NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ryan Creps; Shadman Islem; Bingran Zeng; Angela Boatman; Andrés Castro Samayoa – Innovative Higher Education, 2025
This study examines the success of undergraduate students in computer science supplementary courses offered by a non-profit organization in partnership with colleges and universities across the U.S. Using a novel dataset from the nonprofit organization, we present one of the first descriptive overviews of students enrolled in supplemental computer…
Descriptors: Undergraduate Study, Program Evaluation, Computer Science Education, Supplementary Education
Peer reviewed Peer reviewed
Direct linkDirect link
Joe Anistranski; Karen Harper; Stephanie Zeiger – Learning Professional, 2024
Educators and researchers often think of program design and program evaluation as separate endeavors, even intentionally creating a firewall between them. But what if designers and evaluators worked together, combining their insights to strengthen both the program and the study of it? In the work of evaluating a statewide professional learning…
Descriptors: Program Design, Program Evaluation, Professional Development, State Legislation
Peer reviewed Peer reviewed
Direct linkDirect link
Aykut Durak; Vahide Bulut – Technology, Knowledge and Learning, 2025
The study uses the partial least squares-structural equation modeling (PLS-SEM) algorithm to predict the factors affecting the programming performance (PPE) (low, high) of the students receiving computer programming education. The participants of the study consist of 763 students who received programming education. In the analysis of the data, the…
Descriptors: Prediction, Low Achievement, High Achievement, Academic Achievement
Peer reviewed Peer reviewed
Direct linkDirect link
Hoffman, Daniel L.; Leong, Peter; Ka'aloa, Rochelle Pi'ilani H.; Paek, Seungoh – TechTrends: Linking Research and Practice to Improve Learning, 2022
Culturally-relevant computing has been discussed as a way to promote K-12 Computer Science education and address ongoing challenges related to diversity, equity, and inclusion. What is not well understood about the practice of culturally-relevant computing, however, is how to bring together existing cultural frameworks and Computer Science…
Descriptors: Culturally Relevant Education, Computer Science Education, Teacher Attitudes, Educational Principles
Peer reviewed Peer reviewed
Direct linkDirect link
Arastoopour Irgens, Golnaz; Adisa, Ibrahim; Bailey, Cinamon; Vega Quesada, Hazel – Educational Technology & Society, 2022
As big data algorithm usage becomes more ubiquitous, it will become critical for all young people, particularly those from historically marginalized populations, to have a deep understanding of data science that empowers them to enact change in their local communities and globally. In this study, we explore the concept of critical machine…
Descriptors: Artificial Intelligence, Children, Algorithms, After School Programs
Peer reviewed Peer reviewed
Direct linkDirect link
Hutchison, Amy; Evmenova, Anya S. – Intervention in School and Clinic, 2022
States increasingly are adopting computer science standards to help students develop coding and computational thinking skills. In an effort to support teachers in introducing computer science content to their students with high-incidence disabilities, a new model, computer science integration planning plus universal design for learning (CSIP+),…
Descriptors: Computer Science Education, Students with Disabilities, Access to Education, Computation
Peer reviewed Peer reviewed
Direct linkDirect link
Maher Salem; Khalid Samara; Abdel-Karim Al-Tamimi – ACM Transactions on Computing Education, 2024
This study focuses on the challenges encountered in online cybersecurity education. It adopts an exploratory research design using a mixed-methods approach to investigate the perceptions and experiences of postgraduate students enrolled in an online cybersecurity program. The collection of data is structured into two distinct phases. In the…
Descriptors: Information Security, Computer Security, Guidelines, Student Motivation