Publication Date
In 2025 | 2 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 3 |
Risk | 3 |
Computer Science Education | 2 |
Ethics | 2 |
Foreign Countries | 2 |
Information Security | 2 |
Outcomes of Education | 2 |
Accountability | 1 |
Age Groups | 1 |
Artificial Intelligence | 1 |
Competition | 1 |
More ▼ |
Source
Education and Information… | 3 |
Author
Abiniah Sriskantharajah | 1 |
Adil Jeghal | 1 |
Agarsha Manoharan | 1 |
Ali Yahyaouy | 1 |
Alkaabi, Shamma | 1 |
El Sayed, Hesham | 1 |
H. M. K. K. M. B. Herath | 1 |
Hajar Majjate | 1 |
Hamid Tairi | 1 |
Khalid Alaoui Zidani | 1 |
Khan, Manzoor Ahmed | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Morocco | 1 |
United Arab Emirates | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Hajar Majjate; Youssra Bellarhmouch; Adil Jeghal; Ali Yahyaouy; Hamid Tairi; Khalid Alaoui Zidani – Education and Information Technologies, 2025
In recent times, there has been a growing interest in enhancing recommendation systems for e-learning platforms to deliver a personalised learning experience that meets each learner's distinct requirements and preferences. Nevertheless, it is crucial to recognise the ethical considerations surrounding this technology, as it heavily relies on…
Descriptors: Ethics, Artificial Intelligence, Technology Uses in Education, Student Attitudes
Khan, Manzoor Ahmed; Merabet, Adel; Alkaabi, Shamma; El Sayed, Hesham – Education and Information Technologies, 2022
Computer security competitions have been playing a significant role in encouraging students to get into cybersecurity, as well as enhancing the cybersecurity education system. The level of difficulty of the computer security tasks could be intimidating for most students and learners, one of the reasons there has been a shortage of cybersecurity…
Descriptors: Computer Security, Information Security, Risk, Outcomes of Education