NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 421 to 435 of 837 results Save | Export
Chan, Pat P. W. – International Association for Development of the Information Society, 2014
With the advancement of information and communication technology, collaboration and knowledge sharing through technology is facilitated which enhances the learning process and improves the learning efficiency. The purpose of this paper is to review the methods of assessment and strategy of collaboration and knowledge sharing in a computer course,…
Descriptors: Information Technology, Access to Information, Technology Uses in Education, Evaluation Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Denner, Jill; Werner, Linda; Ortiz, Eloy – Computers & Education, 2012
Computer game programming has been touted as a promising strategy for engaging children in the kinds of thinking that will prepare them to be producers, not just users of technology. But little is known about what they learn when programming a game. In this article, we present a strategy for coding student games, and summarize the results of an…
Descriptors: Females, Computer Uses in Education, Computers, Programming
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Battig, Michael E. – Information Systems Education Journal, 2010
Survey results from a two year project are presented. The survey instruments were developed through review of the literature involving similar studies of student perceptions and with the assistance of social scientists. The study includes both high school and college student perceptions of computing. The survey also contrasts student perceptions…
Descriptors: High School Students, Computer Attitudes, Computer Science, Information Technology
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Dishaw, Mark T.; Eierman, Michael A.; Iversen, Jacob H.; Philip, George – Journal of Information Technology Education: Research, 2013
As collaboration among teams that are distributed in time and space is becoming increasingly important, there is a need to understand the efficacy of tools available to support that collaboration. This study employs a combination of the Technology Acceptance Model (TAM) and the Task-Technology Fit (TTF) model to compare four different technologies…
Descriptors: Cooperation, Collaborative Writing, Electronic Publishing, Word Processing
Ji, Shengyue – ProQuest LLC, 2011
Traditional information systems return answers after a user submits a complete query. Users often feel "left in the dark" when they have limited knowledge about the underlying data, and have to use a try-and-see approach for finding information. The trend of supporting autocomplete in these systems is a first step towards solving this problem. A…
Descriptors: Information Systems, Online Searching, Search Strategies, Computer Interfaces
Peer reviewed Peer reviewed
Direct linkDirect link
He, Wu; Yen, Cherng-Jyh – Journal of Information Systems Education, 2014
More and more information technology (IT) programs are offering distance learning courses to their students. However, to date, there are a very limited number of published articles in the IT education literature that compare how different methods of delivering distance course relate to undergraduate students' learning outcomes in IT software…
Descriptors: Programming, Computer Software, Computer Science Education, Participant Satisfaction
Peer reviewed Peer reviewed
Direct linkDirect link
Sondergaard, Harald; Mulder, Raoul A. – Computer Science Education, 2012
We examine student peer review, with an emphasis on formative practice and collaborative learning, rather than peer grading. Opportunities to engage students in such formative peer assessment are growing, as a range of online tools become available to manage and simplify the process of administering student peer review. We consider whether…
Descriptors: Cooperative Learning, Peer Evaluation, Formative Evaluation, Intellectual Disciplines
Shaw, Bilal A. – ProQuest LLC, 2010
Quantum error-correcting codes have been the cornerstone of research in quantum information science (QIS) for more than a decade. Without their conception, quantum computers would be a footnote in the history of science. When researchers embraced the idea that we live in a world where the effects of a noisy environment cannot completely be…
Descriptors: Information Science, Programming, Information Theory, Computer Science
Peer reviewed Peer reviewed
Direct linkDirect link
Ren, Xiangshi; Zhou, Xiaolei – Behaviour & Information Technology, 2011
Many handheld devices with stylus pens are available in the market; however, there have been few studies which examine the effects of the size of the stylus pen on user performance and subjective preferences for handheld device interfaces for various age groups. Two experiments (pen-length experiment and pen-tip width/pen-width experiment) were…
Descriptors: Young Adults, Handheld Devices, Computer Peripherals, Children
Barr, David; Harrison, John; Conery, Leslie – Learning & Leading with Technology, 2011
In a seminal article published in 2006, Jeanette Wing described computational thinking (CT) as a way of "solving problems, designing systems, and understanding human behavior by drawing on the concepts fundamental to computer science." Wing's article gave rise to an often controversial discussion and debate among computer scientists,…
Descriptors: Educational Objectives, Computer Science, Thinking Skills, Cognitive Processes
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Vedder, Richard G. – Journal of Information Technology Education: Innovations in Practice, 2012
In October 2012, Microsoft will release the commercial version of its next operating system, presently called "Windows 8." This version represents a significant departure from the past. Microsoft wants this operating system to meet user needs regardless of physical platform (e.g., desktop, notebook, tablet, mobile phone). As part of this mission,…
Descriptors: Computer Interfaces, Information Technology, Internet, Vendors
Peer reviewed Peer reviewed
Direct linkDirect link
Ernst, Jeremy V.; Clark, Aaron C. – Journal of STEM Education: Innovations and Research, 2012
In 2009, the North Carolina Virtual Public Schools worked with researchers at the William and Ida Friday Institute to produce and evaluate the use of game creation by secondary students as a means for learning content related to career awareness in Science, Technology, Engineering and Mathematics (STEM) disciplines, with particular emphasis in…
Descriptors: Computers, Educational Technology, Vocational Education, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Erichsen, Elizabeth Anne; DeLorme, Lyn; Connelley, Rosalinda; Okurut-Ibore, Christine; McNamara, Lisa; Aljohani, Obaidalah – Journal of Continuing Higher Education, 2013
An internal assessment was conducted utilizing a sociotechnical systems approach and cultural lens as a means of exploring the dynamics of a blended doctoral program. Blended learning environments were conceived of as sociotechnical systems, and blended programs were defined as programs that utilize multimodal means for the mediation of…
Descriptors: Educational Environment, Program Effectiveness, Computer Science, Online Courses
Pages: 1  |  ...  |  25  |  26  |  27  |  28  |  29  |  30  |  31  |  32  |  33  |  ...  |  56