NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers13
Practitioners2
Administrators1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 13 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Anand Jeyaraj – Journal of Information Systems Education, 2024
A significant activity in the business analytics process is enrichment, which deals with acquiring and combining data from external sources. While different strategies for enrichment are possible, it can be accomplished more efficiently through automation using Python scripts. Since business students may not be immersed in technology skills and…
Descriptors: Scaffolding (Teaching Technique), Business Administration Education, Data Analysis, Programming Languages
Peer reviewed Peer reviewed
Direct linkDirect link
Sharma, Madhav; Biros, David; Ayyalasomayajula, Surya; Dalal, Nikunj – Journal of Information Systems Education, 2020
Teaching introductory programming to IS students is challenging. The educational, technological, demographic, and cultural landscape has changed dramatically in recent years. The post-millennial generation has different needs and expectations in an era of open resources. Learning to program is perceived as difficult, teaching approaches are…
Descriptors: Introductory Courses, Programming, Computer Science Education, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Tekinerdogan, Bedir – Computer Science Education, 2011
Model-driven software development (MDSD) aims to support the development and evolution of software intensive systems using the basic concepts of model, metamodel, and model transformation. In parallel with the ongoing academic research, MDSD is more and more applied in industrial practices. After being accepted both by a broad community of…
Descriptors: Foreign Countries, Computer Software, Graduate Study, Industry
Peer reviewed Peer reviewed
Direct linkDirect link
Kim, Seung Han; Jeon, Jae Wook – IEEE Transactions on Education, 2009
The purpose of the course presented here is to introduce freshmen to embedded systems using LEGO Mindstorms, under an ANSI-C programming environment. The students build their own LEGO robots, make programs for them using ANSI-C, and operate them. By creating these LEGO robots, the students become more motivated, learning the basic concepts of…
Descriptors: Foreign Countries, Instructional Effectiveness, Learning Strategies, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Tan, Wee-Kek; Tan, Chuan-Hoo – Journal of Information Systems Education, 2010
Acquiring the knowledge to assemble an integrated Information System (IS) development process that is tailored to the specific needs of a project has become increasingly important. It is therefore necessary for educators to impart to students this crucial skill. However, Situational Method Engineering (SME) is an inherently complex process that…
Descriptors: Information Systems, Teaching Methods, Student Projects, Models
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kelley, Scott; Alger, Christianna; Deutschman, Douglas – Bioscene: Journal of College Biology Teaching, 2009
The importance of Bioinformatics tools and methodology in modern biological research underscores the need for robust and effective courses at the college level. This paper describes such a course designed on the principles of cooperative learning based on a computer software industry production model called "Extreme Programming" (EP).…
Descriptors: Biology, Information Science, Science Instruction, College Science
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Hsinchun; Li, Xin; Chau, M.; Ho, Yi-Jen; Tseng, Chunju – IEEE Transactions on Education, 2009
With the advent of the World Wide Web, many business applications that utilize data mining and text mining techniques to extract useful business information on the Web have evolved from Web searching to Web mining. It is important for students to acquire knowledge and hands-on experience in Web mining during their education in information systems…
Descriptors: Class Activities, Information Systems, Internet, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Nikolic, B.; Radivojevic, Z.; Djordjevic, J.; Milutinovic, V. – IEEE Transactions on Education, 2009
Courses in Computer Architecture and Organization are regularly included in Computer Engineering curricula. These courses are usually organized in such a way that students obtain not only a purely theoretical experience, but also a practical understanding of the topics lectured. This practical work is usually done in a laboratory using simulators…
Descriptors: Instructional Design, Evaluation Criteria, Science Laboratories, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Mentz, E.; van der Walt, J. L.; Goosen, L. – Computer Science Education, 2008
Based on their quantitative and qualitative investigations, the authors conclude that pair programming as a strategy for teaching student teachers could be made more effective through the incorporation of principles associated with cooperative learning. They substantiate this claim by referring to a literature study about the advantages and…
Descriptors: Preservice Teachers, Learning Strategies, Cooperative Learning, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Bunch, John M. – Journal of Information Systems Education, 2009
This paper presents a goal-based scenario approach to teaching introductory database concepts to undergraduates using two different scaffolding methods. One method, termed "worked-out examples," attempts to reduce extraneous cognitive load by requiring students to complete increasingly complex missing parts of worked out examples. The other…
Descriptors: Cognitive Processes, Difficulty Level, Undergraduate Students, Scaffolding (Teaching Technique)
Cheng, Chin-Chuan – 1995
A discussion of computer-assisted language learning focuses on management of individual learning processes. As distinct from a reference package, a computer-assisted teaching program has to assure that the student acquires and retains the complete information in the most efficient way, provide accurate and useful material, and pique the student's…
Descriptors: Classroom Techniques, Computer Assisted Instruction, Computer Managed Instruction, Computer Software
Ward, Anne W., Ed. – 1994
Designed for education leaders who seek to apply multimedia technology in schools, this guide addresses not only hardware and software matters, but also a wide range of related issues that schools face. Various facets of the topic are addressed in 12 papers presented under 8 broad headings: (1) Multimedia Technology (Racquel Skolnik and R. G.…
Descriptors: Authoring Aids (Programming), Case Studies, Computer Selection, Copyrights