Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
College Instruction | 4 |
Computer Science Education | 4 |
Computer Security | 4 |
Computer Software | 4 |
Instructional Design | 4 |
Instructional Effectiveness | 4 |
Programming | 4 |
Computer Assisted Instruction | 3 |
Electronic Learning | 3 |
Information Technology | 3 |
Case Studies | 2 |
More ▼ |
Source
ACM Transactions on Computing… | 1 |
Educational Technology &… | 1 |
Interactive Technology and… | 1 |
International Association for… | 1 |
Author
Archer, Ricky | 1 |
Campbell, Jackie | 1 |
Chen, Li-Chiou | 1 |
Qadah, Yaseen | 1 |
Tao, Lixin | 1 |
Vega, Percy | 1 |
Xu, Jinsheng | 1 |
Yu, Huiming | 1 |
Yuan, Xiaohong | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Collected Works - Proceedings | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Elementary Secondary Education | 1 |
Audience
Teachers | 1 |
Location
United Kingdom | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers