Publication Date
In 2025 | 1 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 9 |
Since 2016 (last 10 years) | 12 |
Since 2006 (last 20 years) | 15 |
Descriptor
Computer Science Education | 15 |
Computer Software | 15 |
Identification | 15 |
Programming | 8 |
Plagiarism | 7 |
Teaching Methods | 6 |
Comparative Analysis | 5 |
Computer Security | 5 |
Undergraduate Students | 5 |
Artificial Intelligence | 4 |
Coding | 4 |
More ▼ |
Source
Author
Cheers, Hayden | 2 |
Joy, Mike | 2 |
Lin, Yuqing | 2 |
Baeyens, Toon | 1 |
Budi, Setia | 1 |
Carlos Novo | 1 |
Daniel Gooch | 1 |
Daugherty, Michael K. | 1 |
Dawyndt, Peter | 1 |
Di, Jia | 1 |
Edwards, John | 1 |
More ▼ |
Publication Type
Journal Articles | 13 |
Reports - Research | 11 |
Reports - Descriptive | 3 |
Collected Works - Proceedings | 1 |
Information Analyses | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 10 |
Postsecondary Education | 9 |
Elementary Secondary Education | 2 |
Secondary Education | 2 |
High Schools | 1 |
Audience
Location
United Kingdom | 2 |
Arkansas | 1 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
ACT Assessment | 1 |
Gregorc Style Delineator | 1 |
What Works Clearinghouse Rating
Cheers, Hayden; Lin, Yuqing – Computer Science Education, 2023
Background and Context: Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, such tools do not identify plagiarism, nor suggest what assignment submissions are suspicious of plagiarism. Source code plagiarism…
Descriptors: Plagiarism, Programming, Computer Science Education, Identification
Cheers, Hayden; Lin, Yuqing; Yan, Weigen – Informatics in Education, 2023
Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, most of these tools only measure the similarity between assignment submissions, and do not actually identify which are suspicious of plagiarism. This work…
Descriptors: Plagiarism, Assignments, Computer Software, Computer Science Education
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Livinus Obiora Nweke; Uchenna Franklin Okebanama; Gibson Uwaezuoke Mba – Discover Education, 2025
The integration of Internet of Things (IoT), Artificial Intelligence (AI), and cybersecurity presents new opportunities for innovation and entrepreneurship, yet traditional educational approaches often lack the interdisciplinary and applied focus required to develop these competencies. This study evaluates the impact of an experiential learning…
Descriptors: Entrepreneurship, Artificial Intelligence, Internet, Information Security
Maertens, Rien; Van Petegem, Charlotte; Strijbol, Niko; Baeyens, Toon; Jacobs, Arne Carla; Dawyndt, Peter; Mesuere, Bart – Journal of Computer Assisted Learning, 2022
Background: Learning to code is increasingly embedded in secondary and higher education curricula, where solving programming exercises plays an important role in the learning process and in formative and summative assessment. Unfortunately, students admit that copying code from each other is a common practice and teachers indicate they rarely use…
Descriptors: Plagiarism, Benchmarking, Coding, Computer Science Education
Zeng, Mini; Zhu, Feng – Journal of Cybersecurity Education, Research and Practice, 2021
Software vulnerabilities have become a severe cybersecurity issue. There are numerous resources of industry best practices available, but it is still challenging to effectively teach secure coding practices. The resources are not designed for classroom usage because the amount of information is overwhelming for students. There are efforts in…
Descriptors: Computer Software, Coding, Computer Security, Computer Science Education
Tsabari, Stav; Segal, Avi; Gal, Kobi – International Educational Data Mining Society, 2023
Automatically identifying struggling students learning to program can assist teachers in providing timely and focused help. This work presents a new deep-learning language model for predicting "bug-fix-time", the expected duration between when a software bug occurs and the time it will be fixed by the student. Such information can guide…
Descriptors: College Students, Computer Science Education, Programming, Error Patterns
Mike Richards; Kevin Waugh; Mark A Slaymaker; Marian Petre; John Woodthorpe; Daniel Gooch – ACM Transactions on Computing Education, 2024
Cheating has been a long-standing issue in university assessments. However, the release of ChatGPT and other free-to-use generative AI tools has provided a new and distinct method for cheating. Students can run many assessment questions through the tool and generate a superficially compelling answer, which may or may not be accurate. We ran a…
Descriptors: Computer Science Education, Artificial Intelligence, Cheating, Student Evaluation
Novak, Matija; Joy, Mike; Kermek, Dragutin – ACM Transactions on Computing Education, 2019
Teachers deal with plagiarism on a regular basis, so they try to prevent and detect plagiarism, a task that is complicated by the large size of some classes. Students who cheat often try to hide their plagiarism (obfuscate), and many different similarity detection engines (often called plagiarism detection tools) have been built to help teachers.…
Descriptors: Plagiarism, Computer Software, Computer Software Evaluation, College Students
Source Code Plagiarism Detection in Academia with Information Retrieval: Dataset and the Observation
Karnalim, Oscar; Budi, Setia; Toba, Hapnes; Joy, Mike – Informatics in Education, 2019
Source code plagiarism is an emerging issue in computer science education. As a result, a number of techniques have been proposed to handle this issue. However, comparing these techniques may be challenging, since they are evaluated with their own private dataset(s). This paper contributes in providing a public dataset for comparing these…
Descriptors: Plagiarism, Computer Science Education, Comparative Analysis, Problem Solving
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Pizard, Sebastián; Vallespir, Diego – European Journal of Engineering Education, 2017
Software engineering is the discipline that develops all the aspects of the production of software. Although there are guidelines about what topics to include in a software engineering curricula, it is usually unclear which are the best methods to teach them. In any science discipline the construction of a classification schema is a common…
Descriptors: Computer Science Education, Computer Software, Engineering Education, Taxonomy
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Lau, Wilfred W. F.; Yuen, Allan H. K. – Computers & Education, 2010
It has been advocated that pedagogical content knowledge as well as subject matter knowledge are important for improving classroom instructions. To develop pedagogical content knowledge, it is argued that understanding of students' mental representations of concepts is deemed necessary. Yet assessing and comparing mental model of each individual…
Descriptors: Identification, Mathematics Instruction, Pedagogical Content Knowledge, Cognitive Style
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers