Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 5 |
Descriptor
Identification | 5 |
Computer Science Education | 4 |
Computer Software | 3 |
Comparative Analysis | 2 |
Computer Networks | 2 |
Information Security | 2 |
Programming | 2 |
Undergraduate Students | 2 |
Accuracy | 1 |
Assignments | 1 |
At Risk Students | 1 |
More ▼ |
Source
Education | 1 |
IEEE Transactions on Education | 1 |
Informatics in Education | 1 |
Journal of Cybersecurity… | 1 |
Journal of Learning Analytics | 1 |
Author
Barnes, Cynthia | 1 |
Carlos Novo | 1 |
Casey, Kevin | 1 |
Cavaliere, Frank | 1 |
Cheers, Hayden | 1 |
Daugherty, Michael K. | 1 |
Di, Jia | 1 |
Lin, Yuqing | 1 |
Rolando Martins | 1 |
Rui Pinto | 1 |
Thompson, Dale R. | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 5 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Audience
Location
Arkansas | 1 |
Florida | 1 |
Ireland (Dublin) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cheers, Hayden; Lin, Yuqing; Yan, Weigen – Informatics in Education, 2023
Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, most of these tools only measure the similarity between assignment submissions, and do not actually identify which are suspicious of plagiarism. This work…
Descriptors: Plagiarism, Assignments, Computer Software, Computer Science Education
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Casey, Kevin – Journal of Learning Analytics, 2017
Learning analytics offers insights into student behaviour and the potential to detect poor performers before they fail exams. If the activity is primarily online (for example computer programming), a wealth of low-level data can be made available that allows unprecedented accuracy in predicting which students will pass or fail. In this paper, we…
Descriptors: Keyboarding (Data Entry), Educational Research, Data Collection, Data Analysis
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Barnes, Cynthia; Cavaliere, Frank – Education, 2009
Metadata is information about computer-generated documents that is often inadvertently transmitted to others. The problems associated with metadata have become more acute over time as word processing and other popular programs have become more receptive to the concept of collaboration. As more people become involved in the preparation of…
Descriptors: Metadata, Ethics, Internet, Word Processing