Publication Date
In 2025 | 5 |
Descriptor
Source
British Journal of… | 1 |
Discover Education | 1 |
IEEE Transactions on Education | 1 |
International Journal of… | 1 |
Review of Education | 1 |
Author
Abu Alam | 1 |
Alex Cameron | 1 |
Andrew Doyle | 1 |
Basil Hanafi | 1 |
Devyaani Singh | 1 |
Javier Hoz-Ruiz | 1 |
Jelena Jovanovic | 1 |
Jordan Allison | 1 |
Madhu Khurana | 1 |
Marta Estellés | 1 |
Mohammad Ali | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 4 |
Information Analyses | 1 |
Tests/Questionnaires | 1 |
Education Level
Elementary Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Sweden | 1 |
United Kingdom (England) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Marta Estellés; Andrew Doyle – Review of Education, 2025
Over the last two decades, online safety education has emerged as a new field of research focusing on concerns about a myriad of cyber risks. These risks range from online sexual exploitation through to the reproduction of social inequalities. The main assumption underlying this field is that online risks can be mitigated via educational…
Descriptors: Literature Reviews, Safety Education, Computer Security, Information Security
Basil Hanafi; Mohammad Ali; Devyaani Singh – Discover Education, 2025
Quantum computing is the beginning of a new age for diverse industries, and educational technologies will significantly benefit from such quantum developments. This is a novel approach, applying quantum algorithms to enhance educational technologies, with no previous studies addressing the integration of quantum computing for personalized…
Descriptors: Educational Technology, Computer Security, Ethics, Algorithms
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Qinyi Liu; Ronas Shakya; Jelena Jovanovic; Mohammad Khalil; Javier Hoz-Ruiz – British Journal of Educational Technology, 2025
High-volume, high-quality and diverse datasets are crucial for advancing research in the education field. However, such datasets often contain sensitive information that poses significant privacy challenges. Traditional anonymisation techniques fail to meet the privacy standards required by regulations like GDPR, prompting the need for more robust…
Descriptors: Privacy, Data, Information Security, Compliance (Legal)
Susanne Walan – International Journal of Technology and Design Education, 2025
Since the end of 2022, global discussions on Artificial Intelligence (AI) have surged, influencing diverse societal groups, such as teachers, students and policymakers. This case study focuses on Swedish primary school students aged 11-12. The aim is to examine their cognitive and affective perceptions of AI and their current usage. Data,…
Descriptors: Foreign Countries, Elementary School Students, Artificial Intelligence, Student Attitudes