Publication Date
| In 2026 | 2 |
| Since 2025 | 446 |
| Since 2022 (last 5 years) | 2034 |
| Since 2017 (last 10 years) | 4007 |
| Since 2007 (last 20 years) | 6153 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Teachers | 120 |
| Researchers | 25 |
| Students | 17 |
| Policymakers | 15 |
| Practitioners | 14 |
| Administrators | 7 |
| Media Staff | 5 |
| Parents | 2 |
| Community | 1 |
Location
| Turkey | 244 |
| Australia | 127 |
| United Kingdom | 118 |
| Taiwan | 111 |
| China | 108 |
| California | 92 |
| Germany | 80 |
| Spain | 78 |
| United States | 73 |
| Greece | 72 |
| Canada | 71 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 2 |
| Does not meet standards | 1 |
Tangney, Brendan; Oldham, Elizabeth; Conneely, Claire; Barrett, Stephen; Lawlor, John – IEEE Transactions on Education, 2010
This paper describes a model for computer programming outreach workshops aimed at second-level students (ages 15-16). Participants engage in a series of programming activities based on the Scratch visual programming language, and a very strong group-based pedagogy is followed. Participants are not required to have any prior programming experience.…
Descriptors: Foreign Countries, Computer Software, Programming Languages, Computer Science Education
Archibald, J. K.; Fife, W. S. – Computer Science Education, 2007
Embedded systems are increasingly pervasive, and the creation of reliable controlling software offers unique challenges. Embedded software must interact directly with hardware, it must respond to events in a time-critical fashion, and it typically employs concurrency to meet response time requirements. This paper describes an innovative course…
Descriptors: Computer Software, Troubleshooting, Undergraduate Students, Undergraduate Study
Joyce, Donald – Computer Science Education, 2007
This paper reviews nearly 80 published items concerned with promoting academic integrity and reducing plagiarism. Nearly all of them were published in the last seven years and have authors based in Australasia. Most of them have authors from computing departments and many were published in computing journals or presented at computing conferences.…
Descriptors: Plagiarism, Cheating, Integrity, Computer Science
Castro-Schez, J. J.; del Castillo, E.; Hortolano, J.; Rodriguez, A. – IEEE Transactions on Education, 2009
Educational software tools are considered to enrich teaching strategies, providing a more compelling means of exploration and feedback than traditional blackboard methods. Moreover, software simulators provide a more motivating link between theory and practice than pencil-paper methods, encouraging active and discovery learning in the students.…
Descriptors: Foreign Countries, Computer Software, Data Analysis, Web Based Instruction
Cox, G. W.; Hughes, W. E., Jr.; Etzkorn, L. H.; Weisskopf, M. E. – IEEE Transactions on Education, 2009
This paper presents the results of an analysis of indicators that can be used to predict whether a student will succeed in a Computer Science Ph.D. program. The analysis was conducted by studying the records of 75 students who have been in the Computer Science Ph.D. program of the University of Alabama in Huntsville. Seventy-seven variables were…
Descriptors: Case Studies, Prediction, Computer Science Education, Doctoral Degrees
Chen, Hsinchun; Li, Xin; Chau, M.; Ho, Yi-Jen; Tseng, Chunju – IEEE Transactions on Education, 2009
With the advent of the World Wide Web, many business applications that utilize data mining and text mining techniques to extract useful business information on the Web have evolved from Web searching to Web mining. It is important for students to acquire knowledge and hands-on experience in Web mining during their education in information systems…
Descriptors: Class Activities, Information Systems, Internet, Computer Science Education
Ritzhaupt, Albert D. – ACM Transactions on Computing Education, 2009
This article provides an overview of the challenges in implementing a game development course with limited resources in computing curricula. An approach to a holistic game development course is outlined in terms of its organization, software, and instructional methods. The course had 23 students enrolled in its first offering and was…
Descriptors: Educational Strategies, Reliability, Cooperative Learning, Teaching Methods
Caspersen, Michael E.; Kolling, Michael – ACM Transactions on Computing Education, 2009
Programming is recognized as one of seven grand challenges in computing education. Decades of research have shown that the major problems novices experience are composition-based---they may know what the individual programming language constructs are, but they do not know how to put them together. Despite this fact, textbooks, educational…
Descriptors: Programming Languages, Computer Software, Educational Practices, Programming
Dyson, Laurel Evelyn; Litchfield, Andrew; Lawrence, Elaine; Raban, Ryszard; Leijdekkers, Peter – Australasian Journal of Educational Technology, 2009
This article reports on an m-learning research agenda instituted at our university in order to explore how mobile technology can enhance active, experiential learning. Details of the implementation and results of four areas of m-learning are presented: mobile supported fieldwork, fostering interactivity in large lectures with mobile technology,…
Descriptors: Experiential Learning, Case Studies, Program Implementation, Curriculum Implementation
Pendegraft, Norman – Journal of Information Systems Education, 2009
An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…
Descriptors: Privacy, Instructional Materials, Business Administration Education, Class Activities
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Paz, Tamar; Leron, Uri – Journal for Research in Mathematics Education, 2009
Functions are all around us, disguised as actions on concrete objects. Composition of functions, too, is all around us, because these actions can be performed in succession, the output of one serving as the input for the next. In terms of Gray and Tall's (2001) "embodied objects" or Lakoff and Nunez's (2000) "mathematical idea…
Descriptors: Concept Formation, Mathematics Instruction, Mathematical Concepts, Algebra
Stauffer, Karen; Lin, Fuhua; Koole, Marguerite – International Journal of Distance Education Technologies, 2008
This article presents a methodology for developing learning objects for web-based courses using the IMS Learning Design (IMS LD) specification. We first investigated the IMS LD specification, determining how to use it with online courses and the student delivery model, and then applied this to a Unit of Learning (UOL) for online computer science…
Descriptors: Web Based Instruction, Educational Technology, Technology Uses in Education, Computer Science Education
Shinagel, Michael – Continuing Higher Education Review, 2008
The Sunday, August 1, 1993 edition of the "Washington Post" featured the headline: "Indians, Foreigners Build Silicon Valley in Bangalore." In the article, Bangalore, a city of more than four million people, was described as "an island of relative affluence and social stability in this ancient land." Multinational…
Descriptors: Credentials, Graduate Students, Indians, Continuing Education
Hanks, Brian – Journal on Educational Resources in Computing, 2008
In a study of the types of problems encountered by students that led them to seek assistance, Robins et al. [2006] found that the most common problems were related to trivial mechanics. The students in this study worked by themselves on their programming exercises. This article discusses a replication of the Robins et al. study in which the…
Descriptors: Problems, Programming, Peer Relationship, Teamwork

Peer reviewed
Direct link
