Publication Date
| In 2026 | 0 |
| Since 2025 | 424 |
| Since 2022 (last 5 years) | 2009 |
| Since 2017 (last 10 years) | 3982 |
| Since 2007 (last 20 years) | 6128 |
Descriptor
Source
Author
| Barnes, Tiffany | 22 |
| Armoni, Michal | 18 |
| Yadav, Aman | 17 |
| Gal-Ezer, Judith | 16 |
| Malmi, Lauri | 15 |
| Xinogalos, Stelios | 15 |
| Soh, Leen-Kiat | 14 |
| Frydenberg, Mark | 13 |
| Hazzan, Orit | 13 |
| Kafai, Yasmin B. | 13 |
| Howe, Richard D. | 12 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 724 |
| Teachers | 401 |
| Researchers | 151 |
| Policymakers | 97 |
| Administrators | 71 |
| Students | 66 |
| Media Staff | 11 |
| Parents | 9 |
| Community | 6 |
| Counselors | 1 |
| Support Staff | 1 |
| More ▼ | |
Location
| Turkey | 251 |
| Australia | 167 |
| United Kingdom | 153 |
| Canada | 131 |
| China | 118 |
| Taiwan | 118 |
| California | 114 |
| United States | 96 |
| Germany | 88 |
| Spain | 81 |
| Finland | 78 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 2 |
| Does not meet standards | 1 |
Krishnamurthy, Janaki – ProQuest LLC, 2010
Given the increasing competition in the software industry and the critical consequences of software errors, it has become important for companies to achieve high levels of software quality. While cost reduction and timeliness of projects continue to be important measures, software companies are placing increasing attention on identifying the user…
Descriptors: Program Evaluation, Opinions, Privacy, Prediction
Dow, Mirah J. Ingram – School Library Monthly, 2010
School librarians currently speak about school libraries as the largest classroom in the building. If so, how can these librarians describe what they teach? This article explains the user-centered instructional role of secondary school librarians in teaching information and technology literacy skills, as well as how they can authoritatively ensure…
Descriptors: School Libraries, Information Technology, Literacy, Librarians
Saban, Aslihan – Education, 2010
The purpose of this study was to examine the metaphors of exit-level Turkish computer teacher candidates about the concept of "internet". Participants included 45 seniors (23 boys and 22 girls) majoring in the Department of Computer and Instructional Technologies at Selcuk University, Ahmet Kelesoglu Faculty of Education. They were asked…
Descriptors: Educational Technology, Content Analysis, Internet, Figurative Language
Lu, Eric Jui-Lin; Horng, Gwoboa; Yu, Chia-Ssu; Chou, Ling-Ying – Educational Technology & Society, 2010
To increase the interoperability and reusability of learning objects, Advanced Distributed Learning Initiative developed a model called Content Aggregation Model (CAM) to describe learning objects and express relationships between learning objects. However, the suggested relations defined in the CAM can only describe structure-oriented…
Descriptors: Management Systems, Semantics, Metadata, Models
Shuhidan, Shuhaida; Hamilton, Margaret; D'Souza, Daryl – Computer Science Education, 2010
Learning to program is known to be difficult for novices. High attrition and high failure rates in foundation-level programming courses undertaken at tertiary level in Computer Science programs, are commonly reported. A common approach to evaluating novice programming ability is through a combination of formative and summative assessments, with…
Descriptors: Teacher Attitudes, Secondary School Teachers, College Faculty, Multiple Choice Tests
Jansson, P. M.; Ramachandran, R. P.; Schmalzel, J. L.; Mandayam, S. A. – IEEE Transactions on Education, 2010
To keep up with rapidly advancing technology, numerous innovations to the electrical and computer engineering (ECE) curriculum, learning methods and pedagogy have been envisioned, tested, and implemented. It is safe to say that no single approach will work for all of the diverse ECE technologies and every type of learner. However, a few key…
Descriptors: Engineering Education, Computer Science Education, Undergraduate Students, Student Projects
Titterton, Nathaniel; Lewis, Colleen M.; Clancy, Michael J. – Computer Science Education, 2010
Lab-centric instruction emphasizes supervised, hands-on activities by substituting lab for lecture time. It combines a multitude of pedagogical techniques into the format of an extended, structured closed lab. We discuss the range of benefits for students, including increased staff interaction, frequent and varied self-assessments, integrated…
Descriptors: Learning Activities, Computer Assisted Instruction, Mathematics Instruction, Lecture Method
Naude, Kevin A.; Greyling, Jean H.; Vogts, Dieter – Computers & Education, 2010
We present a novel approach to the automated marking of student programming assignments. Our technique quantifies the structural similarity between unmarked student submissions and marked solutions, and is the basis by which we assign marks. This is accomplished through an efficient novel graph similarity measure ("AssignSim"). Our experiments…
Descriptors: Grading, Assignments, Correlation, Interrater Reliability
Grier, Christopher L. – ProQuest LLC, 2009
Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…
Descriptors: Expertise, Metric System, Internet, Web Browsers
Hasan, Ragib – ProQuest LLC, 2009
In today's world, information is increasingly created, processed, transmitted, and stored digitally. While the digital nature of information has brought enormous benefits, it has also created new vulnerabilities and attacks against data. Unlike physical documents, digitally stored information can be rapidly copied, erased, or modified. The…
Descriptors: Archives, Court Litigation, Information Management, Information Storage
Olson, Lars E. – ProQuest LLC, 2009
"Reflective Database Access Control" (RDBAC) is a model in which a database privilege is expressed as a database query itself, rather than as a static privilege contained in an access control list. RDBAC aids the management of database access controls by improving the expressiveness of policies. However, such policies introduce new interactions…
Descriptors: Databases, Access to Information, Computer Software, Computer Science
Howison, James – ProQuest LLC, 2009
This dissertation presents evidence that the production of Free and Open Source Software (FLOSS) is far more alone than together; it is far more often individual work done "in company" than it is teamwork. When tasks appear too large for an individual they are more likely to be deferred until they are easier rather than be undertaken through…
Descriptors: Evidence, Participant Observation, Cooperation, Computer Software
Unuakhalu, Mike F. – Journal of Educational Technology Systems, 2009
This study integrated object-oriented programming instruction with transfer training activities in everyday tasks, which might provide a mechanism that can be used for efficient problem solving. Specifically, a Visual BASIC embedded with everyday tasks group was compared to another group exposed to Visual BASIC instruction only. Subjects were 40…
Descriptors: Undergraduate Students, Programming Languages, Computer Science Education, Transfer of Training
Scime, A. – Computer Science Education, 2008
As computing makes the world a smaller place there will be an increase in the mobility of information technology workers and companies. The European Union has recognized the need for mobility and is instituting educational reforms to provide recognition of worker qualifications. Within computing there have been a number of model curricula proposed…
Descriptors: Information Technology, Foreign Countries, Computer Science Education, Global Approach
Carpenter, Donald A. – Journal of Information Systems Education, 2008
Confusion exists among database textbooks as to the goal of normalization as well as to which normal form a designer should aspire. This article discusses such discrepancies with the intention of simplifying normalization for both teacher and student. This author's industry and classroom experiences indicate such simplification yields quicker…
Descriptors: Database Design, Database Management Systems, Data, Reliability

Direct link
Peer reviewed
