Publication Date
In 2025 | 1 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 9 |
Descriptor
Source
ACM Transactions on Computing… | 9 |
Author
Bowring, James | 1 |
Braught, Grant | 1 |
Broman, David | 1 |
Burke, Quinn | 1 |
Chun-Ying Chen | 1 |
Cutler, Barbara | 1 |
Dolog, Peter | 1 |
Gestwicki, Paul | 1 |
Goldschmidt, David | 1 |
Huss-Lederman, Steven | 1 |
Jazbo Beason | 1 |
More ▼ |
Publication Type
Journal Articles | 9 |
Reports - Research | 5 |
Reports - Descriptive | 3 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 6 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Malmi, Lauri; Sheard, Judy; Kinnunen, Päivi; Simon; Sinclair, Jane – ACM Transactions on Computing Education, 2023
Use of theory within a field of research provides the foundation for designing effective research programs and establishing a deeper understanding of the results obtained. This, together with the emergence of domain-specific theory, is often taken as an indicator of the maturity of any research area. This article explores the development and…
Descriptors: Learning Theories, Computer Science Education, Learning Processes, Models
Chun-Ying Chen – ACM Transactions on Computing Education, 2025
This study examined the effects of worked examples with different explanation types and novices' motivation on cognitive load, and how this subsequently influenced their programming problem-solving performance. Given the study's emphasis on both instructional approaches and learner motivation, the Cognitive Theory of Multimedia Learning served as…
Descriptors: Models, Learning Motivation, Cognitive Processes, Difficulty Level
Luburic, Nikola; Sladic, Goran; Slivka, Jelena; Milosavljevic, Branko – ACM Transactions on Computing Education, 2019
With ever-greater reliance of the developed world on information and communication technologies, constructing secure software has become a top priority. To produce secure software, security activities need to be integrated throughout the software development lifecycle. One such activity is security design analysis (SDA), which identifies security…
Descriptors: Computer Security, Case Studies, Blended Learning, Models
Tiffany Tseng; Matt J. Davidson; Luis Morales-Navarro; Jennifer King Chen; Victoria Delaney; Mark Leibowitz; Jazbo Beason; R. Benjamin Shapiro – ACM Transactions on Computing Education, 2024
Machine learning (ML) models are fundamentally shaped by data, and building inclusive ML systems requires significant considerations around how to design representative datasets. Yet, few novice-oriented ML modeling tools are designed to foster hands-on learning of dataset design practices, including how to design for data diversity and inspect…
Descriptors: Artificial Intelligence, Models, Data Processing, Design
Gestwicki, Paul; McNely, Brian – ACM Transactions on Computing Education, 2016
We define and describe the academic studio model for interdisciplinary, undergraduate, project-oriented education. This model brings faculty, students, and community partners together to investigate an openended academic question, and their collaboration yields an original product that represents their inquiry. The academic studio integrates agile…
Descriptors: Interdisciplinary Approach, Student Projects, Undergraduate Students, Teaching Methods
Vasilevskaya, Maria; Broman, David; Sandahl, Kristian – ACM Transactions on Computing Education, 2015
In a modern computing curriculum, large-project courses are essential to give students hands-on experience of working in a realistic software engineering project. Assessing such projects is, however, extremely challenging. There are various aspects and trade-offs of assessments that can affect course quality. Individual assessments may fairly…
Descriptors: Computer Science Education, Student Projects, Models, Active Learning
Braught, Grant; MacCormick, John; Bowring, James; Burke, Quinn; Cutler, Barbara; Goldschmidt, David; Krishnamoorthy, Mukkai; Turner, Wesley; Huss-Lederman, Steven; Mackellar, Bonnie; Tucker, Allen – ACM Transactions on Computing Education, 2018
Many computer science programs have capstone experiences or project courses that allow students to integrate knowledge from the full breadth of their major. Such capstone projects may be student-designed, instructor-designed, designed in conjunction with outside companies, or integrated with ongoing free and open source (FOSS) projects. The…
Descriptors: Computer Science Education, Open Source Technology, Computer Software, Social Values
Largent, David L. – ACM Transactions on Computing Education, 2016
To prepare graduates for today's work environment, they must be immersed in positive (and perhaps negative) small group experiences in their courses, which will in turn provide a basic understanding of how teams form and develop over time. In the fall of 2009, we started exploring how software development teams form and interact in a computer…
Descriptors: Student Attitudes, Cooperative Learning, Group Dynamics, Group Structure
Dolog, Peter; Thomsen, Lone Leth; Thomsen, Bent – ACM Transactions on Computing Education, 2016
Problem-Based Learning (PBL) has often been seen as an all-or-nothing approach, difficult to apply in traditional curricula based on traditional lectured courses with exercise and lab sessions. Aalborg University has since its creation in 1974 practiced PBL in all subjects, including computer science and software engineering, following a model…
Descriptors: Problem Based Learning, Teaching Methods, Computer Software, Computer Science Education