NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
What Works Clearinghouse Rating
Showing 1 to 15 of 34 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Cheers, Hayden; Lin, Yuqing – Computer Science Education, 2023
Background and Context: Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, such tools do not identify plagiarism, nor suggest what assignment submissions are suspicious of plagiarism. Source code plagiarism…
Descriptors: Plagiarism, Programming, Computer Science Education, Identification
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cheers, Hayden; Lin, Yuqing; Yan, Weigen – Informatics in Education, 2023
Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, most of these tools only measure the similarity between assignment submissions, and do not actually identify which are suspicious of plagiarism. This work…
Descriptors: Plagiarism, Assignments, Computer Software, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Shi, Yang; Mao, Ye; Barnes, Tiffany; Chi, Min; Price, Thomas W. – International Educational Data Mining Society, 2021
Automatically detecting bugs in student program code is critical to enable formative feedback to help students pinpoint errors and resolve them. Deep learning models especially code2vec and ASTNN have shown great success for "large-scale" code classification. It is not clear, however, whether they can be effectively used for bug…
Descriptors: Artificial Intelligence, Program Effectiveness, Coding, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Peer reviewed Peer reviewed
Direct linkDirect link
Van Petegem, Charlotte; Deconinck, Louise; Mourisse, Dieter; Maertens, Rien; Strijbol, Niko; Dhoedt, Bart; De Wever, Bram; Dawyndt, Peter; Mesuere, Bart – Journal of Educational Computing Research, 2023
We present a privacy-friendly early-detection framework to identify students at risk of failing in introductory programming courses at university. The framework was validated for two different courses with annual editions taken by higher education students (N = 2 080) and was found to be highly accurate and robust against variation in course…
Descriptors: Pass Fail Grading, At Risk Students, Introductory Courses, Programming
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Northrup, Astrid K.; Burrows, Andrea C.; Slater, Timothy F. – Problems of Education in the 21st Century, 2022
Like much of the world, the United States is rapidly implementing the teaching of computer science into both primary and secondary school curricula. Uncovering what challenges U.S. schools in general--and rural U.S. schools in the unique environment of more mountainous regions of the U.S. in particular--face in implementing new curricula is not…
Descriptors: Identification, Curriculum Implementation, Barriers, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Maertens, Rien; Van Petegem, Charlotte; Strijbol, Niko; Baeyens, Toon; Jacobs, Arne Carla; Dawyndt, Peter; Mesuere, Bart – Journal of Computer Assisted Learning, 2022
Background: Learning to code is increasingly embedded in secondary and higher education curricula, where solving programming exercises plays an important role in the learning process and in formative and summative assessment. Unfortunately, students admit that copying code from each other is a common practice and teachers indicate they rarely use…
Descriptors: Plagiarism, Benchmarking, Coding, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zeng, Mini; Zhu, Feng – Journal of Cybersecurity Education, Research and Practice, 2021
Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in…
Descriptors: Computer Software, Coding, Computer Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Milan Turcáni; Zoltan Balogh; Michal Kohútek – Smart Learning Environments, 2024
In this research, a mixed-method approach was employed to conduct large-scale eye-tracking measurements, traditionally associated with high costs and extensive time commitments. Utilizing consumer-grade webcams in conjunction with open-source software, data was collected from an expansive cohort of students, thereby demonstrating the scalability…
Descriptors: Computer Science Education, Eye Movements, Reading Comprehension, Knowledge Level
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tsabari, Stav; Segal, Avi; Gal, Kobi – International Educational Data Mining Society, 2023
Automatically identifying struggling students learning to program can assist teachers in providing timely and focused help. This work presents a new deep-learning language model for predicting "bug-fix-time", the expected duration between when a software bug occurs and the time it will be fixed by the student. Such information can guide…
Descriptors: College Students, Computer Science Education, Programming, Error Patterns
Peer reviewed Peer reviewed
Direct linkDirect link
Mike Richards; Kevin Waugh; Mark A Slaymaker; Marian Petre; John Woodthorpe; Daniel Gooch – ACM Transactions on Computing Education, 2024
Cheating has been a long-standing issue in university assessments. However, the release of ChatGPT and other free-to-use generative AI tools has provided a new and distinct method for cheating. Students can run many assessment questions through the tool and generate a superficially compelling answer, which may or may not be accurate. We ran a…
Descriptors: Computer Science Education, Artificial Intelligence, Cheating, Student Evaluation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Varga, Erika B.; Sátán, Ádám – Hungarian Educational Research Journal, 2021
The purpose of this paper is to investigate the pre-enrollment attributes of first-year students at Computer Science BSc programs of the University of Miskolc, Hungary in order to find those that mostly contribute to failure on the Programming Basics first-semester course and, consequently to dropout. Our aim is to detect at-risk students early,…
Descriptors: Identification, At Risk Students, Computer Science Education, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
LópezLeiva, Carlos A.; Noriega, Gabino; Celedón-Pattichis, Sylvia; Pattichis, Marios S. – Teachers College Record, 2022
Background/Context: Computer programming is rarely accessible to K-12 students, especially for those from culturally and linguistically diverse backgrounds. Middle school age is a transitioning time when adolescents are more likely to make long-term decisions regarding their academic choices and interests. Having access to productive and positive…
Descriptors: Hispanic American Students, Student Experience, Mathematics Education, Programming
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ashley Kenway; Phil Wilkinson; Kieron Dowden-Smith – International Journal for Students as Partners, 2019
This article explores issues of student identity and identification through a third-space theory lens. In addition, it positions this use of third-space theory as contributory to Students-as-Partners (SaP) approaches to teaching and learning. Naturally, this research was constructed as a SaP project, and research was undertaken as a collaboration…
Descriptors: Self Concept, Undergraduate Students, Student Attitudes, Resistance (Psychology)
Peer reviewed Peer reviewed
Direct linkDirect link
Novak, Matija; Joy, Mike; Kermek, Dragutin – ACM Transactions on Computing Education, 2019
Teachers deal with plagiarism on a regular basis, so they try to prevent and detect plagiarism, a task that is complicated by the large size of some classes. Students who cheat often try to hide their plagiarism (obfuscate), and many different similarity detection engines (often called plagiarism detection tools) have been built to help teachers.…
Descriptors: Plagiarism, Computer Software, Computer Software Evaluation, College Students
Previous Page | Next Page »
Pages: 1  |  2  |  3