Language
English (UK)
Greek
Lithuanian
Română
English (US)
Maltese
Qualification needs among VET teachers and trainers
Online survey
About this survey
This online survey includes 20 questions for determining the qualification needs among VET teachers and trainers concerning technical and pedagogical needs to integrate digital media and cybersecurity training into existing teaching and learning environments.
About CybARverse
CybARverse is an Erasmus+ co-funded project which supports IT as well as non-IT teachers and trainers’ digital skills development, through the use of immersive technologies. The focus of this project is to train our target group on how to recognise and react correctly to cyberattacks. It promotes cybersecurity awareness, the implementation of the Digital Education Action Plan (Actions 5 and 7) as well as national agendas, and contributes to a more digital, greener and more inclusive teaching and learning. By the end of this programme, at least 80 trainers and teachers, from the four partner countries, will be qualified.
GDPR
As a personal data operator, the EOS Foundation complies with Regulation (EU) 2016/679 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data. The personal data collected in the form will be retrieved, stored and processed within the CybARverse project. By completing and submitting this form, you agree to the processing of this data. For additional clarifications, you can write to office@eos.ro.
Choose your country:
Cyprus
Malta
Romania
1. What is the school level in which you are teaching?
*
Primary (e.g. grades 1 -4)
Lower secondary (e.g. 5-8)
Upper secondary (e.g. 9-12)
Higher education (university)
2. What is your role in the education sector?
*
Teacher
Principal / Director
IT support staff
Other
3. In which age group do you belong?
*
up to 30
31-40
41-50
51-60+
4. How many years of teaching experience do you have?
*
1 – 3 years
3 – 10
10+
5. What is your area of teaching?
ICT
Non-ICT
If you selected Non-ICT, please specify eg. biology teacher
6. How familiar are you with the following cybersecurity terms? (1) Completely unfamiliar; (5) Very familiar
*
1
2
3
4
5
Phishing - which hackers socially engineer email messages to entice recipients to open them. The recipients are tricked into downloading the malware contained within the email by either opening an attached file or embedded link;
Social media threats – spying, stalking and harassment of persons online;
Grooming – befriending and establishing an emotional connection with a child, to lower the child's inhibitions with the objective of sexual abuse;
Social engineering – psychological manipulation of people into performing actions or divulging confidential information;
Malware - malicious software is used to attack information systems;
Ransomware - malware, that threatens to publish the victim’s personal data or perpetually block access to it unless a ransom is paid;
Rootkit – malicious software, which is designed to enable access to a computer;
Pharming – redirect a website’s traffic to another, fake site by installing a malicious program on the computer;
SQL injection – hackers insert malicious code into servers using SQL programming language to get the server to reveal sensitive data;
Cross-site scripting – attackers inject client-side scripts into web pages viewed by other users;
Cryptojacking – act of hijacking a computer to mine cryptocurrencies against the users will;
Zero-day exploit – a newly identified vulnerability in IT infrastructure is first exploited by hacker;
IoT attacks – use potential security vulnerabilities in IoT devices to damage or control them;
Man-in-the-middle attacks – attackers secretly insert themselves between two parties, such as individual computer users and their financial institution;
DoS attack - overload systems by superfluous requests to cause its unavailability;
DDoS attack - hackers bombard an organization's servers with large volumes of simultaneous data requests, thereby making the servers unable to handle any legitimate requests.
7. Have you received any formal cybersecurity training?
*
Yes
No
8. How familiar are you with the following technologies? (1) Completely Unfamiliar; (5) Very familiar
*
1
2
3
4
5
Virtual Reality (VR);
Augmented Reality (AR);
360-degree Videos.
9. Which of the following technologies are you already using in your classroom?
*
Computer
Smart board
Tablets
Phone
AR
VR
Game consoles
Other
10. How would you rate your school's support for the integration of latest technologies (VR/AR/360 videos) in teaching?
*
1
2
3
4
5
(1) Not supportive at all ; (5) Very supportive
11. How would you rate your interest to receive cybersecurity training using technologies such as VR, AR, or 360 videos?
*
1
2
3
4
5
(1) Not interested at all; (5) Very interested
12. What are some of the challenges you face when using technology in your teaching?
*
Hard to use
Lack of tech knowledge
Lack of digital content
Technical difficulties
Difficulty in keeping up with the constant changes and updates in technology
Limited access to technology
Students' lack of familiarity with technology or digital literacy skills
Teachers' lack of familiarity with technology or digital literacy skills
Balancing the use of technology with traditional teaching methods
Difficulty in finding and selecting appropriate educational technology tools
Security and privacy concerns related to online activities
Concerns about the cost
13. How important do you think it is for teachers to receive cybersecurity training?
*
1
2
3
4
5
(1) Not important at all ; (5) Very important
14. How important it is to use immersive technologies such as VR, AR, or 360 videos in teaching?
*
1
2
3
4
5
(1) Not important at all ; (5) Very important
15. How comfortable are you with using new innovative technologies for teaching? (1) Not comfortable at all ; (5) Very comfortable
*
1
2
3
4
5
Augmented Reality;
Virtual Reality;
360 videos.
16. What duration would you consider ideal for a cybersecurity training session based on AR, VR or 360 Videos?
*
5-10 minutes
10-20 minutes
20-30 minutes
17. Have you ever used cybersecurity simulations or exercises as part of your teaching methods?
*
Yes, within the past year
Yes, within the past 2-3 years
Yes, but it has been more than 3 years
No, I have not used cybersecurity simulations or exercises in my teaching
18. Rate the level of benefit you expect to have from being taught (or trained) using VR, AR, or 360 videos on the following cybersecurity areas: (1) No benefit at all (5) Significant benefit
*
1
2
3
4
5
Phishing scams
Social media use
Grooming
Social engineering
Malware protection
Ransomware
Rootkit
Pharming
SQL injection
Cross-site scripting
Cryptojacking
Zero-day exploit
IoT attacks
Man-in-the-middle attacks
DoS attack
DDoS attack
19. To what degree do you agree with the following statement: Training using VR, AR, or 360 videos would be more effective than traditional classroom-style training for the subjects I am teaching.
1
2
3
4
5
(1) Strongly disagree; (5) Strongly agree
20. Are there any other comments or suggestions you would like to make regarding cybersecurity training, also using VR, AR, or 360 videos for the training?
Send
Should be Empty: