Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Problem Solving | 5 |
Technology | 5 |
Computer Science | 3 |
Computer Science Education | 3 |
Achievement Gains | 1 |
Architecture | 1 |
Brain | 1 |
Career Pathways | 1 |
Coding | 1 |
Cognitive Processes | 1 |
College Faculty | 1 |
More ▼ |
Source
Information Systems Education… | 1 |
Journal of Interdisciplinary… | 1 |
Mathematics Teacher | 1 |
ProQuest LLC | 1 |
Author
Anne Marie Sowder | 1 |
Beckman, Joseph W. | 1 |
Candido Cabo | 1 |
Christopher Swift | 1 |
Elliot, Noreen | 1 |
Geoff D. Zylstra | 1 |
Jill Belli | 1 |
Kempner, Yulia | 1 |
Kortsarts, Yana | 1 |
Robin Michals | 1 |
Sean P. MacDonald | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Audience
Location
New York (New York) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Geoff D. Zylstra; Jill Belli; Candido Cabo; Sean P. MacDonald; Robin Michals; Anne Marie Sowder; Christopher Swift – Journal of Interdisciplinary Studies in Education, 2024
The humanities have the potential to enhance STEM curriculum in career-oriented professional degree programs. As part of a larger college-wide initiative to develop interdisciplinary curricula, the National Endowment for the Humanities (NEH) awarded a grant to New York City College of Technology to explore the relationship between the humanities…
Descriptors: Humanities, Educational Environment, STEM Education, Curriculum
Beckman, Joseph W. – ProQuest LLC, 2019
Information security practitioners and researchers who possess sufficient depth of conceptual understanding to reconstitute systems after attacks or adapt information security concepts to novel situations are in short supply. Education of new information security professionals with sufficient conceptual depth is one method by which this shortage…
Descriptors: Achievement Gains, Cognitive Processes, Coding, Technology
Kortsarts, Yana; Kempner, Yulia – Information Systems Education Journal, 2015
Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…
Descriptors: Introductory Courses, Programming, Computer Science Education, Technology

Strauss, Aaron – Mathematics Teacher, 1976
The early development of computers and computer technology is traced, and the relationship of the computer and mathematics is discussed. (SD)
Descriptors: Computer Science, Computer Science Education, Computers, Man Machine Systems
Elliot, Noreen – 1997
The typical undergraduate program in computer science includes an introduction to hardware and operating systems, file processing and database organization, data communication and networking, and programming. However, many graduates may lack the ability to integrate the concepts "learned" into a skill set and pattern of approaching problems that…
Descriptors: College Students, Communication Skills, Computer Science, Employment Opportunities