NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Adamo-Villani, Nicoletta; Oania, Marcus; Cooper, Stephen – Journal of Educational Technology Systems, 2013
We report the development and initial evaluation of a serious game that, in conjunction with appropriately designed matching laboratory exercises, can be used to teach secure coding and Information Assurance (IA) concepts across a range of introductory computing courses. The IA Game is a role-playing serious game (RPG) in which the student travels…
Descriptors: Educational Games, Computer Games, Role Playing, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Cooper, Stephen – ACM Transactions on Computing Education, 2010
This article explores the major design characteristics (both pedagogic as well as technical) that helped to shape Alice 2. It identifies several strengths of Alice as well as several weaknesses. An example problem is solved in Alice, covering many of the design characteristics. Finally, the effects and impacts of Alice instruction are presented,…
Descriptors: Computer Software, Computer Assisted Instruction, Computer Science Education, Programming