Publication Date
In 2025 | 1 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 8 |
Since 2016 (last 10 years) | 13 |
Since 2006 (last 20 years) | 19 |
Descriptor
Technology | 19 |
Computer Science Education | 15 |
Computer Security | 6 |
Programming | 6 |
Teaching Methods | 5 |
Computer Science | 4 |
Computer Software | 4 |
Electronic Learning | 4 |
Females | 4 |
Foreign Countries | 4 |
Higher Education | 4 |
More ▼ |
Source
Author
Sahin, Ismail, Ed. | 2 |
Shelley, Mack, Ed. | 2 |
Alannah Oleson | 1 |
Anne Marie Sowder | 1 |
Babb, Jeffry | 1 |
Beckman, Joseph W. | 1 |
Bevz, Valentyna | 1 |
Bruun, E. | 1 |
Candido Cabo | 1 |
Carnoy, Martin | 1 |
Chen, Li-Chiou | 1 |
More ▼ |
Publication Type
Journal Articles | 13 |
Reports - Research | 9 |
Reports - Descriptive | 6 |
Books | 2 |
Collected Works - General | 2 |
Dissertations/Theses -… | 2 |
Tests/Questionnaires | 2 |
Numerical/Quantitative Data | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Postsecondary Education | 19 |
Higher Education | 18 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Audience
Teachers | 2 |
Location
Germany | 3 |
Greece | 2 |
Indonesia | 2 |
Malaysia | 2 |
New York | 2 |
Russia | 2 |
United Kingdom | 2 |
United States | 2 |
California (San Francisco) | 1 |
France | 1 |
Italy | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Tutorial Programs, Computer Science Education, Computer Security, Programming
Alannah Oleson – ProQuest LLC, 2023
To realize more equitable technology futures, it is not enough to simply adapt technology to be more inclusive "after" it is created. We will also need to equip technology creators with the skills they need to critically reflect upon bias and exclusion "during" the technology design process. The question of how to best to…
Descriptors: Computation, Computer Science Education, Inclusion, Decision Making
Geoff D. Zylstra; Jill Belli; Candido Cabo; Sean P. MacDonald; Robin Michals; Anne Marie Sowder; Christopher Swift – Journal of Interdisciplinary Studies in Education, 2024
The humanities have the potential to enhance STEM curriculum in career-oriented professional degree programs. As part of a larger college-wide initiative to develop interdisciplinary curricula, the National Endowment for the Humanities (NEH) awarded a grant to New York City College of Technology to explore the relationship between the humanities…
Descriptors: Humanities, Educational Environment, STEM Education, Curriculum
Fominykh, Mikhail; Weidlich, Joshua; Kalz, Marco; Hybertsen, Ingunn Dahler – International Journal of Educational Technology in Higher Education, 2022
This article contributes to the debate on the growing number of interdisciplinary study programs in learning and technology, and aims to understand the diversity of programs as well as curricula structure in an international landscape. Scientific fields share their knowledge and recruit young researchers by offering discipline-specific study…
Descriptors: Electronic Learning, Curriculum Evaluation, Interdisciplinary Approach, Masters Programs
Christine Wusylko; Kara Dawson; Pavlo Antonenko; Zhen Xu – Journal of Technology and Teacher Education, 2024
Cybersecurity educational efforts are urgently needed to introduce young people to the profession and give students and teachers cybersecurity knowledge to protect themselves from increasing cybercrime. In this study, 56 elementary preservice teachers participated in a 3-hour intervention within a technology integration course that introduced them…
Descriptors: Computer Security, Technology, Preservice Teacher Education, Preservice Teachers
Beckman, Joseph W. – ProQuest LLC, 2019
Information security practitioners and researchers who possess sufficient depth of conceptual understanding to reconstitute systems after attacks or adapt information security concepts to novel situations are in short supply. Education of new information security professionals with sufficient conceptual depth is one method by which this shortage…
Descriptors: Achievement Gains, Cognitive Processes, Coding, Technology
Students' Perceptions of the History of Science and Technology Course at Teacher Training University
Bevz, Valentyna; Dmytriienko, Oksana – Advanced Education, 2020
The article presents the integrated course "The History of Science and Technology" developed for the students of pedagogical universities, majoring in physics, mathematics, and computer sciences. The authors highlight the effective forms, methods and means of teaching the course. The qualitative research methods included observations,…
Descriptors: Foreign Countries, College Students, Student Attitudes, Science History
Havenga, Marietjie; Drevin, Lynette – International Association for Development of the Information Society, 2020
Although postgraduate students are required to be self-directed, this is not always the case. The aims of this study were twofold. Firstly, we investigated whether the use of problem-based projects supported students in implementing different cryptography algorithms as part of a group assignment. Secondly, we determined to which extent the use of…
Descriptors: Problem Based Learning, Independent Study, Graduate Students, Technology
Ho, Anne M. – PRIMUS, 2018
Escape rooms are an increasingly popular puzzle game, and educators have started implementing them in classrooms. This paper will describe the motivations and implementation of escape-room-like puzzles in an undergraduate cryptography course, including how the open-source mathematics software system SageMath is used. In addition, there is a…
Descriptors: Puzzles, Technology, Class Activities, Undergraduate Students
John, June Park; Carnoy, Martin – Journal of Education and Work, 2019
We analyse race and gender trends in the Silicon Valley technology industry from 1980 to 2015, with a focus on education, employment and wages in computer science. Racial gaps in representation are more salient among programmers than in the overall technology labour force; in addition, we document a stable or increasing gender gap across all races…
Descriptors: Computer Science Education, Race, Ethnicity, Geographic Regions
Kortsarts, Yana; Kempner, Yulia – Information Systems Education Journal, 2015
Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…
Descriptors: Introductory Courses, Programming, Computer Science Education, Technology
Shelley, Mack, Ed.; Sahin, Ismail, Ed. – International Society for Technology, Education, and Science, 2022
Education, science, and technology disciplines at all levels have never been more important, more exciting, or more crucial for its broader impacts on human society. The need for advanced technical skills is increasingly pressing to address climate change, combat COVID and other diseases, enhance the infrastructural built environment, grow food…
Descriptors: Access to Education, Foreign Countries, Education, Sciences
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher – ACM Transactions on Computing Education, 2014
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
Descriptors: Computer Security, Computers, Computer Software, Computer Science Education
Shelley, Mack, Ed.; Sahin, Ismail, Ed. – Online Submission, 2022
Education, science, and technology disciplines at all levels have never been more important, more exciting, or more crucial for its broader impacts on human society. The need for advanced technical skills is increasingly pressing to address climate change, combat COVID and other diseases, enhance the infrastructural built environment, grow food…
Descriptors: Foreign Countries, Education, Sciences, Technology
Previous Page | Next Page ยป
Pages: 1 | 2