NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
What Works Clearinghouse Rating
Showing 1 to 15 of 18 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Cheers, Hayden; Lin, Yuqing – Computer Science Education, 2023
Background and Context: Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, such tools do not identify plagiarism, nor suggest what assignment submissions are suspicious of plagiarism. Source code plagiarism…
Descriptors: Plagiarism, Programming, Computer Science Education, Identification
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cheers, Hayden; Lin, Yuqing; Yan, Weigen – Informatics in Education, 2023
Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, most of these tools only measure the similarity between assignment submissions, and do not actually identify which are suspicious of plagiarism. This work…
Descriptors: Plagiarism, Assignments, Computer Software, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Peer reviewed Peer reviewed
Direct linkDirect link
Maertens, Rien; Van Petegem, Charlotte; Strijbol, Niko; Baeyens, Toon; Jacobs, Arne Carla; Dawyndt, Peter; Mesuere, Bart – Journal of Computer Assisted Learning, 2022
Background: Learning to code is increasingly embedded in secondary and higher education curricula, where solving programming exercises plays an important role in the learning process and in formative and summative assessment. Unfortunately, students admit that copying code from each other is a common practice and teachers indicate they rarely use…
Descriptors: Plagiarism, Benchmarking, Coding, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zeng, Mini; Zhu, Feng – Journal of Cybersecurity Education, Research and Practice, 2021
Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in…
Descriptors: Computer Software, Coding, Computer Security, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tsabari, Stav; Segal, Avi; Gal, Kobi – International Educational Data Mining Society, 2023
Automatically identifying struggling students learning to program can assist teachers in providing timely and focused help. This work presents a new deep-learning language model for predicting "bug-fix-time", the expected duration between when a software bug occurs and the time it will be fixed by the student. Such information can guide…
Descriptors: College Students, Computer Science Education, Programming, Error Patterns
Peer reviewed Peer reviewed
Direct linkDirect link
Mike Richards; Kevin Waugh; Mark A Slaymaker; Marian Petre; John Woodthorpe; Daniel Gooch – ACM Transactions on Computing Education, 2024
Cheating has been a long-standing issue in university assessments. However, the release of ChatGPT and other free-to-use generative AI tools has provided a new and distinct method for cheating. Students can run many assessment questions through the tool and generate a superficially compelling answer, which may or may not be accurate. We ran a…
Descriptors: Computer Science Education, Artificial Intelligence, Cheating, Student Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Novak, Matija; Joy, Mike; Kermek, Dragutin – ACM Transactions on Computing Education, 2019
Teachers deal with plagiarism on a regular basis, so they try to prevent and detect plagiarism, a task that is complicated by the large size of some classes. Students who cheat often try to hide their plagiarism (obfuscate), and many different similarity detection engines (often called plagiarism detection tools) have been built to help teachers.…
Descriptors: Plagiarism, Computer Software, Computer Software Evaluation, College Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Karnalim, Oscar; Budi, Setia; Toba, Hapnes; Joy, Mike – Informatics in Education, 2019
Source code plagiarism is an emerging issue in computer science education. As a result, a number of techniques have been proposed to handle this issue. However, comparing these techniques may be challenging, since they are evaluated with their own private dataset(s). This paper contributes in providing a public dataset for comparing these…
Descriptors: Plagiarism, Computer Science Education, Comparative Analysis, Problem Solving
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Peer reviewed Peer reviewed
Direct linkDirect link
Pizard, Sebastián; Vallespir, Diego – European Journal of Engineering Education, 2017
Software engineering is the discipline that develops all the aspects of the production of software. Although there are guidelines about what topics to include in a software engineering curricula, it is usually unclear which are the best methods to teach them. In any science discipline the construction of a classification schema is a common…
Descriptors: Computer Science Education, Computer Software, Engineering Education, Taxonomy
Tennyson, Matthew F. – ProQuest LLC, 2013
Authorship attribution of source code is the task of deciding who wrote a program, given its source code. Applications include software forensics, plagiarism detection, and determining software ownership. A number of methods for the authorship attribution of source code have been presented in the past. A review of those existing methods is…
Descriptors: Authors, Programming, Computer Software, Plagiarism
Peer reviewed Peer reviewed
Direct linkDirect link
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Shelley, Mack, Ed.; Akcay, Hakan, Ed.; Ozturk, Omer Tayfur, Ed. – International Society for Technology, Education, and Science, 2022
"Proceedings of International Conference on Research in Education and Science" includes full papers presented at the International Conference on Research in Education and Science (ICRES) which took place on March 24-27, 2022 in Antalya, Turkey. The aim of the conference is to offer opportunities to share ideas, to discuss theoretical and…
Descriptors: Educational Technology, Technology Uses in Education, Computer Peripherals, Equipment
Krishnamurthy, Janaki – ProQuest LLC, 2010
Given the increasing competition in the software industry and the critical consequences of software errors, it has become important for companies to achieve high levels of software quality. While cost reduction and timeliness of projects continue to be important measures, software companies are placing increasing attention on identifying the user…
Descriptors: Program Evaluation, Opinions, Privacy, Prediction
Previous Page | Next Page »
Pages: 1  |  2