NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 373 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Iago Rodrigues Agualuza; Silvana Morita Melo; Lina Garcés; Vânia de Oliveira Neves – Informatics in Education, 2025
Modern software companies prioritize high-quality products for competitiveness, and Software Process Improvement (SPI) models help achieve this. In Brazil, the Brazilian Software Process Improvement Model ("MPS-SW" model) is widely used, but its complexity and extensive documentation make it challenging to teach in undergraduate courses.…
Descriptors: Educational Games, Teaching Methods, Computer Science Education, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Khanittha Sittitiamjan; Pongpisit Wuttidittachotti – Educational Process: International Journal, 2025
Background/purpose: This study investigates how knowledge, attitudes, and practices (KAP) influence cybersecurity awareness (CSA) among students in Thai educational institutions. The research addresses regional disparities in cybersecurity readiness by incorporating a culturally responsive adaptation of the KAP model. Materials/methods: A…
Descriptors: Computer Security, Computer Science Education, Foreign Countries, College Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gina Childers; Weverton Ataide Pinheiro; Oluwatosin Daramola; C. Lindsay Linsky; Bryson Payne; Jack Byers; Daniel Baker – Journal of Cybersecurity Education, Research and Practice, 2025
Because K-12 teachers have access to private educational data, they are increasingly at risk of being affected by cybersecurity threats. Examining how teachers conceptualize cybersecurity is vital so that cybersecurity training can be tailored to teachers' understanding of cybersecurity. This study examined K-12 teachers' (n = 255) personalized…
Descriptors: Teacher Attitudes, Knowledge Level, Definitions, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Sonia Lorente; Mónica Arnal-Palacián; Maximiliano Paredes-Velasco – European Journal of Psychology of Education, 2024
The European Higher Education Area (EHEA) proposes to enhance active learning and student protagonism in order to improve academic performance. In this sense, different methodologies are emerging to create scenarios for self-regulation of their learning. In this study the cooperative, collaborative and interdisciplinary learning methodologies were…
Descriptors: Cooperative Learning, Interdisciplinary Approach, Computer Software, Universities
Peer reviewed Peer reviewed
Direct linkDirect link
Jessica M. M. Hamer; Peter E. J. Kemp; Billy Wong; Meggie Copsey-Blake – Cambridge Journal of Education, 2024
Digital skills are beneficial for young people and society, but some individuals, particularly girls, are less likely to choose computing post-compulsory education. Coding is a crucial skill in the school computing curriculum. The authors collected survey data from 4983 secondary-school students (ages 11-16) as well as conducted exploratory factor…
Descriptors: Foreign Countries, Secondary School Students, Computer Science Education, Coding
Peer reviewed Peer reviewed
Direct linkDirect link
Alicia Garcia-Holgado; Andrea Vazquez-Ingelmo; Francisco Jose Garcia-Penalvo – IEEE Transactions on Education, 2024
Contribution: Gender mainstreaming in university teaching should be covered in all the knowledge areas. This work successfully introduces the gender perspective as part of the methodological approach to teaching and learning in Computer Science. Background: This study describes how gender mainstreaming has been introduced and matured during six…
Descriptors: Computer Science, Gender Differences, Equal Education, Inclusion
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Maureen Namukasa; Bhoomin B. Chauhan; Carlie Swords; Curtice Gough; Weronika Dymanus; Catherine Diresta; John Vitali; Vivek Sharma; T. J. OConnor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2025
This study aimed to evaluate the effectiveness of an eight-module Cybersecurity course at increasing the learning outcomes of middle and high school students with little to no experience in Computer Science and Cybersecurity, including underrepresented minorities (URMs) in Cybersecurity. Twice we administered and evaluated the Cybersecurity…
Descriptors: Computer Security, Internet, Instructional Effectiveness, Middle School Students
Peer reviewed Peer reviewed
Direct linkDirect link
Weipeng Yang – Journal of Educational Computing Research, 2024
Computational Thinking (CT) is essential for developing creativity, problem-solving, and digital competence in the 21st century. Coding tools like robotic toys and tablet apps have become popular in early childhood education to support CT development, but there is a debate on which tool is more effective. Little evidence exists on the effect of…
Descriptors: Coding, Preschool Children, Computation, Thinking Skills
Peer reviewed Peer reviewed
Direct linkDirect link
Maja Videnovik; Tone Vold; Linda Kiønig; Vladimir Trajkovik – International Journal of Game-Based Learning, 2025
This study examines whether game-based learning can be used as a promising strategy for fostering students' engagement and motivation. Researchers investigate students' perceptions of the effectiveness of three educational games designed to teach cybersecurity in primary schools: an escape room-style game, a treasure hunt game, and a quiz…
Descriptors: Foreign Countries, Game Based Learning, Learner Engagement, Student Empowerment
Peer reviewed Peer reviewed
Direct linkDirect link
Hamer, Jessica M. M.; Kemp, Peter E. J.; Wong, Billy; Copsey-Blake, Meggie – International Journal of Science Education, 2023
Despite being in a digital age, the diversity of young people choosing to study and work in computing is of ongoing concern, especially low numbers of girls. This paper aims to determine the profile of students who are more likely to aspire to be computer scientists and provide insights into the key factors that shape their aspirations in this…
Descriptors: Foreign Countries, Secondary School Students, Student Attitudes, Occupational Aspiration
Peer reviewed Peer reviewed
Direct linkDirect link
Olelewe, Chijioke Jonathan; Dong, Chunli; Abdullahim, Mohammed; Nwangwu, Chinweike Emmanuel – Technology, Pedagogy and Education, 2023
This study determined the efficacy of the video-clip lecture strategy in enhancing computer science (CS) students' performance in a computer networking course at universities in Gombe state, Nigeria. The study adopted a quasi-experimental design with non-equivalent groups of intact classes. Study participants were 136 CS third-year students made…
Descriptors: Foreign Countries, Instructional Effectiveness, Video Technology, Lecture Method
Peer reviewed Peer reviewed
Direct linkDirect link
Zhanxia Yang; Marina Bers – Computer Science Education, 2024
Background and Context: Historically, women have been underrepresented in computer science. To address this gender gap, researchers advocate for high-quality computer science programs for early childhood. Objectives: This study examines gender differences in coding performance before and after implementing a 24-lesson visual programming curriculum…
Descriptors: Gender Differences, Grade 1, Elementary School Students, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Jennifer M. Blaney; Theresa E. Hernandez; David F. Feldon; Annie M. Wofford – Community College Review, 2025
Research Questions: While community college transfer (i.e., upward transfer) represents an important mechanism for advancing equity across STEM fields, existing studies of gender and women's participation within computer science have largely excluded the perspectives of upward transfer students. We address this gap in the literature by exploring…
Descriptors: Transfer Students, STEM Education, Gender Differences, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Jiaci Lin; Qijiang Shu; Rong Chen; Chunlin Gao; Kaiqing Xu; Keli Yin; Fuhua Yang – International Journal of Technology and Design Education, 2025
Computational thinking (CT) is an essential component of critical skills for university students, representing the ability to analyze and solve problems. In accordance with constructivist learning theory and the core elements of cultivating CT, this research has developed a Project-Based Teaching approach with computational thinking as its focal…
Descriptors: Computation, Thinking Skills, College Students, Active Learning
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  25