Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 22 |
Descriptor
Computers | 26 |
Internet | 26 |
Computer Science Education | 16 |
Computer Software | 15 |
Computer Science | 14 |
Information Technology | 12 |
Foreign Countries | 7 |
Web Sites | 7 |
College Students | 6 |
Computer Security | 6 |
Higher Education | 6 |
More ▼ |
Source
Author
Dixit, R. K. | 2 |
Altenburg, Ruud | 1 |
Amescua, Antonio | 1 |
Arabaci, I. Bakir | 1 |
Attwood, Terri K. | 1 |
Barnes, Cynthia | 1 |
Barrett, Diane | 1 |
Baxter, Anthony Q. | 1 |
Bowman, Michael | 1 |
Brugman, Marc | 1 |
Buis, Rob | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 11 |
Postsecondary Education | 6 |
Adult Education | 2 |
Elementary Secondary Education | 2 |
Elementary Education | 1 |
Audience
Policymakers | 1 |
Researchers | 1 |
Teachers | 1 |
Location
Australia | 2 |
Florida | 2 |
Greece | 2 |
Spain (Madrid) | 2 |
Turkey | 2 |
Asia | 1 |
Brazil | 1 |
California | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
More ▼ |
Laws, Policies, & Programs
Equal Access | 1 |
Assessments and Surveys
National Longitudinal Survey… | 1 |
What Works Clearinghouse Rating
Mayowa Oyedoyin; Ismaila Temitayo Sanusi; Musa Adekunle Ayanwale – Computer Science Education, 2025
Background and Context: Recognizing that digital technologies can enable economic transformation in Africa, computing education has been considered a subject relevant for all within the compulsory level of education. The implementation of the subject in many schools is, however, characterized by a myriad of challenges, including pedagogical…
Descriptors: Elementary School Students, Student Attitudes, Internet, Coding
Barrett, Diane – Information Systems Education Journal, 2020
In a cloud computing environment, traditional digital forensic processes (such as turning off the computer to image the computer hard drive) can be disruptive to businesses because the data of businesses may be co-mingled with other content. As technology changes, the way digital forensics acquisitions are conducted are also changing. The change…
Descriptors: Computer Science Education, Crime, Evidence, Computer Security
Mark S. Kim – ProQuest LLC, 2021
The late Paul Gray was a pioneer in the research tradition of IS education and curriculum (Gorgone and Gray 1999). Recently, the joint ACM/AIS IS2020 Task force published a new "Competency Model" to improve and update the IS curriculum (Leidig and Anderson 2020). This dissertation contributes to this research tradition by introducing a…
Descriptors: Information Systems, Computer Science Education, Digital Literacy, Skill Development
Arabaci, I. Bakir – Turkish Online Journal of Educational Technology - TOJET, 2017
Today, internet-based information technologies are sine qua non of effective learning and teaching. By the use of multiple multi-media tools in education, learning environment is enriched, persistence of learning is ensured and the boringness of the course is prevented. However, the purposeless use of internet in classrooms leads students to get…
Descriptors: Foreign Countries, Telecommunications, Handheld Devices, Technology Uses in Education
Lawler, James; Joseph, Anthony – Information Systems Education Journal, 2012
Education in entrepreneurship continues to be a developing area of curricula for computer science and information systems students. Entrepreneurship is enabled frequently by cloud computing methods that furnish benefits to especially medium and small-sized firms. Expanding upon an earlier foundation paper, the authors of this paper present an…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Medina-Dominguez, Fuensanta; Sanchez-Segura, Maria-Isabel; Mora-Soto, Arturo; Amescua, Antonio – IEEE Transactions on Education, 2010
The development of collaborative Web applications does not follow a software engineering methodology. This is because when university students study Web applications in general, and collaborative Web portals in particular, they are not being trained in the use of software engineering techniques to develop collaborative Web portals. This paper…
Descriptors: Computer Software, Computers, Computer Science, Engineering
Garmpis, Aristogiannis – Journal of Information Technology Education, 2011
Operating Systems (OS) is an important and mandatory discipline in many Computer Science, Information Systems and Computer Engineering curricula. Some of its topics require a careful and detailed explanation from the instructor as they often involve theoretical concepts and somewhat complex mechanisms, demanding a certain degree of abstraction…
Descriptors: Electronic Learning, Undergraduate Students, Computer Software, Information Systems
Miller, Craig S.; Settle, Amber – ACM Transactions on Computing Education, 2011
Specifying file references for hypertext links is an elementary competence that nevertheless draws upon core computational thinking concepts such as tree traversal and the distinction between relative and absolute references. In this article we explore the learning effects of different instructional strategies in the context of an introductory…
Descriptors: Computers, Drills (Practice), Computer Literacy, Thinking Skills
Lin, Shinyi; Shih, Tse-Hua; Lu, Ruiling – International Journal of Technology and Design Education, 2013
Use of innovative learning/instruction mode, embedded in the Certification Pathway System (CPS) developed by Certiport TM, is geared toward Internet and Computing Benchmark & Mentor specifically for IC[superscript 3] certification. The Internet and Computing Core Certification (IC[superscript 3]), as an industry-based credentialing program,…
Descriptors: Computer Science Education, Internet, Information Technology, College Students
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Dong, Xiao – ProQuest LLC, 2010
Workflow technology has emerged as an eminent way to support scientific computing nowadays. Supported by mature technological infrastructures such as web services and high performance computing infrastructure, workflow technology has been well adopted by scientific community as it offers an effective framework to prototype, modify and manage…
Descriptors: Work Environment, Data Processing, Pattern Recognition, Semantics
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
Chen, Ling; Liu, Yang; Gallagher, Marcus; Pailthorpe, Bernard; Sadiq, Shazia; Shen, Heng Tao; Li, Xue – Journal of Information Systems Education, 2012
The demand for graduates with exposure in Cloud Computing is on the rise. For many educational institutions, the challenge is to decide on how to incorporate appropriate cloud-based technologies into their curricula. In this paper, we describe our design and experiences of integrating Cloud Computing components into seven third/fourth-year…
Descriptors: Computers, Schools, Foreign Countries, Computer Science
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)
Barnes, Cynthia; Cavaliere, Frank – Education, 2009
Metadata is information about computer-generated documents that is often inadvertently transmitted to others. The problems associated with metadata have become more acute over time as word processing and other popular programs have become more receptive to the concept of collaboration. As more people become involved in the preparation of…
Descriptors: Metadata, Ethics, Internet, Word Processing
Previous Page | Next Page ยป
Pages: 1 | 2