Publication Date
In 2025 | 0 |
Since 2024 | 5 |
Descriptor
Author
Arjan J. F. Kok | 1 |
Azar Pakdaman Savoji | 1 |
Bahareh Shahabi | 1 |
Connor David Nelson | 1 |
Cornelis Huizing | 1 |
Daniel Chang | 1 |
Diana Cukierman | 1 |
Harrie Passier | 1 |
Holly Hendrigan | 1 |
Joan Sharp | 1 |
John Nesbit | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 3 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Secondary Education | 1 |
Audience
Location
Canada | 1 |
Netherlands | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Paul Biberstein; Thomas Castleman; Luming Chen; Shriram Krishnamurthi – Informatics in Education, 2024
CODAP is a widely-used programming environment for secondary school data science. Its direct-manipulation-based design offers many advantages to learners, especially younger students. Unfortunately, these same advantages can become a liability when it comes to repeating operations consistently, replaying operations (for reproducibility), and also…
Descriptors: Data Science, Secondary School Students, Programming, Open Source Technology
John Nesbit; Qing Liu; Joan Sharp; Diana Cukierman; Holly Hendrigan; Daniel Chang; Bahareh Shahabi; Qingyan Deng; Azar Pakdaman Savoji – Journal of Interactive Learning Research, 2024
The Dialectical Map (DMap) is an open-source, web-based argument visualization tool developed and used at a Canadian University to scaffold argument construction. To illustrate the ways that argument mapping can be used in undergraduate courses, this article presents five cases selected from courses in biology, psychology, computing science, and…
Descriptors: Foreign Countries, Undergraduate Students, Open Source Technology, Persuasive Discourse
Connor David Nelson – ProQuest LLC, 2024
This dissertation introduces a comprehensive framework aimed at reshaping applied cybersecurity education to significantly ease the learning curve, at scale, through three synergistic innovations. These methods address the daunting educational barriers in cybersecurity, enabling learners at all levels to understand complex security concepts more…
Descriptors: Computer Security, Information Security, Computer Science Education, Models
Milan Turcáni; Zoltan Balogh; Michal Kohútek – Smart Learning Environments, 2024
In this research, a mixed-method approach was employed to conduct large-scale eye-tracking measurements, traditionally associated with high costs and extensive time commitments. Utilizing consumer-grade webcams in conjunction with open-source software, data was collected from an expansive cohort of students, thereby demonstrating the scalability…
Descriptors: Computer Science Education, Eye Movements, Reading Comprehension, Knowledge Level
Arjan J. F. Kok; Lex Bijlsma; Cornelis Huizing; Ruurd Kuiper; Harrie Passier – Informatics in Education, 2024
This paper presents the first experiences of the use of an online open-source repository with programming exercises. The repository is independent of any specific teaching approach. Students can search for and select an exercise that trains the programming concepts that they want to train and that only uses the programming concepts they already…
Descriptors: Programming Languages, Computer Science Education, Open Source Technology, Teaching Methods