NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 44 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Peer reviewed Peer reviewed
Direct linkDirect link
Christine Wusylko; Kara Dawson; Pavlo Antonenko; Zhen Xu – Journal of Technology and Teacher Education, 2024
Cybersecurity educational efforts are urgently needed to introduce young people to the profession and give students and teachers cybersecurity knowledge to protect themselves from increasing cybercrime. In this study, 56 elementary preservice teachers participated in a 3-hour intervention within a technology integration course that introduced them…
Descriptors: Computer Security, Technology, Preservice Teacher Education, Preservice Teachers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rosamond, Frances – Informatics in Education, 2018
The Computer Science Unplugged activities and project has been an influential STEM (Science, Technology, Engineering & Mathematics) initiative, providing enrichment and teaching activities supporting computational thinking. Many of its activities are suitable for children. One of the most popular Unplugged activities is "Kid Krypto",…
Descriptors: Technology, Computation, Thinking Skills, Enrichment Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Ho, Anne M. – PRIMUS, 2018
Escape rooms are an increasingly popular puzzle game, and educators have started implementing them in classrooms. This paper will describe the motivations and implementation of escape-room-like puzzles in an undergraduate cryptography course, including how the open-source mathematics software system SageMath is used. In addition, there is a…
Descriptors: Puzzles, Technology, Class Activities, Undergraduate Students
Gusev, Dmitri A.; Swanson, Dewey A. – Association Supporting Computer Users in Education, 2017
Facing the need to introduce new approaches to teaching the art of programming to undergraduate Computer and Information Technology (CIT) students as part of the transition of the former Purdue College of Technology to the novel concept and status of Purdue Polytechnic, we came up with the idea of offering a pilot 300-level course entitled…
Descriptors: Educational Technology, Technology Uses in Education, Undergraduate Study, Programming
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kortsarts, Yana; Kempner, Yulia – Information Systems Education Journal, 2015
Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…
Descriptors: Introductory Courses, Programming, Computer Science Education, Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bers, Marina U. – Early Childhood Research & Practice, 2010
This article describes the TangibleK robotics program for young children. Based on over a decade of research, this program is grounded on the belief that teaching children about the human-made world, the realm of technology and engineering, is as important as teaching them about the natural world, numbers, and letters. The TangibleK program uses…
Descriptors: Young Children, Computer Science, Engineering, Kindergarten
Peer reviewed Peer reviewed
Direct linkDirect link
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Bruun, E.; Nielsen, I. – European Journal of Engineering Education, 2010
Nanotechnology is having an increasing impact on university curricula in electrical engineering and in physics. Major influencers affecting developments in university programmes related to nanoelectronics are discussed and a model for university programme development is described. The model takes into account that nanotechnology affects not only…
Descriptors: Engineering Education, Physics, College Science, College Curriculum
Peer reviewed Peer reviewed
Direct linkDirect link
Aydin, Nuh – PRIMUS, 2009
The theory of error-correcting codes and cryptography are two relatively recent applications of mathematics to information and communication systems. The mathematical tools used in these fields generally come from algebra, elementary number theory, and combinatorics, including concepts from computational complexity. It is possible to introduce the…
Descriptors: Mathematics Curriculum, Computer Science, Number Concepts, Liberal Arts
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
DeSieno, Robert P. – Journal of College Science Teaching, 1986
Traces the evolution and development of computer use and reviews the circumstances that influenced the selection of computing resources at liberal arts colleges. Characterizes the time eras of the computer age and projects factors that could influence computer policy and equipment choice. (ML)
Descriptors: Colleges, Computer Literacy, Computer Science, Computer Science Education
Peer reviewed Peer reviewed
Gedeon, David V. – CoED, 1981
Describes a course to make technical managers more aware of computer technology and how data loggers, programmable controllers, and larger computer systems interact in a hierarchical configuration of manufacturing process control. (SK)
Descriptors: College Science, Computer Science, Computer Science Education, Course Descriptions
Basta, Nicholas – Graduating Engineer, 1988
Discusses the increasing need for electrical, electronic, and computer engineers; and scientists. Provides current status of the computer industry and average salaries. Considers computer chip manufacture and the current chip shortage. (MVL)
Descriptors: Business, College Science, Computer Science, Computer Science Education
Withrow, Frank B.; And Others – Technological Horizons in Education, 1986
Explores recent technological advances and their effects on the education of the handicapped. Indicates that scientific breakthroughs never intended as aids to the handicapped have been adapted to remove their limitations and that some inventions designed to improve the quality of life for most people offer disadvantages for handicapped persons.…
Descriptors: Computer Oriented Programs, Computer Science, Disabilities, Microcomputers
Previous Page | Next Page ยป
Pages: 1  |  2  |  3