Publication Date
| In 2026 | 0 |
| Since 2025 | 431 |
| Since 2022 (last 5 years) | 2019 |
| Since 2017 (last 10 years) | 3992 |
| Since 2007 (last 20 years) | 6138 |
Descriptor
Source
Author
| Barnes, Tiffany | 22 |
| Armoni, Michal | 18 |
| Yadav, Aman | 17 |
| Gal-Ezer, Judith | 16 |
| Malmi, Lauri | 15 |
| Xinogalos, Stelios | 15 |
| Soh, Leen-Kiat | 14 |
| Frydenberg, Mark | 13 |
| Hazzan, Orit | 13 |
| Kafai, Yasmin B. | 13 |
| Howe, Richard D. | 12 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 724 |
| Teachers | 401 |
| Researchers | 151 |
| Policymakers | 97 |
| Administrators | 71 |
| Students | 66 |
| Media Staff | 11 |
| Parents | 9 |
| Community | 6 |
| Counselors | 1 |
| Support Staff | 1 |
| More ▼ | |
Location
| Turkey | 251 |
| Australia | 167 |
| United Kingdom | 153 |
| Canada | 131 |
| China | 118 |
| Taiwan | 118 |
| California | 115 |
| United States | 96 |
| Germany | 88 |
| Spain | 81 |
| Finland | 78 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 2 |
| Does not meet standards | 1 |
Gabriella Colajanni; Alessandro Gobbi; Marinella Picchi; Alice Raffaele; Eugenia Taranto – INFORMS Transactions on Education, 2025
In this paper, we finish describing the project and the experimentation of "Ricerca Operativa Applicazioni Reali" (ROAR; in English, Real Applications of Operations Research), a three-year project for higher secondary schools. ROAR is composed of three teaching units addressed to grades 10, 11, and 12, respectively. To improve students'…
Descriptors: Operations Research, High School Students, Grade 12, STEM Education
Verica R. Milutinovic; Ivana Obradovic; Suzana Ðordevic – Educational Studies, 2025
Many countries are revising their computing curricula, including Serbia, where coding became a core subject in primary schools in 2017/2018. Gamification is a common teaching method, yet little research explores primary students' motivation to learn coding through gamification. This study aims to investigate the factors that influence primary…
Descriptors: Foreign Countries, Elementary School Students, Gamification, Coding
Deepti Reddy Patil; Sridhar Iyer; Sasikumar – ACM Transactions on Computing Education, 2025
Design problems are often ill-structured as the requirements are broadly defined and have multiple correct solutions. Experts solve such problems by applying various cognitive and metacognitive skills before the formal specifications and solution designs are documented. Novices often need help solving ill-structured design problems as they lack…
Descriptors: Educational Environment, Problem Solving, Design, Technology Uses in Education
Sophia Krause-Levy; Andrew Petersen; Oladele Oladunjoye Campbell; William G. Griswold; Leo Porter; Oluwatoyin Adelakun-Adeyemo; Jennifer Campbell; Michelle Craig; Adrienne Decker; Sebastian Dziallas; Carrie Demmans Epp; David R. Gibson; Yekaterina Kharitonova; Devorah Kletenik; David L. Largent; Emma McDonald; Brian M. McSkimming; Tina L. Peterson; Caroline Sih; Cynthia Taylor; Neena Thota – ACM Transactions on Computing Education, 2025
Motivation: In computing, Impostor Phenomenon (IP) has been viewed as a problem for many years, but little research has been done to show its prevalence. In 2020, IP in computing began to be explored at single institutions. The results showed that IP is prevalent among undergraduate and graduate students in computing courses and that the rates of…
Descriptors: Computer Science Education, Higher Education, College Students, Self Concept
Olha V. Barna; Olena H. Kuzminska; Serhiy O. Semerikov – Discover Education, 2025
This study investigates how integrating STEM content in computer science education enhances the implementation of Universal Design for Learning (UDL) principles and its impact on digital competence development in Ukrainian secondary schools. The digital transformation of education demands innovative pedagogical approaches that accommodate diverse…
Descriptors: STEM Education, Computer Science Education, Access to Education, Technological Literacy
Counter-Hegemonic Computing: Toward Computer Science Education for Value Generation and Emancipation
Eglash, Ron; Bennett, Audrey; Cooke, Laquana; Babbitt, William; Lachney, Michael – ACM Transactions on Computing Education, 2021
Students' lives, both in and out of school, are full of different forms of value. Wealthy students enjoy value in the form of financial capital; their fit to hegemonic social practices; excellent health care and so on. Low-income students, especially those from African American, Native American, and Latinx communities, often lack access to those…
Descriptors: Computer Science Education, African American Community, Cultural Influences, Community Development
Duran, Rodrigo; Sorva, Juha; Seppälä, Otto – ACM Transactions on Computing Education, 2021
