Publication Date
| In 2026 | 0 |
| Since 2025 | 403 |
| Since 2022 (last 5 years) | 1840 |
| Since 2017 (last 10 years) | 3663 |
| Since 2007 (last 20 years) | 5346 |
Descriptor
Source
Author
| Barnes, Tiffany | 21 |
| Armoni, Michal | 15 |
| Gal-Ezer, Judith | 15 |
| Yadav, Aman | 15 |
| Malmi, Lauri | 14 |
| Soh, Leen-Kiat | 14 |
| Xinogalos, Stelios | 14 |
| Frydenberg, Mark | 12 |
| Laakso, Mikko-Jussi | 12 |
| Hazzan, Orit | 11 |
| Hunter, Beverly | 11 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 500 |
| Teachers | 313 |
| Researchers | 98 |
| Policymakers | 67 |
| Administrators | 48 |
| Students | 45 |
| Parents | 6 |
| Community | 5 |
| Media Staff | 5 |
| Support Staff | 1 |
Location
| Turkey | 231 |
| Australia | 144 |
| United Kingdom | 124 |
| Taiwan | 107 |
| China | 101 |
| Canada | 97 |
| California | 96 |
| Germany | 78 |
| Spain | 77 |
| Finland | 69 |
| Greece | 66 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards with or without Reservations | 2 |
| Does not meet standards | 1 |
Dasuki, Salihu Ibrahim; Ogedebe, Peter; Kanya, Rislana Abdulazeez; Ndume, Hauwa; Makinde, Julius – International Journal of Education and Development using Information and Communication Technology, 2015
Efforts are been made by Universities in developing countries to ensure that it's graduate are not left behind in the competitive global information society; thus have adopted international computing curricular for their computing degree programs. However, adopting these international curricula seem to be very challenging for developing countries…
Descriptors: Developing Nations, Competence, Global Approach, International Cooperation
Tsai, Chia-Wen – Interactive Learning Environments, 2015
This research investigated, via quasi-experiments, the effects of web-based co-regulated learning (CRL) on developing students' computing skills. Two classes of 68 undergraduates in a one-semester course titled "Applied Information Technology: Data Processing" were chosen for this research. The first class (CRL group, n = 38) received…
Descriptors: Web Based Instruction, Cooperative Learning, Electronic Learning, Blended Learning
Tang, Chaoying; Baer, John; Kaufman, James C. – Journal of Creative Behavior, 2015
To study implicit concepts of creativity in computer science in the United States and mainland China, we first asked 308 Chinese computer scientists for adjectives that would describe a creative computer scientist. Computer scientists and non-computer scientists from China (N = 1069) and the United States (N = 971) then rated how well those…
Descriptors: Creativity, Computer Science Education, Foreign Countries, Educational Theories
Ezen-Can, Aysu; Boyer, Kristy Elizabeth – International Educational Data Mining Society, 2015
The tremendous effectiveness of intelligent tutoring systems is due in large part to their interactivity. However, when learners are free to choose the extent to which they interact with a tutoring system, not all learners do so actively. This paper examines a study with a natural language tutorial dialogue system for computer science, in which…
Descriptors: Intelligent Tutoring Systems, Natural Language Processing, Computer Science Education, Problem Solving
Bennett, Audrey; Eglash, Ron – International Journal of Web-Based Learning and Teaching Technologies, 2013
The phrase "broadening participation" is often used to describe efforts to decrease the race and gender gap in science and engineering education, and in this paper the authors describe an educational program focused on addressing the lower achievement rates and career interests of underrepresented ethnic groups (African American, Native…
Descriptors: Computer Science Education, Low Achievement, Disproportionate Representation, Ethnic Groups
Coggins, Porter E. – Computers in the Schools, 2013
The purpose of this article is to present several implications and recommendations regarding what elementary school children, aged 9-12 years, know about computer passwords and what they know about why computer passwords are important. Student knowledge can then be used to make relevant curriculum decisions based in conjunction with applicable…
Descriptors: Computer Security, Elementary School Students, Student Attitudes, Computer Attitudes
