NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Luburic, Nikola; Sladic, Goran; Slivka, Jelena; Milosavljevic, Branko – ACM Transactions on Computing Education, 2019
With ever-greater reliance of the developed world on information and communication technologies, constructing secure software has become a top priority. To produce secure software, security activities need to be integrated throughout the software development lifecycle. One such activity is security design analysis (SDA), which identifies security…
Descriptors: Computer Security, Case Studies, Blended Learning, Models
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Durak, Gürhan; Ataizi, Murat – Universal Journal of Educational Research, 2016
The purpose of this study was to design the course of Programming Languages-I online, which is given on face-to-face basis at undergraduate level. It is seen in literature that there is no detailed research on the preparation of a fully-online course directly based on an instructional design model. In this respect, depending on the ADDIE design…
Descriptors: Online Courses, Instructional Design, Programming Languages, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Schwieger, Dana; Surendran, Ken – Information Systems Education Journal, 2013
One of the core courses in the IS2010 Model Curriculum Guideline is "IS Strategy, Management and Acquisition" ("ISMA"). The authors redesigned their pre-IS2010 model Information Technology Management (ITM) course to meet the skills development stated in the ISMA course. Since the IT discipline is changing rapidly, the technical…
Descriptors: Information Technology, Curriculum Design, Information Management, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Parsons, David; Stockdale, Rosemary – International Journal of Virtual and Personal Learning Environments, 2012
Multi-User Virtual Environments (MUVEs) are the subject of increasing interest for educators and trainers. This article reports on a longitudinal project that seeks to establish a virtual agile software development workshop hosted in the Open Wonderland MUVE, designed to help learners to understand the basic principles of some core agile software…
Descriptors: Virtual Classrooms, Longitudinal Studies, Workshops, Computer System Design
Eisenstadt, Marc; And Others – 1981
These papers describe efforts toward the systematic improvement of a software environment called SOLO (Eisenstadt, 1978), which has been used with cognitive psychology students at the Open University in Great Britain and is geared towards the manipulation of assertional databases. The first paper, by Eisenstadt, Laubsch, and Kahney, provides an…
Descriptors: Computer Programs, Computer Science Education, Databases, Design Requirements