Publication Date
| In 2026 | 0 |
| Since 2025 | 6 |
| Since 2022 (last 5 years) | 24 |
| Since 2017 (last 10 years) | 72 |
| Since 2007 (last 20 years) | 134 |
Descriptor
| Computer Science Education | 134 |
| Handheld Devices | 134 |
| Foreign Countries | 72 |
| Telecommunications | 55 |
| Teaching Methods | 52 |
| Educational Technology | 51 |
| Computer Software | 50 |
| Electronic Learning | 46 |
| College Students | 41 |
| Student Attitudes | 40 |
| Programming | 39 |
| More ▼ | |
Source
Author
Publication Type
Education Level
Audience
| Teachers | 6 |
| Students | 2 |
| Researchers | 1 |
Location
| Turkey | 11 |
| Taiwan | 9 |
| Australia | 8 |
| Japan | 8 |
| Germany | 7 |
| Italy | 7 |
| Saudi Arabia | 6 |
| Brazil | 5 |
| China | 5 |
| India | 4 |
| South Africa | 4 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Motivated Strategies for… | 2 |
| Learning Style Inventory | 1 |
| Myers Briggs Type Indicator | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Test of English as a Foreign… | 1 |
What Works Clearinghouse Rating
Türkan Karakus Yilmaz; Zafer Yilmaz; Ömer Arpacik – Journal of Educational Computing Research, 2025
This study compares museum-related knowledge, museum learning experiences and cognitive load based on task types presented via a mobile application during a museum virtual tour. The study involved three experiments, each examining the effects of different task types. In the first experiment, tasks varied by difficulty (easy vs. difficult), in the…
Descriptors: Cognitive Ability, Museums, Computer Simulation, Information Technology
Cyril Brom; Tereza Hannemann; Tereza Tetourová; Anna Drobná; Nikol Kopánková; Kristina Volná; Katerina Kacerovská; Filip Dechterenko; Pavel Ježek; Tereza Stárková – International Journal of Technology and Design Education, 2024
Primary school children frequently use digital devices, which can be infected by computer viruses. In this mixed methods paper with two studies (N = 278 + 114), we examined 8-year-olds' preconceptions about computer viruses and protection against them; how to teach these children about said topics using three different, 30-min-long,…
Descriptors: Computers, Children, Computer Security, Knowledge Level
Eric Schätz; Alke Martens – International Association for Development of the Information Society, 2023
Due the wideness of the term Physical Computing, there is a need for a better structure of this topic. This paper is about an approach of structuring this field by finding attributes of different physical computing devices which can be used in class. Those attributes are meant to enforce teachers as well as researchers to analyze different devices…
Descriptors: Computer Use, Handheld Devices, Telecommunications, Teaching Methods
Frydenberg, Mark – Information Systems Education Journal, 2023
The Internet of Things (IoT) is a network of objects that can exchange data with other devices also connected to the Internet. One of the most common consumer examples of IoT is home automation, as a variety of smart devices, including doorbells, lightbulbs, thermostats, and refrigerators are now available which users can control remotely using…
Descriptors: Internet, Computer Software, Automation, Information Technology
Maximiliano Paredes-Velasco; Isaac Lozano-Osorio; Diana Perez-Marin; Liliana Patricia Santacruz-Valencia – IEEE Transactions on Learning Technologies, 2024
Teaching programming is a topic that has generated a high level of interest among researchers in recent decades. In particular, multiple approaches to teaching visual programming have been explored, from the use of tools such as Scratch, robots, unplugged programming, or activities for the development of computational thinking. Despite the wide…
Descriptors: Visual Aids, Programming, Intelligent Tutoring Systems, Computer Oriented Programs
Riad, A. B. M. Kamrul; Islam, Md Saiful; Shahriar, Hossain; Zhang, Chi; Valero, Maria; Sneha, Sweta; Ahamed, Sheikh – Information Systems Education Journal, 2021
Mobile device security has become increasingly important in mobile computing. Since the mobile devices and applications are growing rapidly, the security threats are intensified due to mobile app flaws and lack of security consideration in early stages of software development. The unsecure software development process creates a serious weak path…
Descriptors: Handheld Devices, Computer Security, Computer Software, Computer Science Education
David Firth; Tyler Johnson; Shawn F. Clouse; Patricia Akello – Information Systems Education Journal, 2025
