{"id":19351,"date":"2026-02-26T14:39:44","date_gmt":"2026-02-26T14:39:44","guid":{"rendered":"https:\/\/lite14.net\/blog\/?p=19351"},"modified":"2026-02-26T14:39:44","modified_gmt":"2026-02-26T14:39:44","slug":"students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation","status":"publish","type":"post","link":"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/","title":{"rendered":"Students Use AI to Raise Cybersecurity Awareness Through Phishing Email Simulation"},"content":{"rendered":"<p>&nbsp;<\/p>\n<hr \/>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#Full_Case_Study_High_School_Students_Use_AI_to_Teach_Phishing_Awareness\" >Full Case Study: High School Students Use AI to Teach Phishing Awareness<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#What_Happened\" >What Happened<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#Simulation_Results\" >Simulation Results<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#Educational_Purpose_Ethics\" >Educational Purpose &amp; Ethics<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#Why_It_Matters_Comments_Expert_Views\" >Why It Matters: Comments &amp; Expert Views<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#Teachers_Perspective\" >Teacher\u2019s Perspective<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#Tech_Leaders_Comment\" >Tech Leader\u2019s Comment<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#Broader_Educational_View\" >Broader Educational View<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#_Broader_Context_on_Phishing_Awareness_and_AI\" >\u00a0Broader Context on Phishing Awareness and AI<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#Lessons_From_the_Case\" >Lessons From the Case<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#Case_Study_1_%E2%80%94_High_School_Students_Run_AI%E2%80%91Assisted_Phishing_Simulation\" >Case Study 1 \u2014 High School Students Run AI\u2011Assisted Phishing Simulation<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#_What_the_Project_Was\" >\u00a0What the Project Was<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#_What_Happened_in_the_Simulation\" >\u00a0What Happened in the Simulation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#_Why_It_Worked\" >\u00a0Why It Worked<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#Case_Study_2_%E2%80%94_Ethical_Framework_Consent_Process\" >Case Study 2 \u2014 Ethical Framework &amp; Consent Process<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#_Clear_Rules_and_Agreements\" >\u00a0Clear Rules and Agreements<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-17\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#_Why_This_Matters\" >\u00a0Why This Matters<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-18\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#Comments_From_Educators_and_Experts\" >Comments From Educators and Experts<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-19\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#_Teacher_Leading_the_Project\" >\u00a0Teacher Leading the Project<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-20\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#_School_Technology_Director\" >\u00a0School Technology Director<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-21\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#_Broader_Cybersecurity_Educators\" >\u00a0Broader Cybersecurity Educators<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-22\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#What_These_Cases_Teach\" >What These Cases Teach<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-23\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#_1_AI_Can_Be_a_Double%E2%80%91Edged_Sword\" >\u00a01. AI Can Be a Double\u2011Edged Sword<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-24\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#2_Active_Simulations_Boost_Awareness\" >2. Active Simulations Boost Awareness<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-25\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#_3_Ethics_and_Consent_Are_Key\" >\u00a03. Ethics and Consent Are Key<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-26\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#Expert_Perspectives_on_Phishing_Simulations\" >Expert Perspectives on Phishing Simulations<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Full_Case_Study_High_School_Students_Use_AI_to_Teach_Phishing_Awareness\"><\/span><strong>Full Case Study: High School Students Use AI to Teach Phishing Awareness<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"What_Happened\"><\/span><strong>What Happened<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>At <strong>Eminence High School<\/strong>, a cybersecurity teacher implemented a <em>phishing simulation project<\/em> in which students wrote fake phishing email messages designed to <em>educate<\/em> staff about how phishing attacks work. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/p>\n<ul>\n<li>The simulation was part of a <strong>classroom assignment on cybersecurity and ethical technology use<\/strong>. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/li>\n<li>Students were allowed to use <strong>generative AI tools to help craft realistic phishing emails<\/strong> \u2014 mimicking techniques cybercriminals might use. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/li>\n<li>The school\u2019s tech team <em>intentionally let these fake emails get delivered<\/em> to staff inboxes so that the simulation could run. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Simulation_Results\"><\/span><strong>Simulation Results<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>The <em>first phishing email<\/em>, written without AI, succeeded in persuading <strong>14 staff members to click<\/strong> on a fake link. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/li>\n<li>A <em>second email<\/em>, crafted <strong>with AI assistance<\/strong>, <em>more than doubled<\/em> that number \u2014 showing how convincingly AI can generate text. