Publication Date
| In 2026 | 0 |
| Since 2025 | 28 |
| Since 2022 (last 5 years) | 143 |
| Since 2017 (last 10 years) | 309 |
| Since 2007 (last 20 years) | 673 |
Descriptor
| Information Technology | 837 |
| Computer Science Education | 628 |
| Foreign Countries | 365 |
| Computer Science | 251 |
| Teaching Methods | 173 |
| Computer Software | 171 |
| Student Attitudes | 152 |
| Programming | 132 |
| Educational Technology | 130 |
| College Students | 127 |
| Higher Education | 115 |
| More ▼ | |
Source
Author
| Sutinen, Erkki | 5 |
| Tedre, Matti | 5 |
| Woods, David M. | 5 |
| Frydenberg, Mark | 4 |
| Gusev, Dmitri A. | 4 |
| Mentz, Elsa | 4 |
| Tan, Grace | 4 |
| Venables, Anne | 4 |
| Carbone, Angela | 3 |
| He, Wu | 3 |
| Kommers, Piet, Ed. | 3 |
| More ▼ | |
Publication Type
Education Level
Location
| Australia | 46 |
| Turkey | 42 |
| United Kingdom | 28 |
| United States | 19 |
| South Africa | 17 |
| Taiwan | 15 |
| Canada | 12 |
| Finland | 10 |
| North Carolina | 10 |
| Pennsylvania | 10 |
| California | 9 |
| More ▼ | |
Laws, Policies, & Programs
| Carl D Perkins Vocational and… | 1 |
| Equal Access | 1 |
| No Child Left Behind Act 2001 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Lawler, James; Joseph, Anthony – Information Systems Education Journal, 2012
Education in entrepreneurship continues to be a developing area of curricula for computer science and information systems students. Entrepreneurship is enabled frequently by cloud computing methods that furnish benefits to especially medium and small-sized firms. Expanding upon an earlier foundation paper, the authors of this paper present an…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Mok, Heng Ngee; Lee, Yeow Leong; Tan, Wee Kiat – Australasian Journal of Educational Technology, 2012
This paper describes how a generic computer laboratory equipped with 52 workstations is set up for teaching IT-related courses and other general purpose usage. The authors have successfully constructed a lab management system based on decentralised, client-side software virtualisation technology using Linux and free software tools from VMware that…
Descriptors: Laboratories, Management Systems, Computer Assisted Instruction, Workstations
Mirjana, Ivanovic; Zoran, Putnik; Anja, Sisarica; Zoran, Budimac – Turkish Online Journal of Distance Education, 2011
This paper reports on progress and conclusions of two-year research of gender issues in studying computer science at Department of Mathematics and Informatics, Faculty of Science, University of Novi Sad. Using statistics on data gathered by a survey, the work presented here focused on identifying, understanding, and correlating both female and…
Descriptors: Foreign Countries, Student Attitudes, Student Motivation, Computer Science
Baehr, Craig; Lang, Susan M. – Journal of Technical Writing and Communication, 2012
This article traces the influences of hypertext theory throughout the various genres of online publication in technical communication. It begins with a look back at some of the important concepts and theorists writing about hypertext theory from the post-World War II era, to the early years of the World Wide Web 2.0, and the very differing notions…
Descriptors: Technical Writing, Hypermedia, Information Technology, Internet
de Salas, Kristy; Lewis, Ian; Dermoudy, Julian – Australian Educational Computing, 2014
Within existing ICT degrees there is a widely-held belief that content must be tailored for different "kinds" of students--often two differing student groups: a technical group requiring detailed Computer Science knowledge and a separate group requiring less technical, more strategic ICT knowledge and skills. Our institution has produced…
Descriptors: Cognitive Style, Computer Science, Information Technology, Technological Literacy
Baron, Georges-Louis; Drot-Delange, Beatrice; Grandbastien, Monique; Tort, Françoise – ACM Transactions on Computing Education, 2014
Computer science as a school subject in France is characterized by a succession of promising starts that have not yet been transformed into perennial solutions. The main goal of this article is to analyze this complex situation from a historical perspective, and describe the current rebirth of an optional Computer Science course in the last year…
Descriptors: Computer Science, Secondary School Students, Foreign Countries, Educational History
Ayebi-Arthur, Kofi – Online Submission, 2011
The under-representation of females in Information and Communication Technology (ICT) fields of study and careers continues to attract considerable attention. This article discusses findings of a research that investigated interest in ICT studies and careers among female secondary school students from schools in three districts in the Central…
Descriptors: Foreign Countries, Developing Nations, Computer Science, Science Careers
Pai, Vinay – ProQuest LLC, 2011
The increasing popularity of high-bandwidth Internet connections has enabled new applications like the online delivery of high-quality audio and video content. Conventional server-client approaches place the entire burden of delivery on the content provider's server, making these services expensive to provide. A peer-to-peer approach allows end…
Descriptors: Video Technology, Program Effectiveness, Internet, Information Technology
Alkazemi, Basem Y.; Grami, Grami M. – Journal of Information Technology Education: Innovations in Practice, 2012
Teaching Polymorphism can be best implemented by using a combination of bottom-up and top-down approaches. However, from our observation and students' self-reporting, the former seems to be the predominant in the Saudi context. We try to investigate whether applying a more balanced approach in teaching the comprehensive concept of Polymorphism…
Descriptors: Foreign Countries, Teaching Methods, Programming Languages, Programming
Vaquero, L. M. – IEEE Transactions on Education, 2011
The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform clouds has not…
Descriptors: Foreign Countries, Advanced Courses, Course Objectives, Computers
Nunnery, Christopher Edward – ProQuest LLC, 2011
Botnets remain a potent threat due to evolving modern architectures, inadequate remediation methods, and inaccurate measurement techniques. In response, this research exposes the architectures and operations of two advanced botnets, techniques to enumerate infected hosts, and pursues the scientific refinement of infected-host enumeration data by…
Descriptors: Measurement Techniques, Computer Science, Computer Security, Information Technology
Jafar, Musa; Babb, Jeffry – Information Systems Education Journal, 2012
In this paper we present an artifacts-based approach to teaching a senior level Object-Oriented Analysis and Design course. Regardless of the systems development methodology and process model, and in order to facilitate communication across the business modeling, analysis, design, construction and deployment disciplines, we focus on (1) the…
Descriptors: Data Analysis, Design, Systems Development, Models
Stange, Melissa – ProQuest LLC, 2012
Previous studies have examined the curricula of information systems technology (IST) programs, and some have noted a discrepancy between the stated needs of industry and the skills and attributes of graduates of 4-year programs. In addition, gaps between the 2-year curricula and the perceived needs of employers have been noted. The purpose of this…
Descriptors: Curriculum Evaluation, Information Systems, Information Technology, Associate Degrees
Smarkusky, Debra L.; Toman, Sharon A. – Information Systems Education Journal, 2014
Students in computer science and information technology should be engaged in solving real-world problems received from government and industry as well as those that expose them to various areas of application. In this paper, we discuss interdisciplinary project experiences between majors and non-majors that offered a creative and innovative…
Descriptors: Interdisciplinary Approach, Cooperative Learning, Student Projects, Computer Science Education
Parakh, Abhishek – ProQuest LLC, 2011
Information dispersal algorithms (IDA) are used for distributed data storage because they simultaneously provide security, reliability and space efficiency, constituting a trustworthy computing framework for many critical applications, such as cloud computing, in the information society. In the most general sense, this is achieved by dividing data…
Descriptors: Computers, Information Storage, Information Dissemination, Mathematics

Peer reviewed
Direct link
