Publication Date
| In 2026 | 0 |
| Since 2025 | 5 |
Descriptor
Source
| Education and Information… | 1 |
| IEEE Transactions on Education | 1 |
| International Journal of… | 1 |
| Journal of Applied Research… | 1 |
| Journal of Computing in… | 1 |
Author
| Abu Alam | 1 |
| Alex Cameron | 1 |
| Andrej Jerman Blažic | 1 |
| Borka Jerman Blažic | 1 |
| Dhanya Pramod | 1 |
| Dipti Kapoor Sarmah | 1 |
| Jordan Allison | 1 |
| Linda Kiønig | 1 |
| Madhu Khurana | 1 |
| Maja Videnovik | 1 |
| Nasreen Anjum | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 5 |
| Reports - Research | 4 |
| Information Analyses | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
| Secondary Education | 2 |
| Elementary Education | 1 |
| Grade 7 | 1 |
| High Schools | 1 |
| Junior High Schools | 1 |
| Middle Schools | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dhanya Pramod – Journal of Applied Research in Higher Education, 2025
Purpose: The growth of the internet, access to technology and rapid digital transformations have paved the way for developing attack surfaces for individuals and organizations. There is a dire need to provide cybersecurity awareness most effectively. Gamification-based platforms have evolved to make cybersecurity education more engaging and…
Descriptors: Gamification, Computer Security, Information Security, Training
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Vasco Rikkers; Dipti Kapoor Sarmah – Journal of Computing in Higher Education, 2025
In recent years, gamification has seen a rise in usage for cyber-security training, with some of the most used elements being story and narrative. Yet there seems to be a lack of research on story-based gamification as well as how this type of gamification affects a training's effectiveness. The goal of this study was to test the effectiveness of…
Descriptors: Gamification, Computer Security, Training Methods, Foreign Countries
Andrej Jerman Blažic; Borka Jerman Blažic – Education and Information Technologies, 2025
This paper presents a new developed methodology for teaching and learning subjects that although are very important in the modern digital society are neglected in high school education programs: cybersecurity and cyber safety. A Study among the EU high schools in 2021-2022 revealed that computer science teachers are not regularly upgrading their…
Descriptors: Computer Security, Technology Education, Computer Science Education, Electronic Learning
Maja Videnovik; Tone Vold; Linda Kiønig; Vladimir Trajkovik – International Journal of Game-Based Learning, 2025
This study examines whether game-based learning can be used as a promising strategy for fostering students' engagement and motivation. Researchers investigate students' perceptions of the effectiveness of three educational games designed to teach cybersecurity in primary schools: an escape room-style game, a treasure hunt game, and a quiz…
Descriptors: Foreign Countries, Game Based Learning, Learner Engagement, Student Empowerment

Peer reviewed
Direct link
