Publication Date
| In 2026 | 0 |
| Since 2025 | 7 |
Descriptor
| Computer Security | 7 |
| Foreign Countries | 5 |
| Information Security | 4 |
| Privacy | 4 |
| Artificial Intelligence | 3 |
| Computer Science Education | 3 |
| Electronic Learning | 3 |
| Computer Literacy | 2 |
| Digital Literacy | 2 |
| Internet | 2 |
| Risk | 2 |
| More ▼ | |
Source
| Education and Information… | 7 |
Author
| Abiniah Sriskantharajah | 1 |
| Adil Jeghal | 1 |
| Agarsha Manoharan | 1 |
| Ali Yahyaouy | 1 |
| Alison Lui | 1 |
| Andrej Jerman Blažic | 1 |
| Bekir Yildirim | 1 |
| Borka Jerman Blažic | 1 |
| Catharina Womack | 1 |
| Damjan Fujs | 1 |
| Damjan Vavpotic | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 7 |
| Reports - Research | 7 |
| Tests/Questionnaires | 1 |
Education Level
| Adult Education | 1 |
| Early Childhood Education | 1 |
| High Schools | 1 |
| Higher Education | 1 |
| Postsecondary Education | 1 |
| Preschool Education | 1 |
| Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Damjan Fujs; Simon Vrhovec; Tomaž Hovelja; Damjan Vavpotic – Education and Information Technologies, 2025
An increasingly aging population, widespread internet connectivity, and an increasing number of cybersecurity incidents bring many challenges for the future of information security. Older adults, in particular, are a highly vulnerable demographic, often targeted by cyber attackers. This paper aims to develop an approach that enables the…
Descriptors: Foreign Countries, Older Adults, Digital Literacy, Computer Literacy
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Eric G. Pardiñan; Ricson M. Bondad; Jivulter C. Mangubat – Education and Information Technologies, 2025
Accreditation activities are critical for an institution pursuing excellent recognition. However, the segmented approach to records or document management employed for accreditation, which relies on paper-based records, has several flaws. Impediments such as misplacement, crumpling, termites, and other conditions that might result in damaged or…
Descriptors: Foreign Countries, Web Sites, Archives, Records (Forms)
Andrej Jerman Blažic; Borka Jerman Blažic – Education and Information Technologies, 2025
This paper presents a new developed methodology for teaching and learning subjects that although are very important in the modern digital society are neglected in high school education programs: cybersecurity and cyber safety. A Study among the EU high schools in 2021-2022 revealed that computer science teachers are not regularly upgrading their…
Descriptors: Computer Security, Technology Education, Computer Science Education, Electronic Learning
Alison Lui; Catharina Womack; Penny Orton – Education and Information Technologies, 2025
This article critically evaluates the effects of the ACU Virtual Mobility (VM) Project Digital Information Security Course (DISC) programme on improving students' awareness of cyber security skills, pre and post the educational intervention. Our selected VM tool is Collaborative Online International Learning (COIL). Building on a conceptual…
Descriptors: Cooperative Learning, Electronic Learning, Foreign Countries, Information Security
Esra Betül Kölemen; Bekir Yildirim – Education and Information Technologies, 2025
This study aimed to evaluate the role of AI in preschool from the perspective of preschool teachers. The research group consisted of 101 preschool teachers. The study group was selected according to the easily accessible case sampling method, one of the purposeful sampling methods. The study was a phenomenology, which is a qualitative research…
Descriptors: Early Childhood Education, Teacher Attitudes, Opinions, Technology Uses in Education
Hajar Majjate; Youssra Bellarhmouch; Adil Jeghal; Ali Yahyaouy; Hamid Tairi; Khalid Alaoui Zidani – Education and Information Technologies, 2025
In recent times, there has been a growing interest in enhancing recommendation systems for e-learning platforms to deliver a personalised learning experience that meets each learner's distinct requirements and preferences. Nevertheless, it is crucial to recognise the ethical considerations surrounding this technology, as it heavily relies on…
Descriptors: Ethics, Artificial Intelligence, Technology Uses in Education, Student Attitudes

Peer reviewed
Direct link
