Publication Date
| In 2026 | 0 |
| Since 2025 | 52 |
| Since 2022 (last 5 years) | 260 |
| Since 2017 (last 10 years) | 517 |
| Since 2007 (last 20 years) | 918 |
Descriptor
Source
Author
| Taitt, Kathy | 6 |
| Hazzan, Orit | 5 |
| Lavy, Ilana | 5 |
| Malmi, Lauri | 5 |
| Schwieger, Dana | 5 |
| Acharya, Sushil | 4 |
| Bers, Marina Umaschi | 4 |
| Janicki, Thomas | 4 |
| Joy, Mike | 4 |
| Rashkovits, Rami | 4 |
| Simon, Beth | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 77 |
| Teachers | 77 |
| Students | 23 |
| Researchers | 11 |
| Policymakers | 5 |
| Administrators | 4 |
| Parents | 2 |
| Community | 1 |
Location
| Taiwan | 29 |
| Australia | 27 |
| Turkey | 26 |
| Spain | 23 |
| Greece | 20 |
| United Kingdom | 17 |
| Brazil | 16 |
| China | 16 |
| Germany | 16 |
| Canada | 12 |
| India | 12 |
| More ▼ | |
Laws, Policies, & Programs
| Americans with Disabilities… | 1 |
| Education Consolidation… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 1 |
Riad, A. B. M. Kamrul; Islam, Md Saiful; Shahriar, Hossain; Zhang, Chi; Valero, Maria; Sneha, Sweta; Ahamed, Sheikh – Information Systems Education Journal, 2021
Mobile device security has become increasingly important in mobile computing. Since the mobile devices and applications are growing rapidly, the security threats are intensified due to mobile app flaws and lack of security consideration in early stages of software development. The unsecure software development process creates a serious weak path…
Descriptors: Handheld Devices, Computer Security, Computer Software, Computer Science Education
Paassen, Benjamin; McBroom, Jessica; Jeffries, Bryn; Koprinska, Irena; Yacef, Kalina – Journal of Educational Data Mining, 2021
Educational data mining involves the application of data mining techniques to student activity. However, in the context of computer programming, many data mining techniques can not be applied because they require vector-shaped input, whereas computer programs have the form of syntax trees. In this paper, we present ast2vec, a neural network that…
Descriptors: Data Analysis, Programming Languages, Networks, Novices
Thomas, Paul J.; Patel, Devang; Magana, Alejandra J. – ACM Transactions on Computing Education, 2021
Software modeling is an integral practice for software engineers, especially as the complexity of software solutions increases. Unified Modeling Language (UML) is the industry standard for software modeling. however, it is often used incorrectly and misunderstood by novice software designers. This study is centered around understanding patterns of…
Descriptors: Computer Science Education, Models, Computer Software, Programming Languages
Blažic, Borka Jerman – Education and Information Technologies, 2022
Recruiting, retaining, and maintaining sufficient numbers of cybersecurity professionals in the workplace is a constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical, managerial-related jobs in the cyber sector. The problem is the lack of cybersecurity skills in the European labour…
Descriptors: Foreign Countries, Computer Science Education, Computer Security, Information Security
Tanveer, Binish; Usman, Muhammad – IEEE Transactions on Education, 2022
Contribution: In this study, we accumulated the knowledge and generated evidence on how and in what context CDIO framework has been used in software engineering (SE) education. The aggregated evidence will enable SE academics in making informed decisions while adopting CDIO for SE education and build upon it. Background: CDIO framework is relevant…
Descriptors: Engineering Education, Computer Software, Computer Science Education, Guidelines
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Amos Oyelere Sunday; Friday Joseph Agbo; Jarkko Suhonen – Technology, Knowledge and Learning, 2025
The recent popularity of computational thinking (CT) and the desire to apply CT in our daily lives have prompted the need for a successful pedagogical technique for learning CT in K-12 education. The application of co-design pedagogical techniques has the potential to improve students' CT learning through knowledge sharing and the creation of…
Descriptors: Thinking Skills, Computer Science Education, Research Reports, Teaching Methods
Christine Ladwig; Dana Schwieger – Information Systems Education Journal, 2024
Hollywood screenwriters worry about Artificial Intelligence (AI) replacements taking over their jobs. Famous museums litigate to protect their art from AI infringement. A major retailer scraps a machine-learning based recruitment program that was biased against women. These are just a few examples of how AI is affecting the world of work,…
Descriptors: Computer Science Education, Curriculum Development, Information Systems, Information Science Education
Abdur R. Shahid; Sushma Mishra – Journal of Information Systems Education, 2024
Due to the increasing demand for efficient, effective, and profitable applications of Artificial Intelligence (AI) in various industries, there is an immense need for professionals with the right skills to meet this demand. As a result, several institutions have started to offer AI programs. Yet, there is a notable gap in academia: the absence of…
Descriptors: Masters Programs, Information Systems, Computer Science Education, Artificial Intelligence
Felienne Hermans – Informatics in Education, 2024
This autoethnographic paper is part of a special issue trying to answer the question "How to design or choose languages for programming novices?" I will describe how my programming language Hedy was created, how the initial design goals were formed, how my perspectives on learning and teaching changed along the way, and how Hedy changed…
Descriptors: Decision Making, Programming Languages, Novices, Computer Science Education
Zhadyra Akhatayeva; Kakim Sagindykov; Bazarbek Mukushev; Nurgul Kurmangaliyeva; Ardak Karipzhanova – Education and Information Technologies, 2024
The goal of the study is to create Visual Basic and MATHCAD apps to create programs that show the core force using physical forces as an example. The research subjects are high school teachers and students; the inherent context is high school STEM courses. Programs for computer visualization have been developed, and theoretical investigations have…
Descriptors: High School Teachers, High School Students, STEM Education, Computer Uses in Education
Kumar, Amruth N. – International Educational Data Mining Society, 2023
Is there a pattern in how students solve Parsons puzzles? Is there a difference between the puzzle-solving strategies of C++ and Java students? We used Markov transition matrix to answer these questions. We analyzed the solutions of introductory programming students solving Parsons puzzles involving if-else statements and while loops in C++ and…
Descriptors: Markov Processes, Puzzles, Introductory Courses, Computer Science Education
Frydenberg, Mark – Information Systems Education Journal, 2023
The Internet of Things (IoT) is a network of objects that can exchange data with other devices also connected to the Internet. One of the most common consumer examples of IoT is home automation, as a variety of smart devices, including doorbells, lightbulbs, thermostats, and refrigerators are now available which users can control remotely using…
Descriptors: Internet, Computer Software, Automation, Information Technology
Janice Mak; Yue Xin; Lin Yan; Kristina Kramarczuk; Francheska Figueroa; Brian Nelson; Ebony Terrell Shockley; Jeremy Bernier; Diane Jass Ketelhut – Journal of Technology and Teacher Education, 2025
Current efforts to prepare teachers for integrating computational thinking (CT) into disciplinary areas often do not ensure equitable CT experiences for students. This study examined teachers' CT integration by applying the Accessible Computational Thinking (ACT) Framework designed to align elementary science teachers' professional learning and…
Descriptors: Thinking Skills, Computer Science Education, Teaching Methods, Culturally Relevant Education
Oluwadara Abimbade – Journal of Digital Learning in Teacher Education, 2025
Today's adolescents actively engage with media, not only as consumers but also as creators. Their media creation activities range from graphic design and video production to digital storytelling and game programming. These experiences enable youth to express their voices and promote individual and community development. However, media production…
Descriptors: Middle School Students, Information Literacy, Deception, Misinformation

Peer reviewed
Direct link
