Publication Date
| In 2026 | 0 |
| Since 2025 | 403 |
| Since 2022 (last 5 years) | 1840 |
| Since 2017 (last 10 years) | 3663 |
| Since 2007 (last 20 years) | 5346 |
Descriptor
Source
Author
| Barnes, Tiffany | 21 |
| Armoni, Michal | 15 |
| Gal-Ezer, Judith | 15 |
| Yadav, Aman | 15 |
| Malmi, Lauri | 14 |
| Soh, Leen-Kiat | 14 |
| Xinogalos, Stelios | 14 |
| Frydenberg, Mark | 12 |
| Laakso, Mikko-Jussi | 12 |
| Hazzan, Orit | 11 |
| Hunter, Beverly | 11 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 500 |
| Teachers | 313 |
| Researchers | 98 |
| Policymakers | 67 |
| Administrators | 48 |
| Students | 45 |
| Parents | 6 |
| Community | 5 |
| Media Staff | 5 |
| Support Staff | 1 |
Location
| Turkey | 231 |
| Australia | 144 |
| United Kingdom | 124 |
| Taiwan | 107 |
| China | 101 |
| Canada | 97 |
| California | 96 |
| Germany | 78 |
| Spain | 77 |
| Finland | 69 |
| Greece | 66 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 2 |
| Does not meet standards | 1 |
Miller, Craig S.; Settle, Amber – ACM Transactions on Computing Education, 2011
Specifying file references for hypertext links is an elementary competence that nevertheless draws upon core computational thinking concepts such as tree traversal and the distinction between relative and absolute references. In this article we explore the learning effects of different instructional strategies in the context of an introductory…
Descriptors: Computers, Drills (Practice), Computer Literacy, Thinking Skills
Ahmadzadeh, Marzieh; Mahmoudabadi, Elham; Khodadadi, Farzad – Journal of Information Technology Education, 2011
Anecdotal evidence shows that in computer programming courses plagiarism is a widespread problem. With the growing number of students in such courses, manual plagiarism detection is impractical. This requires instructors to use one of the many available plagiarism detection tools. Prior to choosing one of such tools, a metric that assures the…
Descriptors: Foreign Countries, Plagiarism, Programming Languages, Computer Software
Štuikys, Vytautas; Burbaite, Renata; Damaševicius, Robertas – Informatics in Education, 2013
The paper's contribution is a methodology that integrates two educational technologies (GLO and LEGO robot) to teach Computer Science (CS) topics at the school level. We present the methodology as a framework of 5 components (pedagogical activities, technology driven processes, tools, knowledge transfer actors, and pedagogical outcomes) and…
Descriptors: Educational Technology, Robotics, Computer Science Education, Teaching Methods
Razali, Rozilawati; Zainal, Dzulaiha Aryanee Putri – International Education Studies, 2013
The Case Method (CM) has long been used effectively in Social Science education. Its potential use in Applied Science such as Software Engineering (SE) however has yet to be further explored. SE is an engineering discipline that concerns the principles, methods and tools used throughout the software development lifecycle. In CM, subjects are…
Descriptors: Foreign Countries, Case Method (Teaching Technique), Engineering Education, Computer Software
Al-Dujaily, Amal; Kim, Jieun; Ryu, Hokyoung – Educational Technology & Society, 2013
A concern of computer-based learning system design is how to accommodate learners' individual differences during learning activities. Previous research suggests that adaptive e-learning systems can effectively address such individual differences and, consequently, they enable more directed tutoring via computer-assisted instruction. In this paper,…
Descriptors: Electronic Learning, Extraversion Introversion, Individual Differences, Learning Activities
Lin, Shinyi; Shih, Tse-Hua; Lu, Ruiling – International Journal of Technology and Design Education, 2013
Use of innovative learning/instruction mode, embedded in the Certification Pathway System (CPS) developed by Certiport TM, is geared toward Internet and Computing Benchmark & Mentor specifically for IC[superscript 3] certification. The Internet and Computing Core Certification (IC[superscript 3]), as an industry-based credentialing program,…
Descriptors: Computer Science Education, Internet, Information Technology, College Students
Vekiri, Ioanna – Computers & Education, 2013
In this study, which was situated in the context of information science instruction, data were collected twice using student self-reports to examine the effects of pedagogical practices on changes in boys' and girls' expectancy and value beliefs about computing. Participants were 326 7th-grade students, enrolled in three middle schools that were…
