Publication Date
| In 2026 | 0 |
| Since 2025 | 142 |
| Since 2022 (last 5 years) | 638 |
| Since 2017 (last 10 years) | 1319 |
| Since 2007 (last 20 years) | 1879 |
Descriptor
| Computer Science Education | 2022 |
| Programming | 1782 |
| Foreign Countries | 723 |
| Teaching Methods | 649 |
| Programming Languages | 569 |
| Computer Software | 469 |
| Student Attitudes | 433 |
| College Students | 358 |
| Instructional Effectiveness | 356 |
| Introductory Courses | 350 |
| Undergraduate Students | 325 |
| More ▼ | |
Source
Author
| Xinogalos, Stelios | 13 |
| Barnes, Tiffany | 11 |
| Laakso, Mikko-Jussi | 10 |
| Çakiroglu, Ünal | 8 |
| Malmi, Lauri | 7 |
| Bers, Marina Umaschi | 6 |
| Cetin, Ibrahim | 6 |
| Karnalim, Oscar | 6 |
| Kwon, Kyungbin | 6 |
| Lavy, Ilana | 6 |
| Luxton-Reilly, Andrew | 6 |
| More ▼ | |
Publication Type
Education Level
Location
| Turkey | 102 |
| Taiwan | 45 |
| China | 36 |
| Finland | 31 |
| Greece | 27 |
| Australia | 26 |
| Spain | 23 |
| United Kingdom | 23 |
| Brazil | 22 |
| Israel | 22 |
| Sweden | 22 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 1 |
Kortsarts, Yana; Kempner, Yulia – Information Systems Education Journal, 2015
Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…
Descriptors: Introductory Courses, Programming, Computer Science Education, Technology
Carvalho, Elizabeth Simão – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2015
Teaching object-oriented programming to students in an in-classroom environment demands well-thought didactic and pedagogical strategies in order to guarantee a good level of apprenticeship. To teach it on a completely distance learning environment (e-learning) imposes possibly other strategies, besides those that the e-learning model of Open…
Descriptors: Foreign Countries, Distance Education, Programming, Computer Science Education
Matthews, Reginamary; Hin, Hew Soon; Choo, Koo Ah – Turkish Online Journal of Educational Technology - TOJET, 2014
Learning Object (LO) is the breakdown of larger content into smaller pieces of information that accomplishes a single learning outcome. The smaller piece of content is incorporated with multimedia elements to promote meaningful learning. The prevailing focus on learning objects for introductory programming promising in terms of enhancing the…
Descriptors: Resource Units, Computer Science Education, Programming, College Students
Rennick, Christopher; Hulls, Carol C. W.; McKay, Kenneth N. – IEEE Transactions on Education, 2019
Contribution: A semester-long, open-ended design project was implemented to promote intellectual development of first-year students while reinforcing event-driven/procedural programming principles. This paper describes this approach, and an evaluation strategy using Perry's model for intellectual development. The results show that students can…
Descriptors: Introductory Courses, Engineering Education, Active Learning, Student Projects
Qian, Yizhou; Lehman, James D. – Journal of Education and Learning, 2016
The demand for computing professionals in the workplace has led to increased attention to computer science education, and introductory computer science courses have been introduced at different levels of education. This study investigated the relationship between gender, academic performance in non-programming subjects, and programming learning…
Descriptors: Correlation, Introductory Courses, Success, Middle School Students
Price, Thomas; Zhi, Rui; Barnes, Tiffany – International Educational Data Mining Society, 2017
In this paper we present a novel, data-driven algorithm for generating feedback for students on open-ended programming problems. The feedback goes beyond next-step hints, annotating a student's whole program with suggested edits, including code that should be moved or reordered. We also build on existing work to design a methodology for evaluating…
Descriptors: Feedback (Response), Computer Software, Data Analysis, Programming
Crabtree, John; Zhang, Xihui – Journal of Information Technology Education: Innovations in Practice, 2015
Teaching advanced programming can be a challenge, especially when the students are pursuing different majors with diverse analytical and problem-solving capabilities. The purpose of this paper is to explore the efficacy of using a particular problem as a vehicle for imparting a broad set of programming concepts and problem-solving techniques. We…
Descriptors: Computer Science Education, Programming Languages, Information Technology, Problem Solving
Banerjee, Gargi; Murthy, Sahana; Iyer, Sridhar – Research and Practice in Technology Enhanced Learning, 2015
Multiple studies report that Computer Science (CS) instructors face problems on how to integrate visualizations in their teaching. This problem gets compounded for instructors in technology-constrained classrooms that are common in developing countries. In these classrooms, students are not able to interact with visualization directly; instead,…
Descriptors: Active Learning, Computer Science Education, Visualization, Teaching Methods
Tigrek, Seyitriza – ProQuest LLC, 2012
Mobile devices are becoming indispensable tools for many students and educators. Mobile technology is starting a new era in the computing methodologies in many engineering disciplines and laboratories. Microcontroller extension that communicates with mobile devices will take the data acquisition and control process into a new level in the sensing…
Descriptors: Telecommunications, Handheld Devices, Programming Languages, Engineering Education
Korkmaz, Özgen; Altun, Halis – Online Submission, 2014
Students might have different type and different level of perceptions: Positive or negative perceptions on programming; a perception on benefit of programming, perceptions related to difficulties of programming process etc. The perception of student on their own competence is defined as self-efficacy. Based on the discussions reported in…
Descriptors: Foreign Countries, Computer Science Education, Programming, Self Efficacy
Csernoch, Mária; Biró, Piroska – Acta Didactica Napocensia, 2016
Sprego is programming with spreadsheet functions. The present paper provides introductory Sprego examples which have so far only been available in Hungarian. Spreadsheet environments offer both a programming tool which best serves beginner and end-user programmers' interest, and an approach which lightens the burden of coding and language details.…
Descriptors: Programming, Spreadsheets, Instruction, Problem Solving
Oliver, Kevin – Journal of Computers in Mathematics and Science Teaching, 2016
This paper presents the results of a comparison study between graduate students taking a software security course at an American university and international working professionals taking a version of the same course online through a free massive open online course (MOOC) created in the Google CourseBuilder learning environment. A goal of the study…
Descriptors: Computer Science Education, Online Courses, Graduate Students, Continuing Education
Taylor, Blair; Kaza, Siddharth – ACM Transactions on Computing Education, 2016
Despite the critical societal importance of computer security, security is not well integrated into the undergraduate computing curriculum. Security classes and tracks treat security issues as separable topics as opposed to fundamental issues that pervade all aspects of software development. Recently, there has been an increasing focus on security…
Descriptors: Coding, Introductory Courses, Computer Science Education, Programming
Sentance, Sue; Waite, Jane; Kallia, Maria – Computer Science Education, 2019
Background and Context: Vygotsky's sociocultural theory emphasises the importance of language, mediation, and the transfer of skills and knowledge from the social into the cognitive plane. This perspective has influenced the development of PRIMM (Predict, Run, Investigate, Modify, Make), a structured approach to teaching programming. Objective:…
Descriptors: Computer Science Education, Teaching Methods, Comparative Analysis, Programming
Rimanelli, Marco; Gurba, Krzysztof – International Association for Development of the Information Society, 2019
Among recent e-Learning Pedagogical Strategies, gaming and crisis-simulation games are increasingly used in recent years in university-learning and Blended-courses as an out-of-context effective tool for role-playing and education, especially in Law Schools and Business Schools. Gaming covers several sub-fields (war-games; Law School Mock-Trials;…
Descriptors: Electronic Learning, Social Integration, Teaching Methods, Role Playing

Peer reviewed
Direct link
