NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
SAT (College Admission Test)1
What Works Clearinghouse Rating
Showing 1 to 15 of 151 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Young, Jacob A.; Farshadkhah, Sahar – Journal of Information Systems Education, 2023
In this paper, we describe the development of an in-class exercise designed to teach students how to craft social engineering attacks. Specifically, we focus on the development of phishing emails. Providing an opportunity to craft offensive attacks not only helps prepare students for a career in penetration testing but can also enhance their…
Descriptors: Information Security, Class Activities, Computer Science Education, Social Psychology
Peer reviewed Peer reviewed
Direct linkDirect link
Luse, Andy; Shadbad, Forough Nasirpouri – Journal of Information Systems Education, 2023
The demand for qualified analytics professionals remains high with forecasts showing a continued need over the next few years. While this demand necessitates instruction in analytics in the classroom, many students find analytics concepts to be complicated and boring. This teaching brief describes a novel approach to teaching analytics through…
Descriptors: Computer Science Education, Information Security, Learning Activities, Learner Engagement
Peer reviewed Peer reviewed
Direct linkDirect link
Marckwordt, Jasmine; Muller, Alexandria; Harlow, Danielle; Franklin, Diana; Landsberg, Randall H. – Physics Teacher, 2021
Quantum computers are at the forefront of computing; however, few people understand how they work and their capabilities. We present two versions of an interactive activity designed for high school students (ages 13 to 18) that introduce a core quantum concept--"entanglement." The first version illustrates a simple connection between two…
Descriptors: Physics, Science Instruction, High School Students, Teaching Methods
Gusev, Dmitri A.; Swanson, Dewey A.; Casner, Melissa R. – Association Supporting Computer Users in Education, 2023
Recruiting tomorrow's information technology students is getting to be a challenging job even though there are a variety of many good-paying jobs in the field when they graduate. This is not just an issue for our department, Computer and Information Technology (CIT). According to experts, with declining birthrates, students determining there are…
Descriptors: Information Technology, Student Recruitment, College Students, Learning Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Simon D. Weaver; G. Alex Ambrose; Rebecca J. Whelan – Journal of Chemical Education, 2022
Students completing undergraduate majors in chemistry are not typically required to undergo formal training in computer programming or coding. As a result, many chemistry students are graduating without skills in understanding, writing, or manipulating computer code. This skills gap places students at a disadvantage, considering the widespread and…
Descriptors: Coding, Undergraduate Students, Majors (Students), Chemistry
Peer reviewed Peer reviewed
Direct linkDirect link
Pelánek, Radek; Effenberger, Tomáš – Computer Science Education, 2022
Background and Context: Block-based programming is a popular approach to teaching introductory programming. Block-based programming often works in the context of microworlds, where students solve specific puzzles. It is used, for example, within the Hour of Code event, which targets millions of students. Objective: To identify design guidelines…
Descriptors: Programming, Computer Science Education, Puzzles, Problem Solving
Peer reviewed Peer reviewed
Direct linkDirect link
Kim, J. B.; Zhong, Chen; Liu, Hong – Journal of Information Systems Education, 2023
Cybersecurity education is becoming increasingly important in modern society, and hands-on practice is an essential element. Although instructors provide hands-on labs in their cybersecurity courses, traditional lab exercises often fail to effectively motivate students. Hence, many instructors desire to incorporate gamification in hands-on…
Descriptors: Gamification, Information Security, Class Activities, Active Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Loïs Vanhée; Karin Danielsson; Lena Enqvist; Kalle Grill; Melania Borit – European Journal of Education, 2024
Whereas hackathons are widespread within and outside academia and have been argued to be a valid pedagogical method for teaching interdisciplinarity, no detailed frameworks or methods are available for conceptualizing and organizing educational hackathons, i.e., hackathons dedicated to best achieving pedagogic objectives. This paper is dedicated…
Descriptors: Interdisciplinary Approach, Learning Activities, Programming, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mentzer, Kevin; Galante, Zachary; Frydenberg, Mark – Information Systems Education Journal, 2022
Organizations are keenly interested in data gathering from websites where discussions of products and brands occur. This increasingly means that programmers need an understanding of how to work with website application programming interfaces (APIs) for data acquisition. In this hands-on lab activity, students will learn how to gather data from…
Descriptors: Prediction, Competition, Music, Data Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Rani Van Schoors; Sohum M. Bhatt; Jan Elen; Annelies Raes; Wim Van den Noortgate; Fien Depaepe – International Journal of Designs for Learning, 2024
Due to swift technological changes in society, programming tasks are proliferating in formal and informal education around the globe. However, challenges arise regarding the acquisition of programming skills. Many students are unequipped to develop programming skills due to limited instruction or background and therefore feel insecure when…
Descriptors: Secondary School Students, Grade 1, Individualized Instruction, Electronic Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Rizk, Nadya; McKenzie, Matt; Samrout, Marya – Teaching Science, 2022
Coding is a process often associated with computers. Nevertheless, coding is a thought process that can be mastered even without a computer. In NSW, primary students are introduced to computational and algorithmic thinking as early as Stage 1. Yet, teaching coding to young students is not always easy for teachers, mostly because the process is…
Descriptors: Programming, Computer Science Education, Computation, Thinking Skills
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rosamond, Frances – Informatics in Education, 2018
The Computer Science Unplugged activities and project has been an influential STEM (Science, Technology, Engineering & Mathematics) initiative, providing enrichment and teaching activities supporting computational thinking. Many of its activities are suitable for children. One of the most popular Unplugged activities is "Kid Krypto",…
Descriptors: Technology, Computation, Thinking Skills, Enrichment Activities
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Steven Worker; Fe Moncloa; Vernelle Mitchell-Hawkins – Journal of Youth Development, 2024
Science, technology, engineering, and mathematics (STEM) fields face persistent disparities in racial, ethnic and gender representation; these disparities are even more pronounced in computer science (CS) fields where women of color comprise 1 percent or less of all employees. These inequalities, and their causes, are complex, systemic, and result…
Descriptors: Computer Science Education, Racial Identification, Self Concept, Social Justice
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bowen, Debra; Jaurez, James; Jones, Nancy; Reid, William; Simpson, Christopher – Journal of Cybersecurity Education, Research and Practice, 2022
There are many resources to guide successful K-12 cybersecurity education. The objective of these resources is to prepare skilled and ethical cybersecurity students at the earliest level to meet the demands of higher-level programs. The goal of this article is to provide, as a starting point, a list of as many currently popular K-12 educational…
Descriptors: Computer Security, Information Security, Educational Resources, Elementary Secondary Education
Peer reviewed Peer reviewed
Direct linkDirect link
Qian, Yingxiao; Choi, Ikseon – Educational Technology Research and Development, 2023
Echoing the increasing emphasis on STEM literacy, computational thinking has become a national priority in K-12 schools. Scholars have acknowledged abstraction as the keystone of computational thinking. To foster K-12 students' computational thinking and STEM literacy, students' ability to think abstractly should be enhanced. However, the existing…
Descriptors: Elementary Secondary Education, Computation, Thinking Skills, Abstract Reasoning
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11