Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 24 |
Descriptor
Source
ProQuest LLC | 24 |
Author
Publication Type
Dissertations/Theses -… | 24 |
Education Level
Higher Education | 15 |
Postsecondary Education | 8 |
High Schools | 3 |
Secondary Education | 3 |
Adult Education | 2 |
Junior High Schools | 2 |
Middle Schools | 2 |
Early Childhood Education | 1 |
Audience
Location
Pennsylvania | 1 |
South Carolina | 1 |
Texas | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lorien W. Cafarella – ProQuest LLC, 2023
Many middle school students come to Computer Science (CS) classes without any previous CS instruction or any Computational Thinking (CT) skills that are needed to be successful. To overcome this, many curriculums and programming environments have been used to engage students and to instill a love of CS. Which curriculum should be used to develop…
Descriptors: Middle School Students, Computer Science, Computer Science Education, Program Effectiveness
Jadwiga A. Carlson – ProQuest LLC, 2023
Women are underrepresented in science, technology, engineering, and math (STEM) in higher education institutions and the technology field and vulnerable to attrition. The reviewed literature suggests that the impact of other factors, beyond students' academic performance, leading to well-being and success and affecting female students' retention…
Descriptors: College Students, College Graduates, Alumni, Computer Science Education
Allison Payne Burney – ProQuest LLC, 2020
No doubt exists that literacy and mathematics are the primary foci of early childhood education. Children have limited exposure to computer science-related topics, including robotics, coding, and engineering design. This study is based on prior research evidence indicating that early childhood teachers' confidence and competence can be enhanced…
Descriptors: Professional Development, Computer Science, Program Effectiveness, Early Childhood Teachers
Christopher D. Adams – ProQuest LLC, 2023
Modern higher education institutions must contend with a litany of cyber threats, regulations, and environmental dynamics. These institutions are increasingly being targeted due to the value of the data they possess and their historically permissive configurations that are intended to support academic freedom. Many universities are implementing…
Descriptors: Information Security, Computer Security, Academic Freedom, Corporate Education
Olivares, Daniel Michael – ProQuest LLC, 2019
The 2012 report by the US President's Council of Advisors on Science and Technology (PCAST) predicts a deficit in the workforce for science, technology, engineering, and mathematics (STEM) in the following decade and emphasizes the importance of addressing this shortfall. According to the report, less than half of the three million students…
Descriptors: Intervention, Computer Science Education, Programming, Social Behavior
Caroline D. Hardin – ProQuest LLC, 2019
Hackathons, the time-bound collaborative project-based competitions increasingly popular with undergraduate CS students, are both transformative and problematic. On one hand, they are unique opportunities to apply skills learned in the classroom to real-world, interest driven projects that celebrate risk taking, collaboration, and playfulness. On…
Descriptors: Undergraduate Students, Computer Science Education, Programming, Group Activities
Pan, Yi-Cheng – ProQuest LLC, 2018
Recent policies and initiatives emphasized the importance of helping all students acquire Computer Science (CS) knowledge and develop Computational Thinking (CT). This study investigated the impact of a school-university partnership model on school students' CT development in the context of an after-school program. This study also examined the…
Descriptors: Partnerships in Education, College School Cooperation, Computer Science Education, Middle School Students
Tennyson, Matthew F. – ProQuest LLC, 2013
Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…
Descriptors: Authors, Programming, Computer Software, Plagiarism
Pai, Vinay – ProQuest LLC, 2011
The increasing popularity of high-bandwidth Internet connections has enabled new applications like the online delivery of high-quality audio and video content. Conventional server-client approaches place the entire burden of delivery on the content provider's server, making these services expensive to provide. A peer-to-peer approach allows end…
Descriptors: Video Technology, Program Effectiveness, Internet, Information Technology
Dennis, Sonya Maria – ProQuest LLC, 2013
There has been a steady decline of majors in the disciplines of science, technology, engineering, and mathematics ("STEM majors"). In an effort to improve recruitment and retention in "STEM" majors, an active-learning methodology--"peer-led team learning" ("PLTL")--was implemented by the participating…
Descriptors: Computer Science Education, STEM Education, Peer Teaching, Teamwork
Persinger, Jon F. – ProQuest LLC, 2010
This research study examined whether the overall effectiveness of the Information Technology Infrastructure Library (ITIL) could be predicted by measuring multiple independent variables. The primary variables studied included the number of ITIL process modules adopted and the overall ITIL "maturity level." An online survey was used to…
Descriptors: Information Technology, Program Effectiveness, Prediction, Surveys
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Tyranowski, Theresa M. – ProQuest LLC, 2009
Technological change has become the mode of operation for today's organizations, with organizations in need of constantly training employees on their latest technological changes. There are now four generations working in the same workforce, but only the youngest generation has grown up with technology tools integrated in their daily processes. If…
Descriptors: Employees, Program Effectiveness, Statistical Analysis, Human Resources
Bucks, Gregory Warren – ProQuest LLC, 2010
Computers have become an integral part of how engineers complete their work, allowing them to collect and analyze data, model potential solutions and aiding in production through automation and robotics. In addition, computers are essential elements of the products themselves, from tennis shoes to construction materials. An understanding of how…
Descriptors: Engineering Education, Racquet Sports, Construction Materials, Programming Languages
Krishnamurthy, Janaki – ProQuest LLC, 2010
Given the increasing competition in the software industry and the critical consequences of software errors, it has become important for companies to achieve high levels of software quality. While cost reduction and timeliness of projects continue to be important measures, software companies are placing increasing attention on identifying the user…
Descriptors: Program Evaluation, Opinions, Privacy, Prediction
Previous Page | Next Page »
Pages: 1 | 2