NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20251
Since 20244
Since 2021 (last 5 years)9
Since 2016 (last 10 years)22
Since 2006 (last 20 years)35
Audience
Teachers2
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 35 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Peer reviewed Peer reviewed
Direct linkDirect link
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Tutorial Programs, Computer Science Education, Computer Security, Programming
Alannah Oleson – ProQuest LLC, 2023
To realize more equitable technology futures, it is not enough to simply adapt technology to be more inclusive "after" it is created. We will also need to equip technology creators with the skills they need to critically reflect upon bias and exclusion "during" the technology design process. The question of how to best to…
Descriptors: Computation, Computer Science Education, Inclusion, Decision Making
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Geoff D. Zylstra; Jill Belli; Candido Cabo; Sean P. MacDonald; Robin Michals; Anne Marie Sowder; Christopher Swift – Journal of Interdisciplinary Studies in Education, 2024
The humanities have the potential to enhance STEM curriculum in career-oriented professional degree programs. As part of a larger college-wide initiative to develop interdisciplinary curricula, the National Endowment for the Humanities (NEH) awarded a grant to New York City College of Technology to explore the relationship between the humanities…
Descriptors: Humanities, Educational Environment, STEM Education, Curriculum
Peer reviewed Peer reviewed
Direct linkDirect link
Vogel, Sara – ACM Transactions on Computing Education, 2021
Critical computing approaches to K-12 computer science education aim to promote justice in computing and the wider world. Despite being intertwined with inequitable power dynamics in computing, issues of linguistic (in)justice have received less attention in critical computing. In this article, I draw on theoretical ideas from sociolinguistics and…
Descriptors: Computer Science Education, Middle School Students, Bilingual Students, Multilingualism
Peer reviewed Peer reviewed
Direct linkDirect link
Fominykh, Mikhail; Weidlich, Joshua; Kalz, Marco; Hybertsen, Ingunn Dahler – International Journal of Educational Technology in Higher Education, 2022
This article contributes to the debate on the growing number of interdisciplinary study programs in learning and technology, and aims to understand the diversity of programs as well as curricula structure in an international landscape. Scientific fields share their knowledge and recruit young researchers by offering discipline-specific study…
Descriptors: Electronic Learning, Curriculum Evaluation, Interdisciplinary Approach, Masters Programs
Peer reviewed Peer reviewed
Direct linkDirect link
Christine Wusylko; Kara Dawson; Pavlo Antonenko; Zhen Xu – Journal of Technology and Teacher Education, 2024
Cybersecurity educational efforts are urgently needed to introduce young people to the profession and give students and teachers cybersecurity knowledge to protect themselves from increasing cybercrime. In this study, 56 elementary preservice teachers participated in a 3-hour intervention within a technology integration course that introduced them…
Descriptors: Computer Security, Technology, Preservice Teacher Education, Preservice Teachers
Kimberly A. Mayer – ProQuest LLC, 2020
This action research study explored how women perceived the influences of collaborative software development methodologies on workplace culture at one financial technology firm. While collaborative software development methodologies were not designed to increase gender diversity, the transformational shifts in the way technology teams work…
Descriptors: Employed Women, Technology, Computer Software, Cooperation
Peer reviewed Peer reviewed
Direct linkDirect link
Jones, Stephanie T.; Thompson, JaCoya; Worsley, Marcelo – Computer Science Education, 2020
Background and Context: Sports and technology are often pitted as being at odds with one another. While there are several educational activities that make reference to sports we seldom see sports used as an authentic context for learning computing. Objective: We describe the design of Data in Motion, a curriculum that considers the bi-directional…
Descriptors: Athletics, STEM Education, Summer Programs, Elementary School Students
Beckman, Joseph W. – ProQuest LLC, 2019
Information security practitioners and researchers who possess sufficient depth of conceptual understanding to reconstitute systems after attacks or adapt information security concepts to novel situations are in short supply. Education of new information security professionals with sufficient conceptual depth is one method by which this shortage…
Descriptors: Achievement Gains, Cognitive Processes, Coding, Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bevz, Valentyna; Dmytriienko, Oksana – Advanced Education, 2020
The article presents the integrated course "The History of Science and Technology" developed for the students of pedagogical universities, majoring in physics, mathematics, and computer sciences. The authors highlight the effective forms, methods and means of teaching the course. The qualitative research methods included observations,…
Descriptors: Foreign Countries, College Students, Student Attitudes, Science History
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rosamond, Frances – Informatics in Education, 2018
The Computer Science Unplugged activities and project has been an influential STEM (Science, Technology, Engineering & Mathematics) initiative, providing enrichment and teaching activities supporting computational thinking. Many of its activities are suitable for children. One of the most popular Unplugged activities is "Kid Krypto",…
Descriptors: Technology, Computation, Thinking Skills, Enrichment Activities
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Arboledas-Brihuega, David – Journal of Technology and Science Education, 2019
It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we are in a highly digitized world in which information is continuously transmitted through data communication networks with the expectation of security and confidentiality. Students who are in…
Descriptors: Mathematics, Curriculum Implementation, Active Learning, Student Projects
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Havenga, Marietjie; Drevin, Lynette – International Association for Development of the Information Society, 2020
Although postgraduate students are required to be self-directed, this is not always the case. The aims of this study were twofold. Firstly, we investigated whether the use of problem-based projects supported students in implementing different cryptography algorithms as part of a group assignment. Secondly, we determined to which extent the use of…
Descriptors: Problem Based Learning, Independent Study, Graduate Students, Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ho, Anne M. – PRIMUS, 2018
Escape rooms are an increasingly popular puzzle game, and educators have started implementing them in classrooms. This paper will describe the motivations and implementation of escape-room-like puzzles in an undergraduate cryptography course, including how the open-source mathematics software system SageMath is used. In addition, there is a…
Descriptors: Puzzles, Technology, Class Activities, Undergraduate Students
Previous Page | Next Page ยป
Pages: 1  |  2  |  3