Publication Date
| In 2026 | 0 |
| Since 2025 | 397 |
| Since 2022 (last 5 years) | 1831 |
| Since 2017 (last 10 years) | 3654 |
| Since 2007 (last 20 years) | 5337 |
Descriptor
Source
Author
| Barnes, Tiffany | 21 |
| Armoni, Michal | 15 |
| Gal-Ezer, Judith | 15 |
| Yadav, Aman | 15 |
| Malmi, Lauri | 14 |
| Soh, Leen-Kiat | 14 |
| Xinogalos, Stelios | 14 |
| Frydenberg, Mark | 12 |
| Laakso, Mikko-Jussi | 12 |
| Hazzan, Orit | 11 |
| Hunter, Beverly | 11 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 500 |
| Teachers | 313 |
| Researchers | 98 |
| Policymakers | 67 |
| Administrators | 48 |
| Students | 45 |
| Parents | 6 |
| Community | 5 |
| Media Staff | 5 |
| Support Staff | 1 |
Location
| Turkey | 231 |
| Australia | 144 |
| United Kingdom | 124 |
| Taiwan | 107 |
| China | 101 |
| Canada | 97 |
| California | 96 |
| Germany | 78 |
| Spain | 77 |
| Finland | 69 |
| Greece | 66 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 2 |
| Does not meet standards | 1 |
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Kordaki, Maria – Computers & Education, 2010
This paper presents both the design and the pilot formative evaluation study of a computer-based problem-solving environment (named LECGO: Learning Environment for programming using C using Geometrical Objects) for the learning of computer programming using C by beginners. In its design, constructivist and social learning theories were taken into…
Descriptors: Feedback (Response), Constructivism (Learning), Formative Evaluation, Problem Solving
Tangney, Brendan; Oldham, Elizabeth; Conneely, Claire; Barrett, Stephen; Lawlor, John – IEEE Transactions on Education, 2010
This paper describes a model for computer programming outreach workshops aimed at second-level students (ages 15-16). Participants engage in a series of programming activities based on the Scratch visual programming language, and a very strong group-based pedagogy is followed. Participants are not required to have any prior programming experience.…
Descriptors: Foreign Countries, Computer Software, Programming Languages, Computer Science Education
Tenenberg, Josh; McCartney, Robert – Journal on Educational Resources in Computing, 2007
This issue is devoted to the curriculum guidelines from the Liberal Arts Computer Science Consortium. These guidelines provide a coherent and important model for computing education within a liberal arts context, giving primacy to critical reason, rigorous methods, and student engagement in the research process. In this regard, they are at the…
Descriptors: Guidelines, Computer Science, Liberal Arts, College Curriculum
Archibald, J. K.; Fife, W. S. – Computer Science Education, 2007
Embedded systems are increasingly pervasive, and the creation of reliable controlling software offers unique challenges. Embedded software must interact directly with hardware, it must respond to events in a time-critical fashion, and it typically employs concurrency to meet response time requirements. This paper describes an innovative course…
Descriptors: Computer Software, Troubleshooting, Undergraduate Students, Undergraduate Study
Armoni, Michal; Gal-Ezer, Judith – Computer Science Education, 2007
Non-determinism is one of the most important, yet abstract, recurring concepts of Computer Science. It plays an important role in Computer Science areas such as formal language theory, computability theory, distributed computing, and operating systems. We conducted a series of studies on the perception of non-determinism. In the current research,…
Descriptors: Computer Science, Scientific Concepts, Computer Science Education, Abstract Reasoning
Castro-Schez, J. J.; del Castillo, E.; Hortolano, J.; Rodriguez, A. – IEEE Transactions on Education, 2009
Educational software tools are considered to enrich teaching strategies, providing a more compelling means of exploration and feedback than traditional blackboard methods. Moreover, software simulators provide a more motivating link between theory and practice than pencil-paper methods, encouraging active and discovery learning in the students.…
Descriptors: Foreign Countries, Computer Software, Data Analysis, Web Based Instruction
Cox, G. W.; Hughes, W. E., Jr.; Etzkorn, L. H.; Weisskopf, M. E. – IEEE Transactions on Education, 2009
This paper presents the results of an analysis of indicators that can be used to predict whether a student will succeed in a Computer Science Ph.D. program. The analysis was conducted by studying the records of 75 students who have been in the Computer Science Ph.D. program of the University of Alabama in Huntsville. Seventy-seven variables were…
Descriptors: Case Studies, Prediction, Computer Science Education, Doctoral Degrees
Chen, Hsinchun; Li, Xin; Chau, M.; Ho, Yi-Jen; Tseng, Chunju – IEEE Transactions on Education, 2009
With the advent of the World Wide Web, many business applications that utilize data mining and text mining techniques to extract useful business information on the Web have evolved from Web searching to Web mining. It is important for students to acquire knowledge and hands-on experience in Web mining during their education in information systems…
Descriptors: Class Activities, Information Systems, Internet, Computer Science Education
Ritzhaupt, Albert D. – ACM Transactions on Computing Education, 2009
This article provides an overview of the challenges in implementing a game development course with limited resources in computing curricula. An approach to a holistic game development course is outlined in terms of its organization, software, and instructional methods. The course had 23 students enrolled in its first offering and was…
Descriptors: Educational Strategies, Reliability, Cooperative Learning, Teaching Methods
Caspersen, Michael E.; Kolling, Michael – ACM Transactions on Computing Education, 2009
Programming is recognized as one of seven grand challenges in computing education. Decades of research have shown that the major problems novices experience are composition-based---they may know what the individual programming language constructs are, but they do not know how to put them together. Despite this fact, textbooks, educational…
Descriptors: Programming Languages, Computer Software, Educational Practices, Programming
Dyson, Laurel Evelyn; Litchfield, Andrew; Lawrence, Elaine; Raban, Ryszard; Leijdekkers, Peter – Australasian Journal of Educational Technology, 2009
This article reports on an m-learning research agenda instituted at our university in order to explore how mobile technology can enhance active, experiential learning. Details of the implementation and results of four areas of m-learning are presented: mobile supported fieldwork, fostering interactivity in large lectures with mobile technology,…
Descriptors: Experiential Learning, Case Studies, Program Implementation, Curriculum Implementation
Pendegraft, Norman – Journal of Information Systems Education, 2009
An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…
Descriptors: Privacy, Instructional Materials, Business Administration Education, Class Activities
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Paz, Tamar; Leron, Uri – Journal for Research in Mathematics Education, 2009
Functions are all around us, disguised as actions on concrete objects. Composition of functions, too, is all around us, because these actions can be performed in succession, the output of one serving as the input for the next. In terms of Gray and Tall's (2001) "embodied objects" or Lakoff and Nunez's (2000) "mathematical idea…
Descriptors: Concept Formation, Mathematics Instruction, Mathematical Concepts, Algebra

Direct link
Peer reviewed
