NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Kaie Maennel; Olaf Maennel – ACM Transactions on Computing Education, 2025
The human aspects of cyber security are fundamental as these are interlinked with processes and technology in building resilience against an evolving and complex threat landscape. It is vital to teach future cyber security specialists sufficient knowledge about human aspects in order to strengthen the defences and defend against malicious actors.…
Descriptors: Computer Security, Computer Science Education, College Curriculum, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Charlotte Pierce; Clinton J. Woodward; Andrew Trevillian; Q. Tien Pham – ACM Transactions on Computing Education, 2025
Capstone courses, where students work on a large group project at the end of their degree, are common in computing. Many accreditation and industry bodies explicitly require or recommend them. Over the past two decades, capstone courses specifically focused on game development have become increasingly popular. Game development offers students the…
Descriptors: Foreign Countries, Computer Science Education, Programming, Design
Peer reviewed Peer reviewed
Direct linkDirect link
Ahmad, Adnan; Zeshan, Furkh; Khan, Muhammad Salman; Marriam, Rutab; Ali, Amjad; Samreen, Alia – ACM Transactions on Computing Education, 2020
Gamification is the use of game elements in domains other than games. Gamification use is often suggested for difficult activities because it enhances users' engagement and motivation level. Due to such benefits, the use of gamification is also proposed in education environments to improve students' performance, engagement, and satisfaction.…
Descriptors: Educational Games, Educational Objectives, Computer Science Education, Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Renaud, Karen; Cutts, Quintin – ACM Transactions on Computing Education, 2013
Computing science students amass years of programming experience and a wealth of factual knowledge in their undergraduate courses. Based on our combined years of experience, however, one of our students' abiding shortcomings is that they think there is only "one correct answer" to issues in most courses: an "idealistic"…
Descriptors: Computer Security, Teaching Methods, Computer Science, Decision Making
Peer reviewed Peer reviewed
Direct linkDirect link
Benda, Klara; Bruckman, Amy; Guzdial, Mark – ACM Transactions on Computing Education, 2012
We present the results of an interview study investigating student experiences in two online introductory computer science courses. Our theoretical approach is situated at the intersection of two research traditions: "distance and adult education research," which tends to be sociologically oriented, and "computer science education…
Descriptors: Computer Science Education, Programming, Distance Education, Online Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Ludi, Stephanie; Reichlmayr, Tom – ACM Transactions on Computing Education, 2011
This article describes an outreach program to broaden participation in computing to include more students with visual impairments. The precollege workshops target students in grades 7-12 and engage students with robotics programming. The use of robotics at the precollege level has become popular in part due to the availability of Lego Mindstorm…
Descriptors: High School Students, Visual Impairments, Middle School Students, Outreach Programs