NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 1,514 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Draper, Steve; Maguire, Joseph – ACM Transactions on Computing Education, 2023
The overall aim of this article is to stimulate discussion about the activities within CER, and to develop a more thoughtful and explicit perspective on the different types of research activity within CER, and their relationships with each other. While theories may be the most valuable outputs of research to those wishing to apply them, for…
Descriptors: Computer Science Education, Educational Research, Computer Science, Classification
Peer reviewed Peer reviewed
Direct linkDirect link
Young, Jacob A.; Farshadkhah, Sahar – Journal of Information Systems Education, 2023
In this paper, we describe the development of an in-class exercise designed to teach students how to craft social engineering attacks. Specifically, we focus on the development of phishing emails. Providing an opportunity to craft offensive attacks not only helps prepare students for a career in penetration testing but can also enhance their…
Descriptors: Information Security, Class Activities, Computer Science Education, Social Psychology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Juraj Hromkovic; Regula Lacher – Informatics in Education, 2025
The design of algorithms is one of the hardest topics of high school computer science. This is mainly due to the universality of algorithms as solution methods that guarantee the calculation of a correct solution for all potentially infinitely many instances of an algorithmic problem. The goal of this paper is to present a comprehensible and…
Descriptors: Algorithms, Computer Science Education, High School Students, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Luse, Andy; Shadbad, Forough Nasirpouri – Journal of Information Systems Education, 2023
The demand for qualified analytics professionals remains high with forecasts showing a continued need over the next few years. While this demand necessitates instruction in analytics in the classroom, many students find analytics concepts to be complicated and boring. This teaching brief describes a novel approach to teaching analytics through…
Descriptors: Computer Science Education, Information Security, Learning Activities, Learner Engagement
Peer reviewed Peer reviewed
Direct linkDirect link
Jason Triche; Tianxi Dong; Jacki Landon; Ezekiel Baied – Journal of Information Systems Education, 2024
The adoption of enterprise-wide systems like Customer Relationship Management (CRM) systems continues to grow globally. Due to the prevalence of CRM software in businesses and CRM's expected growth, Information Systems (IS) graduates will likely interact with a CRM system in their careers. However, learning enterprise systems like CRM is…
Descriptors: Business Administration Education, Experiential Learning, Business, Management Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Thin-Yin Leong; Nang-Laik Ma – INFORMS Transactions on Education, 2024
This paper develops a spreadsheet simulation methodology for teaching simulation and performance analysis of priority queues with multiple servers, without resorting to macros, add-ins, or array formula. The approach is made possible by a "single overtaking" simplifying assumption under which any lower-priority customer may be passed in…
Descriptors: Spreadsheets, Simulation, Teaching Methods, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Daniel T. Hickey; Ronald J. Kantor – Journal of Cybersecurity Education, Research and Practice, 2024
The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the "transfer" of cybersecurity learning is crucial. We compared how different recognized "cognitive" transfer theories might help explain and synergize three aspects of cybersecurity education. These include "teaching and…
Descriptors: Transfer of Training, Computer Science Education, Computer Security, Metacognition
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Felix Winkelnkemper; Lukas Höper; Carsten Schulte – Informatics in Education, 2024
When it comes to mastering the digital world, the education system is more and more facing the task of making students competent and self-determined agents when interacting with digital artefacts. This task often falls to computing education. In the traditional fields of computing education, a plethora of models, guidelines, and principles exist,…
Descriptors: Digital Literacy, Computer Uses in Education, Models, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Ngac, Brian K.; Boicu, Mihai – Innovations in Education and Teaching International, 2023
The cyber security environment, its threats, and its defence strategies are constantly changing. Educational programmes and their curriculum are known to be slow changing and at times out-of-date, resulting in content that may not be as relevant to their students and the industry. This research paper will 1 -- present an overview of the curriculum…
Descriptors: Expertise, Curriculum Development, Computer Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Michaelis, Joseph E.; Weintrop, David – ACM Transactions on Computing Education, 2022
Computing is rapidly becoming a critical literacy for succeeding in an increasingly technological world. While the proliferation of programs dedicated to broadening participation in computing increases access, computing education research can benefit from more directly drawing on current interest development theory to improve interventions that…
Descriptors: Computer Science Education, Student Interests, Curriculum Design, Intervention
Peer reviewed Peer reviewed
PDF on ERIC Download full text
David M. Woods; Andrea Hulshult – Information Systems Education Journal, 2025
IT/IS educators continue to work to develop content and activities for teaching Agile practices, processes, and methodologies to their courses to ensure students have the skills expected by businesses. Given the wide range of tools and technologies that fall under the umbrella of Agile and the wide range of places where Agile is applied, educators…
Descriptors: Information Technology, Information Science Education, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Madhav Sharma; Roger McHaney – Decision Sciences Journal of Innovative Education, 2025
Many management information systems (MIS) faculty have adopted a project-oriented approach in their systems analysis and design courses. In these courses, students use a software development methodology to create a web or mobile application project, which can be based on a predefined case or developed for an external stakeholder. Because most…
Descriptors: Computer Software, Artificial Intelligence, Instructional Design, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Gerit Wagner; Laureen Thurner – Journal of Information Systems Education, 2025
Git, as the leading version-control system, is frequently employed by software developers, digital product managers, and knowledge workers. Information systems (IS) students aspiring to fill software engineering, management, or research positions would therefore benefit from familiarity with Git. However, teaching Git effectively can be…
Descriptors: Computer Science Education, Information Systems, Teaching Methods, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wendy Haw; Adam Crawford – Journal of Learning Development in Higher Education, 2025
This article illustrates the potential for hackathons to serve as an innovative educational tool in addressing the underrepresentation of minority communities in science, technology, engineering, and mathematics (STEM) fields. Using Merced, California--a region recognised for its agricultural economy, socioeconomic disparities, and diverse…
Descriptors: Programming, Computer Science Education, Disproportionate Representation, STEM Education
Peer reviewed Peer reviewed
Direct linkDirect link
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  101