NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 46 to 60 of 139,650 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Carmen Flury; Michael Geiss – Paedagogica Historica: International Journal of the History of Education, 2025
This article examines the historical contribution of the German Informatics Society (GI) to the establishment of computer education in German schools. It highlights the role of societal interests, international developments, public and professional debates, and technological change in the GI's educational policy recommendations. The historical…
Descriptors: Computer Science Education, Educational History, Educational Policy, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Seungmin Lee – Educational Technology Research and Development, 2025
This study investigated the effectiveness of localized learning content (LLC) in enhancing computational thinking (CT) skills and learning motivation among 6th-grade elementary school students in Busan, South Korea. In contrast to conventional methodological approaches, our research focuses on the transformative power of culturally and…
Descriptors: Computer Software, Computer Uses in Education, Computer Science Education, Computation
Peer reviewed Peer reviewed
Direct linkDirect link
Andreas Marougkas; Christos Troussas; Akrivi Krouska; Cleo Sgouropoulou – Smart Learning Environments, 2025
Virtual Reality has proven to be highly promising within the field of learning. Most VR learning methods do not effectively implement pedagogical models or adapt to the individual's learning style. This research aims to bridge this gap by integrating Fuzzy Cognitive Maps (FCMs), Flow Theory and Gamification within an educational Virtual Reality…
Descriptors: Computer Simulation, Computer Games, Educational Games, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Krish Pillai; Marcia Lovas – International Society for Technology, Education, and Science, 2023
A typical first computer science course (CS1) introduces the student to coding conventions, variables, methods, control structures, conditionals, and the semantics of classes and objects. Advanced concepts of inheritance, polymorphism, abstract classes, interfaces, and their use in the design process, are covered in a second-level course (CS2).…
Descriptors: Computer Games, Educational Games, Teaching Methods, Technology Uses in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to data theft or other malicious activities. While various methods exist for combating wormhole…
Descriptors: Telecommunications, Computer Networks, Computer Security, Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Davis Krumins; Sandra Schumann; Veiko Vunder; Rauno Põlluäär; Kristjan Laht; Renno Raudmäe; Alvo Aabloo; Karl Kruusamäe – IEEE Transactions on Learning Technologies, 2024
Teaching robotics with the robot operating system (ROS) is valuable for instating good programming practices but requires significant setup steps from the learner. Providing a ready-made ROS learning environment over the web can make robotics more accessible; however, most of the previous remote labs have abstracted the authentic ROS developer…
Descriptors: Teaching Methods, Robotics, Programming, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sehla Ertan; T. Volkan Yüzer – Journal of Educational Technology and Online Learning, 2024
Open and distance learning (ODL) activities aim to meet the expectations and needs of different individuals, societies, and systems by ensuring the continuation of learning with a lifelong learning philosophy and an egalitarian policy for everyone, regardless of time and place. Support services, which address the differentiated expectations and…
Descriptors: Computer Security, Open Education, Distance Education, Technical Support
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Herminio Bodon; Vishesh Kumar; Marcelo Worsley – ACM Transactions on Computing Education, 2025
Objectives: Athletics and sports represent a focal part of adolescence for millions of youth around the world. However, opportunities to engage in computer science (CS) learning experiences are less prevalent, particularly among Hispanic and low-income communities. Recently, researchers have explored ways to bridge these, seemingly, disparate…
Descriptors: Design, Computer Science Education, Physical Education, Athletics
Peer reviewed Peer reviewed
Direct linkDirect link
Jacob Davidsen; Rolf Steier – International Journal of Research & Method in Education, 2025
Methodological advancements for the study of learning processes are both shaped by and drivers of technology developments. Interaction Analysis (IA), as a core methodological approach over the past three decades is reflective of this relationship and can be understood by examining moves from analogue video tapes, to digital media, computational…
Descriptors: Educational Research, Interaction, Research Methodology, Computer Use
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frederic Salmen; Sergej Görzen; René Röpke; Ulrik Schroeder – International Association for Development of the Information Society, 2025
FAIR (findable, accessible, interoperable, reusable) research data including software have become a major point of discussion for the educational technology (EdTech) community in recent years. For software, the community has been investigating these issues since its inception in the 90s and 2000s, first starting with learning objects. In this…
Descriptors: Educational Technology, Computer Uses in Education, Computer Software, STEM Education
Peer reviewed Peer reviewed
Direct linkDirect link
Cyril Brom; Tereza Hannemann; Tereza Tetourová; Anna Drobná; Nikol Kopánková; Kristina Volná; Katerina Kacerovská; Filip Dechterenko; Pavel Ježek; Tereza Stárková – International Journal of Technology and Design Education, 2024
Primary school children frequently use digital devices, which can be infected by computer viruses. In this mixed methods paper with two studies (N = 278 + 114), we examined 8-year-olds' preconceptions about computer viruses and protection against them; how to teach these children about said topics using three different, 30-min-long,…
Descriptors: Computers, Children, Computer Security, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Christiana Karousiou – Educational Media International, 2025
This research study explores the challenges and barriers in school digital transformation based on the perspectives and experiences of school leaders within the Republic of Cyprus. This study employs a qualitative research approach, using interviews to collect insights from 11 purposively selected primary and secondary school leaders. The…
Descriptors: Administrators, Elementary Secondary Education, Foreign Countries, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Sarthak Punj; Poorvi Kejriwal; S. P. Raja – International Journal of Learning and Change, 2024
Technology is advancing and metaverse is gaining popularity. The magic of metaverse is beyond our imagination. In simple terms, the metaverse refers to a virtual shared space that exists online, where people can interact, socialise, work, and play using digital avatars, just like they do in the real world. It is a combination of virtual reality,…
Descriptors: Computer Simulation, Computer Mediated Communication, Health Services, Social Media
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  9310