Publication Date
| In 2026 | 0 |
| Since 2025 | 3 |
| Since 2022 (last 5 years) | 4 |
| Since 2017 (last 10 years) | 6 |
| Since 2007 (last 20 years) | 8 |
Descriptor
| Computer Science Education | 8 |
| Computer Security | 8 |
| Risk | 8 |
| Information Security | 5 |
| Information Technology | 3 |
| Access to Information | 2 |
| Accounting | 2 |
| Computer Networks | 2 |
| Computer Software | 2 |
| Crime | 2 |
| Deception | 2 |
| More ▼ | |
Source
| Education and Information… | 2 |
| ProQuest LLC | 2 |
| Advances in Accounting… | 1 |
| Advances in Engineering… | 1 |
| IEEE Transactions on Learning… | 1 |
| International Association for… | 1 |
Author
| Abiniah Sriskantharajah | 1 |
| Adil Jeghal | 1 |
| Agarsha Manoharan | 1 |
| Ali Yahyaouy | 1 |
| Amin, Rohan Mahesh | 1 |
| Bhunia, Swarup | 1 |
| H. M. K. K. M. B. Herath | 1 |
| Hajar Majjate | 1 |
| Hamid Tairi | 1 |
| Hui Li | 1 |
| Isias, Pedro, Ed. | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 4 |
| Reports - Research | 3 |
| Dissertations/Theses -… | 2 |
| Collected Works - Proceedings | 1 |
| Information Analyses | 1 |
| Reports - Evaluative | 1 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 3 |
| Adult Education | 1 |
| Elementary Education | 1 |
Audience
Location
| Australia | 1 |
| China | 1 |
| Costa Rica | 1 |
| Croatia | 1 |
| Florida | 1 |
| India | 1 |
| Morocco | 1 |
| Poland | 1 |
| Russia | 1 |
| Saudi Arabia | 1 |
| South Africa | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Yukun Xu; Hui Li – IEEE Transactions on Learning Technologies, 2025
Primary school students, despite their vulnerability to cyberattacks, lack targeted cybersecurity education. Using Scopus and Google Scholar, this scoping review analyzed 15 articles (2014-2024) following Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Extension for Scoping Reviews guidelines to examine the landscape of…
Descriptors: Elementary School Students, Computer Security, Educational Trends, Computer Science Education
Hajar Majjate; Youssra Bellarhmouch; Adil Jeghal; Ali Yahyaouy; Hamid Tairi; Khalid Alaoui Zidani – Education and Information Technologies, 2025
In recent times, there has been a growing interest in enhancing recommendation systems for e-learning platforms to deliver a personalised learning experience that meets each learner's distinct requirements and preferences. Nevertheless, it is crucial to recognise the ethical considerations surrounding this technology, as it heavily relies on…
Descriptors: Ethics, Artificial Intelligence, Technology Uses in Education, Student Attitudes
James Johnston – ProQuest LLC, 2024
The need in the public sector is to help people 60+ years of age in the safe, practical use of technology for business, personal use, and family interaction, as this group is targeted more than others for technology fraud. The practice-focused question centers around which topics need to be part of technology fraud pilot training to reduce the…
Descriptors: Older Adults, Learning Theories, Information Security, Pilot Projects
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Saeed J. Roohani; Xiaochuan Zheng – Advances in Accounting Education: Teaching and Curriculum Innovations, 2019
With recent increases in cybersecurity incidents, it is imperative to supplement current accounting curriculum, equip accounting graduates with sufficient knowledge and skills to assess cybersecurity risk, and learn about controls to mitigate such risks. In this chapter, the authors describe 10 teaching modules, supported by 10 professionally…
Descriptors: Accounting, Professional Education, Business Administration Education, Risk
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology

Peer reviewed
Direct link
