NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 196 to 210 of 7,868 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Hege Annette Olstad; Birgit Rognebakke Krogstie; Xiaomeng Su; Rune Hjelsvold – Computer Science Education, 2025
Background and Context: While higher education in Norway intends to ensure students can translate academic learning to real-world settings, a gap persists in computing students' perceptions of their acquired competencies. Objective: This study aims to understand the gap and explore how formative assessment with ePortfolios can help students…
Descriptors: Foreign Countries, Formative Evaluation, Computer Science Education, College Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gina Childers; Weverton Ataide Pinheiro; Oluwatosin Daramola; C. Lindsay Linsky; Bryson Payne; Jack Byers; Daniel Baker – Journal of Cybersecurity Education, Research and Practice, 2025
Because K-12 teachers have access to private educational data, they are increasingly at risk of being affected by cybersecurity threats. Examining how teachers conceptualize cybersecurity is vital so that cybersecurity training can be tailored to teachers' understanding of cybersecurity. This study examined K-12 teachers' (n = 255) personalized…
Descriptors: Teacher Attitudes, Knowledge Level, Definitions, Computer Security
Peer reviewed Peer reviewed
Rebecca Casciano – Grantee Submission, 2025
This study evaluated the implementation and impact of the School of Interactive Arts (SIA), a scalable, in-class instructional model designed to introduce high school students to computer science and video game design through a virtual platform called Ghost School. Conducted in New York City Department of Education public high schools, the study…
Descriptors: Program Implementation, Program Evaluation, Program Effectiveness, High School Students
Peer reviewed Peer reviewed
Direct linkDirect link
Pruthikrai Mahatanankoon; James R. Wolf – Journal of Information Systems Education, 2025
Advances in information and communication technologies (ICT) coupled with artificial intelligence have made computer programming skills indispensable for IT majors and for an increasing number of other science, technology, engineering, and mathematics (STEM) disciplines. Like any hands-on skill, mastering computer programming requires dedicated…
Descriptors: Measures (Individuals), Programming, Undergraduate Students, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hüseyin Gokal; Cem Ufuk Baytar – Turkish Online Journal of Educational Technology - TOJET, 2025
This study aims to examine university students' intentions to use artificial intelligence (AI) applications in their educational processes within the context of job characteristics (JC), technology characteristics (TC), task-technology fit (TTF), and self-efficacy (SE). The research was conducted with 965 students enrolled in Information…
Descriptors: College Students, Intention, Technology Uses in Education, Artificial Intelligence
Peer reviewed Peer reviewed
Direct linkDirect link
Yoonhee Shin; Jaewon Jung; Hyun Ji Lee – Metacognition and Learning, 2024
This study investigated the effects of concept-oriented faded in worked-out examples (WOE) and metacognitive scaffolding on learners' transfer performance and motivation in programming education. Two types of faded in WOE and metacognitive scaffolding were provided. A total of 140 participants were randomly assigned into one of four groups, with…
Descriptors: Metacognition, Concept Formation, Scaffolding (Teaching Technique), Learning Processes
Peer reviewed Peer reviewed
Direct linkDirect link
Xiaojing Duan; Bo Pei; G. Alex Ambrose; Arnon Hershkovitz; Ying Cheng; Chaoli Wang – Education and Information Technologies, 2024
Providing educators with understandable, actionable, and trustworthy insights drawn from large-scope heterogeneous learning data is of paramount importance in achieving the full potential of artificial intelligence (AI) in educational settings. Explainable AI (XAI)--contrary to the traditional "black-box" approach--helps fulfilling this…
Descriptors: Academic Achievement, Artificial Intelligence, Prediction, Models
Peer reviewed Peer reviewed
Direct linkDirect link
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Peer reviewed Peer reviewed
Direct linkDirect link
Sigal Levy; Yelena Stukalin; Nili Guttmann-Beck – Teaching Statistics: An International Journal for Teachers, 2024
Probability theory has extensive applications across various domains, such as statistics, computer science, and finance. In probability education, students are introduced to fundamental principles which may include mathematical topics such as combinatorics and symmetric sample spaces. Students pursuing degrees in computer science possess a robust…
Descriptors: Programming, Probability, Mathematics Skills, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
David S. Bowers; Mihaela Sabin – Education and Information Technologies, 2024
The skills and competencies of IT professionals are often described using employer-led skills frameworks. They express competencies as technical knowledge and skills combined with a range of personal qualities. Employers have indicated the importance of developing such qualities for new graduates. In response, recent ACM/IEEE curricular…
Descriptors: Information Technology, Bachelors Degrees, Computer Science Education, Career Readiness
Peer reviewed Peer reviewed
Direct linkDirect link
Sonia Lorente; Mónica Arnal-Palacián; Maximiliano Paredes-Velasco – European Journal of Psychology of Education, 2024
The European Higher Education Area (EHEA) proposes to enhance active learning and student protagonism in order to improve academic performance. In this sense, different methodologies are emerging to create scenarios for self-regulation of their learning. In this study the cooperative, collaborative and interdisciplinary learning methodologies were…
Descriptors: Cooperative Learning, Interdisciplinary Approach, Computer Software, Universities
Peer reviewed Peer reviewed
Direct linkDirect link
Meghan M. Parkinson; Seppe Hermans; David Gijbels; Daniel L. Dinsmore – Computer Science Education, 2024
Background and Context: More data are needed about how young learners identify and fix errors while programming in pairs. Objective: The study will identify discernible patterns in the intersection between debugging processes and the type of regulation used during debugging while children engage in coding to drive further theory and model…
Descriptors: Computer Science Education, Troubleshooting, Cooperative Learning, Coding
Peer reviewed Peer reviewed
Direct linkDirect link
Gayithri Jayathirtha; Deborah Fields; Yasmin Kafai – Computer Science Education, 2024
Background and Context: Debugging is a challenging yet understudied practice within recent collaborative K-12 physical computing contexts. We examined think-aloud interviews and reflections of seven high school student pairs who debugged researcher-designed buggy electronic textile projects. Objective: We asked: (1) What strategies did student…
Descriptors: High School Students, Problem Solving, Cooperation, Small Group Instruction
Edem Kwesi Atatsi – ProQuest LLC, 2024
Organizations are looking for a well-qualified workforce with the requisite skills, knowledge, and abilities to implement an effective cyber strategy. Academic institutions are facing challenges in meeting the demand for employees with hands-on experience. This exploratory study investigated how academic institutions can use internships to equip…
Descriptors: Internship Programs, Entry Workers, Professional Personnel, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Chen Sun; Stephanie Yang; Betsy Becker – Journal of Educational Computing Research, 2024
Computational thinking (CT), an essential 21st century skill, incorporates key computer science concepts such as abstraction, algorithms, and debugging. Debugging is particularly underrepresented in the CT training literature. This multi-level meta-analysis focused on debugging as a core CT skill, and investigated the effects of various debugging…
Descriptors: Troubleshooting, Computation, Thinking Skills, Intervention
Pages: 1  |  ...  |  10  |  11  |  12  |  13  |  14  |  15  |  16  |  17  |  18  |  ...  |  525