Publication Date
In 2025 | 1 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
Education and Information… | 2 |
Computers & Education | 1 |
Informatics in Education | 1 |
Interactive Learning… | 1 |
Journal of Learning Analytics | 1 |
Author
Bo-Yang Shan | 1 |
Dios, R. | 1 |
Geller, J. | 1 |
Haipeng Wan | 1 |
Jakub Rudolf Mlynárik | 1 |
Juraj Hromkovic | 1 |
Karolína Dockalová Burská | 1 |
Martinez-Maldonado, Roberto | 1 |
Pishtari, Gerti | 1 |
Prieto, Luis P. | 1 |
Radek Ošlejšek | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Research | 5 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Secondary Education | 3 |
High Schools | 2 |
Elementary Education | 1 |
Higher Education | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Juraj Hromkovic; Regula Lacher – Informatics in Education, 2025
The design of algorithms is one of the hardest topics of high school computer science. This is mainly due to the universality of algorithms as solution methods that guarantee the calculation of a correct solution for all potentially infinitely many instances of an algorithmic problem. The goal of this paper is to present a comprehensible and…
Descriptors: Algorithms, Computer Science Education, High School Students, Teaching Methods
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Haipeng Wan; Xue Zhang; Xinxue Yang; Shan Li – Education and Information Technologies, 2024
This study investigated the impact of problematization-oriented scaffolding and structuring-oriented scaffolding, incorporated within instructional videos, on students' computational thinking and their performance in programming education. We recruited 86 participants from three senior classes at a high school. Each of the three classes was…
Descriptors: Scaffolding (Teaching Technique), Instructional Design, Thinking Skills, Computer Science Education
Shian-Shyong Tseng; Tsung-Yu Yang; Wen-Chung Shih; Bo-Yang Shan – Interactive Learning Environments, 2024
In this paper, to handle the problem of the quick evolution of cyber-security attacks, we developed the iMonsters board game and proposed the attack and defense knowledge self-evolving algorithm. Three versions of the iMonsters were launched in 2013, 2017, and 2019, respectively. Accordingly, the cyber-security ontology can be refined by the…
Descriptors: Educational Games, Computer Security, Computer Science Education, Game Based Learning
Pishtari, Gerti; Prieto, Luis P.; Rodriguez-Triana, Maria Jesus; Martinez-Maldonado, Roberto – Journal of Learning Analytics, 2022
This research was triggered by the identified need in literature for large-scale studies about the kinds of designs that teachers create for mobile learning (m-learning). These studies require analyses of large datasets of learning designs. The common approach followed by researchers when analyzing designs has been to manually classify them…
Descriptors: Scaling, Classification, Context Effect, Telecommunications

Dios, R.; Geller, J. – Computers & Education, 1998
Focuses on identifying the educational effects of "activity oriented" instructional techniques. Examines which instructional methods produce enhanced learning and comprehension. Discusses the problem of learning "sorting algorithms," a major topic in every Computer Science curriculum. Presents a low-tech, hands-on teaching method for sorting…
Descriptors: Active Learning, Algorithms, Computer Science Education, Experiential Learning
Vadaparty, K.; And Others – 1994
This paper presents the implications of an ongoing project on the design and development of multimedia instructional material for teaching and learning computer science topics at both graduate and undergraduate levels. Important pedagogical requirements that CAI software should satisfy include: (1) animation of the changes in tree topologies; (2)…
Descriptors: Algorithms, Animation, Computer Assisted Instruction, Computer Science Education