Yin, Chengjiu; Song, Yanjie; Tabata, Yoshiyuki; Ogata, Hiroaki; Hwang, Gwo-Jen – Educational Technology & Society, 2013
This paper proposes a conceptual framework, scaffolding participatory simulation for mobile learning (SPSML), used on mobile devices for helping students learn conceptual knowledge in the classroom. As the pedagogical design, the framework adopts an experiential learning model, which consists of five sequential but cyclic steps: the initial stage,…
Descriptors: Electronic Learning, Scaffolding (Teaching Technique), Handheld Devices, Experiential Learning
Akopian, David; Melkonyan, Arsen; Golgani, Santosh C.; Yuen, Timothy T.; Saygin, Can – Journal of Information Technology Education: Innovations in Practice, 2013
Smartphones are a common accessory to provide rich user experience due to superior memory, advanced software-hardware support, fast processing, and multimedia capabilities. Responding to this trend, advanced engineering systems tend to integrate mobile devices with their solutions to facilitate usability. With many young students showing interest…
Descriptors: Minicourses, Programming, Handheld Devices, Computer Oriented Programs
Bailey Lee, Cynthia; Garcia, Saturnino; Porter, Leo – ACM Transactions on Computing Education, 2013
Peer Instruction (PI) is an active learning pedagogical technique. PI lectures present students with a series of multiple-choice questions, which they respond to both individually and in groups. PI has been widely successful in the physical sciences and, recently, has been successfully adopted by computer science instructors in lower-division,…
Descriptors: Computer Science Education, Advanced Courses, Active Learning, Statistical Analysis
Velazquez-Iturbide, J. Angel – ACM Transactions on Computing Education, 2013
Greedy algorithms constitute an apparently simple algorithm design technique, but its learning goals are not simple to achieve.We present a didacticmethod aimed at promoting active learning of greedy algorithms. The method is focused on the concept of selection function, and is based on explicit learning goals. It mainly consists of an…
Descriptors: Mathematics, Experimental Teaching, Teaching Methods, Active Learning
Shesh, Amit – ACM Transactions on Computing Education, 2013
This article discusses the evolution of a single undergraduate computer graphics course over five semesters, driven by a primary question: if one could offer only one undergraduate course in graphics, what would it include? This constraint is relevant to many small and medium-sized colleges that lack resources, adequate expertise, and enrollment…
Descriptors: Undergraduate Study, Computer Graphics, Small Colleges, Programming
Liew, Tze Wei; Tan, Su-Mae; Jayothisa, Chandrika – Educational Technology & Society, 2013
The present study examined the impact of peer-like and expert-like agent stereotypes, as operationalized by agent's image and voice, on learners' agent perceptions, task-related attitudes, and learning achievement. 56 university freshmen (23 males and 33 females) interacted with either the peer-like agent (female college student) or the…
Descriptors: Foreign Countries, College Freshmen, Student Attitudes, Academic Achievement
Dolynskyi, Yevhen – Comparative Professional Pedagogy, 2014
Over the past decade in the world there has significantly increased the process of globalization, which resulted in high demand for the profession of a translator. For future interpreters it is important to be well informed, to know innovations of the sector, which they have chosen as the major. Therefore, the translator should be able to search…
Descriptors: Translation, Language Proficiency, Second Language Learning, Second Language Instruction
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Ewais, Ahmed; De Troyer, Olga – International Journal of Virtual and Personal Learning Environments, 2014
The use of 3D and Virtual Reality is gaining interest in the context of academic discussions on E-learning technologies. However, the use of 3D for learning environments also has drawbacks. One way to overcome these drawbacks is by having an adaptive learning environment, i.e., an environment that dynamically adapts to the learner and the…
Descriptors: Virtual Classrooms, Computer Simulation, Questionnaires, Electronic Learning

Peer reviewed
Direct link
