Publication Date
| In 2026 | 0 |
| Since 2025 | 2 |
Descriptor
| Computer Security | 2 |
| Crime | 2 |
| Information Security | 2 |
| Age Groups | 1 |
| Computer Science Education | 1 |
| Computer Simulation | 1 |
| Computer Use | 1 |
| Deception | 1 |
| Digital Literacy | 1 |
| Experience | 1 |
| Foreign Countries | 1 |
| More ▼ | |
Author
| Abiniah Sriskantharajah | 1 |
| Agarsha Manoharan | 1 |
| H. M. K. K. M. B. Herath | 1 |
| L. G. P. K. Guruge | 1 |
| P. Sasikala | 1 |
| R. Ravichandran | 1 |
| S. L. P. Yasakethu | 1 |
| Sonam Singh | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Research | 2 |
Education Level
Audience
Location
| India | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
R. Ravichandran; Sonam Singh; P. Sasikala – Journal of Cybersecurity Education, Research and Practice, 2025
This study investigates the awareness and practices of cyber security among school teachers, exploring their understanding of cyber threats, online behaviours, and response mechanisms to cyber incidents. A structured questionnaire was administered to gather data on demographic information, cyber security training, online practices, and experiences…
Descriptors: Computer Security, Information Security, Teacher Characteristics, Training
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk

Peer reviewed
Direct link
