Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 11 |
Since 2006 (last 20 years) | 38 |
Descriptor
Source
Author
Abraham, Solomon T. | 1 |
Adams, Sandra Honda | 1 |
Ajwa, Iyad | 1 |
Akbar, Monika | 1 |
Ala-Mutka, Kirsti M. | 1 |
Alonso-Monsalve, Saul | 1 |
Amelung, M. | 1 |
Amenyo, John-Thones | 1 |
Andersson, David | 1 |
Astrom, Peik | 1 |
Bajracharya, Biju Raja | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 27 |
Postsecondary Education | 21 |
Elementary Secondary Education | 3 |
Elementary Education | 2 |
Adult Education | 1 |
High School Equivalency… | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Practitioners | 38 |
Teachers | 10 |
Policymakers | 6 |
Administrators | 4 |
Media Staff | 2 |
Researchers | 2 |
Students | 2 |
Community | 1 |
Parents | 1 |
Location
United Kingdom | 6 |
Australia | 2 |
California | 2 |
South Africa | 2 |
Taiwan | 2 |
Alabama | 1 |
Argentina | 1 |
Brazil | 1 |
Canada | 1 |
Denmark | 1 |
Finland | 1 |
More ▼ |
Laws, Policies, & Programs
Higher Education Opportunity… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Felix Winkelnkemper; Lukas Höper; Carsten Schulte – Informatics in Education, 2024
When it comes to mastering the digital world, the education system is more and more facing the task of making students competent and self-determined agents when interacting with digital artefacts. This task often falls to computing education. In the traditional fields of computing education, a plethora of models, guidelines, and principles exist,…
Descriptors: Digital Literacy, Computer Uses in Education, Models, Computer Science Education
Christine Wusylko; Kara Dawson; Pavlo Antonenko; Zhen Xu – Journal of Technology and Teacher Education, 2024
Cybersecurity educational efforts are urgently needed to introduce young people to the profession and give students and teachers cybersecurity knowledge to protect themselves from increasing cybercrime. In this study, 56 elementary preservice teachers participated in a 3-hour intervention within a technology integration course that introduced them…
Descriptors: Computer Security, Technology, Preservice Teacher Education, Preservice Teachers
Bull, Glen; Garofalo, Joe; Hguyen, N. Rich – Journal of Digital Learning in Teacher Education, 2020
An educational team founded by Seymour Papert at MIT has developed an evolving series of computing environments designed to facilitate computational thinking. Papert outlined the goal of developing educational environments to facilitate the use of computer as a computational object in a seminal publication, "Teaching Children Thinking"…
Descriptors: Thinking Skills, Computation, Computer Science Education, Programming
Battaglia, Nicolas; Carlos, Neil; Martínez, Roxana; De Vinceni, Marcelo – Journal of Technology and Science Education, 2019
The new models of teaching and learning have their focus on technology, especially on issues related to ubiquity. The impact of ICT in education generates new learning opportunities: the mobile or ubiquitous, which open new doors to technological environments that allow students to learn at any time and place, providing, in addition, tools that…
Descriptors: Computer Uses in Education, Cooperative Learning, Educational Technology, Computer Software
Teiermayer, Attila – Physics Education, 2019
The BBC Micro:bit is a great device to encourage students to get involved in Computer Science and to create their own digital projects. However, the design of the single-board computer (including the built-in sensors) makes it possible to use it in Physics lessons or in Physics related activities, too. Those students who are keen to take up…
Descriptors: Science Instruction, Physics, Computer Science Education, Computers
Gondi, Vamsi; Hua, David; Bajracharya, Biju Raja – Information Systems Education Journal, 2021
In the age of COVID-19, traditional teaching techniques are under scrutiny. Most concepts and labs in the area of information technology are intended to be taught face-to-face in labs using clusters and networking infrastructure. Simulation software's such as uCertify, Pearson online, etc.., are good alternative, but are not always a viable…
Descriptors: Computer Science Education, Computer Software, Computer Simulation, Information Technology
Lesko, Charles J., Jr. – Journal of Cybersecurity Education, Research and Practice, 2019
