NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 1,526 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Noah Glaser; Zeinab Parishani; Amogh Chetankumar Joshi; Prasad Calyam – Technology, Knowledge and Learning, 2025
As Virtual Reality (VR) gains traction in education, its potential to support neurodivergent learners in cybersecurity training remains underexplored. This emerging technology report examines how VR can bridge the gap between STEM education and cybersecurity training for neurodivergent individuals, highlighting both its promise and the challenges…
Descriptors: Computer Simulation, Computer Uses in Education, Computer Science Education, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Peer reviewed Peer reviewed
Direct linkDirect link
Radek Pelánek – ACM Transactions on Computing Education, 2025
Learning environments for programming education need a comprehensive task set that guides students from basic programming concepts to complex challenges. For creating such a task set, it is beneficial to utilize the concept of a design space--a systematic mapping of design dimensions and choices along these dimensions. We propose an iterative…
Descriptors: Computer Science Education, Programming, Design, Task Analysis
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Iago Rodrigues Agualuza; Silvana Morita Melo; Lina Garcés; Vânia de Oliveira Neves – Informatics in Education, 2025
Modern software companies prioritize high-quality products for competitiveness, and Software Process Improvement (SPI) models help achieve this. In Brazil, the Brazilian Software Process Improvement Model ("MPS-SW" model) is widely used, but its complexity and extensive documentation make it challenging to teach in undergraduate courses.…
Descriptors: Educational Games, Teaching Methods, Computer Science Education, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Loïs Vanhée; Karin Danielsson; Lena Enqvist; Kalle Grill; Melania Borit – European Journal of Education, 2024
Whereas hackathons are widespread within and outside academia and have been argued to be a valid pedagogical method for teaching interdisciplinarity, no detailed frameworks or methods are available for conceptualizing and organizing educational hackathons, i.e., hackathons dedicated to best achieving pedagogic objectives. This paper is dedicated…
Descriptors: Interdisciplinary Approach, Learning Activities, Programming, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Eric Schätz; Alke Martens – International Association for Development of the Information Society, 2023
Due the wideness of the term Physical Computing, there is a need for a better structure of this topic. This paper is about an approach of structuring this field by finding attributes of different physical computing devices which can be used in class. Those attributes are meant to enforce teachers as well as researchers to analyze different devices…
Descriptors: Computer Use, Handheld Devices, Telecommunications, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Jun-Ming Su – Education and Information Technologies, 2024
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginners, to develop correct concepts and practical hands-on abilities through cybersecurity education. At present, many methods offer…
Descriptors: Computer Science Education, Information Security, Computer Security, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Draper, Steve; Maguire, Joseph – ACM Transactions on Computing Education, 2023
The overall aim of this article is to stimulate discussion about the activities within CER, and to develop a more thoughtful and explicit perspective on the different types of research activity within CER, and their relationships with each other. While theories may be the most valuable outputs of research to those wishing to apply them, for…
Descriptors: Computer Science Education, Educational Research, Computer Science, Classification
Peer reviewed Peer reviewed
Direct linkDirect link
Gerit Wagner; Laureen Thurner – Journal of Information Systems Education, 2025
Git, as the leading version-control system, is frequently employed by software developers, digital product managers, and knowledge workers. Information systems (IS) students aspiring to fill software engineering, management, or research positions would therefore benefit from familiarity with Git. However, teaching Git effectively can be…
Descriptors: Computer Science Education, Information Systems, Teaching Methods, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
David M. Woods; Andrea Hulshult – Information Systems Education Journal, 2025
IT/IS educators continue to work to develop content and activities for teaching Agile practices, processes, and methodologies to their courses to ensure students have the skills expected by businesses. Given the wide range of tools and technologies that fall under the umbrella of Agile and the wide range of places where Agile is applied, educators…
Descriptors: Information Technology, Information Science Education, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Madhav Sharma; Roger McHaney – Decision Sciences Journal of Innovative Education, 2025
Many management information systems (MIS) faculty have adopted a project-oriented approach in their systems analysis and design courses. In these courses, students use a software development methodology to create a web or mobile application project, which can be based on a predefined case or developed for an external stakeholder. Because most…
Descriptors: Computer Software, Artificial Intelligence, Instructional Design, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Daniel T. Hickey; Ronald J. Kantor – Journal of Cybersecurity Education, Research and Practice, 2024
The cybersecurity threat landscape evolves quickly, continually, and consequentially. This means that the "transfer" of cybersecurity learning is crucial. We compared how different recognized "cognitive" transfer theories might help explain and synergize three aspects of cybersecurity education. These include "teaching and…
Descriptors: Transfer of Training, Computer Science Education, Computer Security, Metacognition
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Felix Winkelnkemper; Lukas Höper; Carsten Schulte – Informatics in Education, 2024
When it comes to mastering the digital world, the education system is more and more facing the task of making students competent and self-determined agents when interacting with digital artefacts. This task often falls to computing education. In the traditional fields of computing education, a plethora of models, guidelines, and principles exist,…
Descriptors: Digital Literacy, Computer Uses in Education, Models, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Trofimova, Ellina; Asgharzadeh Kangachar, Shahla; Weynberg, Karen D.; Willows, Robert D.; Jaschke, Paul R. – Biochemistry and Molecular Biology Education, 2023
With the global increase of infections caused by antibiotic-resistant bacterial strains, there is an urgent need for new methods of tackling the issue. Genomic analysis of bacterial strains can help to understand their virulence and antibiotic resistance profile. Bioinformatic skills are in great demand across the biological sciences. We designed…
Descriptors: Genetics, Science Instruction, Microbiology, Information Science
Peer reviewed Peer reviewed
Direct linkDirect link
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  102