Publication Date
In 2025 | 1 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 9 |
Descriptor
Source
Author
Ali, Sanwar | 1 |
Aman Yadav | 1 |
Baum, Liesl | 1 |
Bishop-Clark, Cathy | 1 |
David Phelps | 1 |
Drum, Dawna M. | 1 |
Hebda, Maryann R. | 1 |
Ho, Belinda | 1 |
Joseph Frusci | 1 |
Kempner, Yulia | 1 |
Kiper, James D. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 14 |
Journal Articles | 12 |
Collected Works - Proceedings | 1 |
Opinion Papers | 1 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 5 |
High Schools | 2 |
Elementary Secondary Education | 1 |
Secondary Education | 1 |
Audience
Practitioners | 1 |
Researchers | 1 |
Teachers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Rafi Santo; Aman Yadav; David Phelps – ACM Transactions on Computing Education, 2024
Those working toward equitable K-12 computing education in the United States have always had their work cut out for them: understanding how best to teach, developing robust curricula, designing novel tools, building teacher capacity, and supporting systemic change in schools to bring equitable computing education to young people. Collectively,…
Descriptors: Computer Science Education, Elementary Secondary Education, Public Education, Teaching Methods
Joseph Frusci – Journal of Cybersecurity Education, Research and Practice, 2024
The increasing complexity of cybersecurity challenges necessitates a holistic educational approach that integrates both technical skills and humanistic perspectives. This article examines the importance of infusing humanities disciplines such as history, ethics, political science, sociology, law, and anthropology, into cybersecurity education.…
Descriptors: Humanities, Humanities Instruction, Computer Science Education, Computer Security
Sunil Hazari – Journal of Educational Research and Practice, 2024
In this article, I present a justification for implementing AI literacy courses in higher education. I explore the ethical concerns and biases surrounding AI technologies, highlighting the importance of critical analysis and responsible use of AI. I then propose a conceptual framework, focusing on awareness, skill development, and the practical…
Descriptors: Artificial Intelligence, Higher Education, Critical Thinking, Innovation
Hebda, Maryann R. – Gifted Child Today, 2023
As technologically gifted students apply their abilities to computer science, they naturally flow through the talent development stages of potential, competency, and expertise. Processes that have always been important for gifted students to learn as they develop potential are embedded in learning code, which engages the beginning programmer in…
Descriptors: Talent Development, Technology Uses in Education, Technological Literacy, Coding
Xiaoni Zhang – Journal of Information Systems Education, 2025
This teaching tip explores the integration of AI tools into database education. The author describes how instructors can use AI tools to prepare teaching materials and how students can use AI to facilitate database development. The teaching tips provided encompass both course-level objectives and assignment-specific strategies. The inclusion of AI…
Descriptors: Databases, Technology Integration, Critical Thinking, Thinking Skills
Marshall, Thomas E.; Drum, Dawna M.; Lambert, Sherwood L.; Morris, Steven A. – Journal of Information Systems Education, 2018
This case addresses the critical topic in education of developing students' skills and capabilities associated with enterprise-level business intelligence systems and associated internal control concerns. The experiences of using a business intelligence,task-based activity in an interdisciplinary curriculum model are presented and discussed.…
Descriptors: Interdisciplinary Approach, Learning Activities, Accounting, Information Systems
Kortsarts, Yana; Kempner, Yulia – Information Systems Education Journal, 2015
Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…
Descriptors: Introductory Courses, Programming, Computer Science Education, Technology
From Rhetoric to Real World: Fostering Higher Order Thinking through Transdisciplinary Collaboration
Wagner, Teri; Baum, Liesl; Newbill, Phyllis – Innovations in Education and Teaching International, 2014
Ill-structured problems abound that require sophisticated problem-solving skills, knowledge across multiple domains and the abilities to think critically and communicate effectively. Despite the abundance of rhetoric supporting the need to build these skills in our students, the acquisition of domain-specific knowledge is still the primary focus…
Descriptors: College Students, Critical Thinking, Problem Solving, Mastery Learning
Yang, Baijan – Tech Directions, 2007
Troubleshooting a corrupted Windows operating system (OS) is a must-learn experience for computer technology students. To teach OS troubleshooting, the simplest approach involves introducing the available tools followed by the "how-to's." But how does a teacher teach his or her students to apply their knowledge in real-life scenarios and help them…
Descriptors: Troubleshooting, Computers, Computer Software, Technology Education
Ali, Sanwar – Mathematics and Computer Education, 2005
Teaching is a scholarly activity and a life-long learning process with no single method or pedagogy that is always most effective. Applications of teaching pedagogies properly vary from content-based to discipline-based areas. In this paper, various teaching pedagogies, including scaffolding, concept mapping, constructivism, and learning…
Descriptors: Teacher Effectiveness, Problem Based Learning, Learning Strategies, Constructivism (Learning)
Kiper, James D.; Bishop-Clark, Cathy – 1994
Computer science and other computer related fields are faced with the high velocity of change in technology. Far more important than the knowledge of a particular software package is the liberal education skills that are learned in the process. This paper reviews the laboratory component of a new computer science course offered at Miami University…
Descriptors: Change, Computer Literacy, Computer Science, Cooperative Learning
Royer, Regina D.; Richards, Patricia O. – Learning & Leading with Technology, 2005
In this edition of Learning Connections, the authors show how technology can enhance study of weather patterns, reading comprehension, real-world training, critical thinking, health education, and art criticism. The following sections are included: (1) Social Studies; (2) Language Arts; (3) Computer Science and ICT; (4) Art; and (5) Health.…
Descriptors: Weather, Reading Comprehension, Health Education, Art Criticism

Ho, Belinda – English for Specific Purposes, 1997
Examines how two groups of computer students reacted to tasks involving different degrees of reflectivity. Results indicate that students found almost all tasks, including the reflective ones, helpful and relevant although the intervention group studied disliked the reflective tasks, especially those at the metacognitive level. (15 references)…
Descriptors: College Students, Comparative Analysis, Computer Science Education, Critical Thinking
Ryan, William C., Ed. – 1986
The l50 papers and 28 panel discussion reports in this collection focus on innovations, trends, and research in the use of computers in a variety of educational settings. Topics discussed include: computer centers and laboratories; use of computer at various levels from K-12 through the university, including inservice teacher training; use of…
Descriptors: Authoring Aids (Programing), Computer Assisted Instruction, Computer Literacy, Computer Science Education