Publication Date
| In 2024 | 110 |
| Since 2023 | 234 |
| Since 2020 (last 5 years) | 573 |
| Since 2015 (last 10 years) | 3193 |
| Since 2005 (last 20 years) | 5299 |
Descriptor
| Coding | 5682 |
| Foreign Countries | 1621 |
| Qualitative Research | 1175 |
| Teaching Methods | 1059 |
| Interviews | 981 |
| Statistical Analysis | 731 |
| Student Attitudes | 650 |
| Observation | 600 |
| Semi Structured Interviews | 599 |
| Case Studies | 577 |
| Teacher Attitudes | 556 |
| More ▼ | |
Source
Author
Publication Type
Education Level
Audience
| Teachers | 66 |
| Practitioners | 35 |
| Researchers | 35 |
| Policymakers | 13 |
| Students | 9 |
| Administrators | 8 |
| Media Staff | 8 |
| Counselors | 6 |
| Parents | 5 |
| Support Staff | 3 |
| Community | 1 |
| More ▼ | |
Location
| Turkey | 165 |
| Australia | 160 |
| Canada | 139 |
| California | 111 |
| China | 78 |
| United Kingdom | 77 |
| United Kingdom (England) | 71 |
| United States | 68 |
| Texas | 67 |
| Germany | 66 |
| Taiwan | 61 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 1 |
| Meets WWC Standards with or without Reservations | 1 |
Davi Bernardo Silva; Deborah Ribeiro Carvalho; Carlos N. Silla – IEEE Transactions on Learning Technologies, 2024
Throughout a programming course, students develop various source code tasks. Using these tasks to track students' progress can provide clues to the strengths and weaknesses found in each learning topic. This practice allows the teacher to intervene in learning in the first few weeks of class and maximize student gains. However, the biggest…
Descriptors: Computation, Models, Ability Grouping, Programming
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Gamon Savatsomboon; Prasert Ruannakarn; Phamornpun Yurayat; Ong-art Chanprasitchai; Jibon Kumar Sharma Leihaothabam – European Journal of Psychology and Educational Research, 2024
Using R to conduct univariate meta-analyses is becoming common for publication. However, R can also conduct multivariate meta-analysis (MMA). However, newcomers to both R and MMA may find using R to conduct MMA daunting. Given that, R may not be easy for those unfamiliar with coding. Likewise, MMA is a topic of advanced statistics. Thus, it may be…
Descriptors: Educational Psychology, Multivariate Analysis, Evaluation Methods, Data Processing
Stephanie J. Gardiner-Walsh; Karla Giese – Journal of Deaf Studies and Deaf Education, 2024
Cued Speech is a system that manually codes the phonemic patterns of spoken languages for visual accessibility. Since its inception, this system has transitioned from a support for speech reading to the current use of home language and literacy development. While controversial in some sectors within the field of Deaf education and the Deaf…
Descriptors: Native Language, Cued Speech, Literacy, Deafness
Hanneke Theelen; Joyce Vreuls; Jim Rutten – International Journal of Technology in Education, 2024
The rapid development of artificial intelligence and large language models (LLMs) has led to significant advancements in applying machine learning techniques across diverse disciplines, including educational science research. This study investigates the potential of LLMs like ChatGPT for qualitative data analysis, focusing on open, axial,…
Descriptors: Artificial Intelligence, Science Education, Educational Research, Coding
Melinda Lanius – PRIMUS, 2024
In this paper, I analyze the impact of culture and metaphor on cryptology education. I will compare and contrast the historically grounded metaphors of cryptology-is-warfare and encryption-is-security to a set of counter-metaphors: cryptology-is-privacy and encryption-is-communication. Using this explicit understanding of conceptual metaphor, I…
Descriptors: Figurative Language, Technology, Coding, Information Security
Joshua Holden – PRIMUS, 2024
This paper describes Alkaline, a size-reduced version of Kyber, which has recently been announced as a prototype NIST standard for post-quantum public-key cryptography. While not as simple as RSA, I believe that Alkaline can be used in an undergraduate classroom to effectively teach the techniques and principles behind Kyber and post-quantum…
Descriptors: Technology, Coding, Undergraduate Study, Algebra
Yuhan Lin – ProQuest LLC, 2024
Block-based programming environments have become increasingly commonplace in computer science education. Despite a rapidly expanding ecosystem of block-based programming environments, text-based languages remain the dominant programming paradigm outside of educational contexts, motivating the transition from block-based to text-based programming.…
Descriptors: Computer Science Education, Programming, Coding, Scaffolding (Teaching Technique)
Pavlos Toukiloglou; Stelios Xinogalos – Education and Information Technologies, 2024
Hour of Code is a widely recognized global event that aims to introduce programming to novice users and integrate computer science into education. This paper presents an analysis of the effectiveness of the support system and user interface of Minecraft Adventurer, a serious game designed for the Hour of Code global event. Although previous…
Descriptors: Novices, Programming, Coding, Computer Science Education
Oscar Karnalim; Hapnes Toba; Meliana Christianti Johan – Education and Information Technologies, 2024
Artificial Intelligence (AI) can foster education but can also be misused to breach academic integrity. Large language models like ChatGPT are able to generate solutions for individual assessments that are expected to be completed independently. There are a number of automated detectors for AI assisted work. However, most of them are not dedicated…
Descriptors: Artificial Intelligence, Academic Achievement, Integrity, Introductory Courses
Shen, Guohua; Yang, Sien; Huang, Zhiqiu; Yu, Yaoshen; Li, Xin – Education and Information Technologies, 2023
Due to the growing demand for information technology skills, programming education has received increasing attention. Predicting students' programming performance helps teachers realize their teaching effect and students' learning status in time to provide support for students. However, few of the existing researches have taken the code that…
Descriptors: Prediction, Programming, Student Characteristics, Profiles
Fernandez-Gauna, Borja; Rojo, Naiara; Graña, Manuel – International Journal of Educational Technology in Higher Education, 2023
We describe an automated assessment process for team-coding assignments based on DevOps best practices. This system and methodology includes the definition of Team Performance Metrics measuring properties of the software developed by each team, and their correct use of DevOps techniques. It tracks the progress on each of metric by each group. The…
Descriptors: Computer Software, Programming, Coding, Teamwork
Mosquera, Jose Miguel Llanos; Suarez, Carlos Giovanny Hidalgo; Guerrero, Victor Andres Bucheli – Education and Information Technologies, 2023
This paper proposes to evaluate learning efficiency by implementing the flipped classroom and automatic source code evaluation based on the Kirkpatrick evaluation model in students of CS1 programming course. The experimentation was conducted with 82 students from two CS1 courses; an experimental group (EG = 56) and a control group (CG = 26). Each…
Descriptors: Flipped Classroom, Coding, Programming, Evaluation Methods
C. Beaver – PRIMUS, 2024
In this paper, several research topics are presented that provide productive avenues of exploration for students in an undergraduate cryptography course. The topics are intended for a variety of skill levels and interests. In some cases, a student might be inspired to try to solve the proposed problem or write computer code. Other topics might…
Descriptors: Technology, Coding, Undergraduate Students, Student Projects
Florida Department of Education, 2024
Florida's high school graduation rate is based on the percentage of students who graduated with a standard diploma within four years of their first full year of enrollment in ninth grade in the state. However, adjustments are made to this cohort over time to: (1) add incoming transfer students based on their grade level and year of entry; (2)…
Descriptors: High School Graduates, Graduation Rate, Withdrawal (Education), Documentation

Peer reviewed
Direct link
