NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Van Petegem, Charlotte; Deconinck, Louise; Mourisse, Dieter; Maertens, Rien; Strijbol, Niko; Dhoedt, Bart; De Wever, Bram; Dawyndt, Peter; Mesuere, Bart – Journal of Educational Computing Research, 2023
We present a privacy-friendly early-detection framework to identify students at risk of failing in introductory programming courses at university. The framework was validated for two different courses with annual editions taken by higher education students (N = 2 080) and was found to be highly accurate and robust against variation in course…
Descriptors: Pass Fail Grading, At Risk Students, Introductory Courses, Programming
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Karnalim, Oscar; Budi, Setia; Toba, Hapnes; Joy, Mike – Informatics in Education, 2019
Source code plagiarism is an emerging issue in computer science education. As a result, a number of techniques have been proposed to handle this issue. However, comparing these techniques may be challenging, since they are evaluated with their own private dataset(s). This paper contributes in providing a public dataset for comparing these…
Descriptors: Plagiarism, Computer Science Education, Comparative Analysis, Problem Solving
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Taherkhani, Ahmad; Malmi, Lauri – Journal of Educational Data Mining, 2013
In this paper, we present a method for recognizing algorithms from students programming submissions coded in Java. The method is based on the concept of "programming schemas" and "beacons". Schemas are high-level programming knowledge with detailed knowledge abstracted out, and beacons are statements that imply specific…
Descriptors: Programming, Mathematics, Computer Science Education, Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Werner, Laurie A.; Courte, Jill – Information Systems Education Journal, 2010
Despite advances in spam detection software, anti-spam laws, and increasingly sophisticated users, the number of successful phishing scams continues to grow. In addition to monetary losses attributable to phishing, there is also a loss of confidence that stifles use of online services. Using in-class activities in an introductory computer course…
Descriptors: Information Security, Crime, Prevention, Class Activities
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers