NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Adamo-Villani, Nicoletta; Oania, Marcus; Cooper, Stephen – Journal of Educational Technology Systems, 2013
We report the development and initial evaluation of a serious game that, in conjunction with appropriately designed matching laboratory exercises, can be used to teach secure coding and Information Assurance (IA) concepts across a range of introductory computing courses. The IA Game is a role-playing serious game (RPG) in which the student travels…
Descriptors: Educational Games, Computer Games, Role Playing, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Cooper, Stephen – ACM Transactions on Computing Education, 2010
This article explores the major design characteristics (both pedagogic as well as technical) that helped to shape Alice 2. It identifies several strengths of Alice as well as several weaknesses. An example problem is solved in Alice, covering many of the design characteristics. Finally, the effects and impacts of Alice instruction are presented,…
Descriptors: Computer Software, Computer Assisted Instruction, Computer Science Education, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Utting, Ian; Cooper, Stephen; Kolling, Michael; Maloney, John; Resnick, Mitchel – ACM Transactions on Computing Education, 2010
This article distills a discussion about the goals, mechanisms, and effects of three environments which aim to support the acquisition and development of computing concepts (problem solving and programming) in pre-University and non-technical students: Alice, Greenfoot, and Scratch. The conversation started in a special session on the topic at the…
Descriptors: Computer Science Education, Computer Assisted Instruction, Problem Solving, Programming