Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Science Education | 4 |
Programming | 4 |
Risk | 4 |
Artificial Intelligence | 2 |
Coding | 2 |
Ethics | 2 |
Program Effectiveness | 2 |
Access to Information | 1 |
Advisory Committees | 1 |
Algorithms | 1 |
Classification | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 2 |
Journal Articles | 2 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jiangyue Liu; Siran Li – Journal of Educational Computing Research, 2024
Pair Programming is considered an effective approach to programming education, but the synchronous collaboration of two programmers involves complex coordination, making this method difficult to be widely adopted in educational settings. Artificial Intelligence (AI) code-generation tools have outstanding capabilities in program generation and…
Descriptors: Artificial Intelligence, Programming, Technology Uses in Education, Coding
Christine Ladwig; Dana Schwieger – Information Systems Education Journal, 2024
Hollywood screenwriters worry about Artificial Intelligence (AI) replacements taking over their jobs. Famous museums litigate to protect their art from AI infringement. A major retailer scraps a machine-learning based recruitment program that was biased against women. These are just a few examples of how AI is affecting the world of work,…
Descriptors: Computer Science Education, Curriculum Development, Information Systems, Information Science Education
Caroline D. Hardin – ProQuest LLC, 2019
Hackathons, the time-bound collaborative project-based competitions increasingly popular with undergraduate CS students, are both transformative and problematic. On one hand, they are unique opportunities to apply skills learned in the classroom to real-world, interest driven projects that celebrate risk taking, collaboration, and playfulness. On…
Descriptors: Undergraduate Students, Computer Science Education, Programming, Group Activities
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis