Publication Date
In 2025 | 225 |
Since 2024 | 796 |
Since 2021 (last 5 years) | 2287 |
Since 2016 (last 10 years) | 3991 |
Since 2006 (last 20 years) | 6010 |
Descriptor
Source
Author
Barnes, Tiffany | 22 |
Armoni, Michal | 18 |
Yadav, Aman | 17 |
Gal-Ezer, Judith | 16 |
Malmi, Lauri | 15 |
Xinogalos, Stelios | 15 |
Soh, Leen-Kiat | 14 |
Frydenberg, Mark | 13 |
Hazzan, Orit | 13 |
Kafai, Yasmin B. | 13 |
Howe, Richard D. | 12 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 722 |
Teachers | 398 |
Researchers | 149 |
Policymakers | 95 |
Administrators | 71 |
Students | 66 |
Media Staff | 11 |
Parents | 9 |
Community | 6 |
Counselors | 1 |
Support Staff | 1 |
More ▼ |
Location
Turkey | 247 |
Australia | 164 |
United Kingdom | 153 |
Canada | 127 |
Taiwan | 117 |
California | 112 |
China | 112 |
United States | 95 |
Germany | 86 |
Spain | 78 |
Finland | 75 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Meets WWC Standards with or without Reservations | 2 |
Does not meet standards | 1 |
Brereton, P. – IEEE Transactions on Education, 2011
Teaching computing students about the importance of evidence and about the use of empirical methods for evaluating computing technologies can be difficult, especially within dual honors undergraduate degree programs. The aims of this study were to explore the effectiveness of second-year undergraduate computing students in carrying out a…
Descriptors: Foreign Countries, Computer Science Education, Computer Software, Undergraduate Students
Lee, C. P.; Uluagac, A. S.; Fairbanks, K. D.; Copeland, J. A. – IEEE Transactions on Education, 2011
This paper describes a competition-style of exercise to teach system and network security and to reinforce themes taught in class. The exercise, called NetSecLab, is conducted on a closed network with student-formed teams, each with their own Linux system to defend and from which to launch attacks. Students are expected to learn how to: 1) install…
Descriptors: Computer Security, Teaching Methods, Computer Networks, Computer Science Education
Bolliger, Doris U.; Inan, Fethi A. – International Review of Research in Open and Distance Learning, 2012
With the growth of online courses and programs in higher education, considerable concerns emerge about student feelings of isolation and disconnectedness in the online learning environment. A research study was conducted to develop and validate an instrument that can be used to measure perceptions of connectedness of students enrolled in online…
Descriptors: Foreign Countries, Online Courses, Computer Science Education, Online Surveys
English, Hilary – Bulgarian Comparative Education Society, 2012
This paper presents the findings of a study on software development students from economically disadvantaged backgrounds that have dropped out of universities which have a strong research emphasis. In the UK, these universities are generally part of the Russell Group of Universities. The participants were all male, mainly black, working class and…
Descriptors: Foreign Countries, Economically Disadvantaged, College Students, Research Universities
Denny, Paul; Cukierman, Diana; Luxton-Reilly, Andrew; Tempero, Ewan – Computer Science Education, 2012
Traditionally, learning resources are created by an instructor and distributed to their students. A contributing-student pedagogy (CSP) is one in which this responsibility shifts, placing students in control of creating the resources and sharing them with their peers. Technology plays a central role in supporting the collection and distribution of…
Descriptors: Foreign Countries, Computer Science Education, Programming, Web 2.0 Technologies
Mentz, Elsa; Bailey, Roxanne; Havenga, Marietjie; Breed, Betty; Govender, Desmond; Govender, Irene; Dignum, Frank; Dignum, Virginia – Perspectives in Education, 2012
This article reflects on the first phase of a research project aimed at the empowerment of Information Technology (IT) teachers in black rural schools in the North-West province of South Africa. In order to empower these IT teachers, the first phase aimed at understanding their unique challenges and needs. Qualitative research methodology was used…
Descriptors: Rural Schools, Educational Needs, Qualitative Research, Information Technology
Fu, Xiao – English Language Teaching, 2013
This study is to examine whether the implementation of CL in an intensive reading class has a positive effect on improving the passive situation of students, whether it helps activate their enthusiasm for and ease their anxiety of participation in language class activities, and whether it is helpful to their improvement of English proficiency. The…
Descriptors: Foreign Countries, English (Second Language), Cooperative Learning, Learning Strategies
Gerhardt, Jill; Olan, Michael – Information Systems Education Journal, 2010
This article describes our experience with peer tutoring in introductory programming courses. This tutoring concept was one of the integral support services out of five student services, which were part of a National Science Foundation Grant, designed to improve education, increase retention, improve professional development and employability, and…
Descriptors: Peer Teaching, Tutoring, Programming, Introductory Courses
Derntl, Michael – International Journal of Distance Education Technologies, 2010
Blogs are an easy-to-use, free alternative to classic means of computer-mediated communication. Moreover, they are authentically aligned with web activity patterns of today's students. The body of studies on integrating and implementing blogs in various educational settings has grown rapidly recently; however, it is often difficult to distill…
Descriptors: Web Sites, Electronic Publishing, Technology Integration, Computer Uses in Education
Wagner, William P.; Pant, Vik – Journal of Information Systems Education, 2010
One of the areas where demand has remained strong for MIS students is in the area of database management. Since the early days, this topic has been a mainstay in the MIS curriculum. Students of database management today typically learn about relational databases, SQL, normalization, and how to design and implement various kinds of database…
Descriptors: College Instruction, Computer Science Education, Information Technology, Business Administration Education
Bjelica, Momcilo; Rankovic, Dragica – Turkish Online Journal of Distance Education, 2010
The development of computer science, statistics and other technological fields, give us more opportunities to improve the process of evaluation of degree of knowledge and achievements in a learning process of our students. More and more we are relying on the computer software to guide us in the grading process. An improved way of grading can help…
Descriptors: Evaluation Methods, Student Evaluation, Distance Education, Academic Achievement
Livanos, Ilias – Higher Education: The International Journal of Higher Education and Educational Planning, 2010
The high level of graduate unemployment, even though it is acknowledged as one of the most distinctive characteristics of the Greek labour market, it has not attracted enough attention in the academic literature. This paper utilizes micro-data from the Labour Force Survey in order to investigate how the employment situation of young (aged 35 and…
Descriptors: Higher Education, Private Sector, Labor Market, Graduates
Wang, Xuanhui – ProQuest LLC, 2009
Search engines have now become essential tools in all aspects of our life. Although a variety of information needs can be served very successfully, there are still a lot of queries that search engines can not answer very effectively and these queries always make users feel frustrated. Since it is quite often that users encounter such "difficult…
Descriptors: Search Engines, Information Needs, Internet, Search Strategies
Morales, Ramses Victor – ProQuest LLC, 2009
Thesis Statement: "Availability-dependent global predicates can be efficiently and scalably realized for a class of distributed services, in spite of specific selfish and colluding behaviors, using local and decentralized protocols". Several types of large-scale distributed systems spanning the Internet have to deal with availability variations…
Descriptors: Computer Science, Internet, Network Analysis, Probability
Pankau, Brian L. – ProQuest LLC, 2009
This empirical study evaluates the document category prediction effectiveness of Naive Bayes (NB) and K-Nearest Neighbor (KNN) classifier treatments built from different feature selection and machine learning settings and trained and tested against textual corpora of 2300 Gang-Of-Four (GOF) design pattern documents. Analysis of the experiment's…
Descriptors: Prediction, Dictionaries, Geometric Concepts, Mathematics