Following a multi-year effort that developed not only a detailed list of functional requirements but also the preliminary physical and logical design layouts, the concept for a multi-faceted cybersecurity center was approved and the physical, as well as, additional infrastructure space was subsequently allocated. This effort briefly describes the…
Descriptors: Needs Assessment, Computer Security, Design, Computer Centers
Garcia-Carballeira, Felix; Calderon-Mateos, Alejandro; Alonso-Monsalve, Saul; Prieto-Cepeda, Javier – IEEE Transactions on Learning Technologies, 2020
Our educational project has three primary goals. First, we want to provide a robust vision of how hardware and software interplay, by integrating the design of an instruction set (through microprogramming) and using that instruction set for assembly programming. Second, we wish to offer a versatile and interactive tool where the previous…
Descriptors: Instructional Design, Computer Simulation, Technology Integration, Programming
Jerše, Gregor; Lokar, Matija – International Journal for Technology in Mathematics Education, 2017
The emphasis in several courses at technical faculties is on using a computer to perform numerical methods. Instead of focusing on mathematical rigorousness such courses usually concentrate on demonstrating the practical usage of numerical mathematical methods to the students. The practical usage of numerical methods is best learned by exposing…
Descriptors: Computer Uses in Education, Computer Science Education, Programming, Mathematical Applications
Ho, Anne M. – PRIMUS, 2018
Escape rooms are an increasingly popular puzzle game, and educators have started implementing them in classrooms. This paper will describe the motivations and implementation of escape-room-like puzzles in an undergraduate cryptography course, including how the open-source mathematics software system SageMath is used. In addition, there is a…
Descriptors: Puzzles, Technology, Class Activities, Undergraduate Students
Yamashita, Koichi; Nagao, Takamasa; Kogure, Satoru; Noguchi, Yasuhiro; Konishi, Tatsuhiro; Itoh, Yukihiro – Research and Practice in Technology Enhanced Learning, 2016
In this paper, we describe a code-reading support environment and practical classroom applications using this environment to understand nested loops. Previously, we developed a code-reading support system based on visualization of the relationships among the program code, target domain world, and operations. We implemented the proposed system in…
Descriptors: Programming, Computer Science Education, Learning Activities, Computer Uses in Education
Mauco, María Virginia; Ferrante, Enzo; Felice, Laura – Information Systems Education Journal, 2014
Basic courses on logic are common in most computer science curricula. Students often have difficulties in handling formalisms and getting familiar with them. Educational software helps to motivate and improve the teaching-learning processes. Therefore, incorporating these kinds of tools becomes important, because they contribute to gaining…
Descriptors: Computer Software, Computer Uses in Education, Logical Thinking, Introductory Courses
Jaokar, Ajit – Educational Technology, 2013
This article discusses the evolution of computing education in preparing for the next wave of computing. With the proliferation of mobile devices, most agree that we are living in a "post-PC" world. Using the Raspberry Pi computer platform, based in the UK, as an example, the author discusses computing education in a world where the…
Descriptors: Computer Uses in Education, Technological Advancement, Educational Development, Handheld Devices
Macinko Kovac, Maja; Eret, Lidija – Online Submission, 2012
This article gives insight into methodical correlation model of teaching mathematics and computer science. The model shows the way in which the related areas of computer science and mathematics can be supplemented, if it transforms the way of teaching and creates a "joint" lessons. Various didactic materials are designed, in which all…
Descriptors: Computer Science Education, Mathematics Instruction, Teaching Models, Elementary School Curriculum
Chuda, D.; Navrat, P.; Kovacova, B.; Humay, P. – IEEE Transactions on Education, 2012
The issue of plagiarism is discussed in the context of university education in disciplines related to computing. The focus is therefore mainly on software plagiarism. First, however, a case is made for the claim that the most important reason that plagiarism cannot be tolerated lies in the essence of the concept of a university as it is rooted in…
Descriptors: Plagiarism, Computer Software, Internet, Higher Education