Publication Date
| In 2026 | 1 |
| Since 2025 | 417 |
| Since 2022 (last 5 years) | 1854 |
| Since 2017 (last 10 years) | 3677 |
| Since 2007 (last 20 years) | 5360 |
Descriptor
| Computer Science Education | 7871 |
| Foreign Countries | 2300 |
| Programming | 1790 |
| Teaching Methods | 1682 |
| Student Attitudes | 1329 |
| Higher Education | 1158 |
| Computer Software | 1139 |
| College Students | 1074 |
| Undergraduate Students | 1039 |
| Educational Technology | 848 |
| Computer Assisted Instruction | 826 |
| More ▼ | |
Source
Author
| Barnes, Tiffany | 21 |
| Armoni, Michal | 15 |
| Gal-Ezer, Judith | 15 |
| Yadav, Aman | 15 |
| Malmi, Lauri | 14 |
| Soh, Leen-Kiat | 14 |
| Xinogalos, Stelios | 14 |
| Frydenberg, Mark | 12 |
| Laakso, Mikko-Jussi | 12 |
| Hazzan, Orit | 11 |
| Hunter, Beverly | 11 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 500 |
| Teachers | 313 |
| Researchers | 98 |
| Policymakers | 67 |
| Administrators | 48 |
| Students | 45 |
| Parents | 6 |
| Community | 5 |
| Media Staff | 5 |
| Support Staff | 1 |
Location
| Turkey | 232 |
| Australia | 144 |
| United Kingdom | 124 |
| Taiwan | 107 |
| China | 101 |
| Canada | 97 |
| California | 96 |
| Germany | 79 |
| Spain | 77 |
| Finland | 69 |
| Greece | 66 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 2 |
| Does not meet standards | 1 |
Senad Orhani; Kyvete Shatri – Educational Process: International Journal, 2025
Background/purpose: In the modernized society with advanced technology, as education becomes increasingly dependent on information technology, there is a need to prepare the next generation of students with a wide variety of skills and abilities necessary for future scientific careers. Modern educational challenges include the task of engaging…
Descriptors: Computer Games, Technology Uses in Education, Game Based Learning, Student Motivation
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Nicolas Pope; Juho Kahila; Henriikka Vartiainen; Matti Tedre – IEEE Transactions on Learning Technologies, 2025
The rapid advancement of artificial intelligence and its increasing societal impacts have turned many computing educators' focus toward early education in machine learning (ML). Limited options for educational tools for teaching novice learners about the mechanisms of ML and data-driven systems presents a recognized challenge in K-12 computing…
Descriptors: Artificial Intelligence, Computer Oriented Programs, Computer Science Education, Grade 4
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Noah Glaser; Zeinab Parishani; Amogh Chetankumar Joshi; Prasad Calyam – Technology, Knowledge and Learning, 2025
As Virtual Reality (VR) gains traction in education, its potential to support neurodivergent learners in cybersecurity training remains underexplored. This emerging technology report examines how VR can bridge the gap between STEM education and cybersecurity training for neurodivergent individuals, highlighting both its promise and the challenges…
Descriptors: Computer Simulation, Computer Uses in Education, Computer Science Education, Computer Security
Using Mobile Applications to Develop the Teacher's Teaching Performance and Professional Development
Mona Esmat; Nahed Amasha – Education and Information Technologies, 2025
This research examines the integration of mobile applications with the Egyptian Knowledge Bank (EKB) to support the professional development of teachers, with a particular focus on computer science educators. Given the barriers teachers face in attending traditional training programs, such as time constraints, location, and costs, Mobile Learning…
Descriptors: Computer Uses in Education, Computer Oriented Programs, Teacher Effectiveness, Faculty Development
Nurten Gündüz; Mehmet Sincar – International Journal of Contemporary Educational Research, 2024
The metaverse which is considered as the digital big bang of humanity and the next evolution of the internet is anticipated to offer a living environment for civilization 5.0 and beyond in various domains including education. Each novice technology that enters our daily lives generates also fear, anxiety, and problems as well as hope, benefit, and…
Descriptors: Higher Education, Computer Simulation, Ethics, Computer Security
Nuno Verdelho Trindade; Lidia Custodio; Alfredo Ferreira; Joao Madeiras Pereira – IEEE Transactions on Learning Technologies, 2024
Ray tracing is a computer graphics technique used to produce realistic visuals by physically simulating the behavior of light. Although this technique can be described straightforwardly, fully comprehending it might be challenging. It is typically taught in the classroom using the 2-D formats, such as paper or a blackboard. We propose using…
Descriptors: Computer Simulation, Computer Graphics, Visualization, Computer Assisted Instruction
Ruta Pirta-Dreimane; Agne Brilingaite; Evita Roponena; Karen Parish; Janis Grabis; Ricardo Gregorio Lugo; Martinš Bonders – Technology, Knowledge and Learning, 2025
Incorporating gamification elements and innovative approaches in training programs are promising for addressing cybersecurity knowledge gaps. Cybersecurity education should combine hard and soft skill development when building the capacity to manage cyber incidents requiring timely communication, team collaboration, and self-efficacy in risk…
Descriptors: Computer Security, Computer Science Education, Educational Games, Gamification
Mohammed Nazel Alshammari; Wendy Yánez-Pazmino; Carlos Mera-Gómez; Rami Bahsoon – ACM Transactions on Computing Education, 2025
Background: In agile software engineering team projects, effective collaboration and communication between members are essential for promoting agility and lean software development. Agile methodologies, which emphasize iterative development, collaboration and adaptability, are well suited to dynamic educational environments. However, agile teams…
Descriptors: Computer Software, Productivity, Computer Science Education, Cooperative Learning
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Türkan Karakus Yilmaz; Zafer Yilmaz; Ömer Arpacik – Journal of Educational Computing Research, 2025
This study compares museum-related knowledge, museum learning experiences and cognitive load based on task types presented via a mobile application during a museum virtual tour. The study involved three experiments, each examining the effects of different task types. In the first experiment, tasks varied by difficulty (easy vs. difficult), in the…
Descriptors: Cognitive Ability, Museums, Computer Simulation, Information Technology
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Jinshui Wang; Shuguang Chen; Zhengyi Tang; Pengchen Lin; Yupeng Wang – Education and Information Technologies, 2025
Mastering SQL programming skills is fundamental in computer science education, and Online Judging Systems (OJS) play a critical role in automatically assessing SQL codes, improving the accuracy and efficiency of evaluations. However, these systems are vulnerable to manipulation by students who can submit "cheating codes" that pass the…
Descriptors: Programming, Computer Science Education, Cheating, Computer Assisted Testing
Hrishikesh Bhide – ProQuest LLC, 2024
The meteoric rise in software and technology has altered the paradigm of information security and privacy. Classified information, stored earlier behind locked doors, is now stored on the internet on servers that can be accessed from anywhere on the globe. As a result of these advancements, we are now vulnerable to cyber-attacks. Cyber-attacks are…
Descriptors: Game Based Learning, Learning Strategies, Computer Security, Computer Science Education

Peer reviewed
Direct link
