Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Models | 4 |
Computer Science Education | 3 |
Design | 2 |
Educational Philosophy | 2 |
Active Learning | 1 |
Adolescents | 1 |
Artificial Intelligence | 1 |
Attribution Theory | 1 |
Barriers | 1 |
Blended Learning | 1 |
Case Studies | 1 |
More ▼ |
Source
ACM Transactions on Computing… | 4 |
Author
Bruce, Kim B. | 1 |
Cupper, Robert D. | 1 |
Jazbo Beason | 1 |
Jennifer King Chen | 1 |
Luburic, Nikola | 1 |
Luis Morales-Navarro | 1 |
Mark Leibowitz | 1 |
Matt J. Davidson | 1 |
Milosavljevic, Branko | 1 |
Pajunen, John | 1 |
R. Benjamin Shapiro | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
New York (New York) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tedre, Matti; Pajunen, John – ACM Transactions on Computing Education, 2023
A rich body of empirically grounded results and a solid theory base have often been viewed as signs of a mature discipline. Many disciplines have frequently debated what they should accept as legitimate kinds of theories, the proper roles of theory, and appropriate reference disciplines. Computing education research (CER) in particular has seen a…
Descriptors: Educational Theories, Computer Science Education, Educational Research, Educational Philosophy
Tiffany Tseng; Matt J. Davidson; Luis Morales-Navarro; Jennifer King Chen; Victoria Delaney; Mark Leibowitz; Jazbo Beason; R. Benjamin Shapiro – ACM Transactions on Computing Education, 2024
Machine learning (ML) models are fundamentally shaped by data, and building inclusive ML systems requires significant considerations around how to design representative datasets. Yet, few novice-oriented ML modeling tools are designed to foster hands-on learning of dataset design practices, including how to design for data diversity and inspect…
Descriptors: Artificial Intelligence, Models, Data Processing, Design
Luburic, Nikola; Sladic, Goran; Slivka, Jelena; Milosavljevic, Branko – ACM Transactions on Computing Education, 2019
With ever-greater reliance of the developed world on information and communication technologies, constructing secure software has become a top priority. To produce secure software, security activities need to be integrated throughout the software development lifecycle. One such activity is security design analysis (SDA), which identifies security…
Descriptors: Computer Security, Case Studies, Blended Learning, Models
Bruce, Kim B.; Cupper, Robert D.; Scot Drysdale, Robert L. – ACM Transactions on Computing Education, 2010
With the support of a grant from the Sloan Foundation, nine computer scientists from liberal arts colleges came together in October, 1984 to form the Liberal Arts Computer Science Consortium (LACS) and to create a model curriculum appropriate for liberal arts colleges. Over the years the membership has grown and changed, but the focus has remained…
Descriptors: Computer Science Education, Computer Science, Consortia, Liberal Arts