Publication Date
| In 2026 | 0 |
| Since 2025 | 298 |
| Since 2022 (last 5 years) | 1303 |
| Since 2017 (last 10 years) | 2958 |
| Since 2007 (last 20 years) | 4871 |
Descriptor
| Computer Software | 6077 |
| Teaching Methods | 6077 |
| Foreign Countries | 2148 |
| Educational Technology | 1586 |
| Computer Assisted Instruction | 1371 |
| Student Attitudes | 1204 |
| Second Language Learning | 1039 |
| Second Language Instruction | 1025 |
| Mathematics Instruction | 861 |
| Computer Uses in Education | 824 |
| English (Second Language) | 785 |
| More ▼ | |
Source
Author
Publication Type
Education Level
Audience
| Teachers | 490 |
| Practitioners | 365 |
| Researchers | 75 |
| Students | 33 |
| Administrators | 28 |
| Policymakers | 14 |
| Parents | 9 |
| Media Staff | 4 |
| Community | 2 |
Location
| Turkey | 193 |
| Australia | 152 |
| China | 131 |
| United Kingdom | 103 |
| Indonesia | 94 |
| Taiwan | 87 |
| Spain | 79 |
| Canada | 69 |
| Saudi Arabia | 59 |
| Iran | 52 |
| Malaysia | 50 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 2 |
| Meets WWC Standards with or without Reservations | 3 |
| Does not meet standards | 4 |
Krish Pillai; Marcia Lovas – International Society for Technology, Education, and Science, 2023
A typical first computer science course (CS1) introduces the student to coding conventions, variables, methods, control structures, conditionals, and the semantics of classes and objects. Advanced concepts of inheritance, polymorphism, abstract classes, interfaces, and their use in the design process, are covered in a second-level course (CS2).…
Descriptors: Computer Games, Educational Games, Teaching Methods, Technology Uses in Education
Davis Krumins; Sandra Schumann; Veiko Vunder; Rauno Põlluäär; Kristjan Laht; Renno Raudmäe; Alvo Aabloo; Karl Kruusamäe – IEEE Transactions on Learning Technologies, 2024
Teaching robotics with the robot operating system (ROS) is valuable for instating good programming practices but requires significant setup steps from the learner. Providing a ready-made ROS learning environment over the web can make robotics more accessible; however, most of the previous remote labs have abstracted the authentic ROS developer…
Descriptors: Teaching Methods, Robotics, Programming, Computer Science Education
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Caroline Marx; Stephanie Roesch; Korbinian Moeller; Christiane Benz – International Electronic Journal of Mathematics Education, 2025
Understanding part-whole relations is crucial in early mathematics education. However, both analogue and digital learning environments often lack systematic approaches to foster part-whole understanding. With the rising popularity of educational apps, it is essential to evaluate how they implement learning of part-whole relations. Accordingly,…
Descriptors: Mathematics Instruction, Computer Software, Teaching Methods, Computer Assisted Instruction
Iago Rodrigues Agualuza; Silvana Morita Melo; Lina Garcés; Vânia de Oliveira Neves – Informatics in Education, 2025
Modern software companies prioritize high-quality products for competitiveness, and Software Process Improvement (SPI) models help achieve this. In Brazil, the Brazilian Software Process Improvement Model ("MPS-SW" model) is widely used, but its complexity and extensive documentation make it challenging to teach in undergraduate courses.…
Descriptors: Educational Games, Teaching Methods, Computer Science Education, Computer Software
James McGibney – ProQuest LLC, 2024
This phenomenological study's objective was to review the existing initiatives for cybersecurity awareness and training that are in place for the K-12 education system throughout the United States. Every facet of life is now plagued by the potential, perceived, and real threat of cyber warfare, which includes, but is not limited to, K-12 schools…
Descriptors: Information Security, Computer Security, Crime, Kindergarten
Esmail Mohebbi – Decision Sciences Journal of Innovative Education, 2025
Microsoft Excel and Access are widely used in introductory courses designed to teach the fundamentals of spreadsheet and relational database modeling skills in various disciplines. To achieve the targeted learning outcomes, instructors of these courses strive to provide students with guided, frequent, and incrementally fruitful practice with the…
Descriptors: Teaching Methods, Instructional Effectiveness, Spreadsheets, Computer Simulation
