Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Science Education | 3 |
| Computer Security | 3 |
| Deception | 3 |
| Information Security | 3 |
| Crime | 2 |
| Risk | 2 |
| Adult Education | 1 |
| Adult Learning | 1 |
| Age Groups | 1 |
| Best Practices | 1 |
| Computer Simulation | 1 |
| More ▼ | |
Author
| Abiniah Sriskantharajah | 1 |
| Agarsha Manoharan | 1 |
| Burkman, Jim | 1 |
| H. M. K. K. M. B. Herath | 1 |
| James Johnston | 1 |
| L. G. P. K. Guruge | 1 |
| Luse, Andy | 1 |
| S. L. P. Yasakethu | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Research | 2 |
| Dissertations/Theses -… | 1 |
Education Level
| Adult Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
James Johnston – ProQuest LLC, 2024
The need in the public sector is to help people 60+ years of age in the safe, practical use of technology for business, personal use, and family interaction, as this group is targeted more than others for technology fraud. The practice-focused question centers around which topics need to be part of technology fraud pilot training to reduce the…
Descriptors: Older Adults, Learning Theories, Information Security, Pilot Projects
Luse, Andy; Burkman, Jim – Journal of Cybersecurity Education, Research and Practice, 2021
Social engineering is a large problem in our modern technological world, but while conceptually understood, it is harder to teach compared to traditional pen testing techniques. This research details a class project where students implemented a phishing exercise against real-world targets. Through cooperation with an external corporate partner,…
Descriptors: Computer Security, Information Security, Deception, Student Projects

Peer reviewed
Direct link
