NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
No Child Left Behind Act 20011
What Works Clearinghouse Rating
Showing 1 to 15 of 33 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Oscar Karnalim; Hapnes Toba; Meliana Christianti Johan – Education and Information Technologies, 2024
Artificial Intelligence (AI) can foster education but can also be misused to breach academic integrity. Large language models like ChatGPT are able to generate solutions for individual assessments that are expected to be completed independently. There are a number of automated detectors for AI assisted work. However, most of them are not dedicated…
Descriptors: Artificial Intelligence, Academic Achievement, Integrity, Introductory Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Cheers, Hayden; Lin, Yuqing – Computer Science Education, 2023
Background and Context: Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, such tools do not identify plagiarism, nor suggest what assignment submissions are suspicious of plagiarism. Source code plagiarism…
Descriptors: Plagiarism, Programming, Computer Science Education, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Omer, Uzma; Tehseen, Rabia; Farooq, Muhammad Shoaib; Abid, Adnan – Education and Information Technologies, 2023
Learning analytics (LA) is a significant field of study to examine and identify difficulties the novice programmers face while learning how to program. Despite producing notable research by the community in the specified area, rare work is observed to synthesize these research efforts and discover the dimensions that guide the future research of…
Descriptors: Programming, Learning Analytics, Educational Research, Data
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cheers, Hayden; Lin, Yuqing; Yan, Weigen – Informatics in Education, 2023
Source code plagiarism is a common occurrence in undergraduate computer science education. Many source code plagiarism detection tools have been proposed to address this problem. However, most of these tools only measure the similarity between assignment submissions, and do not actually identify which are suspicious of plagiarism. This work…
Descriptors: Plagiarism, Assignments, Computer Software, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Dong, Yihuan; Marwan, Samiha; Shabrina, Preya; Price, Thomas; Barnes, Tiffany – International Educational Data Mining Society, 2021
Over the years, researchers have studied novice programming behaviors when doing assignments and projects to identify struggling students. Much of these efforts focused on using student programming and interaction features to predict student success at a course level. While these methods are effective at early detection of struggling students in…
Descriptors: Navigation (Information Systems), Academic Achievement, Learner Engagement, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Van Petegem, Charlotte; Deconinck, Louise; Mourisse, Dieter; Maertens, Rien; Strijbol, Niko; Dhoedt, Bart; De Wever, Bram; Dawyndt, Peter; Mesuere, Bart – Journal of Educational Computing Research, 2023
We present a privacy-friendly early-detection framework to identify students at risk of failing in introductory programming courses at university. The framework was validated for two different courses with annual editions taken by higher education students (N = 2 080) and was found to be highly accurate and robust against variation in course…
Descriptors: Pass Fail Grading, At Risk Students, Introductory Courses, Programming
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marwan, Samiha; Shi, Yang; Menezes, Ian; Chi, Min; Barnes, Tiffany; Price, Thomas W. – International Educational Data Mining Society, 2021
Feedback on how students progress through completing subgoals can improve students' learning and motivation in programming. Detecting subgoal completion is a challenging task, and most learning environments do so either with "expert-authored" models or with "data-driven" models. Both models have advantages that are…
Descriptors: Expertise, Models, Feedback (Response), Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Schoeman, Marthie – Perspectives in Education, 2019
Due to the character of programming languages, reading ability may have more impact on learning to program than on learning in other subjects. This paper describes an exploratory study of the relationship between reading skills, as perceived through eye tracking, and the ability to program. An empirical investigation into this relationship…
Descriptors: Reading Skills, Predictor Variables, Programming, Novices
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tsabari, Stav; Segal, Avi; Gal, Kobi – International Educational Data Mining Society, 2023
Automatically identifying struggling students learning to program can assist teachers in providing timely and focused help. This work presents a new deep-learning language model for predicting "bug-fix-time", the expected duration between when a software bug occurs and the time it will be fixed by the student. Such information can guide…
Descriptors: College Students, Computer Science Education, Programming, Error Patterns
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Varga, Erika B.; Sátán, Ádám – Hungarian Educational Research Journal, 2021
The purpose of this paper is to investigate the pre-enrollment attributes of first-year students at Computer Science BSc programs of the University of Miskolc, Hungary in order to find those that mostly contribute to failure on the Programming Basics first-semester course and, consequently to dropout. Our aim is to detect at-risk students early,…
Descriptors: Identification, At Risk Students, Computer Science Education, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
LópezLeiva, Carlos A.; Noriega, Gabino; Celedón-Pattichis, Sylvia; Pattichis, Marios S. – Teachers College Record, 2022
Background/Context: Computer programming is rarely accessible to K-12 students, especially for those from culturally and linguistically diverse backgrounds. Middle school age is a transitioning time when adolescents are more likely to make long-term decisions regarding their academic choices and interests. Having access to productive and positive…
Descriptors: Hispanic American Students, Student Experience, Mathematics Education, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Novak, Matija; Joy, Mike; Kermek, Dragutin – ACM Transactions on Computing Education, 2019
Teachers deal with plagiarism on a regular basis, so they try to prevent and detect plagiarism, a task that is complicated by the large size of some classes. Students who cheat often try to hide their plagiarism (obfuscate), and many different similarity detection engines (often called plagiarism detection tools) have been built to help teachers.…
Descriptors: Plagiarism, Computer Software, Computer Software Evaluation, College Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Karnalim, Oscar; Budi, Setia; Toba, Hapnes; Joy, Mike – Informatics in Education, 2019
Source code plagiarism is an emerging issue in computer science education. As a result, a number of techniques have been proposed to handle this issue. However, comparing these techniques may be challenging, since they are evaluated with their own private dataset(s). This paper contributes in providing a public dataset for comparing these…
Descriptors: Plagiarism, Computer Science Education, Comparative Analysis, Problem Solving
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kermek, Dragutin; Novak, Matija – Informatics in Education, 2016
In programming courses there are various ways in which students attempt to cheat. The most commonly used method is copying source code from other students and making minimal changes in it, like renaming variable names. Several tools like Sherlock, JPlag and Moss have been devised to detect source code plagiarism. However, for larger student…
Descriptors: Plagiarism, Programming, Assignments, Cheating
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pelánek, Radek; Effenberger, Tomáš; Kukucka, Adam – Journal of Educational Data Mining, 2022
We study the automatic identification of educational items worthy of content authors' attention. Based on the results of such analysis, content authors can revise and improve the content of learning environments. We provide an overview of item properties relevant to this task, including difficulty and complexity measures, item discrimination, and…
Descriptors: Item Analysis, Identification, Difficulty Level, Case Studies
Previous Page | Next Page »
Pages: 1  |  2  |  3