Publication Date
| In 2026 | 0 |
| Since 2025 | 27 |
| Since 2022 (last 5 years) | 122 |
| Since 2017 (last 10 years) | 553 |
| Since 2007 (last 20 years) | 1605 |
Descriptor
Source
Author
Publication Type
Education Level
Location
| Turkey | 79 |
| Australia | 58 |
| Canada | 53 |
| China | 36 |
| California | 35 |
| United Kingdom | 30 |
| Taiwan | 24 |
| United States | 21 |
| United Kingdom (England) | 19 |
| Texas | 18 |
| Germany | 16 |
| More ▼ | |
Laws, Policies, & Programs
| Individuals with Disabilities… | 2 |
| Americans with Disabilities… | 1 |
| Higher Education Act Title IX | 1 |
| Higher Education Opportunity… | 1 |
| Morrill Act 1862 | 1 |
| Title IX Education Amendments… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Zack J. Damon; Michael E. Ellis – Sport Management Education Journal, 2025
Sport analytics remains a growing area in the sport industry. As such, the demand for skills and knowledge in this area has grown. This demand includes off-field data, such as marketing trends, as well as financial data related to sport organizations. There has been a trickle-down effect in sport management (and other) education programs to teach…
Descriptors: Athletics, Data Collection, Data Analysis, Coding
Leah Bidlake; Eric Aubanel; Daniel Voyer – ACM Transactions on Computing Education, 2025
Research on mental model representations developed by programmers during parallel program comprehension is important for informing and advancing teaching methods including model-based learning and visualizations. The goals of the research presented here were to determine: how the mental models of programmers change and develop as they learn…
Descriptors: Schemata (Cognition), Programming, Computer Science Education, Coding
Muntasir Hoq; Ananya Rao; Reisha Jaishankar; Krish Piryani; Nithya Janapati; Jessica Vandenberg; Bradford Mott; Narges Norouzi; James Lester; Bita Akram – International Educational Data Mining Society, 2025
In Computer Science (CS) education, understanding factors contributing to students' programming difficulties is crucial for effective learning support. By identifying specific issues students face, educators can provide targeted assistance to help them overcome obstacles and improve learning outcomes. While identifying sources of struggle, such as…
Descriptors: Computer Science Education, Programming, Misconceptions, Error Patterns
Ainhoa Berciano; Astrid Cuida; María-Luisa Novo – Education and Information Technologies, 2025
In the last two decades, computational thinking has gained wide relevance in international educational systems. The inclusion of this new type of thinking poses educational challenges with some underlying research questions that need to be answered to meet these challenges with quality. Thus, this study focuses on analyzing the difficulties that…
Descriptors: Coding, Translation, Programming Languages, Sequential Approach
Gus Greivel; Alexandra Newman; Maxwell Brown; Kelly Eurek – INFORMS Transactions on Education, 2024
Industrial-scale models require considerable setup time; hence, once built, they are used in myriad ways to consider closely related cases. In practice, the code for these models frequently evolves without appropriate notational choices, largely as a result of the lengthy development time of, and the number of individuals contributing to, their…
Descriptors: Models, Best Practices, Mathematical Concepts, Energy
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Jeffrey Ehme – PRIMUS, 2024
The Miller-Rabin test is a useful probabilistic method for finding large primes. In this paper, we explain the method in detail and give three variations on this test. These variations were originally developed as student projects to supplement a course in error correcting codes and cryptography.
Descriptors: Probability, Numbers, Coding, Algorithms
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Cindy Royal – Journalism and Mass Communication Educator, 2025
Artificial intelligence (AI) has taken the forefront in discussions of the future of media and education. Although there are valid concerns, AI has the potential to be useful in learning new skills, particularly those related to computer programming. This case study depicts the ways AI was introduced to assist in teaching coding, specifically in a…
Descriptors: Artificial Intelligence, Coding, Programming, Computer Science Education
Changming Liang; Lei Du – Journal of Educational Computing Research, 2025
This study delved into the impact of educational robotics, virtual coding, and unplugged coding on the problem-solving, computational thinking (CT), and coding skills of English as a Foreign Language (EFL) learners. Employing a pretest-posttest experimental design, the study encompassed 351 EFL students distributed across four groups to compare…
Descriptors: Foreign Countries, College Students, English (Second Language), Second Language Learning
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
Joshua Holden – PRIMUS, 2024
This paper describes Alkaline, a size-reduced version of Kyber, which has recently been announced as a prototype NIST standard for post-quantum public-key cryptography. While not as simple as RSA, I believe that Alkaline can be used in an undergraduate classroom to effectively teach the techniques and principles behind Kyber and post-quantum…
Descriptors: Technology, Coding, Undergraduate Study, Algebra
C. Beaver – PRIMUS, 2024
In this paper, several research topics are presented that provide productive avenues of exploration for students in an undergraduate cryptography course. The topics are intended for a variety of skill levels and interests. In some cases, a student might be inspired to try to solve the proposed problem or write computer code. Other topics might…
Descriptors: Technology, Coding, Undergraduate Students, Student Projects
Andrew Millam; Christine Bakke – Journal of Information Technology Education: Innovations in Practice, 2024
Aim/Purpose: This paper is part of a multi-case study that aims to test whether generative AI makes an effective coding assistant. Particularly, this work evaluates the ability of two AI chatbots (ChatGPT and Bing Chat) to generate concise computer code, considers ethical issues related to generative AI, and offers suggestions for how to improve…
Descriptors: Coding, Artificial Intelligence, Natural Language Processing, Computer Software

Peer reviewed
Direct link
