Publication Date
| In 2026 | 0 |
| Since 2025 | 6 |
| Since 2022 (last 5 years) | 13 |
| Since 2017 (last 10 years) | 25 |
| Since 2007 (last 20 years) | 31 |
Descriptor
| Computer Science Education | 56 |
| Training | 56 |
| Foreign Countries | 15 |
| Computer Software | 13 |
| Higher Education | 12 |
| College Students | 11 |
| Educational Technology | 10 |
| Distance Education | 8 |
| Information Technology | 8 |
| Programming | 8 |
| Teaching Methods | 8 |
| More ▼ | |
Source
Author
Publication Type
Education Level
Audience
| Policymakers | 2 |
| Practitioners | 2 |
| Administrators | 1 |
Location
| Italy | 3 |
| Brazil | 2 |
| Canada | 2 |
| Germany | 2 |
| Japan | 2 |
| Mexico | 2 |
| South Africa | 2 |
| Africa | 1 |
| Algeria | 1 |
| Australia | 1 |
| Bulgaria | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Wilson Libardo Pantoja Yépez; Julio Ariel Hurtado Alegría; Ajay Bandi; Arvind W. Kiwelekar – Education and Information Technologies, 2024
The ability to define, evaluate, and implement software architectures is a fundamental skill for software engineers. However, teaching software architecture can be challenging as it requires students to be involved in real-context projects with high degrees of complexity. This involves making trade-off decisions among several quality attributes.…
Descriptors: Computer Software, Training, Computer Science Education, Teaching Methods
Ezequiel Scott; Marcelo Campo – Interactive Learning Environments, 2023
Scrum is one of the most used frameworks for agile software development because of its potential improvements in productivity, quality, and client satisfaction. Academia has also focussed on teaching Scrum practices to prepare students to face common software engineering challenges and facilitate their insertion in professional contexts.…
Descriptors: Computer Simulation, Training, Computer Software, Computer Science Education
Bérénice Lemoine; Pierre Laforcade; Sébastien George – Journal of Computer Assisted Learning, 2025
Background: Training the memorization of declarative knowledge requires the repetitive presentation of various forms of factual questions to learners. Educational games designed for this purpose should offer activities that are both tailored to individual learners and varied to prevent boredom. Whilst the Technology-Enhanced Learning (TEL)…
Descriptors: Educational Games, Design, Computer Science Education, Training
OConnor, T. J.; Brown, Dane; Jackson, Jasmine; Payne, Bryson; Schmeelk, Suzanna – Journal of Cybersecurity Education, Research and Practice, 2023
To support the workforce gap of skilled cybersecurity professionals, gamified pedagogical approaches for teaching cybersecurity have exponentially grown over the last two decades. During this same period, e-sports developed into a multi-billion dollar industry and became a staple on college campuses. In this work, we explore the opportunity to…
Descriptors: Computer Security, Computer Science Education, Gamification, Competition
Yukun Xu; Hui Li – IEEE Transactions on Learning Technologies, 2025
Primary school students, despite their vulnerability to cyberattacks, lack targeted cybersecurity education. Using Scopus and Google Scholar, this scoping review analyzed 15 articles (2014-2024) following Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Extension for Scoping Reviews guidelines to examine the landscape of…
Descriptors: Elementary School Students, Computer Security, Educational Trends, Computer Science Education
Sirinda Palahan – IEEE Transactions on Learning Technologies, 2025
The rise of online programming education has necessitated more effective personalized interactions, a gap that PythonPal aims to fill through its innovative learning system integrated with a chatbot. This research delves into PythonPal's potential to enhance the online learning experience, especially in contexts with high student-to-teacher ratios…
Descriptors: Programming, Computer Science Education, Artificial Intelligence, Computer Mediated Communication
Maria Chaparro Osman; Maureen Namukasa; Cherrise Ficke; Isabella Piasecki; T. J. O'Connor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2023
A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the cybersecurity workforce. This workforce shortage has partly been attributed to the lack of diversity in the cybersecurity field, with women, African…
Descriptors: Diversity (Institutional), Labor Force, Computer Security, Disproportionate Representation
