NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 21 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Takada, Shingo; Cuadros-Vargas, Ernesto; Impagliazzo, John; Gordon, Steven; Marshall, Linda; Topi, Heikki; van der Veer, Gerrit; Waguespack, Leslie – Education and Information Technologies, 2020
Various computing subdisciplines, such as computer science and software engineering, each have their own curricular guidelines. They can be very difficult to understand and compare for people such as prospective students, industry personnel, and even faculty members. This is compounded by a lack of information surrounding undergraduate computing…
Descriptors: Computer Science Education, Curriculum Development, Academic Standards, Visualization
Peer reviewed Peer reviewed
Direct linkDirect link
Rita Garcia; Michelle Craig – ACM Transactions on Computing Education, 2025
Introduction: Computer Science Education does not have a universally defined set of concepts consistently covered in all introductory courses (CS1). One approach to understanding the concepts covered in CS1 is to ask educators. In 2004, Nell Dale did just this. She also collected their perceptions on challenging topics to teach. Dale mused how the…
Descriptors: Replication (Evaluation), Teaching Methods, Computer Science Education, Introductory Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Spruit, Marcel – Higher Education, Skills and Work-based Learning, 2022
Purpose: The information security field requires standardised education. This could be based on generic job profiles and a standard competence framework. The question is whether this is possible and feasible. To find out, the author did a case study: developing an information security master curriculum based on a generic PVIB job profile and the…
Descriptors: Information Security, Computer Science Education, Profiles, Case Studies
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alhamdani, Wasim A. – Journal of Cybersecurity Education, Research and Practice, 2019
A suggested curriculum for secondary and primarily academic discipline in Cybersecurity Postsecondary Education is presented. This curriculum is developed based on the Association for Computing Machinery guidelines and the National Centers of Academic Excellence Cyber Operations program.
Descriptors: Postsecondary Education, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kusaka, Satoshi – Journal of Education and Learning, 2021
Information and Communication Technology (ICT) education has been actively implemented around the world recently. ICT curriculum in schools is intended to improve students' programming-oriented thinking rather than to train them as programmers. The core of ICT education is 'computational thinking'. Computational thinking is taking an approach to…
Descriptors: Cross Cultural Studies, Thinking Skills, Information Technology, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Bohler, Jeffrey A.; Larson, Benjamin; Peachey, Todd A.; Shehane, Ronald F. – Journal of Information Systems Education, 2020
Information systems education objectives must continually adapt to a dynamic marketplace for knowledge and skills. For faculty developing programs that better prepare students for this demanding environment, existing research and guidelines provide a foundation to develop relevant coursework. However, an examination of peer institutions indicates…
Descriptors: Information Systems, Computer Science Education, Curriculum Evaluation, Guidelines
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2016
The demand for college graduates with skills in big data analysis is on the rise. Employers in all industry sectors have found significant value in analyzing both separate and combined data streams. However, news reports continue to script headlines drawing attention to data improprieties, privacy breaches and identity theft. While data privacy is…
Descriptors: Information Security, Information Systems, Data, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Waguespack, Leslie J. – Information Systems Education Journal, 2011
As punishment in the biblical story of Moses the slaves were told they had to make bricks without straw. This was impossible because bricks made without straw had the appearance of strength and function but could not withstand the proof of actual use. The slaves' punishment was therefore not only to make bricks, but also to find the straw on their…
Descriptors: Information Systems, Computer Science Education, Computer Software, Design
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Akar, Sacide Guzin Mazman; Altun, Arif – Contemporary Educational Technology, 2017
The purpose of this study is to investigate and conceptualize the ranks of importance of social cognitive variables on university students' computer programming performances. Spatial ability, working memory, self-efficacy, gender, prior knowledge and the universities students attend were taken as variables to be analyzed. The study has been…
Descriptors: Individual Differences, Learning Processes, Programming, Self Efficacy
Peer reviewed Peer reviewed
Direct linkDirect link
Zheng, Guangzhi; Zhang, Chi; Li, Lei – Journal of Information Systems Education, 2015
Business intelligence (BI) and healthcare analytics are the emerging technologies that provide analytical capability to help healthcare industry improve service quality, reduce cost, and manage risks. However, such component on analytical healthcare data processing is largely missed from current healthcare information technology (HIT) or health…
Descriptors: Business, Intelligence, Information Technology, Curriculum
Nunes, Miguel Baptista, Ed.; McPherson, Maggie, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers of the International Conference e-Learning 2016, which was organised by the International Association for Development of the Information Society, 1-3 July, 2016. This conference is part of the Multi Conference on Computer Science and Information Systems 2016, 1-4 July. The e-Learning (EL) 2016 conference aims…
Descriptors: Professional Associations, Conferences (Gatherings), Electronic Learning, Computer Science Education
Lippey, Gerald – Journal of Computer-Based Instruction, 1975
A listing of some possible pitfalls that can deter the effective development activities of computer managed instruction. (HB)
Descriptors: Computer Assisted Instruction, Computer Science, Curriculum Development, Educational Development
Peer reviewed Peer reviewed
Australian Mathematics Teacher, 1984
The recommendations of the Commonwealth Schools Commission's National Advisory Committee on Computers in Schools are summarized. They are classified in terms of curriculum development, professional development, support services, software and courseware, hardware, and organization. (MNS)
Descriptors: Computer Oriented Programs, Computer Science Education, Computer Software, Computers
Peer reviewed Peer reviewed
Ryan, Samuel G.; Bedi, Dina N. – Journal of Visual Impairment and Blindness, 1978
The article reports on an innovative approach to developing computer literacy among 15 visually impaired students that was presented in two four-week workshops in computer programing for visually impaired students at Baruch College, N.Y. (Author/PHR)
Descriptors: Computer Science Education, Curriculum Development, Guidelines, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Law, Wai K. – Journal of Information Systems Education, 2007
The heterogeneous backgrounds and interests of prospective students has been an emerging challenge in Information Systems (IS) education. Pounding waves of technology carried students away from the shores of traditional IS training. Pragmatists avoided the traditional IS programs, many of which struggled among budget reduction, competing training…
Descriptors: Information Systems, Internet, Problem Based Learning, Learning Strategies
Previous Page | Next Page ยป
Pages: 1  |  2