Publication Date
| In 2026 | 0 |
| Since 2025 | 4 |
| Since 2022 (last 5 years) | 15 |
Descriptor
Source
Author
| Abiniah Sriskantharajah | 1 |
| Agarsha Manoharan | 1 |
| Agne Brilingaite | 1 |
| Ali, Mohd Norawi | 1 |
| Alper Yayla | 1 |
| Amogh Chetankumar Joshi | 1 |
| Bell, Zerla | 1 |
| Brantly, Aaron | 1 |
| Brilingaite, Agne | 1 |
| Bukauskas, Linas | 1 |
| Chu, Xiaoyan | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 12 |
| Reports - Research | 7 |
| Information Analyses | 3 |
| Reports - Descriptive | 2 |
| Books | 1 |
| Collected Works - Proceedings | 1 |
| Dissertations/Theses -… | 1 |
| Reports - Evaluative | 1 |
| Speeches/Meeting Papers | 1 |
Audience
Location
| Brazil | 1 |
| Estonia | 1 |
| European Union | 1 |
| Greece | 1 |
| Indonesia | 1 |
| Italy | 1 |
| Malaysia | 1 |
| Mexico | 1 |
| Philippines | 1 |
| Portugal | 1 |
| Turkey | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dhanya Pramod – Journal of Applied Research in Higher Education, 2025
Purpose: The growth of the internet, access to technology and rapid digital transformations have paved the way for developing attack surfaces for individuals and organizations. There is a dire need to provide cybersecurity awareness most effectively. Gamification-based platforms have evolved to make cybersecurity education more engaging and…
Descriptors: Gamification, Computer Security, Information Security, Training
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Keith A. Jordan – ProQuest LLC, 2022
Despite significant cybersecurity policy, a prioritization of funding, and increased cybersecurity workforce training, DoD operational testers continue to find critical cyber vulnerabilities in its Weapon and Control Systems that result in the warfighter's lack of ability to "fight through" when faced with a cyber-contested environment…
Descriptors: Training, Computer Security, Government (Administrative Body), Government Employees
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Noah Glaser; Zeinab Parishani; Amogh Chetankumar Joshi; Prasad Calyam – Technology, Knowledge and Learning, 2025
As Virtual Reality (VR) gains traction in education, its potential to support neurodivergent learners in cybersecurity training remains underexplored. This emerging technology report examines how VR can bridge the gap between STEM education and cybersecurity training for neurodivergent individuals, highlighting both its promise and the challenges…
Descriptors: Computer Simulation, Computer Uses in Education, Computer Science Education, Computer Security
Ruta Pirta-Dreimane; Agne Brilingaite; Evita Roponena; Karen Parish; Janis Grabis; Ricardo Gregorio Lugo; Martinš Bonders – Technology, Knowledge and Learning, 2025
Incorporating gamification elements and innovative approaches in training programs are promising for addressing cybersecurity knowledge gaps. Cybersecurity education should combine hard and soft skill development when building the capacity to manage cyber incidents requiring timely communication, team collaboration, and self-efficacy in risk…
Descriptors: Computer Security, Computer Science Education, Educational Games, Gamification
Nurten Gündüz; Mehmet Sincar – International Journal of Contemporary Educational Research, 2024
The metaverse which is considered as the digital big bang of humanity and the next evolution of the internet is anticipated to offer a living environment for civilization 5.0 and beyond in various domains including education. Each novice technology that enters our daily lives generates also fear, anxiety, and problems as well as hope, benefit, and…
Descriptors: Higher Education, Computer Simulation, Ethics, Computer Security
Simpson, Joseph; Brantly, Aaron – Journal of Cybersecurity Education, Research and Practice, 2022
Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related…
Descriptors: Information Security, Undergraduate Students, Gamification, Literature Reviews
Paul Wagner; Dalal Alharthi – Journal of Cybersecurity Education, Research and Practice, 2024
The United States faces persistent threats conducting malicious cyber campaigns that threaten critical infrastructure, companies and their intellectual property, and the privacy of its citizens. Additionally, there are millions of unfilled cybersecurity positions, and the cybersecurity skills gap continues to widen. Most companies believe that…
Descriptors: Artificial Intelligence, Computer Simulation, Information Technology, Computer Security
Wang, Minjuan; Yu, Haiyang; Bell, Zerla; Chu, Xiaoyan – IEEE Transactions on Learning Technologies, 2022
The Metaverse is a network of 3-D virtual worlds supporting social connections among its users and enabling them to participate in activities mimicking real life. It merges physical and virtual reality and provides channels for multisensory interactions and immersions in a variety of environments (Mystakidis, 2022). The Metaverse is considered the…
Descriptors: Technology Uses in Education, Computer Simulation, Educational Environment, Best Practices
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Maennel, Kaie; Brilingaite, Agne; Bukauskas, Linas; Juozapavicius, Aušrius; Knox, Benjamin James; Lugo, Ricardo Gregorio; Maennel, Olaf; Majore, Ginta; Sütterlin, Stefan – SAGE Open, 2023
Hands-on and practical learning has been key to cybersecurity education and training success. Cyber Defense Exercises (CDX) are a common approach to training, testing, and verifying technical and soft skills. However, full-scale CDX implementation is also an expensive training event. In order to advance such exercises to the next level, CDX…
Descriptors: Computer Security, Computer Science Education, Information Security, Computer Simulation
Ravendran, Saravnesvaran; Karpudewan, Mageswary; Ali, Mohd Norawi; Lay, Yoon Fah – Malaysian Online Journal of Educational Sciences, 2023
The Fourth Industrial Revolution (4IR) refers to the current rapid technological growth that fundamentally changes how humans live. 4IR is essential to improve higher education worldwide and develop crucial skills such as e-learning and innovation, information and media technology, and life and career skills. This study aims to assess the…
Descriptors: Technological Advancement, Foreign Countries, Technological Literacy, Pedagogical Content Knowledge
Kahraman, Deniz; Koc, Mustafa – International Society for Technology, Education, and Science, 2022
It is considered important for school principals to have technology leadership competencies in digital age conditions in order to carry out education and training efficiently and effectively. Since teachers see school principals as role models, how teachers perceive the technology use skills of school principals is an important factor for the…
Descriptors: Instructional Leadership, Educational Technology, Information Technology, Technology Integration
Piet Kommers, Editor; Inmaculada Arnedillo Sánchez, Editor; Pedro Isaías, Editor – International Association for Development of the Information Society, 2024
These proceedings contain the papers and posters of the 22nd International Conference on e-Society (ES 2024) and 20th International Conference on Mobile Learning (ML 2024), organised by the International Association for Development of the Information Society (IADIS) in Porto, Portugal, during March 9-11, 2024. The e-Society 2024 conference aims to…
Descriptors: Information Technology, Adolescents, Divorce, Health Services

Peer reviewed
Direct link