As smartphone ownership has steadily increased there has been a rise in individuals that display Problematic Smartphone Use (PSU). Through a comprehensive literature review of PSU it quickly became evident that research into PSU intervention strategies such as Cognitive Behavior Therapy (CBT) and Digital Detox are focused on "collectivist…
Descriptors: Computer Science Education, Social Media, Computer Software, Collectivism
Shih-Ting Chu; Chun-Chun Chang; Yun-Fang Tu – Educational Technology Research and Development, 2025
In higher education, concept mapping has been extensively adopted as an assessment and evaluation tool for conceptual knowledge. In recent years, an increasing number of researchers have applied concept mapping to teaching in technology-based environments. However, no research was found to holistically explore the role of concept maps in…
Descriptors: Concept Mapping, Technology Uses in Education, Higher Education, Educational Research
Tóth, Tomás; Lovászová, Gabriela – Informatics in Education, 2021
In education, we have noticed a significant gap between the ability of students to program in an educational visual programming environment and the ability to write code in a professional programming environment. The aim of our research was to verify the methodology of transition from visual programming of mobile applications in MIT App Inventor 2…
Descriptors: Foreign Countries, Computer Science Education, Programming, Coding
Jing Wang; Jasni Dolah – International Journal of Virtual and Personal Learning Environments, 2024
Cultural tourism provides rich opportunities for experiential learning, but a framework to foster such learning is lacking. This study introduces the "learning behaviors-interactive scenarios" framework to explore key facilitators of experiential learning in cultural tourism. Through a literature review, it outlines key learning…
Descriptors: Influences, Experiential Learning, Tourism, Cultural Awareness
Peixoto, Maria Joelma; Duarte, Paulo A. S.; Araújo, Pedro T.; Pinto, Pedro I. C.; Sarmento, Wellington W. F.; Trinta, Fernando A. M.; Viana, Windson – Informatics in Education, 2020
Mark Weiser coined the term Ubiquitous Computing (UbiComp) describing a future in which everyday life-objects would have embedded computers providing services anytime and anywhere. This paradigm is theme recurrent in many graduate courses of Computer Science around the world. To better understand the challenge of teaching Ubiquitous Computing…
Descriptors: Computer Science Education, Teaching Methods, Handheld Devices, Measurement Equipment
Fuentes, Pablo; Camarero, Cristobal; Herreros, David; Mateev, Vladimir; Vallejo, Fernando; Martinez, Carmen – IEEE Transactions on Learning Technologies, 2022
Understanding the architecture of a processor can be uninteresting and deterring for computer science students, since low-level details of computer architecture are often perceived to lack real-world impact. These courses typically have a strong practical component where students learn the fundamentals of the computer architecture and the handling…
Descriptors: Computer Science Education, Computer System Design, Programming Languages, Fatigue (Biology)
Mikroyannidis, Alexander; Gómez-Goiri, Aitor; Smith, Andrew; Domingue, John – Interactive Learning Environments, 2020
The main challenges commonly associated with acquiring practical network engineering skills are the requirements for access to specialised and up-to-date network equipment, as well as the high costs associated with obtaining and maintaining this equipment. The PT Anywhere initiative addresses these challenges by offering a mobile environment for…
Descriptors: Computer Science Education, Computer Networks, Data Analysis, Engineering
Aziman Abdullah – International Society for Technology, Education, and Science, 2023
This study explores the potential of using screen time data in learning management systems (LMS) to estimate student learning time (SLT) and validate the credit value of courses. Gathering comprehensive data on actual student learning time is difficult, so this study uses LMS Moodle logs from a computer programming course with 490 students over 16…
Descriptors: Time Factors (Learning), Handheld Devices, Computer Use, Television Viewing
Hicks, Timothy Alex; Cohen, Jonathan D.; Calandra, Brendan – Technology, Pedagogy and Education, 2022
This mixed methods case study presents the experience of a group of middle school students in a year-long, after-school computing programme in a large, inner-city school district in the southeastern United States. The purpose of this research is to explore informal educational strategies that are conducive at giving underrepresented minority youth…
Descriptors: Middle School Students, After School Education, Computer Science Education, Informal Education

Peer reviewed
Direct link
