Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 14 |
Descriptor
Source
Author
Agee, Kelly, Ed. | 1 |
Astrom, Peik | 1 |
Babb, Jeffry S. | 1 |
Balester, Valerie | 1 |
Bergstrom, Laura | 1 |
Bhunia, Swarup | 1 |
Blanes, Ian | 1 |
Blocher, Michael | 1 |
Borns, Robert J. | 1 |
Borrego, Carlos | 1 |
Brabston, Mary | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 13 |
Postsecondary Education | 7 |
Adult Education | 1 |
Elementary Secondary Education | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Practitioners | 2 |
Teachers | 2 |
Administrators | 1 |
Students | 1 |
Location
Finland | 2 |
Arizona | 1 |
Australia | 1 |
Canada | 1 |
Florida | 1 |
Italy | 1 |
Malawi | 1 |
Massachusetts | 1 |
Mississippi | 1 |
Missouri | 1 |
North Dakota | 1 |
More ▼ |
Laws, Policies, & Programs
Carl D Perkins Vocational and… | 1 |
No Child Left Behind Act 2001 | 1 |
Assessments and Surveys
ACT Assessment | 1 |
What Works Clearinghouse Rating
What! No GUI? -- Teaching a Text Based Command Line Oriented Introduction to Computer Science Course
Goldstein, Ira – Information Systems Education Journal, 2019
Computer Science students need to acquire knowledge about both the hardware and software aspects of computing systems. It is necessary for them to understand how each layer interacts with one another. However, since Graphical User Interfaces have become ubiquitous, the opportunities to interact with the computer via a command prompt as part of…
Descriptors: Computer Science Education, Computer Software, Introductory Courses, Programming
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Borrego, Carlos; Fernández, Cristina; Blanes, Ian; Robles, Sergi – Journal of Technology and Science Education, 2017
Real-life room-escape games are ludic activities in which participants enter a room in order to get out of it only after solving some riddles. In this paper, we explain a Room Escape teaching experience developed in the Engineering School at Universitat Autònoma de Barcelona. The goal of this activity is to increase student's motivation and to…
Descriptors: Computer Science Education, Educational Games, Learning Activities, Learning Motivation
Ntogramatzidis, Lorenzo; Zanasi, Roberto; Cuoghi, Stefania – IEEE Transactions on Education, 2014
This paper describes a range of design techniques for standard compensators (Lead-Lag networks and PID controllers) that have been applied to the teaching of many undergraduate control courses throughout Italy over the last twenty years, but that have received little attention elsewhere. These techniques hinge upon a set of simple formulas--herein…
Descriptors: Instructional Innovation, Design Requirements, Course Descriptions, Electronic Equipment
Craig, Scotty D. – Advanced Distributed Learning Initiative, 2021
The dynamic and high-stakes nature of education and training requires reliance on evidence-based practices and policies to make decisions about technology adoption and implementation. In the report, "Science of Learning and Readiness (SoLaR) Recommendation Report: Science of Learning Practices for Distributed Online Environments"…
Descriptors: Science Education, Learning Readiness, Evidence Based Practice, Check Lists
Chawinga, Winner Dominic – E-Learning and Digital Media, 2016
It is understood that microblogging (tweeting) which is a form of Web 2.0, has been a centre of attraction in some institutions of higher education. However, despite its hype and pomp as reported by some scholars in developed countries, integration of Twitter in a classroom environment in developing countries is just beginning to flourish. In…
Descriptors: Social Media, Electronic Publishing, Course Content, Foreign Countries
Chen, Fang; Brabston, Mary – Journal of Information Systems Education, 2011
We implemented two local area network (LAN) projects in our introductory data communications and networking course. The first project required students to develop a LAN from scratch for a small imaginary organization. The second project required student groups to analyze a LAN for a real world small organization. By allowing students to apply what…
Descriptors: Computer Networks, Information Science Education, Information Networks, Theory Practice Relationship
Tu, Chih-Hsiung; Sujo-Montes, Laura; Yen, Cherng-Jyh; Chan, Junn-Yih; Blocher, Michael – TechTrends: Linking Research and Practice to Improve Learning, 2012
Learning management systems traditionally provide structures to guide online learners to achieve their learning goals. Web 2.0 technology empowers learners to create, share, and organize their personal learning environments in open network environments; and allows learners to engage in social networking and collaborating activities. Advanced…
Descriptors: Online Courses, Computer Assisted Instruction, Educational Technology, Course Descriptions
Tan, Grace; Venables, Anne – Journal of Information Technology Education, 2010
Since 2001, there has been a dramatic decline in Information Technology and Computer Science student enrolments worldwide. As a consequence, many institutions have evaluated their offerings and revamped their programs to include units designed to capture students' interests and increase subsequent enrolment. Likewise, at Victoria University the…
Descriptors: Curriculum Development, Information Technology, Curriculum Design, Computer Science Education
Cronin, John J. – Journal of Marketing Education, 2009
Wikis are one of the newest features of Web 2.0. This article describes the implementation of a project in a marketing course in which students created an interactive textbook using wiki software. Several surprises encountered along the way are described, and the unique problem of grading individual contributions to a wiki is discussed. The author…
Descriptors: Marketing, Educational Technology, Hypermedia, Cooperative Learning
Alberta Advanced Education and Technology, 2009
The graduate of the Communication Technician apprenticeship program is a certified journeyperson who will be able to: (1) supervise, train and coach apprentices; (2) use a thorough knowledge of electrical and electronic theory and its application to communication and associated equipment used in the telecommunication industry; (3) understand…
Descriptors: Foreign Countries, Paraprofessional Personnel, Apprenticeships, Telecommunications
Ercan, Tuncay; Sahin, Yasar Guneri – Online Submission, 2007
Course descriptions prepared by the lecturers in the beginning of the academic year do not get any feed back from the students enrolled it. These syllabuses are not only used for the future semesters, but also used by the other lecturers without even making any changes. This causes a negative effect on the student education since many of the…
Descriptors: Knowledge Level, Measures (Individuals), Course Descriptions, Computer Networks

Balester, Valerie; And Others – Computers and Composition, 1992
Describes the sharing of authority that occurred during a collaboratively taught course for basic writing students, supported by real-time computer exchanges. Discusses the computer classroom, curriculum, assignments, collaborative teaching, and student responses to the course. (SR)
Descriptors: Basic Writing, Computer Networks, Course Descriptions, Higher Education
Agee, Kelly, Ed. – Research and Curriculum Unit, 2009
Secondary vocational-technical education programs in Mississippi are faced with many challenges resulting from sweeping educational reforms at the national and state levels. Schools and teachers are increasingly being held accountable for providing true learning activities to every student in the classroom. This accountability is measured through…
Descriptors: Information Technology, Educational Technology, Teaching Methods, Computer Science Education
Previous Page | Next Page »
Pages: 1 | 2