NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 26 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Dhanya Pramod – Journal of Applied Research in Higher Education, 2025
Purpose: The growth of the internet, access to technology and rapid digital transformations have paved the way for developing attack surfaces for individuals and organizations. There is a dire need to provide cybersecurity awareness most effectively. Gamification-based platforms have evolved to make cybersecurity education more engaging and…
Descriptors: Gamification, Computer Security, Information Security, Training
Peer reviewed Peer reviewed
Direct linkDirect link
Moraes, Eduardo Baldo; Kipper, Liane Mahlmann; Hackenhaar Kellermann, Ana Clara; Austria, Leonardo; Leivas, Pedro; Moraes, Jorge André Ribas; Witczak, Marcus – Interactive Technology and Smart Education, 2023
Purpose: The purpose of this study is to identify the uses of Industry 4.0 technologies in the area of education and how they contribute to learning in addition to highlighting at what educational level they are used. Design/methodology/approach: A systematic literature review was carried out in the Scopus (Elsevier), Web of Science and…
Descriptors: Educational Technology, Internet, Computer Simulation, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Yuyu Chen; Yuntao Zou – European Journal of Education, 2024
This research paper focuses on the adoption of multi-perspective theory to study teachers' attitudes and intentions towards using intelligent mixed reality (MR) devices for classroom behaviour analysis. The research model integrates TRI (Technology Readiness Index), IDT (Innovation Diffusion Theory), ECM (Expectation Confirmation Theory) and TAM…
Descriptors: Teacher Attitudes, Educational Quality, Intention, Artificial Intelligence
Peer reviewed Peer reviewed
Direct linkDirect link
Mark Anthony Camilleri – Interactive Technology and Smart Education, 2024
Purpose: Many educators are increasingly acquainting themselves and becoming adept with interactive technologies like augmented reality and virtual reality. Some of them are also looking forward to using Metaverse applications, as they want to benefit from its immersive three-dimensional capabilities. Therefore, the purpose of this study is to…
Descriptors: Artificial Intelligence, Educational Technology, Technology Uses in Education, Cost Effectiveness
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nurten Gündüz; Mehmet Sincar – International Journal of Contemporary Educational Research, 2024
The metaverse which is considered as the digital big bang of humanity and the next evolution of the internet is anticipated to offer a living environment for civilization 5.0 and beyond in various domains including education. Each novice technology that enters our daily lives generates also fear, anxiety, and problems as well as hope, benefit, and…
Descriptors: Higher Education, Computer Simulation, Ethics, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Simpson, Joseph; Brantly, Aaron – Journal of Cybersecurity Education, Research and Practice, 2022
Several decades of research in simulation and gamification in higher education shows that simulations are highly effective in improving a range of outcomes for students including declarative knowledge and interest in the topic being taught. While there appears to be a broad array of options to provide education in an undergraduate setting related…
Descriptors: Information Security, Undergraduate Students, Gamification, Literature Reviews
Peer reviewed Peer reviewed
Direct linkDirect link
Chander, Romesh; Dhar, Meghna; Bhatt, Ketan – Journal of Access Services, 2022
With the rising cases of theft, vandalism, mutilation, infiltration, and other fraudulent practices at academic libraries, the matter of library security has become a matter of greater concern for modern-day library professionals as well as scholars in the field of library and information science. Considering the seriousness of the issue, the…
Descriptors: Bibliometrics, Academic Libraries, Information Security, Crime
Peer reviewed Peer reviewed
Direct linkDirect link
Ersin Dincelli; Alper Yayla – Journal of Information Systems Education, 2024
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse -- a shared and persistent virtual world. Companies are eagerly investing in various VR products and services, aiming to be early adopters and create new…
Descriptors: Information Security, Computer Security, Computer Science Education, Computer Simulation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Akinade Adebowale Adewojo – Digital Education Review, 2025
As educational spaces transition from physical classrooms to digital and AI-mediated environments, this research explores the ontological implications of this shift. By examining the concept of the "Future Classroom," which extends learning spaces into virtual, augmented, and AI-driven realities, this study asks whether digital spaces…
Descriptors: Educational Trends, Futures (of Society), Virtual Classrooms, Artificial Intelligence
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Workman, Michael D. – Journal of Cybersecurity Education, Research and Practice, 2021
Cybersecurity capabilities in organizations and governmental agencies continue to lag behind the threats. Given the current environment, these entities have placed renewed emphasis on cybersecurity education. However, education appears to lack its full potential in most settings. Few empirical studies have systematically tested the efficacy of…
Descriptors: Computer Security, Information Security, Computer Science Education, Instructional Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Huang, Wanju – TechTrends: Linking Research and Practice to Improve Learning, 2023
A design case is a form of scholarly writing in which the author embarks on a reflective journey sharing rich descriptions of their design, design processes, challenges, etc. This paper presents two design cases that demonstrate how learning theories and instructional design concepts were purposefully incorporated in two instructional applications…
Descriptors: Learning Processes, Instructional Design, Learning Theories, Artificial Intelligence
Shklyar, Tatiana L.; Popova, Anna V.; Gorokhova, Svetlana S. – Journal of Educational Psychology - Propositos y Representaciones, 2020
In this article authors suggest considering features of hybrid reality, both in psychology and in law. The authors investigate the opportunities and dangers of the virtual world. They reveal the main psychological aspects that provoke the person to plunge into Internet space. Also in the article, the authors show the main tendencies and the…
Descriptors: Psychology, Laws, Computer Simulation, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Maennel, Kaie; Brilingaite, Agne; Bukauskas, Linas; Juozapavicius, Aušrius; Knox, Benjamin James; Lugo, Ricardo Gregorio; Maennel, Olaf; Majore, Ginta; Sütterlin, Stefan – SAGE Open, 2023
Hands-on and practical learning has been key to cybersecurity education and training success. Cyber Defense Exercises (CDX) are a common approach to training, testing, and verifying technical and soft skills. However, full-scale CDX implementation is also an expensive training event. In order to advance such exercises to the next level, CDX…
Descriptors: Computer Security, Computer Science Education, Information Security, Computer Simulation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nonkanyiso Pamella Shabalala – Research in Social Sciences and Technology, 2024
The integration of Artificial Intelligence (AI) into Open Distance eLearning (ODeL) represents a significant evolution in STEM education, offering transformative benefits in teaching, learning and administrative processes. This conceptual paper explores how AI-driven platforms are revolutionising ODeL by providing personalised learning…
Descriptors: STEM Education, Distance Education, Artificial Intelligence, Educational Technology
Previous Page | Next Page »
Pages: 1  |  2