NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 60 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Alannah Oleson – ProQuest LLC, 2023
To realize more equitable technology futures, it is not enough to simply adapt technology to be more inclusive "after" it is created. We will also need to equip technology creators with the skills they need to critically reflect upon bias and exclusion "during" the technology design process. The question of how to best to…
Descriptors: Computation, Computer Science Education, Inclusion, Decision Making
Peer reviewed Peer reviewed
Direct linkDirect link
Vogel, Sara – ACM Transactions on Computing Education, 2021
Critical computing approaches to K-12 computer science education aim to promote justice in computing and the wider world. Despite being intertwined with inequitable power dynamics in computing, issues of linguistic (in)justice have received less attention in critical computing. In this article, I draw on theoretical ideas from sociolinguistics and…
Descriptors: Computer Science Education, Middle School Students, Bilingual Students, Multilingualism
Peer reviewed Peer reviewed
Direct linkDirect link
Christine Wusylko; Kara Dawson; Pavlo Antonenko; Zhen Xu – Journal of Technology and Teacher Education, 2024
Cybersecurity educational efforts are urgently needed to introduce young people to the profession and give students and teachers cybersecurity knowledge to protect themselves from increasing cybercrime. In this study, 56 elementary preservice teachers participated in a 3-hour intervention within a technology integration course that introduced them…
Descriptors: Computer Security, Technology, Preservice Teacher Education, Preservice Teachers
Beckman, Joseph W. – ProQuest LLC, 2019
Information security practitioners and researchers who possess sufficient depth of conceptual understanding to reconstitute systems after attacks or adapt information security concepts to novel situations are in short supply. Education of new information security professionals with sufficient conceptual depth is one method by which this shortage…
Descriptors: Achievement Gains, Cognitive Processes, Coding, Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rosamond, Frances – Informatics in Education, 2018
The Computer Science Unplugged activities and project has been an influential STEM (Science, Technology, Engineering & Mathematics) initiative, providing enrichment and teaching activities supporting computational thinking. Many of its activities are suitable for children. One of the most popular Unplugged activities is "Kid Krypto",…
Descriptors: Technology, Computation, Thinking Skills, Enrichment Activities
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Arboledas-Brihuega, David – Journal of Technology and Science Education, 2019
It is evident that the society in which we live will demand more and more qualified and specialized positions in the different branches of engineering. Now we are in a highly digitized world in which information is continuously transmitted through data communication networks with the expectation of security and confidentiality. Students who are in…
Descriptors: Mathematics, Curriculum Implementation, Active Learning, Student Projects
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Havenga, Marietjie; Drevin, Lynette – International Association for Development of the Information Society, 2020
Although postgraduate students are required to be self-directed, this is not always the case. The aims of this study were twofold. Firstly, we investigated whether the use of problem-based projects supported students in implementing different cryptography algorithms as part of a group assignment. Secondly, we determined to which extent the use of…
Descriptors: Problem Based Learning, Independent Study, Graduate Students, Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ho, Anne M. – PRIMUS, 2018
Escape rooms are an increasingly popular puzzle game, and educators have started implementing them in classrooms. This paper will describe the motivations and implementation of escape-room-like puzzles in an undergraduate cryptography course, including how the open-source mathematics software system SageMath is used. In addition, there is a…
Descriptors: Puzzles, Technology, Class Activities, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
John, June Park; Carnoy, Martin – Journal of Education and Work, 2019
We analyse race and gender trends in the Silicon Valley technology industry from 1980 to 2015, with a focus on education, employment and wages in computer science. Racial gaps in representation are more salient among programmers than in the overall technology labour force; in addition, we document a stable or increasing gender gap across all races…
Descriptors: Computer Science Education, Race, Ethnicity, Geographic Regions
Gusev, Dmitri A.; Swanson, Dewey A. – Association Supporting Computer Users in Education, 2017
Facing the need to introduce new approaches to teaching the art of programming to undergraduate Computer and Information Technology (CIT) students as part of the transition of the former Purdue College of Technology to the novel concept and status of Purdue Polytechnic, we came up with the idea of offering a pilot 300-level course entitled…
Descriptors: Educational Technology, Technology Uses in Education, Undergraduate Study, Programming
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kortsarts, Yana; Kempner, Yulia – Information Systems Education Journal, 2015
Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…
Descriptors: Introductory Courses, Programming, Computer Science Education, Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Desai, Niranjan; Stefanek, George – American Journal of Engineering Education, 2017
Student access to the Internet has made it much easier for students to find solutions to traditional homework problems online and thereby has made this traditional assessment method of monitoring student progress and gauging the assimilation of knowledge in engineering and technology courses less reliable. This paper presents an in-class,…
Descriptors: Academic Achievement, Homework, Technology, Tests
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Shelley, Mack, Ed.; Sahin, Ismail, Ed. – International Society for Technology, Education, and Science, 2022
Education, science, and technology disciplines at all levels have never been more important, more exciting, or more crucial for its broader impacts on human society. The need for advanced technical skills is increasingly pressing to address climate change, combat COVID and other diseases, enhance the infrastructural built environment, grow food…
Descriptors: Access to Education, Foreign Countries, Education, Sciences
Peer reviewed Peer reviewed
Direct linkDirect link
Stanisavljevic, Zarko; Stanisavljevic, Jelena; Vuletic, Pavle; Jovanovic, Zoran – IEEE Transactions on Learning Technologies, 2014
Educational software systems have an increasingly significant presence in engineering sciences. They aim to improve students' attitudes and knowledge acquisition typically through visual representation and simulation of complex algorithms and mechanisms or hardware systems that are often not available to the educational institutions. This paper…
Descriptors: Technology, Mathematics, Visual Aids, Computer Software
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4