Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 10 |
Descriptor
Computer Oriented Programs | 15 |
Information Technology | 15 |
Programming | 12 |
Programming Languages | 4 |
Computer Software | 3 |
Foreign Countries | 3 |
Handheld Devices | 3 |
Information Systems | 3 |
Business Administration | 2 |
Business Administration… | 2 |
Competence | 2 |
More ▼ |
Source
Author
Altiok, Serhat | 1 |
Chudnov, Daniel | 1 |
Chusho, Takeshi | 1 |
Cristian Tebé | 1 |
Dorner, Ralph | 1 |
Elcacho, Colette | 1 |
Eudald Correig | 1 |
Frydenberg, Mark | 1 |
Ghimire, Prashant | 1 |
Huynh, Minh | 1 |
Jesús Brezmes | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Adult Education | 1 |
Elementary Secondary Education | 1 |
Audience
Practitioners | 2 |
Teachers | 2 |
Administrators | 1 |
Location
Illinois | 1 |
Japan | 1 |
Massachusetts | 1 |
Ohio | 1 |
Turkey | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Maria Llambrich; Pau Satorra; Eudald Correig; Josep Gumà; Jesús Brezmes; Cristian Tebé; Raquel Cumeras – Research Synthesis Methods, 2024
Meta-analysis is a useful tool in clinical research, as it combines the results of multiple clinical studies to improve precision when answering a particular scientific question. While there has been a substantial increase in publications using meta-analysis in various clinical research topics, the number of published meta-analyses in metabolomics…
Descriptors: Meta Analysis, Programming Languages, Information Technology, Computer Oriented Programs
Samuel C. Yang – Journal of Information Systems Education, 2024
Amid the ever-increasing number of cyberthreats, cybersecurity degree programs represent a potential growth area for business schools. This study examines undergraduate cybersecurity programs offered by AACSB-accredited business schools in the US. It surveyed 503 AACSB-accredited schools and identified 72 cybersecurity programs. Using the IS2020…
Descriptors: Computer Security, Information Security, Business Administration Education, Business Schools
Altiok, Serhat; Yükseltürk, Erman – International Journal of Computer Science Education in Schools, 2018
The purpose of the study is to analyze pre-service IT teachers' views on a five day seminar which is related to current methodologies and tools in K-12 computer programming education. The study sample consisted of 44 pre-service IT teachers who study as 3rd or 4th undergraduate program at Department of Computer Education and Instructional…
Descriptors: Preservice Teachers, Information Technology, Student Attitudes, Programming
Huynh, Minh; Ghimire, Prashant – Journal of Information Technology Education: Innovations in Practice, 2015
As mobile devices become prevalent, there is always a need for apps. How hard is it to develop an app, especially a cross-platform app? The paper shares an experience in a project that involved the development of a student services web app that can be run on cross-platform mobile devices. The paper first describes the background of the project,…
Descriptors: Handheld Devices, Computer Oriented Programs, Computer Software, Open Source Technology
Chusho, Takeshi – International Association for Development of the Information Society, 2016
It is preferable for business professionals to develop web applications which must be modified frequently based on their needs. A website for matching is a typical example because various matching websites for C2C (Consumer to Consumer) have recently been opened in relation to the "sharing economy". In our case studies on end-user…
Descriptors: Foreign Countries, Computer Oriented Programs, Computer Interfaces, Information Technology
Frydenberg, Mark – Information Systems Education Journal, 2016
Teaching game development has become an accepted methodology for introducing programming concepts and capturing the interest of beginning computer science and information technology (IT) students. This study, conducted over three consecutive semesters, explores game development using a gaming engine, rather than a traditional programming language,…
Descriptors: Games, Design, Programming, Teaching Methods
Schaffhauser, Dian – T.H.E. Journal, 2011
According to a March estimate from Distimo, there were 653,614 apps in the iPhone, Android, iPad, BlackBerry, and Windows Mobile stores alone. So, is it any wonder that these busy people have found a few that come in handy on the job? Mobile apps are as indispensable to district IT executives as they are becoming in the classroom--for professional…
Descriptors: Computer Oriented Programs, Programming, Computer Software Evaluation, Handheld Devices
Soares, Andrey – Information Systems Education Journal, 2014
App Inventor has been used successfully to teach introduction to programming course for CS/IS/IT and Non-CS majors. Now, researchers are looking on how to include the tool in the curriculum of more advanced computing courses. This paper presents some Issues, Challenges and Opportunities observed while teaching courses on Mobile Application…
Descriptors: Teaching Methods, Programming, Computer Science Education, Information Systems
Chudnov, Daniel – Computers in Libraries, 2009
In this article, the author provides several reasons why one should not rewrite a code from scratch. One should not do it because it will take longer than one thinks. This is the lesson he learned when he started rewriting one of his applications from scratch. The sane thing to do would have been to fix or replace a piece and get on with life.…
Descriptors: Revision (Written Composition), Programming, Coding, Computer Oriented Programs
Simkin, Mark G. – Journal of Information Systems Education, 2008
Data-validation routines enable computer applications to test data to ensure their accuracy, completeness, and conformance to industry or proprietary standards. This paper presents five programming cases that require students to validate five different types of data: (1) simple user data entries, (2) UPC codes, (3) passwords, (4) ISBN numbers, and…
Descriptors: Computers, Computer Oriented Programs, Programming, Information Technology
Dorner, Ralph; Schafer, Arno; Elcacho, Colette; Luckas, Volker – 1998
This paper shows how World Wide Web-based technology using VRML (Virtual Reality Modeling Language) can be applied in an industrial education and training context. Following an introduction to the importance of lifelong learning and training in industry, the state of the art of VRML is discussed, including its features and integration into the Web…
Descriptors: Animation, Authoring Aids (Programming), Computer Assisted Instruction, Computer Oriented Programs
Rawlins, Mike – Syllabus, 2001
Explains what XML (Extensible Markup Language) is; where to find it in a few years (everywhere from Web pages, to database management systems, to common campus applications); issues that will make XML somewhat of an experimental strategy in the near term; and the importance of decision-makers being abreast of XML trends in standards, tools…
Descriptors: Computer Oriented Programs, Computer Uses in Education, Educational Technology, Futures (of Society)
TELRI: Trans European Language Resources Infrastructure Newsletter, 1997
The first seven issues of the Trans European Language Resources Infrastructure (TELRI) newsletter, a publication of the COPERNICUS project funded by the Commission of the European Communities, date from September 1995 to October 1997. The first three issues contain articles in the origins of TELRI, its members, working groups, and events. TELRI's…
Descriptors: Computer Oriented Programs, Computer Software Development, Czech, Foreign Countries
Ohio State Univ., Columbus. Tech Prep Curriculum Services. – 2000
This profile provides the curricular framework for Ohio Tech Prep programs in e-commerce marketing beginning in high school and continuing through the end of the associate degree. It includes a comprehensive set of e-commerce marketing competencies that reflect job opportunities and skills required for e-commerce marketing professionals today and…
Descriptors: Articulation (Education), Associate Degrees, Business Administration, Business Communication
Ohio State Univ., Columbus. Center on Education and Training for Employment. – 1995
This index allows the user to scan the competencies under each title for the 28 subjects appropriate for use in a competency list for the 12 occupations within the business/computer technologies cluster. Titles of the 28 units are as follows: employability skills; professionalism; teamwork; professional and ethical standards; economic and business…
Descriptors: Accounting, Business Administration, Competence, Competency Based Education