Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Software | 6 |
Experiential Learning | 6 |
Open Source Technology | 6 |
Computer Science Education | 5 |
Student Attitudes | 3 |
College Students | 2 |
Computer Security | 2 |
Computers | 2 |
Graduate Students | 2 |
Information Technology | 2 |
Internet | 2 |
More ▼ |
Source
Information Systems Education… | 2 |
IEEE Transactions on Education | 1 |
Journal of Education for… | 1 |
Journal of Interactive… | 1 |
Journal on Educational… | 1 |
Author
Ahamed, Sheikh | 1 |
Bowring, James | 1 |
Burke, Quinn | 1 |
C. Sean Burns | 1 |
Daniela K. DiGiacomo | 1 |
Islam, Md Saiful | 1 |
Jennifer Pusateri | 1 |
Riad, A. B. M. Kamrul | 1 |
Serapiglia, Anthony | 1 |
Shahriar, Hossain | 1 |
Shekar, N. H. | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 3 |
Reports - Research | 2 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Audience
Location
South Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Riad, A. B. M. Kamrul; Islam, Md Saiful; Shahriar, Hossain; Zhang, Chi; Valero, Maria; Sneha, Sweta; Ahamed, Sheikh – Information Systems Education Journal, 2021
Mobile device security has become increasingly important in mobile computing. Since the mobile devices and applications are growing rapidly, the security threats are intensified due to mobile app flaws and lack of security consideration in early stages of software development. The unsecure software development process creates a serious weak path…
Descriptors: Handheld Devices, Computer Security, Computer Software, Computer Science Education
C. Sean Burns; Jennifer Pusateri; Daniela K. DiGiacomo – Journal of Education for Library and Information Science, 2025
This paper presents a novel approach to designing an online, open-source course in systems librarianship, an area of librarianship that may be perceived as complex and intimidating because of the technologies involved. The course design focuses on making systems librarianship more approachable for library and information science students who may…
Descriptors: Library Science, Online Courses, Open Education, Instructional Design
Bowring, James; Burke, Quinn – Journal of Interactive Learning Research, 2016
This paper documents four years of a novel approach to teaching a two-course sequence in software engineering as part of the ABET-accredited computer science curriculum at the College of Charleston. This approach is team-based and centers on learning software engineering in the context of open source software projects. In the first course, teams…
Descriptors: Teaching Methods, Computer Software, Computer Science Education, Open Source Technology
Serapiglia, Anthony – Information Systems Education Journal, 2013
Many students are entering Computer Science education with limited exposure to operating systems and applications other than those produced by Apple or Microsoft. This gap in familiarity with the Open Source community can quickly be bridged with a simple exercise that can also be used to strengthen two other important current computing concepts,…
Descriptors: Experiential Learning, Introductory Courses, Laboratories, Computer Science Education
Vona, M.; Shekar, N. H. – IEEE Transactions on Education, 2013
The "open hardware mobile manipulator" (OHMM) is a new open platform with a unique combination of features for teaching robotics software and algorithms. On-board low- and high-level processors support real-time embedded programming and motor control, as well as higher-level coding with contemporary libraries. Full hardware designs and…
Descriptors: Robotics, Computer Software, Open Source Technology, Internet
Shumba, Rose – Journal on Educational Resources in Computing, 2006
In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix, are based on actions required to secure a Linux host. Publicly available resources were used to…
Descriptors: Computer Security, Experiential Learning, Computer Software, Open Source Technology