Publication Date
| In 2026 | 0 |
| Since 2025 | 4 |
| Since 2022 (last 5 years) | 7 |
| Since 2017 (last 10 years) | 7 |
| Since 2007 (last 20 years) | 7 |
Descriptor
Source
| ACM Transactions on Computing… | 1 |
| Australasian Journal of… | 1 |
| Discover Education | 1 |
| Education and Information… | 1 |
| Educational Process:… | 1 |
| Journal of Cybersecurity… | 1 |
| Smart Learning Environments | 1 |
Author
| Brenda M. Stoesz | 1 |
| Carlos Novo | 1 |
| Chenglu Li | 1 |
| Daniel Gooch | 1 |
| Gibson Uwaezuoke Mba | 1 |
| John Woodthorpe | 1 |
| Kevin Waugh | 1 |
| Khanittha Sittitiamjan | 1 |
| Livinus Obiora Nweke | 1 |
| Marian Petre | 1 |
| Mark A Slaymaker | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 7 |
| Reports - Research | 6 |
| Reports - Descriptive | 1 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 4 |
| High Schools | 1 |
| Secondary Education | 1 |
Audience
Location
| Canada | 1 |
| Nigeria | 1 |
| Thailand | 1 |
| United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zifeng Liu; Wanli Xing; Xinyue Jiao; Chenglu Li; Wangda Zhu – Education and Information Technologies, 2025
The ability of large language models (LLMs) to generate code has raised concerns in computer science education, as students may use tools like ChatGPT for programming assignments. While much research has focused on higher education, especially for languages like Java and Python, little attention has been given to K-12 settings, particularly for…
Descriptors: High School Students, Coding, Artificial Intelligence, Electronic Learning
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Matthew Quesnel; Brenda M. Stoesz – Australasian Journal of Educational Technology, 2025
Contract cheating is a significant concern in higher education, requiring a multifaceted teaching and learning approach to address it. Quizzing students about their writing to promote engagement, confirm authorship and detect cheating has not yet been investigated systematically. Therefore, in this study, our objective was to explore the validity…
Descriptors: Cheating, Authors, Computer Uses in Education, Validity
Khanittha Sittitiamjan; Pongpisit Wuttidittachotti – Educational Process: International Journal, 2025
Background/purpose: This study investigates how knowledge, attitudes, and practices (KAP) influence cybersecurity awareness (CSA) among students in Thai educational institutions. The research addresses regional disparities in cybersecurity readiness by incorporating a culturally responsive adaptation of the KAP model. Materials/methods: A…
Descriptors: Computer Security, Computer Science Education, Foreign Countries, College Students
Livinus Obiora Nweke; Uchenna Franklin Okebanama; Gibson Uwaezuoke Mba – Discover Education, 2025
The integration of Internet of Things (IoT), Artificial Intelligence (AI), and cybersecurity presents new opportunities for innovation and entrepreneurship, yet traditional educational approaches often lack the interdisciplinary and applied focus required to develop these competencies. This study evaluates the impact of an experiential learning…
Descriptors: Entrepreneurship, Artificial Intelligence, Internet, Information Security
Milan Turcáni; Zoltan Balogh; Michal Kohútek – Smart Learning Environments, 2024
In this research, a mixed-method approach was employed to conduct large-scale eye-tracking measurements, traditionally associated with high costs and extensive time commitments. Utilizing consumer-grade webcams in conjunction with open-source software, data was collected from an expansive cohort of students, thereby demonstrating the scalability…
Descriptors: Computer Science Education, Eye Movements, Reading Comprehension, Knowledge Level
Mike Richards; Kevin Waugh; Mark A Slaymaker; Marian Petre; John Woodthorpe; Daniel Gooch – ACM Transactions on Computing Education, 2024
Cheating has been a long-standing issue in university assessments. However, the release of ChatGPT and other free-to-use generative AI tools has provided a new and distinct method for cheating. Students can run many assessment questions through the tool and generate a superficially compelling answer, which may or may not be accurate. We ran a…
Descriptors: Computer Science Education, Artificial Intelligence, Cheating, Student Evaluation

Peer reviewed
Direct link
