzed and explained using descriptive statistics, measures of central tendency and t-test on paire...

Aretha Matienzo

Edilberto Andal

This study aimed to determine the relationship of physical activity and exercise participation motives with that of the dance skills performance of students. This study utilized the descriptive- correlational research design with 40 of Cagbalete Island National High School Grade 10 students of the academic year 2021-2022 as the respondents. Participatory motives were measured using the Exercise Motivation Inventory (EMI-2) of Markland (1997). The statistical tools used were the mean statistics standard deviation in determining the participation motives of the respondents and Pearson Product-Moment Correlation Coefficient in determining the relationship between the participatory motives and dance skills performance of the respondents. Results show that enjoyment is the top motive of the students to participate in physical activity and exercises. They are very good in manifesting their physical, technical and skills performance. It was concluded that there is a significant relationship between the physical activity and exercise motives in terms of enjoyment with that of the dance skills performance of the students, which implies that enjoyment plays a crucial role in their physical activity participation. To ensure enjoyment in Physical Education (PE) it is suggested that teacher consider certain enjoyment processes particularly activity-related excitement when structuring PE activities and programs.

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

Esther Digal

Arlene Loquias , Rose Balighot

Jinky Mañibo

Brendan Bentley

Camille Dumpang

Merlyn Juacalla

Russel Aporbo

Frontiers in Artificial Intelligence and Applications

International Journal of Research Publication (IJRP)

Linus Thliza

Behavioral Sciences

Miana Carneiro

Rosalie Macalos

Technium Social Sciences Journal

Ζωή Καραμπατζάκη

Waqas Nawaz

Musa K . Damao

Martha Nahole

Ahlexa Molabola

Multimodal Technologies and Interaction

Juan Garzón

Michelle Velasco

CHRIS JEZREL BARLETA , Agripina Banayo

Reviewing Assistive Human-Robot Experiences for Inclusive Human-Robot Interaction

Aishah Shah

Jennifer Manalo

Maria Lourdes G . Tan

Richard Galano

Marivel De Guzman

Jaesa Garcia

Esteban Lagrada

Loveda Guisando

Bryan Dandan

Ronalyn Castro

Leoncio Olobia

Lucilyn Luis

Jorge Pelegrín Borondo

Robert Sieben

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

IMAGES

  1. (PDF) A Systematic Literature Review on Internet of Things in Education

    a systematic literature review on internet of things in education benefits and challenges

  2. A systematic literature review on Internet of things in education

    a systematic literature review on internet of things in education benefits and challenges

  3. (PDF) Internet of Things: A systematic Literature Review -Overview Paper

    a systematic literature review on internet of things in education benefits and challenges

  4. (PDF) A Systematic Literature Review on Internet of Things in Education

    a systematic literature review on internet of things in education benefits and challenges

  5. Iot In Education Powerpoint Template Ppt Slides

    a systematic literature review on internet of things in education benefits and challenges

  6. systematic literature review steps

    a systematic literature review on internet of things in education benefits and challenges

COMMENTS

  1. A Systematic Literature Review on Internet of Things in Education

    This study presents the results of a systematic literature review focusing on the benefits and the challenges faced in education in integrating IoT into the curriculum and educational environments.

  2. A systematic literature review on Internet of things in education

    With close to 20.4 billion devices connected to the Internet to be deployed by 2020, Internet of things (IoT) is already being leveraged in diverse sectors. Now, because of the ubiquitous nature of I...

  3. A systematic literature review on Internet of things in education

    Semantic Scholar extracted view of "A systematic literature review on Internet of things in education: Benefits and challenges" by M. Kassab et al.

  4. The Internet of Things as a Tool Towards Smart Education: A Systematic

    The IoT enhances how schools monitor students' behaviour, performance, locations, health and social behaviours, with applicability in the use of beacon chips as a form of student identity. This technology ensures simplification of facial identification challenges through the use of biometrics.

  5. The use of Internet of Things devices in early childhood education: A

    In 2017, Kassab et al. ( 2020) conducted a meaningful systematic review on the benefits and challenges of incorporating the IoT into education, which covered all the stages of learning.

