Publication Date
In 2025 | 6 |
Since 2024 | 27 |
Since 2021 (last 5 years) | 85 |
Since 2016 (last 10 years) | 164 |
Since 2006 (last 20 years) | 437 |
Descriptor
Source
Author
Schwieger, Dana | 6 |
Mitri, Michel | 5 |
Lending, Diane | 4 |
Venables, Anne | 4 |
Ali, Azad | 3 |
Gusev, Dmitri A. | 3 |
Surendran, Ken | 3 |
Tan, Grace | 3 |
Waguespack, Leslie J. | 3 |
Bielikova, Maria | 2 |
Bunch, John M. | 2 |
More ▼ |
Publication Type
Reports - Descriptive | 455 |
Journal Articles | 411 |
Speeches/Meeting Papers | 22 |
Tests/Questionnaires | 17 |
Guides - Classroom - Teacher | 5 |
Numerical/Quantitative Data | 5 |
Books | 3 |
Collected Works - General | 2 |
Opinion Papers | 1 |
Education Level
Location
United Kingdom | 13 |
Australia | 12 |
California | 11 |
Pennsylvania | 11 |
Spain | 11 |
Germany | 10 |
Japan | 9 |
Indiana | 8 |
New York | 8 |
Virginia | 8 |
North Carolina | 7 |
More ▼ |
Laws, Policies, & Programs
Higher Education Opportunity… | 1 |
Assessments and Surveys
NEO Five Factor Inventory | 1 |
Test of English for… | 1 |
What Works Clearinghouse Rating
Ana E. Redstone; Tian Luo – TechTrends: Linking Research and Practice to Improve Learning, 2024
This article focuses on the practical implementation of Universal Design for Learning (UDL) in an online computer science course, articulating the collaborative efforts between the instructional designer (the first author) and the faculty member to redesign the course using UDL principles. Specific instances of redesigned learning modules and…
Descriptors: Electronic Learning, Computer Science, Student Empowerment, Higher Education
Jason Triche; Tianxi Dong; Jacki Landon; Ezekiel Baied – Journal of Information Systems Education, 2024
The adoption of enterprise-wide systems like Customer Relationship Management (CRM) systems continues to grow globally. Due to the prevalence of CRM software in businesses and CRM's expected growth, Information Systems (IS) graduates will likely interact with a CRM system in their careers. However, learning enterprise systems like CRM is…
Descriptors: Business Administration Education, Experiential Learning, Business, Management Systems
Thin-Yin Leong; Nang-Laik Ma – INFORMS Transactions on Education, 2024
This paper develops a spreadsheet simulation methodology for teaching simulation and performance analysis of priority queues with multiple servers, without resorting to macros, add-ins, or array formula. The approach is made possible by a "single overtaking" simplifying assumption under which any lower-priority customer may be passed in…
Descriptors: Spreadsheets, Simulation, Teaching Methods, Computer Science Education
Kevin Johnston; Norman van Wyk; Joachim Schuler; Brian Eyre – International Society for Technology, Education, and Science, 2024
To create a Futures Literacy course. Background: A previously developed and tested Framework to develop IT courses for emerging technologies was used to develop a Futures Literacy course. A literature review was conducted to discover theories, models, and frameworks that could be used to create IT courses. A Course Development Framework was used…
Descriptors: Computer Science Education, Curriculum Development, Course Content, Futures (of Society)
Crowdsourcing Cyber Experts to Determine Relevant Topics during Cyber Curriculum Development Efforts
Ngac, Brian K.; Boicu, Mihai – Innovations in Education and Teaching International, 2023
The cyber security environment, its threats, and its defence strategies are constantly changing. Educational programmes and their curriculum are known to be slow changing and at times out-of-date, resulting in content that may not be as relevant to their students and the industry. This research paper will 1 -- present an overview of the curriculum…
Descriptors: Expertise, Curriculum Development, Computer Security, Computer Science Education
Gerit Wagner; Laureen Thurner – Journal of Information Systems Education, 2025
Git, as the leading version-control system, is frequently employed by software developers, digital product managers, and knowledge workers. Information systems (IS) students aspiring to fill software engineering, management, or research positions would therefore benefit from familiarity with Git. However, teaching Git effectively can be…
Descriptors: Computer Science Education, Information Systems, Teaching Methods, Computer Software
Wendy Haw; Adam Crawford – Journal of Learning Development in Higher Education, 2025
This article illustrates the potential for hackathons to serve as an innovative educational tool in addressing the underrepresentation of minority communities in science, technology, engineering, and mathematics (STEM) fields. Using Merced, California--a region recognised for its agricultural economy, socioeconomic disparities, and diverse…
Descriptors: Programming, Computer Science Education, Disproportionate Representation, STEM Education
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Gusev, Dmitri A.; Swanson, Dewey A.; Casner, Melissa R. – Association Supporting Computer Users in Education, 2023
Recruiting tomorrow's information technology students is getting to be a challenging job even though there are a variety of many good-paying jobs in the field when they graduate. This is not just an issue for our department, Computer and Information Technology (CIT). According to experts, with declining birthrates, students determining there are…
Descriptors: Information Technology, Student Recruitment, College Students, Learning Activities
Mitri, Michel – Journal of Information Systems Education, 2023
This article presents a multi-stage guided technical project coding Python scripts for utilizing Amazon Web Services (AWS) to work with a document-store database called DynamoDB. Students doing this project should have taken an introductory programming class (ideally in Python) and a database class to have experience with Python coding and…
Descriptors: Programming Languages, Computer Science Education, Student Projects, Databases
Linda J. Sax – Journal of The First-Year Experience & Students in Transition, 2025
Although the process of inquiry is guided by questions, the result is rarely a clear answer. Instead, deep investigation--despite producing data, results, and evidence--ultimately results in a lot more questions. The author, rather than feeling disillusioned by that reality, has come to accept it as the cyclical nature of research. For more than…
Descriptors: College Students, Student Experience, Educational Research, Gender Differences
Wagler, Adam – Journal of Advertising Education, 2023
What role does advertising play in product development as part of owned media? For three years, a capstone advertising campaign course collaborated with STEM courses to form interdisciplinary teams composed of advertising, engineering, and computer science. The study provides insight into how teams can be more entrepreneurial by building on the…
Descriptors: Advertising, Capstone Experiences, Interdisciplinary Approach, Cooperative Learning
Cheers, Hayden; Lin, Yuqing; Yan, Weigen – Informatics in Education, 2023
Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, most of these tools only measure the similarity between assignment submissions, and do not actually identify which are suspicious of plagiarism. This work…
Descriptors: Plagiarism, Assignments, Computer Software, Computer Science Education
Kim, J. B.; Zhong, Chen; Liu, Hong – Journal of Information Systems Education, 2023
Cybersecurity education is becoming increasingly important in modern society, and hands-on practice is an essential element. Although instructors provide hands-on labs in their cybersecurity courses, traditional lab exercises often fail to effectively motivate students. Hence, many instructors desire to incorporate gamification in hands-on…
Descriptors: Gamification, Information Security, Class Activities, Active Learning
Kunye Chen; Raghav Mahalingam; Neal Ormsbee; Rachel Schlossman; Luis Sentis – IEEE Transactions on Education, 2024
University laboratories deliver unique hands-on experimentation opportunities for STEM students, but often lack state-of-the-art equipment and provide limited access to their equipment. The University of Texas Cloud Laboratory (CLAB) provides remote access to cutting-edge series elastic actuators for student experimentation regarding…
Descriptors: STEM Education, Laboratory Experiments, Laboratory Equipment, Robotics