NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 136 to 150 of 837 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Woods, David M. – Information Systems Education Journal, 2020
This paper explores how goal-setting activities in a course were used to promote a growth mindset in students. Research shows many benefits for students with a growth mindset that emphasizes learning and addressing challenges by focusing on effort and process rather than judgments about success or ability. Activities designed to prompt students to…
Descriptors: Goal Orientation, Assignments, Learning Activities, Skill Development
Peer reviewed Peer reviewed
Direct linkDirect link
Burrell, Darrell Norman; Courtney-Dattola, Ashley; Burton, Sharon L.; Nobles, Calvin; Springs, Delores; Dawson, Maurice E. – International Journal of Information and Communication Technology Education, 2020
Many universities require end of course evaluations for all courses taught as tool for academic accreditation purposes. The reality is that often many academic departments either do not do anything or have no idea what to do when evaluations continue to be poor. As a result, students have fought back against this process to create their own…
Descriptors: Internet, Instructional Improvement, Information Technology, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Binh Tran; Karen C. Benson; Lorraine Jonassen – Journal of Cybersecurity Education, Research and Practice, 2023
One only needs to listen to the news reports to recognize that the gap between securing the enterprise and cybersecurity threats, breaches, and vulnerabilities appears to be widening at an alarming rate. An untapped resource to combat these attacks lies in the students of the secondary educational system. Necessary in the cybersecurity education…
Descriptors: Certification, College Curriculum, Information Security, Computer Security
Constance Barnes-Watson – ProQuest LLC, 2024
There is a purported shortage of employable labor in the tech workforce, yet Black, Indigenous, Women of Color (BIWOC) in urban centers struggle to find and sustain roles in "high-tech." The tech ecosystem is a CIS-gendered, white male heterosexual space that perpetuates and "ideal worker norm" (Kachchaf et al., 2015), which…
Descriptors: Computer Science Education, Intervention, Females, Urban Areas
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Juho Kahila; Henriikka Vartiainen; Matti Tedre; Eetu Arkko; Anssi Lin; Nicolas Pope; Ilkka Jormanainen; Teemu Valtonen – Informatics in Education, 2024
The integration of artificial intelligence (AI) topics into K-12 school curricula is a relatively new but crucial challenge faced by education systems worldwide. Attempts to address this challenge are hindered by a serious lack of curriculum materials and tools to aid teachers in teaching AI. This article introduces the theoretical foundations and…
Descriptors: Personal Autonomy, Data, Children, Creativity
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tureniyazova, Asiya Ibragimovna – Research in Social Sciences and Technology, 2019
To date, hundreds of advanced teaching methods, such as game methods, have been developed, and these problem-based learning methods are widely used in education. Most of these technologies are based on the principles of student-centered and participatory learning. These interactive methods allow the learner to master the necessary professional…
Descriptors: Teaching Methods, Visual Aids, Information Technology, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Smith, Sally; Taylor-Smith, Ella; Fabian, Khristin; Zarb, Mark; Paterson, James; Barr, Matthew; Berg, Tessa – Journal of Education and Work, 2021
This mixed-method study at six universities asked degree apprentices about their trajectories into the apprenticeship, to better understand the social mobility potential of apprenticeships. The degree apprenticeship offers a route to a degree for apprentices, who are employees studying for a degree. As a new model, little is known about the…
Descriptors: Social Mobility, Apprenticeships, College Students, Student Interests
Peer reviewed Peer reviewed
Direct linkDirect link
AlGhamdi, Rayed A. – Education & Training, 2022
Purpose: This paper examined the evaluation of the virtual internship program for KAU IT students during the COVID-19 pandemic, 2020 summer. Design/methodology/approach: A mixed-method survey was utilized for the data collection. Out of 164 enrolled students in the 2020 summer training program, 147 students opted to participate. This gives a…
Descriptors: COVID-19, Pandemics, Internship Programs, Summer Programs
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pishtari, Gerti; Prieto, Luis P.; Rodriguez-Triana, Maria Jesus; Martinez-Maldonado, Roberto – Journal of Learning Analytics, 2022
This research was triggered by the identified need in literature for large-scale studies about the kinds of designs that teachers create for mobile learning (m-learning). These studies require analyses of large datasets of learning designs. The common approach followed by researchers when analyzing designs has been to manually classify them…
Descriptors: Scaling, Classification, Context Effect, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Wongwuttiwat, Jittima; Winley, Graham Kenneth – Journal of Education for Business, 2020
This is an exploratory classroom project involving lecturers and students in an ICT degree program at a university in Thailand. Twenty creativity traits derived from neuroscience are used as a framework to examine and compare: (a) the importance that lecturers assign to these traits as attributes of students; and (b) the extent to which students…
Descriptors: Creativity, College Faculty, College Students, Neurosciences
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wilinski, Antoni; Kupracz, Lukasz – Informatics in Education, 2020
The aim of the article is to determine in the studied groups the multiple intelligence distribution defined in the 1980s by Howard Gardner. The research was conducted in three groups of respondents. The first study group was first-year students of computer science, the second was master (2nd degree) students, educationally 4 years older than the…
Descriptors: Multiple Intelligences, Intelligence Tests, College Freshmen, Graduate Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frydenberg, Mark; Lorenz, Birgy – Information Systems Education Journal, 2020
Learning cybersecurity awareness builds on basic information technology concepts and digital literacy skills. In an effort to raise cybersecurity awareness among information technology students, this paper describes a series of three different interactive sessions offered to students of all levels at a business university. The sessions introduced…
Descriptors: Computer Security, Computer Science Education, Computer Literacy, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pike, Ronald E.; Brown, Brandon – Information Systems Education Journal, 2019
Cloud computing has grown immensely in the past decade and is becoming increasingly important to organizations. The Computer Information Systems (CIS) program at Cal Poly Pomona has gone through a re-visioning process that included the addition of a course on IT infrastructure to address the growth of cloud computing and resulting changes in IS/IT…
Descriptors: Information Technology, Undergraduate Study, Computer Science Education, Information Systems
Earls, Eamon McCarthy – Pioneer Institute for Public Policy Research, 2019
Fintech describes new technology aimed at improving and automating the delivery of financial services. The term encompasses a wide variety of finance industry segments, such as crowdfunding, peer-to-peer lending, payments, data collection, cryptocurrency, credit scoring, cybersecurity for finance, thematic investing, algorithmic asset management,…
Descriptors: Public Colleges, Financial Services, Information Technology, Technological Advancement
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Pages: 1  |  ...  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  ...  |  56