Publication Date
| In 2026 | 0 |
| Since 2025 | 3 |
| Since 2022 (last 5 years) | 19 |
| Since 2017 (last 10 years) | 32 |
| Since 2007 (last 20 years) | 156 |
Descriptor
Source
Author
| Mitchell, Eugene E., Ed. | 7 |
| Moursund, David | 6 |
| Hunter, Beverly | 5 |
| Hamblen, John W. | 4 |
| Kugel, Peter | 4 |
| Papert, Seymour | 4 |
| Ahl, David H. | 3 |
| Braun, Ludwig | 3 |
| Dutton, P. E. | 3 |
| Fitzhugh, Robert J. | 3 |
| Marcovitz, Alan B., Ed. | 3 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 135 |
| Teachers | 46 |
| Researchers | 17 |
| Administrators | 16 |
| Policymakers | 13 |
| Students | 5 |
| Community | 1 |
| Media Staff | 1 |
| Support Staff | 1 |
Location
| Canada | 14 |
| Australia | 12 |
| United Kingdom | 12 |
| California | 9 |
| United Kingdom (Great Britain) | 8 |
| Japan | 7 |
| Turkey | 7 |
| United States | 7 |
| United Kingdom (England) | 6 |
| Brazil | 5 |
| United Kingdom (Scotland) | 5 |
| More ▼ | |
Laws, Policies, & Programs
| Elementary and Secondary… | 3 |
| Carl D Perkins Vocational and… | 1 |
| Equal Access | 1 |
| First Amendment | 1 |
| Fourth Amendment | 1 |
| No Child Left Behind Act 2001 | 1 |
Assessments and Surveys
| ACT Assessment | 1 |
| Attitude Scale | 1 |
| Bem Sex Role Inventory | 1 |
| Computer Attitude Scale | 1 |
| Motivated Strategies for… | 1 |
| National Longitudinal Survey… | 1 |
What Works Clearinghouse Rating
Koch, Melissa; Gorges, Torie; Penuel, William R. – Afterschool Matters, 2012
"Co-design"--including youth development staff along with curriculum designers--is the key to developing an effective program that is both scalable and sustainable. This article describes Build IT, a two-year afterschool and summer curriculum designed to help middle school girls develop fluency in information technology (IT), interest in…
Descriptors: Females, Computers, Information Technology, Computer Science
Abbiss, Jane – Gender and Education, 2011
Students negotiate their masculine and feminine identities as students of information and communication technology (ICT) and computer users as they participate in specialist ICT courses and in other areas of their lives. As they negotiate these roles, they are established in relations of power and authority with the technology and with each other.…
Descriptors: Computers, Foreign Countries, Specialists, Gender Issues
Sorva, Juha; Lönnberg, Jan; Malmi, Lauri – Computer Science Education, 2013
Visual program simulation (VPS) is a new, interactive form of educational program visualisation, in which learners use graphical controls to direct a program's execution rather than simply watching an animation of it. In this article, we report on a qualitative empirical study of novice programmers learning through VPS. From an analysis of…
Descriptors: Visualization, Computer Uses in Education, Interviews, Observation
Zendler, Andreas; Spannagel, Christian – Journal on Educational Resources in Computing, 2008
The design of computer science curricula should rely on central concepts of the discipline rather than on technical short-term developments. Several authors have proposed lists of basic concepts or fundamental ideas in the past. However, these catalogs were based on subjective decisions without any empirical support. This article describes the…
Descriptors: Computer Science Education, Computers, Multivariate Analysis, Computer Science
Denner, Jill; Werner, Linda; Ortiz, Eloy – Computers & Education, 2012
Computer game programming has been touted as a promising strategy for engaging children in the kinds of thinking that will prepare them to be producers, not just users of technology. But little is known about what they learn when programming a game. In this article, we present a strategy for coding student games, and summarize the results of an…
Descriptors: Females, Computer Uses in Education, Computers, Programming
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Baytak, Ahmet; Land, Susan M. – Educational Technology Research and Development, 2011
This study employed a case study design (Yin, "Case study research, design and methods," 2009) to investigate the processes used by 5th graders to design and develop computer games within the context of their environmental science unit, using the theoretical framework of "constructionism." Ten fifth graders designed computer games using "Scratch"…
Descriptors: Computer Software, Programming, Learning Processes, Grade 5
Charleston, LaVar J. – Journal of Diversity in Higher Education, 2012
According to Pearson (2002), minority groups are not well represented in science, technology, engineering, and mathematics (STEM) occupations. Among these underrepresented groups are African Americans. To ensure the economic vitality of the STEM workforce in the United States, it is imperative to broaden participation in STEM-related fields and…
Descriptors: Computers, African Americans, Grounded Theory, Career Choice
Shaw, Bilal A. – ProQuest LLC, 2010
Quantum error-correcting codes have been the cornerstone of research in quantum information science (QIS) for more than a decade. Without their conception, quantum computers would be a footnote in the history of science. When researchers embraced the idea that we live in a world where the effects of a noisy environment cannot completely be…
Descriptors: Information Science, Programming, Information Theory, Computer Science
Barr, David; Harrison, John; Conery, Leslie – Learning & Leading with Technology, 2011
In a seminal article published in 2006, Jeanette Wing described computational thinking (CT) as a way of "solving problems, designing systems, and understanding human behavior by drawing on the concepts fundamental to computer science." Wing's article gave rise to an often controversial discussion and debate among computer scientists,…
Descriptors: Educational Objectives, Computer Science, Thinking Skills, Cognitive Processes
Ernst, Jeremy V.; Clark, Aaron C. – Journal of STEM Education: Innovations and Research, 2012
In 2009, the North Carolina Virtual Public Schools worked with researchers at the William and Ida Friday Institute to produce and evaluate the use of game creation by secondary students as a means for learning content related to career awareness in Science, Technology, Engineering and Mathematics (STEM) disciplines, with particular emphasis in…
Descriptors: Computers, Educational Technology, Vocational Education, Student Attitudes
Demski, Jennifer – Campus Technology, 2011
The burgeoning consumer-tech market is creating new challenges for higher education IT departments. As increased expectations of mobility and connectivity have students and faculty looking to consumer technology to meet their academic needs, IT must revamp operations and infrastructure to meet the demand, while keeping security risks and budgets…
Descriptors: Information Services, Educational Technology, Technology Integration, Higher Education
Dong, Xiao – ProQuest LLC, 2010
Workflow technology has emerged as an eminent way to support scientific computing nowadays. Supported by mature technological infrastructures such as web services and high performance computing infrastructure, workflow technology has been well adopted by scientific community as it offers an effective framework to prototype, modify and manage…
Descriptors: Work Environment, Data Processing, Pattern Recognition, Semantics
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)

Peer reviewed
Direct link