  6. Investigating the impact of the Internet of Things on higher education

    Originality/value By examining the evidence, this study contributes to understanding the context and supplements existing research. It conducts a systematic literature review to assess the impact of the IoT on the educational process, proposes future research directions and presents findings that aid the efficient management of HE resources.

  7. Internet of Things in Education: Opportunities and Challenges

    The basic concept of Internet of Things is the ability to upgrade everyday objects with identification, sensor, network, and processing capabilities that will enable them to communicate with each other, as well as with other devices and services via the Internet. Improved in this way, these objects become smart objects, because they require ...

  8. Challenges and Opportunities in the Internet of Intelligence of Things

    The overall purpose of this study is to explore the application of IoT and artificial intelligence in education and, more specifically, learning. Our methodology follows four research questions. We first report the results of a systematic literature review on the Internet of Intelligence of Things (IoIT) in education.

  9. PDF Implications Of Internet Of Things (IoT) On The Education For Students

    Using the Systematic Literature Review (SLR) method by Kitchenham, 2007, this paper presents a systematic literature review with a goal to present the implications of IoT in education for students ...

  10. PDF A systematic literature review on Internet of things in education

    This study presents the results of a systematic literature. review focusing on the benefits and the challenges faced in education in integrating. IoT into the curriculum and educational ...

  11. The dual effects of the Internet of Things (IoT): A systematic review

    The paper reads as follows: the literature review deriving a comprehensive list of benefits and risks is presented in Section 2; the methodology used in this research is described in Section 3. The results of the two case studies are presented in Section 4. The resulting benefits of IoT adoption in the cases are presented followed by the risks.

  12. Impacts of digital technologies on education and factors influencing

    For this purpose, we conducted a non-systematic literature review. The results of the literature review were organized thematically based on the evidence presented about the impact of digital technology on education and the factors that affect the schools' digital capacity and digital transformation.

  13. Adoption of Internet of Things: A systematic literature review and

    Due to the enormous potential of the Internet of things, attention towards its adoption is increasing significantly. Despite the undeniable relevance of this field, the current study aims to synthesize the body of knowledge on IoT adoption using systematic literature review (SPAR-4-SLR) with the TCCM framework.

  14. (PDF) Implications Of Internet Of Things (IoT) On The Education For

    Using the Systematic Literature Review (SLR) method by Kitchenham, 2007, this paper presents a systematic literature review with a goal to present the implications of IoT in education for students with disabilities.

  15. A systematic literature review on Internet of things in education

    This study presents the results of a systematic literature review focusing on the benefits and the challenges faced in education in integrating IoT into the curriculum and educational environments.

  16. Internet of Things Based Education: Definition, Benefits, and Challenges

    Moreover, we analyze the benefit of the internet of things based education, which is mainly about the wider geographic coverage and Real-time access and independence.

  17. (PDF) Implications Of Internet Of Things (IoT) On The Education For

    Considering the world population of 15% that is of people living with disabilities according to World Health Organization, this paper therefore is a systematic review of literature for the period ...

  18. Full article: Science capital as a lens for studying science

    This article presents the findings of a systematic review that considers research conducted on science capital. Science capital includes what an individual knows about science, what they think abou...

  19. (PDF) Implications of Internet of Things (IoT) on the Education for

    Considering the world population of 15% that is of people living with disabilities according to World Health Organization, this paper therefore is a systematic review of literature for the period 2010 to 2021, on the implications of Internet of Things (IoTs) on the Education for students with disabilities, to highlight benefits, challenges ...

  20. Information

    The methodology used in this research is a systematic literature review (SLR). SLR is used to present the information in a clear and organized way. It will help in identifying the limitations and research gaps that exist in current studies. It will also help in the determination of the research future direction.

  21. (PDF) Implications of Internet of Things (IoT) on the Education for

    The purpose of this study is to provide a comprehensive systematic literature review of digital learning strategies within universities (institutions of higher learning) in developing countries. Further, the paper seeks to identify gaps for further research, as well as point out future research agenda for digital learning strategies within universities in developing countries. A structured ...

  22. (PDF) Implications of Internet of Things (IoT) on the Education for

    Implications of Internet of Things (IoT) on the Education for students with disabilities: A Systematic Literature Review