Publication Date
In 2025 | 1 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Problem Solving | 6 |
Technology | 6 |
Computer Science | 4 |
Computer Science Education | 3 |
Computer Security | 2 |
Interdisciplinary Approach | 2 |
Achievement Gains | 1 |
Animals | 1 |
Architecture | 1 |
Brain | 1 |
Career Pathways | 1 |
More ▼ |
Source
Education, Citizenship and… | 1 |
Information Systems Education… | 1 |
Journal of Interdisciplinary… | 1 |
Mathematics Teacher | 1 |
ProQuest LLC | 1 |
Author
Adiv Gal | 1 |
Anne Marie Sowder | 1 |
Beckman, Joseph W. | 1 |
Candido Cabo | 1 |
Christopher Swift | 1 |
Elliot, Noreen | 1 |
Geoff D. Zylstra | 1 |
Jill Belli | 1 |
Kempner, Yulia | 1 |
Kortsarts, Yana | 1 |
Robin Michals | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Elementary Education | 1 |
Grade 5 | 1 |
Intermediate Grades | 1 |
Middle Schools | 1 |
Audience
Location
Israel | 1 |
New York (New York) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Adiv Gal – Education, Citizenship and Social Justice, 2025
This qualitative study examined the perceptions of 42 fifth-grade students (ages 11-12) along with 8 staff members, 9 ornithologists, and 10 high-tech experts who participated in a hackathon event. This was the culmination of a learning process designed to find environmental, technological, and humane solutions to the competition between the…
Descriptors: Computer Science, Grade 5, Elementary School Students, Group Activities
Geoff D. Zylstra; Jill Belli; Candido Cabo; Sean P. MacDonald; Robin Michals; Anne Marie Sowder; Christopher Swift – Journal of Interdisciplinary Studies in Education, 2024
The humanities have the potential to enhance STEM curriculum in career-oriented professional degree programs. As part of a larger college-wide initiative to develop interdisciplinary curricula, the National Endowment for the Humanities (NEH) awarded a grant to New York City College of Technology to explore the relationship between the humanities…
Descriptors: Humanities, Educational Environment, STEM Education, Curriculum
Beckman, Joseph W. – ProQuest LLC, 2019
Information security practitioners and researchers who possess sufficient depth of conceptual understanding to reconstitute systems after attacks or adapt information security concepts to novel situations are in short supply. Education of new information security professionals with sufficient conceptual depth is one method by which this shortage…
Descriptors: Achievement Gains, Cognitive Processes, Coding, Technology
Kortsarts, Yana; Kempner, Yulia – Information Systems Education Journal, 2015
Steganography is the art and science of concealing communication. The goal of steganography is to hide the very existence of information exchange by embedding messages into unsuspicious digital media covers. Cryptography, or secret writing, is the study of the methods of encryption, decryption and their use in communications protocols.…
Descriptors: Introductory Courses, Programming, Computer Science Education, Technology

Strauss, Aaron – Mathematics Teacher, 1976
The early development of computers and computer technology is traced, and the relationship of the computer and mathematics is discussed. (SD)
Descriptors: Computer Science, Computer Science Education, Computers, Man Machine Systems
Elliot, Noreen – 1997
The typical undergraduate program in computer science includes an introduction to hardware and operating systems, file processing and database organization, data communication and networking, and programming. However, many graduates may lack the ability to integrate the concepts "learned" into a skill set and pattern of approaching problems that…
Descriptors: College Students, Communication Skills, Computer Science, Employment Opportunities