Publication Date
| In 2026 | 0 |
| Since 2025 | 397 |
| Since 2022 (last 5 years) | 1831 |
| Since 2017 (last 10 years) | 3654 |
| Since 2007 (last 20 years) | 5337 |
Descriptor
Source
Author
| Barnes, Tiffany | 21 |
| Armoni, Michal | 15 |
| Gal-Ezer, Judith | 15 |
| Yadav, Aman | 15 |
| Malmi, Lauri | 14 |
| Soh, Leen-Kiat | 14 |
| Xinogalos, Stelios | 14 |
| Frydenberg, Mark | 12 |
| Laakso, Mikko-Jussi | 12 |
| Hazzan, Orit | 11 |
| Hunter, Beverly | 11 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 500 |
| Teachers | 313 |
| Researchers | 98 |
| Policymakers | 67 |
| Administrators | 48 |
| Students | 45 |
| Parents | 6 |
| Community | 5 |
| Media Staff | 5 |
| Support Staff | 1 |
Location
| Turkey | 231 |
| Australia | 144 |
| United Kingdom | 124 |
| Taiwan | 107 |
| China | 101 |
| Canada | 97 |
| California | 96 |
| Germany | 78 |
| Spain | 77 |
| Finland | 69 |
| Greece | 66 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 2 |
| Does not meet standards | 1 |
Larraza-Mendiluze, Edurne; Garay-Vitoria, Nestor – IEEE Transactions on Education, 2015
This paper surveys how the computer input/output (I/O) subsystem is taught in introductory undergraduate courses. It is important to study the educational process of the computer I/O subsystem because, in the curricula recommendations, it is considered a core topic in the area of knowledge of computer architecture and organization (CAO). It is…
Descriptors: Computer Science Education, Engineering Education, Introductory Courses, Undergraduate Study
Raiyn, Jamal; Tilchin, Oleg – Journal of Education and Practice, 2015
Meaningful learning based on PBL is new learning strategy. Compared to traditional learning strategy, the meaningful learning strategy put the student in center of the learning process. The roles of the student in the meaningful learning strategy will be increased. The Problem-based Learning (PBL) model is considered the most productive way to…
Descriptors: Problem Based Learning, Thinking Skills, Computer Science Education, Learning Strategies
Harris, Mark A.; Patten, Karen P. – Journal of Information Systems Education, 2015
Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs…
Descriptors: Taxonomy, Computer Security, Curriculum Development, Undergraduate Study
Pastrana, José L. – European Journal of Educational Sciences, 2015
European universities are involved in a process of change to ensure they are more comparable, compatible and coherent systems of higher education inside the European Higher Education Area (EHEA). In addition, scouting takes more than 100 years educating young people around the world. This non-formal education is based on values and its method is…
Descriptors: Computer Software, Higher Education, Colleges, Health Services
Sharma, Kshitij; Jermann, Patrick; Dillenbourg, Pierre – International Educational Data Mining Society, 2015
Current schemes to categorise MOOC students result from a single view on the population which either contains the engagement of the students or demographics or self reported motivation. We propose a new hierarchical student categorisation, which uses common online activities capturing both engagement and achievement of MOOC students. A first level…
Descriptors: Foreign Countries, Online Courses, Large Group Instruction, Student Characteristics
Hartshorn, K. James; Evans, Norman W.; Egbert, Jesse; Johnson, Amy – Reading in a Foreign Language, 2017
English-medium institutions of higher education host increasing numbers of English-as-a second-language (ESL) learners in the US. English language skill is vital to their progress. Previous research examined reading challenges and expectations faculty have for their first-year students within five popular majors for international students…
Descriptors: English (Second Language), Second Language Learning, Foreign Students, College Faculty
Griffith, Mary – Universal Journal of Educational Research, 2017
Content and Language Integrated Learning (CLIL) is as full of challenges as it is of possibilities. We will explore the challenges while seeking realistic solutions as eight Computer Science professors teach their subjects through English for the first time. We hope to gain insights into the bilingual classroom at the university level where…
Descriptors: Foreign Countries, Teaching Methods, Language of Instruction, Course Content
Darmoroz, Halyna – Comparative Professional Pedagogy, 2017
The paper deals with the aspects of professional training of specialists in computational linguistics by the example of the University of Stuttgart. First of all, we have attempted to define the essence of the terms "applied linguistics" and "computational linguistics" based on the views of Ukrainian and foreign scholars. We…
Descriptors: Computational Linguistics, Universities, Curriculum Development, Foreign Countries
Machajewski, Szymon Tomasz – Online Submission, 2017
Between 2000 and 2016, the STEM industry reportedly added jobs at the rate of 28% while all jobs were growing at only 6%. However, 48% of bachelor's degree students and 69% of associate's degree students in STEM majors left their program of study between 2003 and 2009. The high attrition rate is often attributed to low student engagement, boredom,…
Descriptors: College Science, STEM Education, Introductory Courses, Case Studies
Sauls, Jeff; Gudigantala, Naveen – Journal of Information Systems Education, 2013
Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…
Descriptors: Computer Security, College Graduates, Labor Force, Computer Science Education
Kellow, Jan-Marie – Waikato Journal of Education, 2018
The revised Technology Curriculum for years 1-13 now includes two Digital Technologies areas: 'computational thinking for Digital Technologies' and 'designing and developing digital outcomes'. By 2020, all schools are expected to address these curriculum additions. This article outlines some of the background stated purposes for introducing this…
Descriptors: Technology Education, Information Technology, Outcomes of Education, Educational Change
High School Students' Views on the PBL Activities Supported via Flipped Classroom and LEGO Practices
Cukurbasi, Baris; Kiyici, Mubin – Educational Technology & Society, 2018
The purpose of this study was to investigate the high school students' views on instructions based on Flipped Classroom Model (FC) and LEGO applications. The case study, which is one of the qualitative research methods, was used within the scope of the study, the duration of which was 7 weeks. In order to choose the research group of the study,…
Descriptors: High School Students, Student Attitudes, Grade 10, Problem Based Learning
Hew, Khe Foon – British Journal of Educational Technology, 2016
Although past research has sought to identify the factors of student engagement in traditional online courses, two questions remained largely unanswered with regard to Massive Open Online Courses (MOOCs): do the factors that could influence student engagement in traditional online courses also apply to online courses that are massive and open?…
Descriptors: Online Courses, Learner Engagement, Large Group Instruction, Learning Experience
Tumuheki, Peace Buhwamatsiko; Zeelen, Jacques; Openjuru, George Ladaah – International Journal of Lifelong Education, 2016
The objective of this qualitative study was to establish motivations for participation of non-traditional students (NTS) in university education. The findings are drawn from empirical data collected from 15 unstructured in-depth interviews with NTS of the School of Computing and Informatics Technology at Makerere University, and analysed with the…
Descriptors: Student Motivation, Higher Education, Nontraditional Students, Social Environment
Master, Allison; Cheryan, Sapna; Meltzoff, Andrew N. – Journal of Educational Psychology, 2016
Computer science has one of the largest gender disparities in science, technology, engineering, and mathematics. An important reason for this disparity is that girls are less likely than boys to enroll in necessary "pipeline courses," such as introductory computer science. Two experiments investigated whether high-school girls' lower…
Descriptors: Gender Differences, Computer Science, Sex Stereotypes, Computer Science Education

Peer reviewed
Direct link
