Publication Date
In 2025 | 5 |
Descriptor
Computer Security | 5 |
Foreign Countries | 4 |
Computer Science Education | 3 |
Electronic Learning | 3 |
Information Security | 3 |
Artificial Intelligence | 2 |
Internet | 2 |
Privacy | 2 |
Risk | 2 |
Skill Development | 2 |
Access to Computers | 1 |
More ▼ |
Source
Education and Information… | 5 |
Author
Abiniah Sriskantharajah | 1 |
Adil Jeghal | 1 |
Agarsha Manoharan | 1 |
Ali Yahyaouy | 1 |
Alison Lui | 1 |
Andrej Jerman Blažic | 1 |
Borka Jerman Blažic | 1 |
Catharina Womack | 1 |
Eric G. Pardiñan | 1 |
H. M. K. K. M. B. Herath | 1 |
Hajar Majjate | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 5 |
Education Level
High Schools | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Eric G. Pardiñan; Ricson M. Bondad; Jivulter C. Mangubat – Education and Information Technologies, 2025
Accreditation activities are critical for an institution pursuing excellent recognition. However, the segmented approach to records or document management employed for accreditation, which relies on paper-based records, has several flaws. Impediments such as misplacement, crumpling, termites, and other conditions that might result in damaged or…
Descriptors: Foreign Countries, Web Sites, Archives, Records (Forms)
Andrej Jerman Blažic; Borka Jerman Blažic – Education and Information Technologies, 2025
This paper presents a new developed methodology for teaching and learning subjects that although are very important in the modern digital society are neglected in high school education programs: cybersecurity and cyber safety. A Study among the EU high schools in 2021-2022 revealed that computer science teachers are not regularly upgrading their…
Descriptors: Computer Security, Technology Education, Computer Science Education, Electronic Learning
Alison Lui; Catharina Womack; Penny Orton – Education and Information Technologies, 2025
This article critically evaluates the effects of the ACU Virtual Mobility (VM) Project Digital Information Security Course (DISC) programme on improving students' awareness of cyber security skills, pre and post the educational intervention. Our selected VM tool is Collaborative Online International Learning (COIL). Building on a conceptual…
Descriptors: Cooperative Learning, Electronic Learning, Foreign Countries, Information Security
Hajar Majjate; Youssra Bellarhmouch; Adil Jeghal; Ali Yahyaouy; Hamid Tairi; Khalid Alaoui Zidani – Education and Information Technologies, 2025
In recent times, there has been a growing interest in enhancing recommendation systems for e-learning platforms to deliver a personalised learning experience that meets each learner's distinct requirements and preferences. Nevertheless, it is crucial to recognise the ethical considerations surrounding this technology, as it heavily relies on…
Descriptors: Ethics, Artificial Intelligence, Technology Uses in Education, Student Attitudes