NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Jiangyue Liu; Siran Li – Journal of Educational Computing Research, 2024
Pair Programming is considered an effective approach to programming education, but the synchronous collaboration of two programmers involves complex coordination, making this method difficult to be widely adopted in educational settings. Artificial Intelligence (AI) code-generation tools have outstanding capabilities in program generation and…
Descriptors: Artificial Intelligence, Programming, Technology Uses in Education, Coding
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Christine Ladwig; Dana Schwieger – Information Systems Education Journal, 2024
Hollywood screenwriters worry about Artificial Intelligence (AI) replacements taking over their jobs. Famous museums litigate to protect their art from AI infringement. A major retailer scraps a machine-learning based recruitment program that was biased against women. These are just a few examples of how AI is affecting the world of work,…
Descriptors: Computer Science Education, Curriculum Development, Information Systems, Information Science Education
Caroline D. Hardin – ProQuest LLC, 2019
Hackathons, the time-bound collaborative project-based competitions increasingly popular with undergraduate CS students, are both transformative and problematic. On one hand, they are unique opportunities to apply skills learned in the classroom to real-world, interest driven projects that celebrate risk taking, collaboration, and playfulness. On…
Descriptors: Undergraduate Students, Computer Science Education, Programming, Group Activities
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis