Publication Date
In 2025 | 5 |
Descriptor
Source
Journal of Information… | 2 |
Discover Education | 1 |
Education and Information… | 1 |
Journal of Educational… | 1 |
Author
Publication Type
Journal Articles | 5 |
Reports - Research | 5 |
Tests/Questionnaires | 2 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Secondary Education | 1 |
Audience
Location
Cambodia | 1 |
Colorado (Colorado Springs) | 1 |
Nigeria | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Tutorial Programs, Computer Science Education, Computer Security, Programming
Livinus Obiora Nweke; Uchenna Franklin Okebanama; Gibson Uwaezuoke Mba – Discover Education, 2025
The integration of Internet of Things (IoT), Artificial Intelligence (AI), and cybersecurity presents new opportunities for innovation and entrepreneurship, yet traditional educational approaches often lack the interdisciplinary and applied focus required to develop these competencies. This study evaluates the impact of an experiential learning…
Descriptors: Entrepreneurship, Artificial Intelligence, Internet, Information Security
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Sreynet Un – Journal of Educational Technology and Online Learning, 2025
Since its emergence, technology has progressed beyond knowledge. Therefore, competencies are needed to navigate it safely, responsibly, and ethically. A well-designed curriculum forms the core of school strategies to enhance students' competencies and learning outcomes. This study examines the integration of digital citizenship concepts in…
Descriptors: Secondary School Students, Curriculum Development, Educational Strategies, Outcomes of Education