Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article
Free access

Participatory teaching methods in computer science

Published: 01 February 1987 Publication History

Abstract

This paper discusses the role of participatory teaching methods in the computer science classroom. The list of these methods includes brainstorming, directed dialogues, small discussion groups, role playing, games, debates, panel discussions, and Socratic dialogues. The author has used such methods in Computers and Society classes and to a limited degree in Compiler Design, Computer Architecture and Operating Systems classes and believes that such techniques have a place in the computer science classroom. It is the aim of this paper to provide an overview of participatory teaching methods and their use in computer science education.

References

[1]
M. Adler (Ed.), "The Conduct of Seminars" (Ch. i), The Paideia Proqram: Pointers and Prospects, Macmillan Publishing Co., 1984
[2]
L. Allen, P. Kugel and J. Ross, "QUERIES 'N THEORIES: The Science & Language Game", WFF 'N PROOF Publishers, iiii Maple Ave., Turtle Creek, PA 15145, Copyright 1970
[3]
E.P. Bell, Jr., "Debating Controversial Issues", The History Teacher, Vol. 15, No. 2, pp. 207-223 (Feb. 1982)
[4]
M. Buchmann, "Improving Education by Talking: Argument or Conversation?", Teachers Colleqe Record, Vol. 86, pp. 441- 453 (Spring 1985)
[5]
S. Carroll, et al, "The Relative Effectiveness of Training Methods-- Expert Opinion and Research", Personnel PsYchology, Vol. 25, pp. 495-509, 1972
[6]
J. Dewey, Experience and Education, Collier Books (a division of Macmillan Publishing Co.), 1938
[7]
D. Gailagher, et al, Using TAKING SIDES in the Classroom, (a general instructor's manual for the entire Taking Sides series), The Dushkin Publishing Group, Inc., Sluice Dock, Guilford, CT 06437 (phone 800/243-6532), 1986
[8]
P. Hounshell and G. Madrazo, Jr., "Debate: Verbal Encounters In the Science Classroom", School Science and Mathematics, Vol. 79, pp. 690-694 (Dec 79)
[9]
J. Newstrom, "Evaluating the Effectiveness of Training Methods", Personnel Administrator, January 1980, pp. 55-60
[10]
H Schroeder and D. G. Ebert, Business and Society Teaching Technique", Journal of Business Education, Vol. 58, pp. 266-269 (April 1983)
[11]
G. Stanford and A. E. Roark, Human Interaction in Education, Allyn and Bacon, Inc. 1974
[12]
"The Constitution: That Delicate Balance" and "The Military and the Media", each is a 13-part PBS series produced by The Media and Society Seminars, Columbia University School of Journalism
[13]
H. M. Deitel, An Introduction to Operating Systems, rev ist ed., Addison Wesley, 1984
[14]
T. Forester (Ed.), The Information Technoloqy Revolution, The MIT Press, 1985
[15]
D.G. Johnson, Computer Ethics, Prentice Hall (Series in Occupational Ethics), 1985
[16]
E. J. Lias, Future Mind, Little, Brown and Company, 1982
[17]
K. Schellenberg (Ed.), Computers in Society, (an Annual Editions publication), The Dushkin Publishing Group, 1986
[18]
A. S. Tanenbaum, Structured Computer Organization, 2nd ed., Prentice Hall, 1984

Cited By

View all
  • (2024)The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design ExperimentProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641943(1-21)Online publication date: 11-May-2024
  • (2022)A Hands-on University Short Course for Edge AIProceedings of the 26th Pan-Hellenic Conference on Informatics10.1145/3575879.3575971(83-89)Online publication date: 25-Nov-2022
  • (2019)Be it ResolvedProceedings of the 24th Western Canadian Conference on Computing Education10.1145/3314994.3325086(1-6)Online publication date: 3-May-2019
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 February 1987
Published in SIGCSE Volume 19, Issue 1

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)136
  • Downloads (Last 6 weeks)9
Reflects downloads up to 21 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)The Effects of Group Discussion and Role-playing Training on Self-efficacy, Support-seeking, and Reporting Phishing Emails: Evidence from a Mixed-design ExperimentProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3641943(1-21)Online publication date: 11-May-2024
  • (2022)A Hands-on University Short Course for Edge AIProceedings of the 26th Pan-Hellenic Conference on Informatics10.1145/3575879.3575971(83-89)Online publication date: 25-Nov-2022
  • (2019)Be it ResolvedProceedings of the 24th Western Canadian Conference on Computing Education10.1145/3314994.3325086(1-6)Online publication date: 3-May-2019
  • (2019)Student Emotion Recognition in Computer Science Education: A Blessing or Curse?Learning and Collaboration Technologies. Designing Learning Experiences10.1007/978-3-030-21814-0_23(301-311)Online publication date: 15-Jun-2019
  • (2013)Introducing Network Design to Students via a Dance ActivityProceedings of the 2013 IEEE Fifth International Conference on Technology for Education (t4e 2013)10.1109/T4E.2013.37(123-126)Online publication date: 18-Dec-2013
  • (2013)Exposing students to the unfamiliar - Improving software engineering teaching in non-major computer science programs2013 IEEE Global Engineering Education Conference (EDUCON)10.1109/EduCon.2013.6530273(1294-1298)Online publication date: Mar-2013
  • (2013)Practices of advanced programming: Tradition versus innovationComputer Applications in Engineering Education10.1002/cae.2046521:2(237-244)Online publication date: 10-Apr-2013
  • (2010)Principles of asking effective questions during student problem solvingProceedings of the 41st ACM technical symposium on Computer science education10.1145/1734263.1734417(460-464)Online publication date: 10-Mar-2010
  • (2009)Teaching Requirements Engineering to the Baháí Students in Iran who are Denied of Higher EducationProceedings of the 2009 Fourth International Workshop on Requirements Engineering Education and Training10.1109/REET.2009.11(38-48)Online publication date: 1-Sep-2009
  • (2009)Interactive Teaching Methods in Information Security CourseProceedings of the 2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing10.1109/EmbeddedCom-ScalCom.2009.94(489-493)Online publication date: 25-Sep-2009
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media