Publication Date
| In 2026 | 0 |
| Since 2025 | 5 |
| Since 2022 (last 5 years) | 30 |
| Since 2017 (last 10 years) | 130 |
| Since 2007 (last 20 years) | 377 |
Descriptor
Source
Author
| Isaías, Pedro, Ed. | 3 |
| Cutumisu, Maria | 2 |
| Demirbilek, Muhammet | 2 |
| Garrett, Lauretta | 2 |
| Garrison, D. R. | 2 |
| Gero, John | 2 |
| Gire, Elizabeth | 2 |
| Gray, Colin M. | 2 |
| Hokayem, Hayat | 2 |
| Howard, Craig D. | 2 |
| Ifenthaler, Dirk, Ed. | 2 |
| More ▼ | |
Publication Type
Education Level
Location
| Turkey | 23 |
| Canada | 15 |
| Australia | 13 |
| China | 13 |
| United Kingdom | 11 |
| Taiwan | 10 |
| Japan | 7 |
| New Zealand | 7 |
| California | 6 |
| Iran | 6 |
| United States | 6 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Need for Cognition Scale | 1 |
| Program for International… | 1 |
| SAT (College Admission Test) | 1 |
| Self Description Questionnaire | 1 |
| Stages of Concern… | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Haley A. Delcher; Enas S. Alsatari; Adeyeye I. Haastrup; Sayema Naaz; Lydia A. Hayes-Guastella; Autumn M. McDaniel; Olivia G. Clark; Devin M. Katerski; Francois O. Prinsloo; Olivia R. Roberts; Meredith A. Shaddix; Bridgette N. Sullivan; Isabella M. Swan; Emily M. Hartsell; Jeffrey D. DeMeis; Sunita S. Paudel; Glen M. Borchert – Biochemistry and Molecular Biology Education, 2025
Today, due to the size of many genomes and the increasingly large sizes of sequencing files, independently analyzing sequencing data is largely impossible for a biologist with little to no programming expertise. As such, biologists are typically faced with the dilemma of either having to spend a significant amount of time and effort to learn how…
Descriptors: Artificial Intelligence, Technology Uses in Education, Training, Teaching Methods
Sinan Onal; Derya Kulavuz-Onal; Marie Childers – Journal of Educational Technology Systems, 2025
This study investigates the integration and application of ChatGPT among U.S. higher education students across various academic disciplines. Given the recent introduction of ChatGPT in educational contexts, this research aims to understand the specific ways students utilize this tool for academic tasks and their perceived impact on their academic…
Descriptors: Artificial Intelligence, Technology Uses in Education, Educational Benefits, Academic Achievement
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Masoumeh Bagheri-Nesami; Mahsa Kamali; Amirabbas Mollaei – Smart Learning Environments, 2025
Nurses acknowledge that their understanding of the shortcomings in the utilization of medical devices stems from insufficient knowledge about their correct usage. The use of Quick Response (QR) technology has paved a new gateway for accessing information and resources. The available evidence confirmed the usefulness of QR codes for use in clinical…
Descriptors: Medical Services, Handheld Devices, Knowledge Level, Clinical Experience
Deepak Dawar – Information Systems Education Journal, 2024
Learning computer programming is typically difficult for newcomers. Demotivation and learned helplessness have received much attention. Besides the subject's intricacy, low in-class participation has been associated with poor student achievement. This paper presents a follow-up, stage 2 study on the novel instructional technique, Student-Driven…
Descriptors: College Students, Computer Science Education, Required Courses, Elective Courses
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Ciganik, Shari; McDaniel, Michael – PRIMUS, 2021
Prospective teachers and cryptography students use programming, statistics and guile to enrich both their courses.
Descriptors: Preservice Teachers, Elementary School Teachers, Technology, Problem Solving
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
Joshua Holden – PRIMUS, 2024
This paper describes Alkaline, a size-reduced version of Kyber, which has recently been announced as a prototype NIST standard for post-quantum public-key cryptography. While not as simple as RSA, I believe that Alkaline can be used in an undergraduate classroom to effectively teach the techniques and principles behind Kyber and post-quantum…
Descriptors: Technology, Coding, Undergraduate Study, Algebra
C. Beaver – PRIMUS, 2024
In this paper, several research topics are presented that provide productive avenues of exploration for students in an undergraduate cryptography course. The topics are intended for a variety of skill levels and interests. In some cases, a student might be inspired to try to solve the proposed problem or write computer code. Other topics might…
Descriptors: Technology, Coding, Undergraduate Students, Student Projects
Ho, Chun-Heng; Zhang, Hang-qin; Li, Juan; Zhang, Min-quan – International Journal of Distance Education Technologies, 2023
Digital education has recently become a mainstream education model. Despite digital education's increasing popularity, there remain issues when it comes to teacher-student interactions in digital space, which have made it impossible for this model to achieve the same teaching quality as traditional in-person education. Compared with other academic…
Descriptors: Technology Uses in Education, Electronic Learning, Teacher Student Relationship, Interaction
Ece Ceren Özer; Aleyna Özdemir; Feyza Ünsal; Semra Benzer – Science Insights Education Frontiers, 2025
This qualitative case study explored graduate students' views (n=6) on AI-supported applications and an AI-enabled blockbased coding tool (PictoBlox) in science education. Data were gathered over a 39-hour implementation via a semi-structured interview form and screen captures from the activities, and analyzed with content analysis. Participants…
Descriptors: Graduate Students, Student Attitudes, Artificial Intelligence, Technology Uses in Education
Leigh Jin; Tai-Yin Chi; Brenda Mak – Journal of Information Systems Education, 2024
This paper presents the Screencast-Based Assessment Technique (SBAT) for a mobile app development curriculum in the information systems discipline. SBAT was implemented as a midterm take-home exam in which students design and develop an app project based on their own interests, passions, or ambitions. In addition to coding, students must create…
Descriptors: Technology Uses in Education, Computer Oriented Programs, Handheld Devices, Computer Software
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education

Peer reviewed
Direct link
