Publication Date
| In 2026 | 0 |
| Since 2025 | 41 |
| Since 2022 (last 5 years) | 211 |
| Since 2017 (last 10 years) | 385 |
| Since 2007 (last 20 years) | 944 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 279 |
| Teachers | 123 |
| Researchers | 60 |
| Administrators | 35 |
| Policymakers | 33 |
| Students | 25 |
| Media Staff | 6 |
| Parents | 4 |
| Community | 2 |
| Counselors | 1 |
Location
| United States | 40 |
| Canada | 39 |
| United Kingdom | 37 |
| Australia | 34 |
| California | 26 |
| United Kingdom (Great Britain) | 25 |
| Turkey | 21 |
| Texas | 20 |
| China | 18 |
| Germany | 18 |
| Israel | 17 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Bruce, Kim B.; Cupper, Robert D.; Scot Drysdale, Robert L. – ACM Transactions on Computing Education, 2010
With the support of a grant from the Sloan Foundation, nine computer scientists from liberal arts colleges came together in October, 1984 to form the Liberal Arts Computer Science Consortium (LACS) and to create a model curriculum appropriate for liberal arts colleges. Over the years the membership has grown and changed, but the focus has remained…
Descriptors: Computer Science Education, Computer Science, Consortia, Liberal Arts
Persinger, Jon F. – ProQuest LLC, 2010
This research study examined whether the overall effectiveness of the Information Technology Infrastructure Library (ITIL) could be predicted by measuring multiple independent variables. The primary variables studied included the number of ITIL process modules adopted and the overall ITIL "maturity level." An online survey was used to…
Descriptors: Information Technology, Program Effectiveness, Prediction, Surveys
Arndt, Timothy – International Association for Development of the Information Society, 2012
Post-secondary students are increasingly receiving instruction by distance learning. This mode of learning can result in the students learning in isolation, with bad results in learning outcomes. The same type of isolation can occur for part-time students and those who are working while taking classes. In such circumstances, we believe that it…
Descriptors: Learning Activities, Communities of Practice, Community Development, Student Surveys
Koch, Melissa; Gorges, Torie; Penuel, William R. – Afterschool Matters, 2012
"Co-design"--including youth development staff along with curriculum designers--is the key to developing an effective program that is both scalable and sustainable. This article describes Build IT, a two-year afterschool and summer curriculum designed to help middle school girls develop fluency in information technology (IT), interest in…
Descriptors: Females, Computers, Information Technology, Computer Science
Gentile, Lisa; Caudill, Lester; Fetea, Mirela; Hill, April; Hoke, Kathy; Lawson, Barry; Lipan, Ovidiu; Kerckhove, Michael; Parish, Carol; Stenger, Krista; Szajda, Doug – Journal of College Science Teaching, 2012
To help undergraduates make connections among disciplines so they are able to approach, evaluate, and contribute to the solutions of important global problems, our campus has been focused on interdisciplinary research and education opportunities across the science, technology, engineering, and mathematics (STEM) disciplines. This paper describes…
Descriptors: Physics, Majors (Students), Interdisciplinary Approach, Computer Science
Hart, Beth; Carman, Elaine; Luisier, Danielle; Vasavada, Natasha – College Board, 2011
The College Board has been a strong advocate for and played an active role in the development of the Common Core State Standards. As part of this collaboration, the College Board helped draft the standards and helped shape the initiative by providing executive guidance on the Common Core Advisory Committee. The goal of the Common Core State…
Descriptors: Advisory Committees, State Standards, Advanced Placement, English Literature
Jara, Carlos A.; Candelas, Francisco A.; Puente, Santiago T.; Torres, Fernando – Computers & Education, 2011
Automatics and Robotics subjects are always greatly improved when classroom teaching is supported by adequate laboratory courses and experiments following the "learning by doing" paradigm, which provides students a deep understanding of theoretical lessons. However, expensive equipment and limited time prevent teachers having sufficient…
Descriptors: Undergraduate Students, Teacher Effectiveness, Experiential Learning, Laboratories
Abbiss, Jane – Gender and Education, 2011
Students negotiate their masculine and feminine identities as students of information and communication technology (ICT) and computer users as they participate in specialist ICT courses and in other areas of their lives. As they negotiate these roles, they are established in relations of power and authority with the technology and with each other.…
Descriptors: Computers, Foreign Countries, Specialists, Gender Issues
Devedzic, V.; Milenkovic, S. R. – IEEE Transactions on Education, 2011
This paper describes the authors' experience of teaching agile software development to students of computer science, software engineering, and other related disciplines, and comments on the implications of this and the lessons learned. It is based on the authors' eight years of experience in teaching agile software methodologies to various groups…
Descriptors: Computer Software, Computer Science, Engineering, College Faculty
Zendler, Andreas; Spannagel, Christian – Journal on Educational Resources in Computing, 2008
The design of computer science curricula should rely on central concepts of the discipline rather than on technical short-term developments. Several authors have proposed lists of basic concepts or fundamental ideas in the past. However, these catalogs were based on subjective decisions without any empirical support. This article describes the…
Descriptors: Computer Science Education, Computers, Multivariate Analysis, Computer Science
Chiu, Chiung-Fang; Lee, Greg C. – Computers & Education, 2009
The current practice of traditional in-class lecture for learning computer science (CS) in the high schools of Taiwan is in need of revamping. Teachers instruct on the use of commercial software instead of teaching CS concepts to students. The lack of more suitable teaching materials and limited classroom time are the main reasons for the…
Descriptors: High Schools, Computer Science, Foreign Countries, Lecture Method
Ballera, Melvin; Elssaedi, Mosbah Mohamed – Association for the Advancement of Computing in Education, 2012
There is an unrealized potential in the use of socially-oriented pedagogical agent and interactive simulation in e-learning system. In this paper, we investigate the impact of having a socially oriented tutor agent and the incorporation of interactive simulation in e-learning into student performances, perceptions and experiences for non-native…
Descriptors: Simulation, Foreign Countries, Computer Science, Electronic Learning
Denner, Jill; Werner, Linda; Ortiz, Eloy – Computers & Education, 2012
Computer game programming has been touted as a promising strategy for engaging children in the kinds of thinking that will prepare them to be producers, not just users of technology. But little is known about what they learn when programming a game. In this article, we present a strategy for coding student games, and summarize the results of an…
Descriptors: Females, Computer Uses in Education, Computers, Programming
Battig, Michael E. – Information Systems Education Journal, 2010
Survey results from a two year project are presented. The survey instruments were developed through review of the literature involving similar studies of student perceptions and with the assistance of social scientists. The study includes both high school and college student perceptions of computing. The survey also contrasts student perceptions…
Descriptors: High School Students, Computer Attitudes, Computer Science, Information Technology
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality

Peer reviewed
Direct link