Karjalainen, Mika; Ojala, Anna-Liisa; Vatanen, Marko; Lötjönen, Jarno – International Journal of Adult Education and Technology, 2022
This qualitative study includes nine semi-structured interviews with cybersecurity experts from different security-related organizations who are familiar with cybersecurity exercises. Its contribution to cybersecurity workforce development focuses on organizational learning rather than individual skills development and relevant competencies. It…
Descriptors: Computer Security, Computer Science Education, Organizational Learning, Skill Development
Koschmieder, Lukas; Altenfeld, Ralph; Eiken, Janin; Böttger, Bernd; Schmitz, Georg J. – Education Sciences, 2021
Hands-on type training of Integrated Computational Materials Engineering (ICME) is characterized by assisted application and combination of multiple simulation software tools and data. In this paper, we present recent experiences in establishing a cloud-based infrastructure to enable remote use of dedicated commercial and open access simulation…
Descriptors: Computer Software, Training, Computer Science Education, Simulation
Furtado, Julio; Oliveira, Sandro Ronaldo Bezerra; Chaves, Rafael Oliveira – International Journal of Information and Communication Technology Education, 2021
In organizations that are seeking a high degree of maturity, it is necessary to achieve a statistical control of software processes and to know their behavior and operational performance. The approach adopted for the research involves reading articles and experience performance reports, practical cases, discussion, the use of games and simulators,…
Descriptors: Undergraduate Students, Computer Science Education, Teaching Methods, Computer Software
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Kraus, Lydia – Education and Information Technologies, 2022
Cybersecurity professionals need hands-on training to prepare for managing the current advanced cyber threats. To practice cybersecurity skills, training participants use numerous software tools in computer-supported interactive learning environments to perform offensive or defensive actions. The interaction involves typing commands, communicating…
Descriptors: Data Use, Learning Analytics, Information Security, Training
Noura Zeroual; Mahnane Lamia; Mohamed Hafidi – Education and Information Technologies, 2024
Traditional education systems do not provide students with much freedom to choose the right training of study that suits them, which leads on long-term to the negative effects not only on social, economic and mental' well-being of student, but also will have a negative effect on the quality of the work produced by this student in the future. In…
Descriptors: Artificial Intelligence, Technology Uses in Education, Foreign Countries, Computer Science Education
Nisar Ahmed Dahri; Noraffandy Yahaya; Muhammad Saleem Vighio – Education and Information Technologies, 2025
This study examines the effects of interactive and collaborative digital training applications on teachers' academic performance, utilizing the Technology Acceptance Model and collaborative learning theories. A total of 219 government school computer teachers participated in an online training program through Microsoft Teams, employing a…
Descriptors: Computer Science Education, Faculty Development, Online Courses, Training
Chinyamurindi, Willie T.; Dlaza, Zikhona – Reading & Writing: Journal of the Reading Association of South Africa, 2018
The concept of digital and information communication technology (ICT) literacy is receiving renewed empirical attention. This focus is attributed to the changing nature of society and the move towards the ideals of the knowledge-based economy. Further, universities in South Africa and internationally are encouraging the fusion of technology in how…
Descriptors: Foreign Countries, College Faculty, Computer Literacy, Faculty Development
Sakir Hossain Faruque; Sharun Akter Khushbu; Sharmin Akter – Education and Information Technologies, 2025
A career is crucial for anyone to fulfill their desires through hard work. During their studies, students cannot find the best career suggestions unless they receive meaningful guidance tailored to their skills. Therefore, we developed an AI-assisted model for early prediction to provide better career suggestions. Although the task is difficult,…
Descriptors: Decision Making, Career Development, Career Guidance, Computer Science Education

Peer reviewed
Direct link
