NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
What Works Clearinghouse Rating
Showing 1 to 15 of 368 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Loïs Vanhée; Karin Danielsson; Lena Enqvist; Kalle Grill; Melania Borit – European Journal of Education, 2024
Whereas hackathons are widespread within and outside academia and have been argued to be a valid pedagogical method for teaching interdisciplinarity, no detailed frameworks or methods are available for conceptualizing and organizing educational hackathons, i.e., hackathons dedicated to best achieving pedagogic objectives. This paper is dedicated…
Descriptors: Interdisciplinary Approach, Learning Activities, Programming, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Dana Kube; Sebastian Gombert; Brigitte Suter; Joshua Weidlich; Karel Kreijns; Hendrik Drachsler – Journal of Computer Assisted Learning, 2024
Background: Gender stereotypes about women and men are prevalent in computer science (CS). The study's goal was to investigate the role of gender bias in computer-supported collaborative learning (CSCL) in a CS context by elaborating on gendered experiences in the perception of individual and team performance in mixed-gender teams in a hackathon.…
Descriptors: Cooperative Learning, Computer Assisted Instruction, Gender Issues, Learning Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Livinus Obiora Nweke; Uchenna Franklin Okebanama; Gibson Uwaezuoke Mba – Discover Education, 2025
The integration of Internet of Things (IoT), Artificial Intelligence (AI), and cybersecurity presents new opportunities for innovation and entrepreneurship, yet traditional educational approaches often lack the interdisciplinary and applied focus required to develop these competencies. This study evaluates the impact of an experiential learning…
Descriptors: Entrepreneurship, Artificial Intelligence, Internet, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Jin Wei-Kocsis; Moein Sabounchi; Gihan J. Mendis; Praveen Fernando; Baijian Yang; Tonglin Zhang – IEEE Transactions on Education, 2024
Contribution: A novel proactive and collaborative learning paradigm was proposed to engage learners with different backgrounds and enable effective retention and transfer of the multidisciplinary artificial intelligence (AI)-cybersecurity knowledge. Specifically, the proposed learning paradigm contains: 1) an immersive learning environment to…
Descriptors: Computer Security, Artificial Intelligence, Interdisciplinary Approach, Models
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Collins, Jazmin; Ford, Vitaly – Journal of Cybersecurity Education, Research and Practice, 2023
The use of the Capture the Flag (CTF)-style competitions has grown popular in a variety of environments as a method to improve or reinforce cybersecurity techniques. However, while these competitions have shown promise in student engagement, enjoyment, and the teaching of essential workforce cybersecurity concepts, many of these CTF challenges…
Descriptors: Computer Security, Computer Science Education, Coding, Competition
Peer reviewed Peer reviewed
Direct linkDirect link
Araos, Andrés; Damsa, Crina; Gaševic, Dragan – Journal of Computer Assisted Learning, 2023
Background: The surge of online platforms has generated interest in how specialized platforms support formal and informal learning in various disciplinary domains. Knowledge is still limited regarding how undergraduate students navigate and use platforms to learn. Objectives: This study explores computer and software engineering students' learning…
Descriptors: Computer Science Education, Computer Software, Learning Activities, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Maennel, Kaie; Brilingaite, Agne; Bukauskas, Linas; Juozapavicius, Aušrius; Knox, Benjamin James; Lugo, Ricardo Gregorio; Maennel, Olaf; Majore, Ginta; Sütterlin, Stefan – SAGE Open, 2023
Hands-on and practical learning has been key to cybersecurity education and training success. Cyber Defense Exercises (CDX) are a common approach to training, testing, and verifying technical and soft skills. However, full-scale CDX implementation is also an expensive training event. In order to advance such exercises to the next level, CDX…
Descriptors: Computer Security, Computer Science Education, Information Security, Computer Simulation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Workman, Michael D. – Journal of Cybersecurity Education, Research and Practice, 2021
Cybersecurity capabilities in organizations and governmental agencies continue to lag behind the threats. Given the current environment, these entities have placed renewed emphasis on cybersecurity education. However, education appears to lack its full potential in most settings. Few empirical studies have systematically tested the efficacy of…
Descriptors: Computer Security, Information Security, Computer Science Education, Instructional Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Psathas, Georgios; Tegos, Stergios; Demetriadis, Stavros N.; Tsiatsos, Thrasyvoulos – International Journal of Computer-Supported Collaborative Learning, 2023
Despite their potential to deliver a high-quality learning experience, massive open online courses (MOOCs) pose several issues, such as high dropout rates, difficulties in collaboration between students, low teaching involvement, and limited teacher-student interaction. Most of these issues can be attributed to the large number, diversity, and…
Descriptors: Computer Mediated Communication, MOOCs, Cooperative Learning, Learning Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Donald M. Johnson; Will Doss; Christopher M. Estepp – Natural Sciences Education, 2024
Microcontrollers are widely used in agriculture, yet most undergraduate agriculture students do not have the programming skills necessary to make use of these devices in their academic programs or careers. However, generative artificial intelligence (AI) chatbots, such as ChatGPT, have the ability to write complex microcontroller programs when…
Descriptors: Undergraduate Students, Agricultural Education, Programming, Artificial Intelligence
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Charito G. Ong; Josan C. Fermano; Albert Christopher P. Daniot II – International Association for Development of the Information Society, 2022
This study reports an impact assessment of the basic Arduino programming training conducted among select Junior High School Students in a National High School in Cagayan De Oro City. The Focus Group Discussion sessions and survey questionnaires via goggle form complemented the content of the impact study table. The researchers aimed to determine…
Descriptors: Computer Software, Programming, Computer Science Education, Junior High School Students
Peer reviewed Peer reviewed
Direct linkDirect link
Deborah Silvis; Jody Clarke-Midura; Victor R. Lee; Jessica Shumway – Science Education, 2026
Affect has long been of interest in early childhood education, where social and emotional dynamics are seen as critical dimensions of learning, intricately linked to embodied activity. As part of the special issue Centering Affect and Emotion Toward Justice and Dignity in Science Education, this paper conceptualizes affect through children's…
Descriptors: Affective Behavior, STEM Education, Computer Science Education, Active Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Chanjuan Fu; Xiaoxin Hao; Xinyue Shi; Hanxin Qian; Shanyun He; Fengji Geng – npj Science of Learning, 2025
This study investigates the effect of cognitive control strategies on young children's emotional and attentional states during coding learning. We conducted a quasi-experimental study with 46 children aged 5-6 years, dividing them into an experimental group using cognitive control strategies (planning, monitoring, reflecting) and a control group…
Descriptors: Cognitive Processes, Executive Function, Young Children, Attention
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bowen, Debra; Jaurez, James; Jones, Nancy; Reid, William; Simpson, Christopher – Journal of Cybersecurity Education, Research and Practice, 2022
There are many resources to guide successful K-12 cybersecurity education. The objective of these resources is to prepare skilled and ethical cybersecurity students at the earliest level to meet the demands of higher-level programs. The goal of this article is to provide, as a starting point, a list of as many currently popular K-12 educational…
Descriptors: Computer Security, Information Security, Educational Resources, Elementary Secondary Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Christina Kyriakou; Agoritsa Gogoulou; Maria Grigoriadou – Informatics in Education, 2023
This paper presents an educational setting that attempts to enhance students' understanding and facilitate students' linking-inferencing skills. The proposed setting is structured in three stages. The first stage intends to explore students' prior knowledge. The second stage aims to help students tackle their difficulties and misconceptions and…
Descriptors: Thinking Skills, Inferences, Computer Science Education, Computer System Design
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  25