Publication Date
| In 2026 | 0 |
| Since 2025 | 424 |
| Since 2022 (last 5 years) | 2009 |
| Since 2017 (last 10 years) | 3982 |
| Since 2007 (last 20 years) | 6128 |
Descriptor
Source
Author
| Barnes, Tiffany | 22 |
| Armoni, Michal | 18 |
| Yadav, Aman | 17 |
| Gal-Ezer, Judith | 16 |
| Malmi, Lauri | 15 |
| Xinogalos, Stelios | 15 |
| Soh, Leen-Kiat | 14 |
| Frydenberg, Mark | 13 |
| Hazzan, Orit | 13 |
| Kafai, Yasmin B. | 13 |
| Howe, Richard D. | 12 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 724 |
| Teachers | 401 |
| Researchers | 151 |
| Policymakers | 97 |
| Administrators | 71 |
| Students | 66 |
| Media Staff | 11 |
| Parents | 9 |
| Community | 6 |
| Counselors | 1 |
| Support Staff | 1 |
| More ▼ | |
Location
| Turkey | 251 |
| Australia | 167 |
| United Kingdom | 153 |
| Canada | 131 |
| China | 118 |
| Taiwan | 118 |
| California | 114 |
| United States | 96 |
| Germany | 88 |
| Spain | 81 |
| Finland | 78 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 2 |
| Does not meet standards | 1 |
Kahiigi, Evelyn Kigozi; Vesisenaho, Mikko; Hansson, Henrik; Danielson, Mats; Tusubira, F. F. – Journal of Interactive Online Learning, 2012
The educational culture in most developing countries is lecturer-centred with lecturers as providers of information and students as receivers of information. This approach has impacted on student's ability to seek and create knowledge to support their learning process. A collaborative learning approach that promotes students process of inquiry,…
Descriptors: Foreign Countries, Developing Nations, Internet, Computer Science Education
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Cakiroglu, Unal – Turkish Online Journal of Distance Education, 2012
This study investigated the effect of blended learning on novices' understandings of the introductory programming. A quasi-experimental design with participants of preservice computer and instructional technologies teachers, one control group (CG, N =64) and one experimental group (EG, N=61) who received the course 11 weeks. While face-to-face…
Descriptors: Cognitive Processes, Novices, Retention (Psychology), Preservice Teacher Education
Chen, Hong-Ren – Journal of Educational Computing Research, 2012
Recognition of students' facial expressions can be used to understand their level of attention. In a traditional classroom setting, teachers guide the classes and continuously monitor and engage the students to evaluate their understanding and progress. Given the current popularity of e-learning environments, it has become important to assess the…
Descriptors: Foreign Countries, Interactive Video, Computer Software Evaluation, Distance Education
Zhang, Aimao – Journal of Information Technology Education: Research, 2012
Pedagogy of higher education is shifting from passive to active and deep learning. At the same time, the information technology (IT) industry and the Accreditation Board for Engineering and Technology (ABET) are demanding soft skills training. Thus, in designing an IT course, we devised group teaching projects where students learn to work with…
Descriptors: Group Activities, Industry, Cooperative Learning, Information Technology
De Lucia, A.; Francese, R.; Passero, I.; Tortora, G. – International Journal of Distance Education Technologies, 2012
Mobile devices are changing the way people work and communicate. Most of the innovative devices offer the opportunity to integrate augmented reality in mobile applications, permitting the combination of the real world with virtual information. This feature can be particularly useful to enhance informal and formal didactic actions based on student…
Descriptors: Foreign Countries, Photography, Student Participation, Cooperative Learning
Drake, John R. – Journal of Information Technology Education: Innovations in Practice, 2012
Active learning has been championed in academic circles as the pedagogical fix to boring lectures typically found in introduction to information systems courses. However, the literature on active learning is mixed. In this paper, we critically examine active learning research and discover a misplaced emphasis leading to paradoxical findings in…
Descriptors: Classroom Techniques, Learning Theories, Class Activities, Course Objectives
Campbell, Jackie – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to describe and discuss the use of specifically-developed, inquiry-based learning materials for Computing and Forensic Computing students. Small applications have been developed which require investigation in order to de-bug code, analyse data issues and discover "illegal" behaviour. The applications…
Descriptors: Foreign Countries, Computer Software, Inquiry, Active Learning
Liu, Chia-Ju; Zandvliet, David B.; Hou, I.-Ling – Learning Environments Research, 2012
This study investigated perceptions of senior high school students towards the Taiwanese information technology (IT) classroom with the What Is Happening in this Class? (WIHIC) survey and explored the physical learning environment of the IT classroom using the Computerised Classroom Environment Inventory (CCEI). The participants included 2,869…
Descriptors: Foreign Countries, Technology Education, Vocational High Schools, Information Technology
Arnold, Corey Wells – ProQuest LLC, 2009
Radiology data, in the form of images and reports, is growing at a high rate due to the introduction of new imaging modalities, new uses of existing modalities, and the growing importance of objective image information in the diagnosis and treatment of patients. This increase has resulted in an enormous set of image data that is richly annotated…
Descriptors: Medical Research, Radiology, Patients, Language Processing
Spradling, Carol; Soh, Leen-Kiat; Ansorge, Charles J. – Computer Science Education, 2009
A national web-based survey was administered to 700 undergraduate computer science (CS) programs in the United States as part of a stratified random sample of 797 undergraduate CS programs. The 251 program responses (36% response rate) regarding social and professional issues are presented. This article describes the demographics of the…
Descriptors: College Faculty, Guidelines, Teacher Attitudes, Curriculum Design
Paterson, J. H.; Cheng, K. F.; Haddow, J. – ACM Transactions on Computing Education, 2009
PatternCoder is a software tool to aid student understanding of class associations. It has a wizard-based interface which allows students to select an appropriate binary class association or design pattern for a given problem. Java code is then generated which allows students to explore the way in which the class associations are implemented in a…
Descriptors: Programming Languages, Programming, Computer Science Education, Computer Software
Bouzidi, L'hadi; Jaillet, Alain – Educational Technology & Society, 2009
The excessive workload generated by the assessment of exam papers in large classes and the need to give feedback in time often constitute a rather heavy burden for teachers. The online peer assessment can contribute to reduce this workload and, possibly, to improve learning quality by assigning the assessment task to students. However, this raises…
Descriptors: Feedback (Response), Peer Evaluation, Computer Science, Engineering
Aydin, Nuh – PRIMUS, 2009
The theory of error-correcting codes and cryptography are two relatively recent applications of mathematics to information and communication systems. The mathematical tools used in these fields generally come from algebra, elementary number theory, and combinatorics, including concepts from computational complexity. It is possible to introduce the…
Descriptors: Mathematics Curriculum, Computer Science, Number Concepts, Liberal Arts
Parry, Marc – Chronicle of Higher Education, 2009
If you work at a community college that teaches cybersecurity, it pays to be located in the backyard of a spy agency. Just don't ask Kelly A. Koermer, administrator of the Anne Arundel Community College, what's inside those dark towers at Fort Meade. She points out other highlights of the restricted region: an employees-only exit off the highway,…
Descriptors: Community Colleges, Internet, Computer Security, National Security

Peer reviewed
Direct link
