Publication Date
In 2025 | 3 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 9 |
Since 2006 (last 20 years) | 12 |
Descriptor
Source
Information Systems Education… | 4 |
Journal of Information… | 3 |
Computer Science Education | 2 |
ACM Transactions on Computing… | 1 |
Education Sciences | 1 |
Education and Information… | 1 |
Turkish Online Journal of… | 1 |
Author
Anna Drobná | 1 |
Anna Yaghobová | 1 |
Barrett, Diane | 1 |
Ben-David Kolikant, Yifat | 1 |
Borowczak, Mike | 1 |
Burrows, Andrea Carneal | 1 |
Cooley, Rafer | 1 |
Cyril Brom | 1 |
Daniel L. Segal | 1 |
Daniel Št’astný | 1 |
David Kocsis | 1 |
More ▼ |
Publication Type
Journal Articles | 13 |
Tests/Questionnaires | 13 |
Reports - Research | 12 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 7 |
Elementary Education | 2 |
Junior High Schools | 2 |
Middle Schools | 2 |
Secondary Education | 2 |
Grade 4 | 1 |
Grade 6 | 1 |
Grade 8 | 1 |
High Schools | 1 |
Intermediate Grades | 1 |
More ▼ |
Audience
Teachers | 2 |
Policymakers | 1 |
Researchers | 1 |
Location
Colorado (Colorado Springs) | 1 |
Connecticut | 1 |
Cyprus | 1 |
Czech Republic | 1 |
Israel | 1 |
New York | 1 |
Nigeria | 1 |
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
Learning Style Inventory | 1 |
What Works Clearinghouse Rating
Mayowa Oyedoyin; Ismaila Temitayo Sanusi; Musa Adekunle Ayanwale – Computer Science Education, 2025
Background and Context: Recognizing that digital technologies can enable economic transformation in Africa, computing education has been considered a subject relevant for all within the compulsory level of education. The implementation of the subject in many schools is, however, characterized by a myriad of challenges, including pedagogical…
Descriptors: Elementary School Students, Student Attitudes, Internet, Coding
Barrett, Diane – Information Systems Education Journal, 2020
In a cloud computing environment, traditional digital forensic processes (such as turning off the computer to image the computer hard drive) can be disruptive to businesses because the data of businesses may be co-mingled with other content. As technology changes, the way digital forensics acquisitions are conducted are also changing. The change…
Descriptors: Computer Science Education, Crime, Evidence, Computer Security
Cyril Brom; Anna Drobná; Anna Yaghobová; Daniel Št’astný; Katerina Zábrodská; Marek Urban – ACM Transactions on Computing Education, 2025
Objectives: Limited research exists on how new computer science (CS) teachers understand fundamental Internet principles. This knowledge gap hinders the development of effective upskilling courses, especially as new CS curricula are being introduced worldwide. This study investigates new CS teachers' conceptions of fundamental Internet principles,…
Descriptors: Internet, Knowledge Level, Computer Science Education, Elementary School Teachers
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Sajjanhar, Atul; Faulkner, Julie – Education and Information Technologies, 2019
In this study, we gauge the perceptions of novice computer programmers about Second Life (SL) as a digital learning environment for concept understanding in computer programming. SL is chosen as the learning environment because it offers, within a constructivist frame, the use of learner-centered pedagogies for designing curriculum. We adopt a…
Descriptors: Novices, Programming, Computer Simulation, Internet
Woods, David M. – Journal of Information Systems Education, 2020
Professionals working in technology fields face continuing challenges, not only to remain current with the latest technologies but also to understand the complex problems their company and IT organization faces. These challenges constantly change as technology evolves, and they are dependent on organizational factors. Lectures and discussions of…
Descriptors: Active Learning, Debate, Information Technology, Problem Solving
Wolf, Shaya; Burrows, Andrea Carneal; Borowczak, Mike; Johnson, Mason; Cooley, Rafer; Mogenson, Kyle – Education Sciences, 2020
Research on innovative, integrated outreach programs guided three separate week-long outreach camps held across two summers (2018 and 2019). These camps introduced computer science through real-world applications and hands-on activities, each dealing with cybersecurity principles. The camps utilized low-cost hardware and free software to provide a…
Descriptors: Outreach Programs, Summer Programs, Camps, Program Length
Lang, Guido – Information Systems Education Journal, 2017
This paper introduces agile learning, a novel pedagogical approach that applies the processes and principles of agile software development to the context of learning. Agile learning is characterized by short project cycles, called sprints, in which a usable deliverable is fully planned, designed, built, tested, reviewed, and launched. An…
Descriptors: Teaching Methods, Computer Software, Student Projects, Undergraduate Students
Ben-David Kolikant, Yifat; ma'ayan, Ze'ev – Computer Science Education, 2018
Higher-education students now have more alternatives for searching for information than previous generations had. The Internet is a vast ocean of information sources, albeit with diverse reliability and quality. In Web 2.0 platforms, any participant can be a content creator. This reality is challenging for both the instructors and the students. We…
Descriptors: Computer Science Education, Higher Education, Internet, Web 2.0 Technologies
Jesse, Gayle – Information Systems Education Journal, 2013
The purpose of this paper is to provide educators with a course model and pedagogy to teach a computer information systems usability course. This paper offers a case study based on an honors student project titled "Web Usability: Phases of Developing an Interactive Event Database." Each individual phase--creating a prototype along with…
Descriptors: Teaching Methods, Information Systems, Computer Science Education, Internet
Lawler, James P.; Molluzzo, John C.; Doshi, Vijal – Information Systems Education Journal, 2012
Social networking on the Internet continues to be a frequent avenue of communication, especially among Net Generation consumers, giving benefits both personal and professional. The benefits may be eventually hindered by issues in information gathering and sharing on social networking sites. This study evaluates the perceptions of students taking a…
Descriptors: Social Networks, Privacy, Information Security, Student Attitudes
Levy, Meira; Hadar, Irit – Journal of Information Systems Education, 2010
The new concepts and technologies of Web 2.0 attract researches in a variety of fields including education, business and knowledge management. However, while the Web 2.0 potential in the education discipline has been widely studied, in the management discipline the Web 2.0 business value has not been fully acknowledged. This research suggests an…
Descriptors: Knowledge Management, Business Administration Education, Internet, Electronic Publishing
Gümüs, Agah; Özad, Bahire Efe – Turkish Online Journal of Educational Technology - TOJET, 2004
Following the exponential increase in the global usage of the Internet as one of the main tools for communication, the Internet established itself as the fourth most powerful media. In a similar vein, computer literacy education and related courses established themselves as the essential components of the Faculty of Communication and Media…
Descriptors: Foreign Countries, College Freshmen, Efficiency, Computer Literacy