Zhihan Wang – Education and Information Technologies, 2025
The integration of classical and modern teaching strategies enables the creation of an effective educational environment that meets the needs of various types of learners. The aim of this study is to explore the potential for integrating mobile applications into vocal education by analyzing their accessibility and effectiveness as learning tools,…
Descriptors: Educational Technology, Technology Uses in Education, Technology Integration, Computer Oriented Programs
Wilson Libardo Pantoja Yépez; Julio Ariel Hurtado Alegría; Ajay Bandi; Arvind W. Kiwelekar – Education and Information Technologies, 2024
The ability to define, evaluate, and implement software architectures is a fundamental skill for software engineers. However, teaching software architecture can be challenging as it requires students to be involved in real-context projects with high degrees of complexity. This involves making trade-off decisions among several quality attributes.…
Descriptors: Computer Software, Training, Computer Science Education, Teaching Methods
Eric Schätz; Alke Martens – International Association for Development of the Information Society, 2023
Due the wideness of the term Physical Computing, there is a need for a better structure of this topic. This paper is about an approach of structuring this field by finding attributes of different physical computing devices which can be used in class. Those attributes are meant to enforce teachers as well as researchers to analyze different devices…
Descriptors: Computer Use, Handheld Devices, Telecommunications, Teaching Methods
Sokratis Tselegkaridis; Theodosios Sapounidis; Serafeim A. Triantafyllou – Discover Education, 2025
Nowadays, the educational process is enriched with technological tools such as Arduino and Micro:bit. These tools offer both tangible and graphical interaction, however, widespread adoption by educators faces limitations. Many educators hesitate to utilize them, primarily due to lacking training. Therefore, this study examines educators'…
Descriptors: Technology Uses in Education, Elementary School Teachers, Secondary School Teachers, Electronic Equipment
Noelle Brown; Sara Nurollahian; Eliane S. Wiese – ACM Transactions on Computing Education, 2025
While there have been many calls for teaching ethics and responsible computing, it is unclear how responsible computing instruction and technical learning interact. Some instructors even hesitate to include ethics in their courses, fearing it might distract students from learning technical computing content. An approach called…
Descriptors: Teaching Methods, Computer Science Education, Intervention, Ethics
Jun-Ming Su – Education and Information Technologies, 2024
With the rapid growth of web applications, web application security (WAS) has become an important cybersecurity issue. For effective WAS protection, it is necessary to cultivate and train personnel, especially beginners, to develop correct concepts and practical hands-on abilities through cybersecurity education. At present, many methods offer…
Descriptors: Computer Science Education, Information Security, Computer Security, Web Sites
Carlos Sandoval-Medina; Carlos Argelio Arévalo-Mercado; Estela Lizbeth Muñoz-Andrade; Jaime Muñoz-Arteaga – Journal of Information Systems Education, 2024
Learning basic programming concepts in computer science-related fields poses a challenge for students, to the extent that it becomes an academic-social problem, resulting in high failure and dropout rates. Proposed solutions to the problem can be found in the literature, such as the development of new programming languages and environments, the…
Descriptors: Cognitive Ability, Computer Science Education, Programming, Instructional Materials
W. Monty Jones; Katherine Hansen; Douglas Lusa Krug; Michael L. Schad; Nakisha Whittington; Xun Liu – Computer Science Education, 2025
Background and Context: Efforts to engage adult learners in computer science in the United States have been largely unsuccessful. While research examining the use of music for teaching computer programming with K-12 learners is emerging, little research with adult learners exists. Objective: This study evaluates the effect of computer coding…
Descriptors: Musical Composition, Computer Software, Adult Students, Student Attitudes

Peer reviewed
Direct link
