NotesFAQContact Us
Collection
Advanced
Search Tips
Location
Indiana1
Norway1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 13 results Save | Export
Alannah Oleson – ProQuest LLC, 2023
To realize more equitable technology futures, it is not enough to simply adapt technology to be more inclusive "after" it is created. We will also need to equip technology creators with the skills they need to critically reflect upon bias and exclusion "during" the technology design process. The question of how to best to…
Descriptors: Computation, Computer Science Education, Inclusion, Decision Making
Peer reviewed Peer reviewed
Direct linkDirect link
Christine Wusylko; Kara Dawson; Pavlo Antonenko; Zhen Xu – Journal of Technology and Teacher Education, 2024
Cybersecurity educational efforts are urgently needed to introduce young people to the profession and give students and teachers cybersecurity knowledge to protect themselves from increasing cybercrime. In this study, 56 elementary preservice teachers participated in a 3-hour intervention within a technology integration course that introduced them…
Descriptors: Computer Security, Technology, Preservice Teacher Education, Preservice Teachers
Beckman, Joseph W. – ProQuest LLC, 2019
Information security practitioners and researchers who possess sufficient depth of conceptual understanding to reconstitute systems after attacks or adapt information security concepts to novel situations are in short supply. Education of new information security professionals with sufficient conceptual depth is one method by which this shortage…
Descriptors: Achievement Gains, Cognitive Processes, Coding, Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Havenga, Marietjie; Drevin, Lynette – International Association for Development of the Information Society, 2020
Although postgraduate students are required to be self-directed, this is not always the case. The aims of this study were twofold. Firstly, we investigated whether the use of problem-based projects supported students in implementing different cryptography algorithms as part of a group assignment. Secondly, we determined to which extent the use of…
Descriptors: Problem Based Learning, Independent Study, Graduate Students, Technology
Gusev, Dmitri A.; Swanson, Dewey A. – Association Supporting Computer Users in Education, 2017
Facing the need to introduce new approaches to teaching the art of programming to undergraduate Computer and Information Technology (CIT) students as part of the transition of the former Purdue College of Technology to the novel concept and status of Purdue Polytechnic, we came up with the idea of offering a pilot 300-level course entitled…
Descriptors: Educational Technology, Technology Uses in Education, Undergraduate Study, Programming
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jafar, Musa; Babb, Jeffry – Information Systems Education Journal, 2012
In this paper we present an artifacts-based approach to teaching a senior level Object-Oriented Analysis and Design course. Regardless of the systems development methodology and process model, and in order to facilitate communication across the business modeling, analysis, design, construction and deployment disciplines, we focus on (1) the…
Descriptors: Data Analysis, Design, Systems Development, Models
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bers, Marina U. – Early Childhood Research & Practice, 2010
This article describes the TangibleK robotics program for young children. Based on over a decade of research, this program is grounded on the belief that teaching children about the human-made world, the realm of technology and engineering, is as important as teaching them about the natural world, numbers, and letters. The TangibleK program uses…
Descriptors: Young Children, Computer Science, Engineering, Kindergarten
Peer reviewed Peer reviewed
Direct linkDirect link
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Peer reviewed Peer reviewed
Berleur, Jacques – Impact of Science on Society, 1978
Questions are raised which cover a wide range of epistemological, cultural, ethical, and practical problems related to the teaching of informatics. (BB)
Descriptors: Computer Science, Educational Philosophy, Information Science, Information Systems
Peer reviewed Peer reviewed
Nold, Ellen W. – College Composition and Communication, 1975
Computers can be programed for humanistic objectives.
Descriptors: Computer Assisted Instruction, Computer Programs, Computer Science, Computers
Salzmann, C.; Latchman, H. A.; Gillet, D.; Crisalle, O. D. – 1998
A prototype system based on an inverted pendulum is used to study the Quality of Service and discuss requirements of remote-experimentation systems utilized for carrying out control engineering experiments over the Internet. This class of applications involves the transmission over the network of a variety of data types with their own peculiar…
Descriptors: Computer Science Education, Computer Uses in Education, Distance Education, Higher Education
Bork, Alfred – Technological Horizons in Education, 1989
Discusses Norway's effort to determine what steps should be taken following its National Program for Computers in Education. Reports that this was the first time an international organization was chosen to make educational recommendations to a government. Lists characteristics of the Norwegian National Program and summarizes recommendations of the…
Descriptors: Computer Science Education, Computer Uses in Education, Curriculum Design, Curriculum Development
Peer reviewed Peer reviewed
McDonough, Jo – ELT Journal, 1998
New textbooks for teaching English for Special Purposes (ESP) are reviewed, including texts for science and technology, computing, engineering, and electronics as well as a guide to general classroom techniques and activities for ESP teachers. Criteria for evaluating and selecting instructional materials are also addressed briefly. (MSE)
Descriptors: Audiovisual Aids, Classroom Techniques, Computer Science, Educational Strategies