NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20260
Since 20251
Since 2022 (last 5 years)11
Audience
Teachers11
Researchers2
Students2
Policymakers1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 11 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Peer reviewed Peer reviewed
Direct linkDirect link
Mayowa Oyedoyin; Ismaila Temitayo Sanusi; Musa Adekunle Ayanwale – Computer Science Education, 2025
Background and Context: Recognizing that digital technologies can enable economic transformation in Africa, computing education has been considered a subject relevant for all within the compulsory level of education. The implementation of the subject in many schools is, however, characterized by a myriad of challenges, including pedagogical…
Descriptors: Elementary School Students, Student Attitudes, Internet, Coding
Peer reviewed Peer reviewed
Direct linkDirect link
Nason, Erica E.; Wang, Kaipeng; Ausbrooks, Angela R. – Journal of Social Work Education, 2023
This article introduces an open-source software package--R for Qualitative Data Analysis (RQDA). RQDA is an R package for analysis of text-formatted data, which is compatible across operating platforms. It is user-friendly and seamlessly integrates with R, which makes it possible to conduct statistical analyses on qualitative coding. Alternative…
Descriptors: Statistical Analysis, Computer Software, Open Source Technology, Usability
Peer reviewed Peer reviewed
Direct linkDirect link
Kaitlyn Storm; Jerry Zhang; Eileen Haase – Biomedical Engineering Education, 2022
Our first year biomedical engineering course exposes students to multiple engineering and design techniques within an overarching theme of understanding health inequity. Currently, the semester-long curriculum excludes computational methods such as Python programming and Machine Learning, which are usually not introduced until more advanced BME…
Descriptors: Artificial Intelligence, Programming Languages, Learning Modules, Introductory Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Leigh Jin; Tai-Yin Chi; Brenda Mak – Journal of Information Systems Education, 2024
This paper presents the Screencast-Based Assessment Technique (SBAT) for a mobile app development curriculum in the information systems discipline. SBAT was implemented as a midterm take-home exam in which students design and develop an app project based on their own interests, passions, or ambitions. In addition to coding, students must create…
Descriptors: Technology Uses in Education, Computer Oriented Programs, Handheld Devices, Computer Software
Bers, Marina Umaschi – MIT Press, 2022
Today, schools are introducing STEM education and robotics to children in ever-lower grades. In "Beyond Coding," Marina Umaschi Bers lays out a pedagogical roadmap for teaching code that encompasses the cultivation of character along with technical knowledge and skills. Presenting code as a universal language, she shows how children…
Descriptors: Programming, Computer Science Education, Teaching Methods, Moral Values
Unlu, Serkan; Kiray, Seyit Ahmet – Online Submission, 2022
This book has been prepared to introduce common technological tools that can be used in science education in the distance education process. Although most of the applications introduced in the book are used in face-to-face education, this book focuses on their use in the distance science education process. In the Introduction part of the book, the…
Descriptors: Computer Software, Videoconferencing, Distance Education, Pandemics
Peer reviewed Peer reviewed
Direct linkDirect link
Papadakis, Stamatios, Ed.; Kalogiannakis, Michail, Ed. – Lecture Notes in Educational Technology, 2022
This book brings together a collection of work from around the world in order to consider effective STEM, robotics, mobile apps education from a range of perspectives. It presents valuable perspectives--both practical and theoretical--that enrich the current STEM, robotics, mobile apps education agenda. As such, the book makes a substantial…
Descriptors: STEM Education, Robotics, Computer Oriented Programs, Handheld Devices