Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Science Education | 5 |
Design Requirements | 5 |
Models | 5 |
Computer Software | 3 |
Case Studies | 2 |
Student Educational Objectives | 2 |
Undergraduate Students | 2 |
Blended Learning | 1 |
College Seniors | 1 |
Computer Programs | 1 |
Computer Security | 1 |
More ▼ |
Source
ACM Transactions on Computing… | 1 |
Information Systems Education… | 1 |
International Journal of… | 1 |
Universal Journal of… | 1 |
Author
Ataizi, Murat | 1 |
Durak, Gürhan | 1 |
Eisenstadt, Marc | 1 |
Luburic, Nikola | 1 |
Milosavljevic, Branko | 1 |
Parsons, David | 1 |
Schwieger, Dana | 1 |
Sladic, Goran | 1 |
Slivka, Jelena | 1 |
Stockdale, Rosemary | 1 |
Surendran, Ken | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 4 |
Reports - Descriptive | 1 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Audience
Location
Missouri | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Luburic, Nikola; Sladic, Goran; Slivka, Jelena; Milosavljevic, Branko – ACM Transactions on Computing Education, 2019
With ever-greater reliance of the developed world on information and communication technologies, constructing secure software has become a top priority. To produce secure software, security activities need to be integrated throughout the software development lifecycle. One such activity is security design analysis (SDA), which identifies security…
Descriptors: Computer Security, Case Studies, Blended Learning, Models
Durak, Gürhan; Ataizi, Murat – Universal Journal of Educational Research, 2016
The purpose of this study was to design the course of Programming Languages-I online, which is given on face-to-face basis at undergraduate level. It is seen in literature that there is no detailed research on the preparation of a fully-online course directly based on an instructional design model. In this respect, depending on the ADDIE design…
Descriptors: Online Courses, Instructional Design, Programming Languages, Computer Science Education
Schwieger, Dana; Surendran, Ken – Information Systems Education Journal, 2013
One of the core courses in the IS2010 Model Curriculum Guideline is "IS Strategy, Management and Acquisition" ("ISMA"). The authors redesigned their pre-IS2010 model Information Technology Management (ITM) course to meet the skills development stated in the ISMA course. Since the IT discipline is changing rapidly, the technical…
Descriptors: Information Technology, Curriculum Design, Information Management, Computer Science Education
Parsons, David; Stockdale, Rosemary – International Journal of Virtual and Personal Learning Environments, 2012
Multi-User Virtual Environments (MUVEs) are the subject of increasing interest for educators and trainers. This article reports on a longitudinal project that seeks to establish a virtual agile software development workshop hosted in the Open Wonderland MUVE, designed to help learners to understand the basic principles of some core agile software…
Descriptors: Virtual Classrooms, Longitudinal Studies, Workshops, Computer System Design
Eisenstadt, Marc; And Others – 1981
These papers describe efforts toward the systematic improvement of a software environment called SOLO (Eisenstadt, 1978), which has been used with cognitive psychology students at the Open University in Great Britain and is geared towards the manipulation of assertional databases. The first paper, by Eisenstadt, Laubsch, and Kahney, provides an…
Descriptors: Computer Programs, Computer Science Education, Databases, Design Requirements