Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Science Education | 5 |
Computer Security | 5 |
Identification | 5 |
Computer Software | 4 |
Teaching Methods | 3 |
Undergraduate Students | 3 |
Barriers | 2 |
Comparative Analysis | 2 |
Computer Networks | 2 |
Data Analysis | 2 |
Data Collection | 2 |
More ▼ |
Source
Journal of Cybersecurity… | 2 |
International Association for… | 1 |
International Journal for… | 1 |
Journal of Educational Data… | 1 |
Author
Ashley Kenway | 1 |
Carlos Novo | 1 |
Edwards, John | 1 |
Hart, Kaden | 1 |
Kieron Dowden-Smith | 1 |
Phil Wilkinson | 1 |
Rolando Martins | 1 |
Rui Pinto | 1 |
Shrestha, Raj | 1 |
Zeng, Mini | 1 |
Zhu, Feng | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Information Analyses | 1 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
United Kingdom (England) | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
ACT Assessment | 1 |
What Works Clearinghouse Rating
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Zeng, Mini; Zhu, Feng – Journal of Cybersecurity Education, Research and Practice, 2021
Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in…
Descriptors: Computer Software, Coding, Computer Security, Computer Science Education
Students as Contested: Exploring Issues of Student Identity and Identification in Educational Spaces
Ashley Kenway; Phil Wilkinson; Kieron Dowden-Smith – International Journal for Students as Partners, 2019
This article explores issues of student identity and identification through a third-space theory lens. In addition, it positions this use of third-space theory as contributory to Students-as-Partners (SaP) approaches to teaching and learning. Naturally, this research was constructed as a SaP project, and research was undertaken as a collaboration…
Descriptors: Self Concept, Undergraduate Students, Student Attitudes, Resistance (Psychology)
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers