Publication Date
In 2025 | 23 |
Since 2024 | 493 |
Since 2021 (last 5 years) | 1852 |
Since 2016 (last 10 years) | 3398 |
Since 2006 (last 20 years) | 4962 |
Descriptor
Source
Author
Barnes, Tiffany | 21 |
Armoni, Michal | 15 |
Gal-Ezer, Judith | 15 |
Yadav, Aman | 15 |
Malmi, Lauri | 14 |
Soh, Leen-Kiat | 14 |
Xinogalos, Stelios | 14 |
Frydenberg, Mark | 12 |
Laakso, Mikko-Jussi | 12 |
Hazzan, Orit | 11 |
Hunter, Beverly | 11 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 497 |
Teachers | 306 |
Researchers | 94 |
Policymakers | 62 |
Administrators | 48 |
Students | 45 |
Parents | 6 |
Community | 5 |
Media Staff | 5 |
Support Staff | 1 |
Location
Turkey | 221 |
Australia | 138 |
United Kingdom | 123 |
Taiwan | 105 |
Canada | 93 |
California | 90 |
China | 88 |
Germany | 75 |
Spain | 74 |
Finland | 66 |
Greece | 63 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Meets WWC Standards with or without Reservations | 2 |
Does not meet standards | 1 |
Schneider, Johannes; Bernstein, Abraham; Brocke, Jan vom; Damevski, Kostadin; Shepherd, David C. – IEEE Transactions on Learning Technologies, 2018
All methodologies for detecting plagiarism to date have focused on the final digital "outcome", such as a document or source code. Our novel approach takes the creation process into account using logged events collected by special software or by the macro recorders found in most office applications. We look at an author's interaction…
Descriptors: Plagiarism, Assignments, Programming, Computer Software
Tureniyazova, Asiya Ibragimovna – Research in Social Sciences and Technology, 2019
To date, hundreds of advanced teaching methods, such as game methods, have been developed, and these problem-based learning methods are widely used in education. Most of these technologies are based on the principles of student-centered and participatory learning. These interactive methods allow the learner to master the necessary professional…
Descriptors: Teaching Methods, Visual Aids, Information Technology, Computer Science Education
Burrows, Andrea C.; Borowczak, Mike – Educational Action Research, 2019
This article explores one group's use of action research (AR) and lesson study in three US university-level computer science courses affecting 85 undergraduate computer science and engineering students. It offers an overview of three areas including AR, lesson study, and engineering soft skills. The research group identified a problem:…
Descriptors: Computer Science Education, Engineering Education, Action Research, Conflict Resolution
Candela, Anthony R. – Journal of Visual Impairment & Blindness, 2019
Computer programming (also known as coding) is a career path that many individuals choose to pursue. The occupation of computer programmer has in the past and will continue in the future to afford people who are visually impaired (i.e., those who are blind or have low vision) a wide variety of job possibilities. Because students with visual…
Descriptors: Access to Computers, Accessibility (for Disabled), Blindness, Visual Impairments
Taipalus, Toni – Journal of Information Systems Education, 2019
Structured Query Language (SQL) is still the de facto database query language widely used in industry and taught in almost all university level database courses. The role of SQL is further strengthened by the emergence of NewSQL systems which use SQL as their query language as well as some NoSQL systems, e.g., Cassandra and DynamoDB, which base…
Descriptors: Programming Languages, Programming, Computer Science Education, Databases
Exploring Saudi Computer Science Teachers' Conceptual Mastery Level of Computational Thinking Skills
Alfayez, Abdulaziz A.; Lambert, Judy – Computers in the Schools, 2019
The Ministry of Education in Saudi Arabia implemented a new computer science curriculum in 2008. There was speculation that many computer science teachers did not possess sufficient knowledge of computational thinking needed to teach this subject. To investigate this topic, a quantitative research study was conducted with 55 male computer science…
Descriptors: Foreign Countries, Computer Science Education, Males, Secondary School Teachers
Aljumaily, Harith; Cuadra, Dolores; Laefer, Debra F. – Computer Science Education, 2019
Background: Conceptual models are an essential phase in software design, but they can create confusion and reduced performance for students in Database Design courses. Objective: A novel Relational Data Model Validation Tool (MVTool) was developed and tested to determine (1) if students who use MVTool perform better than those who do not, and (2)…
Descriptors: Models, Databases, Computer Science Education, Skills
Pattanaphanchai, Jarutas – Journal of University Teaching and Learning Practice, 2019
Computer programming is a difficult subject for most novice programming students which leads to a high rate of dropout or failure. Flipped classrooms have been increasingly used to teach programming students to practice their programming skills in the class based on their knowledge acquired from outside the classroom. This study investigated…
Descriptors: Foreign Countries, College Students, Academic Achievement, Blended Learning
Aeiad, Eiman; Meziane, Farid – Education and Information Technologies, 2019
With the rapid advances in E-learning systems, personalisation and adaptability have now become important features in the education technology. In this paper, we describe the development of an architecture for A Personalised and Adaptable E-Learning System (APELS) that attempts to contribute to advancements in this field. APELS aims to provide a…
Descriptors: Electronic Learning, Individualized Instruction, Computer Science Education, Computer System Design
Žanko, Žana; Mladenovic, Monika; Boljat, Ivica – Education and Information Technologies, 2019
There are known misconceptions about variables which are mostly the same since the first studies since more than 30 years ago. Consciousness about the misconceptions in programming can be crucial for teaching and learning programming for novices because, if we are aware of them, maybe we can minimise or even prevent them. Researchers mostly…
Descriptors: Misconceptions, Elementary Secondary Education, Programming, Programming Languages
Vachharajani, Vinay; Pareek, Jyoti – International Journal of Distance Education Technologies, 2019
E-learning plays a significant role in educating large number of students. In the delivery of e-learning material, automatic e-assessment has been applied only to some extent in the case of free response answers in highly technical diagrams in domains like software engineering, electronics, etc., where there is a great scope of imagination and…
Descriptors: Automation, Visual Aids, Student Evaluation, Undergraduate Students
Hsu, Yu-Chang; Irie, Natalie Roote; Ching, Yu-Hui – TechTrends: Linking Research and Practice to Improve Learning, 2019
Since 2006, there has been an ever-increasing momentum in computational thinking educational policy initiatives (CTEPI) across the globe. In this paper, the representative CT educational policy initiatives viewed through the lens of international perspectives and cultural contexts were examined, compared and discussed. Reports, white papers, and…
Descriptors: Computation, Thinking Skills, Educational Policy, Computer Science Education
Abramova, Irina V.; Shilova, Zoya V.; Varankina, Vera I.; Rubanova, Irina V. – European Journal of Contemporary Education, 2019
The present article is aimed to prove that integrative-modular training is one of the conditions for the formation of students' unified vision of the professional world, and to offer a solution to the problem: what is the pedagogical model of integrative-modular training in professional preparation of students. The aim of the article is to…
Descriptors: Professional Education, Teaching Models, Foreign Countries, College Students
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Maycock, Keith W. – Journal of Computer Assisted Learning, 2019
The case study was carried out at a third-level college in Ireland to investigate the performance of a student population completing a first year computer architecture module using a flipped learning approach against a traditional chalk and talk approach. The study was completed over a 2-year period with the same lecturer delivering both…
Descriptors: Foreign Countries, Lecture Method, Blended Learning, College Students