Descriptors: Foreign Countries, Computer Science Education, Values, Beliefs
Kurt, Adile Askim; Akbulut, Yavuz; Odabasi, H. Ferhan; Ceylan, Beril; Kuzu, Elif Bugra; Donmez, Onur; Izmirli, Ozden Sahin – Online Submission, 2013
Information and Communication Technologies Action Competence (ICTAC) can be defined as "individuals' motivation and capacity to voluntarily employ their ICT skills for initiating or taking part in civic actions". Since academic staff and teachers in ICT related fields have crucial roles in training action-competent individuals, this…
Descriptors: Foreign Countries, State Universities, Preservice Teachers, Educational Technology
Hughes, Michael C.; Jadud, Matthew C.; Rodrigo, Ma. Mercedes T. – Computer Science Education, 2010
In Java, "System.out.printf" and "String.format" consume a specialised kind of string commonly known as a format string. In our study of first-year students at the Ateneo de Manila University, we discovered that format strings present a substantial challenge for novice programmers. Focusing on their first laboratory we found…
Descriptors: Foreign Countries, Computer Science Education, Programming Languages, Introductory Courses
Tenenberg, Josh; McCartney, Robert – ACM Transactions on Computing Education, 2010
Scholarly communities in computing determine how to produce and validate knowledge within their domains of focus. Much of this knowledge can remain tacit because of shared ways of becoming a disciplinary scholar within any particular area of computing. But such tacitness presents challenges for computing education scholarship, since knowledge…
Descriptors: Feedback (Response), Scholarship, Communities of Practice, Epistemology
Agbo, Igwe Sylvester – Journal of Education and Practice, 2015
Research studies in the past years show that Information and Communication Technology is an effective means for boasting educational opportunities, but most teachers neither use this technology as an instructional delivery system nor integrate technology into their curriculum. Studies reveal a number of factors influencing teachers' decisions to…
Descriptors: Foreign Countries, Computer Uses in Education, Influences, Computer Science Education
Barney, Lee S.; Maughan, Bryan D. – Complicity: An International Journal of Complexity and Education, 2015
Students learn best when teachers get out of the way. Unfortunately, university classrooms continue to be intensely teacher-centric, are driven by the teacher's agenda and calendar, and embrace simple models rather than complex alternatives. These simple types of learning environments frustrate students' development of the risk-taking and choice…
Descriptors: College Faculty, Teaching Methods, Learning Processes, Risk
Parsons, David; Stockdale, Rosemary – International Journal of Virtual and Personal Learning Environments, 2012
Multi-User Virtual Environments (MUVEs) are the subject of increasing interest for educators and trainers. This article reports on a longitudinal project that seeks to establish a virtual agile software development workshop hosted in the Open Wonderland MUVE, designed to help learners to understand the basic principles of some core agile software…
Descriptors: Virtual Classrooms, Longitudinal Studies, Workshops, Computer System Design
Sims, J. Eric – ProQuest LLC, 2012
Information security has been a particularly hot topic since the enhanced internal control requirements of Sarbanes-Oxley (SOX) were introduced in 2002. At about this same time, cloud computing started its explosive growth. Outsourcing of mission-critical functions has always been a gamble for managers, but the advantages of cloud computing are…
Descriptors: Information Security, Computer Science Education, Clearinghouses, Data Analysis
Bell, Corbin Christopher – ProQuest LLC, 2012
The objective of this study was to survey IS curriculum in AACSB-accredited Information Systems programs across the United States, to evaluate current adherence to the IS 2010 Curriculum Guidelines, and to assess the number and type of career track developments initiated as a result of less stringent requirements in the new curriculum guidelines.…
Descriptors: Guidelines, Information Systems, Core Curriculum, Accreditation (Institutions)

Peer reviewed
Direct link
