Publication Date
| In 2026 | 2 |
| Since 2025 | 449 |
| Since 2022 (last 5 years) | 2037 |
| Since 2017 (last 10 years) | 4010 |
| Since 2007 (last 20 years) | 6156 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Teachers | 120 |
| Researchers | 25 |
| Students | 17 |
| Policymakers | 15 |
| Practitioners | 14 |
| Administrators | 7 |
| Media Staff | 5 |
| Parents | 2 |
| Community | 1 |
Location
| Turkey | 244 |
| Australia | 127 |
| United Kingdom | 118 |
| Taiwan | 111 |
| China | 108 |
| California | 92 |
| Germany | 80 |
| Spain | 78 |
| United States | 73 |
| Greece | 72 |
| Canada | 71 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 2 |
| Does not meet standards | 1 |
Benander, Alan C.; Benander, Barbara A. – Journal of Information Systems Education, 2008
Educators have been using the Towers of Hanoi problem for many years as an example of a problem that has a very elegant recursive solution. However, the elegance and conciseness of this solution can make it difficult for students to understand the amount of computer time required in the execution of this solution. And, like many recursive computer…
Descriptors: Computer Science Education, Information Systems, Programming, Active Learning
Gaspar, Alessio; Langevin, Sarah; Boyer, Naomi; Armitage, William – Informatics in Education, 2010
This qualitative study explores how using Peer Learning Forums (PLF) in an online asynchronous computer programming course can be analyzed to derive information about Student Activity Focus (SAF) for adult Information Technology students. Three instruments are proposed to assist instructors classify questions posted by students on these forums,…
Descriptors: Asynchronous Communication, Qualitative Research, Learning Activities, Classification
Kordaki, Maria – Computers & Education, 2010
This paper presents both the design and the pilot formative evaluation study of a computer-based problem-solving environment (named LECGO: Learning Environment for programming using C using Geometrical Objects) for the learning of computer programming using C by beginners. In its design, constructivist and social learning theories were taken into…
Descriptors: Feedback (Response), Constructivism (Learning), Formative Evaluation, Problem Solving
Tangney, Brendan; Oldham, Elizabeth; Conneely, Claire; Barrett, Stephen; Lawlor, John – IEEE Transactions on Education, 2010
This paper describes a model for computer programming outreach workshops aimed at second-level students (ages 15-16). Participants engage in a series of programming activities based on the Scratch visual programming language, and a very strong group-based pedagogy is followed. Participants are not required to have any prior programming experience.…
Descriptors: Foreign Countries, Computer Software, Programming Languages, Computer Science Education
Archibald, J. K.; Fife, W. S. – Computer Science Education, 2007
Embedded systems are increasingly pervasive, and the creation of reliable controlling software offers unique challenges. Embedded software must interact directly with hardware, it must respond to events in a time-critical fashion, and it typically employs concurrency to meet response time requirements. This paper describes an innovative course…
Descriptors: Computer Software, Troubleshooting, Undergraduate Students, Undergraduate Study
Joyce, Donald – Computer Science Education, 2007
This paper reviews nearly 80 published items concerned with promoting academic integrity and reducing plagiarism. Nearly all of them were published in the last seven years and have authors based in Australasia. Most of them have authors from computing departments and many were published in computing journals or presented at computing conferences.…
Descriptors: Plagiarism, Cheating, Integrity, Computer Science
Castro-Schez, J. J.; del Castillo, E.; Hortolano, J.; Rodriguez, A. – IEEE Transactions on Education, 2009
Educational software tools are considered to enrich teaching strategies, providing a more compelling means of exploration and feedback than traditional blackboard methods. Moreover, software simulators provide a more motivating link between theory and practice than pencil-paper methods, encouraging active and discovery learning in the students.…
Descriptors: Foreign Countries, Computer Software, Data Analysis, Web Based Instruction
Cox, G. W.; Hughes, W. E., Jr.; Etzkorn, L. H.; Weisskopf, M. E. – IEEE Transactions on Education, 2009
This paper presents the results of an analysis of indicators that can be used to predict whether a student will succeed in a Computer Science Ph.D. program. The analysis was conducted by studying the records of 75 students who have been in the Computer Science Ph.D. program of the University of Alabama in Huntsville. Seventy-seven variables were…
Descriptors: Case Studies, Prediction, Computer Science Education, Doctoral Degrees
Chen, Hsinchun; Li, Xin; Chau, M.; Ho, Yi-Jen; Tseng, Chunju – IEEE Transactions on Education, 2009
With the advent of the World Wide Web, many business applications that utilize data mining and text mining techniques to extract useful business information on the Web have evolved from Web searching to Web mining. It is important for students to acquire knowledge and hands-on experience in Web mining during their education in information systems…
Descriptors: Class Activities, Information Systems, Internet, Computer Science Education
Ritzhaupt, Albert D. – ACM Transactions on Computing Education, 2009
This article provides an overview of the challenges in implementing a game development course with limited resources in computing curricula. An approach to a holistic game development course is outlined in terms of its organization, software, and instructional methods. The course had 23 students enrolled in its first offering and was…
Descriptors: Educational Strategies, Reliability, Cooperative Learning, Teaching Methods
Caspersen, Michael E.; Kolling, Michael – ACM Transactions on Computing Education, 2009
Programming is recognized as one of seven grand challenges in computing education. Decades of research have shown that the major problems novices experience are composition-based---they may know what the individual programming language constructs are, but they do not know how to put them together. Despite this fact, textbooks, educational…
Descriptors: Programming Languages, Computer Software, Educational Practices, Programming
Dyson, Laurel Evelyn; Litchfield, Andrew; Lawrence, Elaine; Raban, Ryszard; Leijdekkers, Peter – Australasian Journal of Educational Technology, 2009
This article reports on an m-learning research agenda instituted at our university in order to explore how mobile technology can enhance active, experiential learning. Details of the implementation and results of four areas of m-learning are presented: mobile supported fieldwork, fostering interactivity in large lectures with mobile technology,…
Descriptors: Experiential Learning, Case Studies, Program Implementation, Curriculum Implementation
Pendegraft, Norman – Journal of Information Systems Education, 2009
An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…
Descriptors: Privacy, Instructional Materials, Business Administration Education, Class Activities
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Paz, Tamar; Leron, Uri – Journal for Research in Mathematics Education, 2009
Functions are all around us, disguised as actions on concrete objects. Composition of functions, too, is all around us, because these actions can be performed in succession, the output of one serving as the input for the next. In terms of Gray and Tall's (2001) "embodied objects" or Lakoff and Nunez's (2000) "mathematical idea…
Descriptors: Concept Formation, Mathematics Instruction, Mathematical Concepts, Algebra

Peer reviewed
Direct link
