NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 32 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Kam, Hwee-Joo; Katerattanakul, Pairin – Journal of Information Technology Education: Innovations in Practice, 2019
Aim/Purpose: In this study, the researchers investigated whether the out-of-class learning approach could help the students to attain any valuable learning outcomes for cybersecurity learning and could enhance the perceived value of cybersecurity education among the students. Background: Cybersecurity learning poses challenges for its students to…
Descriptors: Academic Achievement, Learner Engagement, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Vicente, Aileen Joan; Tan, Tiffany Adelaine; Yu, Alvin Ray – Journal of Information Technology Education: Innovations in Practice, 2018
Aim/Purpose: This study was aimed at enhancing students' learning of software engineering methods. A collaboration between the Computer Science, Business Management, and Product Design programs was formed to work on actual projects with real clients. This interdisciplinary form of collaboration simulates the realities of a diverse Software…
Descriptors: Interdisciplinary Approach, Computer Science Education, Engineering Education, Business Administration Education
Peer reviewed Peer reviewed
Direct linkDirect link
Liebenberg, Janet; Pieterse, Vreda – Journal of Information Technology Education: Innovations in Practice, 2018
Aim/Purpose: The aims of this study were to investigate the feasibility of automatic assessment of programming tasks and to compare manual assessment with automatic assessment in terms of the effect of the different assessment methods on the marks of the students. Background: Manual assessment of programs written by students can be tedious. The…
Descriptors: Programming, Comparative Analysis, Grades (Scholastic), Evaluation Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Sharp, Jason H.; Sharp, Laurie A. – Journal of Information Technology Education: Innovations in Practice, 2017
Aim/Purpose: Compared student academic performance on specific course requirements in a C# programming course across three instructional approaches: traditional, online, and flipped. Background: Addressed the following research question--When compared to the online and traditional instructional approaches, does the flipped instructional approach…
Descriptors: Comparative Analysis, Academic Achievement, Conventional Instruction, Web Based Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Du, Jie; Wimmer, Hayden; Rada, Roy – Journal of Information Technology Education: Innovations in Practice, 2016
The Hour of Code is a one-hour introduction to computer science organized by Code.org, a non-profit dedicated to expanding participation in computer science. This study investigated the impact of the Hour of Code on students' attitudes towards computer programming and their knowledge of programming. A sample of undergraduate students from two…
Descriptors: Undergraduate Students, Computer Science Education, Programming, Introductory Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Dongo, Tendai; Reed, April H.; O'Hara, Margaret – Journal of Information Technology Education: Innovations in Practice, 2016
Pair programming is a collaborative programming practice that places participants in dyads, working in tandem at one computer to complete programming assignments. Pair programming studies with Computer Science (CS) and Software Engineering (SE) majors have identified benefits such as technical productivity, program/design quality, academic…
Descriptors: Management Information Systems, Majors (Students), Computer Software, Programming
Peer reviewed Peer reviewed
Direct linkDirect link
Sullivan, Amanda; Bers, Marina Umaschi – Journal of Information Technology Education: Innovations in Practice, 2016
Prior work demonstrates the importance of introducing young children to programming and engineering content before gender stereotypes are fully developed and ingrained in later years. However, very little research on gender and early childhood technology interventions exist. This pilot study looks at N = 45 children in kindergarten through second…
Descriptors: Early Childhood Education, Kindergarten, Grade 1, Grade 2
Peer reviewed Peer reviewed
Direct linkDirect link
Crabtree, John; Zhang, Xihui – Journal of Information Technology Education: Innovations in Practice, 2015
Teaching advanced programming can be a challenge, especially when the students are pursuing different majors with diverse analytical and problem-solving capabilities. The purpose of this paper is to explore the efficacy of using a particular problem as a vehicle for imparting a broad set of programming concepts and problem-solving techniques. We…
Descriptors: Computer Science Education, Programming Languages, Information Technology, Problem Solving
Peer reviewed Peer reviewed
Direct linkDirect link
English, John; English, Tammy – Journal of Information Technology Education: Innovations in Practice, 2015
In this paper we discuss the use of automated assessment in a variety of computer science courses that have been taught at Israel Academic College by the authors. The course assignments were assessed entirely automatically using Checkpoint, a web-based automated assessment framework. The assignments all used free-text questions (where the students…
Descriptors: Computer Science Education, Computer Assisted Testing, Foreign Countries, College Students
Peer reviewed Peer reviewed
Direct linkDirect link
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Ali, Azad; Smith, David – Journal of Information Technology Education: Innovations in Practice, 2014
This paper presents a debate between two faculty members regarding the teaching of the legacy programming course (COBOL) in a Computer Science (CS) program. Among the two faculty members, one calls for the continuation of teaching this language and the other calls for replacing it with another modern language. Although CS programs are notorious…
Descriptors: Programming Languages, Information Technology, Computer Science Education, Comparative Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Ali, Azad; Smith, David – Journal of Information Technology Education: Innovations in Practice, 2014
A department of computer science (CS) has faced a peculiar situation regarding their selection of introductory programming course. This course is a required course for the students enrolled in the CS program and is a prerequisite to their other advanced programming courses. At the same time, the course can be considered a general education course…
Descriptors: Introductory Courses, Programming, Computer Science Education, General Education
Peer reviewed Peer reviewed
Direct linkDirect link
Hattingh, Frederik; Buitendag, Albertus A. K.; van der Walt, Jacobus S. – Journal of Information Technology Education: Innovations in Practice, 2013
The transfer and teaching of programming and programming related skills has become, increasingly difficult on an undergraduate level over the past years. This is partially due to the number of programming languages available as well as access to readily available source code over the Web. Source code plagiarism is common practice amongst many…
Descriptors: Plagiarism, Identification, Programming, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Akopian, David; Melkonyan, Arsen; Golgani, Santosh C.; Yuen, Timothy T.; Saygin, Can – Journal of Information Technology Education: Innovations in Practice, 2013
Smartphones are a common accessory to provide rich user experience due to superior memory, advanced software-hardware support, fast processing, and multimedia capabilities. Responding to this trend, advanced engineering systems tend to integrate mobile devices with their solutions to facilitate usability. With many young students showing interest…
Descriptors: Minicourses, Programming, Handheld Devices, Computer Oriented Programs
Previous Page | Next Page ยป
Pages: 1  |  2  |  3