We propose a framework for identifying, organizing, and communicating learning objectives that involve program semantics. In this framework, detailed learning objectives are written down as rules of program behavior (RPBs). RPBs are teacher-facing statements that describe what needs to be learned about the behavior of a specific sort of programs.…
Descriptors: Behavioral Objectives, Computer Science Education, Programming, Evaluation Criteria
Mertala, Pekka – British Journal of Educational Technology, 2021
While computing has been (re)introduced into the basic education curricula in various countries, its actual implementation appears to be inconsistent. There are schools in which computing education is commonplace, while the implementation seems to be lagging behind in others. There is emerging evidence that some teachers do not consider computing…
Descriptors: Multiple Literacies, Computer Science Education, Elementary Secondary Education, Teaching Methods
Shi, Yang; Mao, Ye; Barnes, Tiffany; Chi, Min; Price, Thomas W. – International Educational Data Mining Society, 2021
Automatically detecting bugs in student program code is critical to enable formative feedback to help students pinpoint errors and resolve them. Deep learning models especially code2vec and ASTNN have shown great success for "large-scale" code classification. It is not clear, however, whether they can be effectively used for bug…
Descriptors: Artificial Intelligence, Program Effectiveness, Coding, Computer Science Education
Richard W. Lightcap III – ProQuest LLC, 2021
Nationally, a shortage exists of qualified cybersecurity persons entering the field, posing challenges for higher education institutions in locating qualified educators to help fill the gap. A wealth of literature discusses the needs of students, yet literature outlining qualities of attracting graduates to become educators is lacking. The purpose…
Descriptors: Phenomenology, Computer Security, Career Change, Postsecondary Education
Starkey, Louise; Yates, Anne; de Roiste, Mairead; Lundqvist, Karsten; Ormond, Adreanne; Randal, John; Sylvester, Allan – Educational Technology Research and Development, 2023
Disciplines in Higher Education have their own interpretations of what is essential knowledge that influences what is taught, how teaching occurs, and the role of digital tools. Disciplinary culture is dynamic and evolving, informed by disciplinary research and technology improvement. During the COVID-19 pandemic, digital solutions enabled ongoing…
Descriptors: Undergraduate Study, College Faculty, Educational Technology, Statistics
Lin, Judith C. P. – Higher Education: The International Journal of Higher Education Research, 2023
In higher education institutions, critical race theory (CRT) is known to be associated with fields that study racial disparities or systemic oppression such as law, education, and ethnic studies. The impression that CRT is unrelated to fields like business or computer science may have led scholars and practitioners from these disciplines to put…
Descriptors: Racism, Critical Race Theory, Higher Education, Health Sciences
Hao, Xiaoxin; Xu, Zhiyi; Guo, Mingyue; Hu, Yuzheng; Geng, Fengji – International Journal of STEM Education, 2023
Background: Coding has become an integral part of STEM education. However, novice learners face difficulties in processing codes within embedded structures (also termed nested structures). This study aimed to investigate the cognitive mechanism underlying the processing of embedded coding structures based on hierarchical complexity theory, which…
Descriptors: Cognitive Processes, Difficulty Level, Programming, Computer Science Education
Miedema, Daphne; Fletcher, George; Aivaloglou, Efthimia – ACM Transactions on Computing Education, 2023
Prior studies in the Computer Science education literature have illustrated that novices make many mistakes in composing SQL queries. Query formulation proves to be difficult for students. Only recently, some headway was made towards understanding why SQL leads to so many mistakes, by uncovering student misconceptions. In this article, we shed new…
Descriptors: Computer Science Education, Novices, Misconceptions, Programming Languages
Collins, Jazmin; Ford, Vitaly – Journal of Cybersecurity Education, Research and Practice, 2023
The use of the Capture the Flag (CTF)-style competitions has grown popular in a variety of environments as a method to improve or reinforce cybersecurity techniques. However, while these competitions have shown promise in student engagement, enjoyment, and the teaching of essential workforce cybersecurity concepts, many of these CTF challenges…
Descriptors: Computer Security, Computer Science Education, Coding, Competition

Peer reviewed
Direct link
