NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 116 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Geoff D. Zylstra; Jill Belli; Candido Cabo; Sean P. MacDonald; Robin Michals; Anne Marie Sowder; Christopher Swift – Journal of Interdisciplinary Studies in Education, 2024
The humanities have the potential to enhance STEM curriculum in career-oriented professional degree programs. As part of a larger college-wide initiative to develop interdisciplinary curricula, the National Endowment for the Humanities (NEH) awarded a grant to New York City College of Technology to explore the relationship between the humanities…
Descriptors: Humanities, Educational Environment, STEM Education, Curriculum
Peer reviewed Peer reviewed
Direct linkDirect link
Fominykh, Mikhail; Weidlich, Joshua; Kalz, Marco; Hybertsen, Ingunn Dahler – International Journal of Educational Technology in Higher Education, 2022
This article contributes to the debate on the growing number of interdisciplinary study programs in learning and technology, and aims to understand the diversity of programs as well as curricula structure in an international landscape. Scientific fields share their knowledge and recruit young researchers by offering discipline-specific study…
Descriptors: Electronic Learning, Curriculum Evaluation, Interdisciplinary Approach, Masters Programs
Kimberly A. Mayer – ProQuest LLC, 2020
This action research study explored how women perceived the influences of collaborative software development methodologies on workplace culture at one financial technology firm. While collaborative software development methodologies were not designed to increase gender diversity, the transformational shifts in the way technology teams work…
Descriptors: Employed Women, Technology, Computer Software, Cooperation
Peer reviewed Peer reviewed
Direct linkDirect link
Jones, Stephanie T.; Thompson, JaCoya; Worsley, Marcelo – Computer Science Education, 2020
Background and Context: Sports and technology are often pitted as being at odds with one another. While there are several educational activities that make reference to sports we seldom see sports used as an authentic context for learning computing. Objective: We describe the design of Data in Motion, a curriculum that considers the bi-directional…
Descriptors: Athletics, STEM Education, Summer Programs, Elementary School Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bevz, Valentyna; Dmytriienko, Oksana – Advanced Education, 2020
The article presents the integrated course "The History of Science and Technology" developed for the students of pedagogical universities, majoring in physics, mathematics, and computer sciences. The authors highlight the effective forms, methods and means of teaching the course. The qualitative research methods included observations,…
Descriptors: Foreign Countries, College Students, Student Attitudes, Science History
Peer reviewed Peer reviewed
Direct linkDirect link
Jankowski, Amy – Issues in Science and Technology Librarianship, 2017
Accessibility and findability of digitized archival resources can be a challenge, particularly for students or researchers not familiar with archival formats and digital interfaces, which adhere to different descriptive standards than more widely familiar library resources. Numerous aggregate archival collection databases exist, which provide a…
Descriptors: Archives, Primary Sources, Scientific and Technical Information, Biology
Buse, Kathleen; Evans, Nicole; George, Emma; Ford, Jeremy; Anderson, Jessica – American Association of University Women, 2017
While girls are studying and excelling in science and math more than ever before, this achievement has not been matched with a similar rise in the representation of women in these careers. Today, women make up just 12 percent of the engineering workforce and 26 percent of the computing workforce. Employers play a critical role in improving the…
Descriptors: Best Practices, Sex Fairness, Disproportionate Representation, Technology
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bers, Marina U. – Early Childhood Research & Practice, 2010
This article describes the TangibleK robotics program for young children. Based on over a decade of research, this program is grounded on the belief that teaching children about the human-made world, the realm of technology and engineering, is as important as teaching them about the natural world, numbers, and letters. The TangibleK program uses…
Descriptors: Young Children, Computer Science, Engineering, Kindergarten
Peer reviewed Peer reviewed
Direct linkDirect link
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Aydin, Nuh – PRIMUS, 2009
The theory of error-correcting codes and cryptography are two relatively recent applications of mathematics to information and communication systems. The mathematical tools used in these fields generally come from algebra, elementary number theory, and combinatorics, including concepts from computational complexity. It is possible to introduce the…
Descriptors: Mathematics Curriculum, Computer Science, Number Concepts, Liberal Arts
Hill, Catherine; Corbett, Christianne; St. Rose, Andresse – American Association of University Women, 2010
The number of women in science and engineering is growing, yet men continue to outnumber women, especially at the upper levels of these professions. In elementary, middle, and high school, girls and boys take math and science courses in roughly equal numbers, and about as many girls as boys leave high school prepared to pursue science and…
Descriptors: Women Scientists, Technology, Engineering, Mathematics
Van Dyke, Carolynn – 1987
The borrowing of words by computer sciences from the field of English implies a widespread interest in the relationship between technology and language. To confirm the genealogy of "technological literacy," it would be useful to understand better linguistic literacy. To be literate is to be able to participate in the linguistic interchanges that…
Descriptors: Computer Science, Computer Science Education, Dialogs (Literary), English
Peer reviewed Peer reviewed
Strauss, Aaron – Mathematics Teacher, 1976
The early development of computers and computer technology is traced, and the relationship of the computer and mathematics is discussed. (SD)
Descriptors: Computer Science, Computer Science Education, Computers, Man Machine Systems
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8