NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Donado, Marjorie Fontalvo – ProQuest LLC, 2022
Universities are reflections of our societies and are tasked with educating the next generation of experts. The computer science (CS) phenomenon, with its high-paying jobs, attracts more students than ever to the CS undergraduate major. One may wonder why women are underrepresented in the CS major if they constitute half of university enrollment…
Descriptors: College Students, Females, Computer Science Education, Majors (Students)
Peer reviewed Peer reviewed
Direct linkDirect link
Gonzalez, Fernando – Education and Information Technologies, 2023
The study of robotics has become a popular course among many educational programs, especially as a technical elective. A significant part of this course involves having the students learn how to program the movement of a robotic arm by controlling the velocity of its individual joint motors, a topic referred to as joint programming. They must…
Descriptors: Robotics, Educational Technology, Technology Uses in Education, Simulation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Maria Chaparro Osman; Maureen Namukasa; Cherrise Ficke; Isabella Piasecki; T. J. O'Connor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2023
A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the cybersecurity workforce. This workforce shortage has partly been attributed to the lack of diversity in the cybersecurity field, with women, African…
Descriptors: Diversity (Institutional), Labor Force, Computer Security, Disproportionate Representation
Peer reviewed Peer reviewed
Direct linkDirect link
Lunn, Stephanie; Ross, Monique; Hazari, Zahra; Weiss, Mark Allen; Georgiopoulos, Michael; Christensen, Kenneth – ACM Transactions on Computing Education, 2022
Despite increasing demands for skilled workers within the technological domain, there is still a deficit in the number of graduates in computing fields (computer science, information technology, and computer engineering). Understanding the factors that contribute to students' motivation and persistence is critical to helping educators,…
Descriptors: Educational Experience, Prediction, Identification (Psychology), Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Maral Kargarmoakhar; Monique Ross; Zahra Hazari; Stephen Secules; Mark Allen Weiss; Michael Georgiopoulos; Kenneth Christensen; Tiana Solis – ACM Transactions on Computing Education, 2024
While computing programs in the U.S. are experiencing growth in enrollment trends, they are still grappling with matters related to retention and persistence of computing undergraduates. One construct identified by scholars as having an impact on persistence in computing is computing identity, which is shaped by constructs such as recognition,…
Descriptors: Communities of Practice, Scholarships, Computer Science Education, Self Concept
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ferris, Kaitlyn A.; Century, Jeanne; Zuo, Huifang – International Journal of Computer Science Education in Schools, 2021
This article reports on implementation of a problem-based learning intervention developed with the intention of finding time for computer science (CS) in the elementary school day. This study investigated differences in effects on students in particular socio-demographic groups using a quasi-experimental design. We first provide an overview of the…
Descriptors: Equal Education, Computer Science Education, Elementary School Students, Intervention
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security