Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 34 |
| Since 2017 (last 10 years) | 111 |
| Since 2007 (last 20 years) | 283 |
Descriptor
| Case Studies | 339 |
| Computer Science Education | 339 |
| Foreign Countries | 163 |
| Teaching Methods | 109 |
| Student Attitudes | 92 |
| Computer Software | 84 |
| Undergraduate Students | 70 |
| Programming | 69 |
| Educational Technology | 65 |
| Information Technology | 53 |
| College Students | 50 |
| More ▼ | |
Source
Author
Publication Type
Education Level
Audience
| Teachers | 12 |
| Researchers | 5 |
| Practitioners | 4 |
| Policymakers | 3 |
| Students | 1 |
Location
| Australia | 24 |
| Germany | 15 |
| Turkey | 14 |
| United Kingdom | 14 |
| Brazil | 11 |
| New Zealand | 10 |
| Spain | 10 |
| South Africa | 9 |
| United States | 9 |
| Finland | 8 |
| Israel | 8 |
| More ▼ | |
Laws, Policies, & Programs
| Carl D Perkins Vocational and… | 1 |
| No Child Left Behind Act 2001 | 1 |
Assessments and Surveys
| ACT Assessment | 2 |
| Program for International… | 2 |
| Learning Style Inventory | 1 |
| Massachusetts Comprehensive… | 1 |
| Motivated Strategies for… | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Cheers, Hayden; Lin, Yuqing; Yan, Weigen – Informatics in Education, 2023
Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, most of these tools only measure the similarity between assignment submissions, and do not actually identify which are suspicious of plagiarism. This work…
Descriptors: Plagiarism, Assignments, Computer Software, Computer Science Education
DeLiema, David; Kwon, Yejin Angela; Chisholm, Andrea; Williams, Immanuel; Dahn, Maggie; Flood, Virginia J.; Abrahamson, Dor; Steen, Francis F. – Cognition and Instruction, 2023
When teachers, researchers, and students describe productively responding to moments of failure in the learning process, what might this mean? Blending prior theoretical and empirical research on the relationship between failure and learning, and empirical results from four data sets that are part of a larger design-based research project, we…
Descriptors: Guidelines, Learning Processes, Correlation, Failure
Audrey Ellis; Tracie Yorke; Charles Ansell – Complete College America, 2025
As artificial intelligence reshapes many aspects of society and workforce, many colleges and universities have focused on developing technical AI programs within computer science departments. But preparing students and faculty for an AI-enabled future requires more than technical training--it demands a broader approach to AI literacy and…
Descriptors: Artificial Intelligence, Higher Education, Computer Software, Technology Integration
Kleinman, Erica; Shergadwala, Murtuza N.; Teng, Zhaoqing; Villareale, Jennifer; Bryant, Andy; Zhu, Jichen; Seif El-Nasr, Magy – Journal of Learning Analytics, 2022
Educational technology is shifting toward facilitating personalized learning. Such personalization, however, requires a detailed understanding of students' problem-solving processes. Sequence analysis (SA) is a promising approach to gaining granular insights into student problem solving; however, existing techniques are difficult to interpret…
Descriptors: Problem Solving, Learning Analytics, Decision Making, Educational Technology
Schwieger, Dana – Information Systems Education Journal, 2023
Many small organizations sponsor events and activities that could benefit from the data management and reporting capabilities provided through a centralized database. However, many of those organizations do not have the budget to afford a commercial solution or an on-going subscription to a cloud-based solution for a small scope event with limited…
Descriptors: Databases, Computer Software, Information Systems, Volunteers
Fernández-Batanero, José María; Piñero-Virué, Rocío; Rodríguez-González, César Antonio; Reyes-Rebollo, Miguel María – European Journal of Educational Research, 2022
In this study we focus our research on the case analysis of an eleven-year-old boy and his close relationship with technology, specifically robotics. The methodology of the study is experimental in nature, with the aim of improving the subject's attention span through robotics, thereby favouring his educational process and, consequently, his…
Descriptors: Case Studies, Robotics, Student Attitudes, Age Differences
Allison, Jordan – Journal of Further and Higher Education, 2023
Cyber security is a growing area of international importance, with shortages present for cyber security skills. While many universities have introduced degree programmes for cyber security, the major focus of these programmes is on the development of technical skills with some reports indicating how graduates of these courses lack in softer skills…
Descriptors: Computer Security, Information Security, Computer Science Education, Teaching Methods
Kuo, Yu-Chen; Chen, Yun-An – Education and Information Technologies, 2023
With the development of science and technology, the demand for programmers has increased. However, learning computer programs is not an easy task. It might cause a significant impact on programming if misconceptions exist at the beginning of the study. Hence, it is important to discover and correct them immediately. Chatbots are effective teaching…
Descriptors: Programming, Artificial Intelligence, Computer Science Education, Misconceptions
Spruit, Marcel – Higher Education, Skills and Work-based Learning, 2022
Purpose: The information security field requires standardised education. This could be based on generic job profiles and a standard competence framework. The question is whether this is possible and feasible. To find out, the author did a case study: developing an information security master curriculum based on a generic PVIB job profile and the…
Descriptors: Information Security, Computer Science Education, Profiles, Case Studies
Almuhaideb, Abdullah M.; Saeed, Saqib – Journal of Information Systems Education, 2021
ABET accreditation has become a well-known standard for academic programs not only in the U.S. but also across the globe. Instantiating the processes to systematically improve the quality of programs is a daunting task for higher education institutions. In this contribution, we provide a detailed process-based framework that can assist aspiring…
Descriptors: Engineering Education, Accreditation (Institutions), Computer Security, Crime
Luburic, Nikola; Sladic, Goran; Slivka, Jelena; Milosavljevic, Branko – ACM Transactions on Computing Education, 2019
With ever-greater reliance of the developed world on information and communication technologies, constructing secure software has become a top priority. To produce secure software, security activities need to be integrated throughout the software development lifecycle. One such activity is security design analysis (SDA), which identifies security…
Descriptors: Computer Security, Case Studies, Blended Learning, Models
Monica Ward; Fiona O'Riordan; Danielle Logan-Fleming; Dervila Cooke; Tara Concannon-Gibney; Marina Efthymiou; Niamh Watkins – Innovations in Education and Teaching International, 2024
Assessment is a central feature of teaching and learning. It is both complex and challenging in ordinary times, and these aspects are magnified in an online learning environment. Given its central role, it is crucial that its design and purpose is rigorous and robust. This paper presents justification for using interactive oral assessment as an…
Descriptors: Verbal Tests, Oral Language, Experiential Learning, Case Studies
Goode, Jennifer – Journal of Technical Writing and Communication, 2021
This descriptive narrative depicts an academic program that deploys a collaborative project model for delivering concurrent multimedia courses at the undergraduate and graduate levels. Applying this model, online master's students who are studying the management of technical communication activities remotely manage teams of on-campus undergraduate…
Descriptors: Graduate Students, Undergraduate Students, Online Courses, Management Development
Laovisutthichai, Vikrom; Srihiran, Kaweekrai; Lu, Weisheng – Industry and Higher Education, 2023
Building information modeling (BIM) has been a disruptive development in the global architecture, engineering, construction and operations (AECO) industry. While architecture schools have sought to integrate BIM into their curricula, most current pedagogical approaches and lessons are derived from engineering and construction management…
Descriptors: Architectural Education, Case Studies, Creativity, Construction Industry

Peer reviewed
Direct link
