Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 3 |
Descriptor
Source
| Journal of Educational… | 3 |
Author
| Andreas Giannakoulas | 1 |
| Chu, Bill | 1 |
| Klaudt, Dieter | 1 |
| Lipford, Heather Richter | 1 |
| Seitz, Cornelia | 1 |
| Stelios Xinogalos | 1 |
| Thomas, Tyler | 1 |
| Whitney, Michael | 1 |
| Zendler, Andreas | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 2 |
| Reports - Descriptive | 1 |
Education Level
| Elementary Education | 1 |
| Higher Education | 1 |
Audience
Location
| North Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Andreas Giannakoulas; Stelios Xinogalos – Journal of Educational Computing Research, 2025
This study critically reviews sixteen empirical studies that investigate the various difficulties that primary school students encounter while learning programming through educational games. Specifically, the challenges that students face in understanding basic programming concepts and the game elements that contribute to these difficulties, as…
Descriptors: Elementary School Students, Elementary School Teachers, Programming, Game Based Learning
Zendler, Andreas; Seitz, Cornelia; Klaudt, Dieter – Journal of Educational Computing Research, 2016
A process model ("cpm.4.CSE") is introduced that allows the development of competence models in computer science education related to curricular requirements. It includes eight subprocesses: (a) determine competence concept, (b) determine competence areas, (c) identify computer science concepts, (d) assign competence dimensions to…
Descriptors: Competency Based Education, Models, Computer Science Education, Curriculum Development
Whitney, Michael; Lipford, Heather Richter; Chu, Bill; Thomas, Tyler – Journal of Educational Computing Research, 2018
Many of the software security vulnerabilities that people face today can be remediated through secure coding practices. A critical step toward the practice of secure coding is ensuring that our computing students are educated on these practices. We argue that secure coding education needs to be included across a computing curriculum. We are…
Descriptors: Computer Security, Programming, Coding, Computer Science Education

Peer reviewed
Direct link