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/li>\n<li>Staff exposure to these simulated attacks became a <strong>learning experience<\/strong>, helping them notice tactics attackers might use in real threats. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Educational_Purpose_Ethics\"><\/span><strong>Educational Purpose &amp; Ethics<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Before running the simulation:<\/p>\n<ul>\n<li>The teacher <strong>discussed ethical technology use<\/strong> with students \u2014 emphasizing that AI can be used for both good and bad purposes. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/li>\n<li><strong>Students and parents signed a technology acceptable\u2011use agreement<\/strong> that allowed the project to proceed. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/li>\n<\/ul>\n<p>This context was important to ensure the students understood <em>why<\/em> they were creating deceptive emails \u2014 not to harm, but to educate others about security. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Why_It_Matters_Comments_Expert_Views\"><\/span><strong>Why It Matters: Comments &amp; Expert Views<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Teachers_Perspective\"><\/span><em>Teacher\u2019s Perspective<\/em><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>The teacher leading the project said there\u2019s <em>no way around it<\/em> \u2014 everyone <em>needs basic cybersecurity education<\/em> for society to stay safe. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/li>\n<li>She believes students gain valuable skills whether they pursue cybersecurity careers or simply need to defend themselves online. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Tech_Leaders_Comment\"><\/span><em>Tech Leader\u2019s Comment<\/em><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>The district\u2019s technology director, commenting on the project, joked that while the simulation was \u201csuccessful,\u201d it <em>wasn\u2019t success in a malicious way<\/em> \u2014 it was success as a learning tool. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Broader_Educational_View\"><\/span><em>Broader Educational View<\/em><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>This case reflects a growing belief in education circles that <strong>students should learn cyber\u2011risk concepts early<\/strong>, not just technical skills but social engineering tactics. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/li>\n<li>Using AI in simulations <strong>shows how real attackers might use similar tools<\/strong> \u2014 and helps both students and staff learn how to <em>recognize<\/em> signs of phishing and manipulation before they fall for real attacks. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"_Broader_Context_on_Phishing_Awareness_and_AI\"><\/span>\u00a0Broader Context on Phishing Awareness and AI<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>This student project lines up with emerging trends in cybersecurity training:<\/p>\n<ul>\n<li>AI tools are increasingly used to create <strong>realistic phishing simulations<\/strong> that help people learn to spot threats \u2014 both in schools and workplaces. (<a title=\"Security Awareness Training: Education for Employees | Proofpoint US\" href=\"https:\/\/www.proofpoint.com\/us\/products\/mitigate-human-risk?utm_source=chatgpt.com\">Proofpoint<\/a>)<\/li>\n<li>Research shows that phishing simulations can be powerful awareness tools when combined with proper training and ethical framing \u2014 though they must be used carefully so participants <em>learn<\/em> rather than simply feel tricked. (<a title=\"Why security awareness training doesn\u2019t work \u2014 and how to fix it\" href=\"https:\/\/www.cybersecuritydive.com\/news\/cybersecurity-awareness-training-research-flaws\/803201\/?utm_source=chatgpt.com\">cybersecuritydive.com<\/a>)<\/li>\n<li>In higher education and corporate environments alike, <strong>AI\u2011enhanced phishing tests and awareness campaigns<\/strong> are becoming part of standard cybersecurity education strategies. (<a title=\"Hooked by phish: Security offices test Duke community in annual phishing awareness campaign\" href=\"https:\/\/dukechronicle.com\/article\/duke-university-phishing-campaign-awareness-email-information-security-cybersecurity-20251103?utm_source=chatgpt.com\">dukechronicle.com<\/a>)<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Lessons_From_the_Case\"><\/span><strong>Lessons From the Case<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ol>\n<li><strong>AI can make training more realistic<\/strong> \u2014 both educators and defenders must adapt as AI gets better at mimicking human language. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/li>\n<li><strong>Ethics and consent matter<\/strong> \u2014 having clear agreements from students and staff ensures such exercises are responsible and instructional. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/li>\n<li><strong>Learning by doing works<\/strong> \u2014 students not only learned about phishing but <em>took part<\/em> in demonstrating why training is needed. (<a title=\"These Students Tricked Teachers With Phishing Emails\u2014for a Good Cause\" href=\"https:\/\/www.edweek.org\/technology\/these-students-tricked-teachers-with-phishing-emails-for-a-good-cause\/2026\/02?utm_source=chatgpt.com\">Education Week<\/a>)<\/li>\n<\/ol>\n<hr \/>\n<p>Here are the <strong>detailed case studies and key comments<\/strong> related to how <em>students used AI to raise cybersecurity awareness through phishing email simulations<\/em> \u2014 based on recent reporting, teacher insights, and broader expert context:<\/p>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Case_Study_1_%E2%80%94_High_School_Students_Run_AI%E2%80%91Assisted_Phishing_Simulation\"><\/span><strong>Case Study 1 \u2014 High School Students Run AI\u2011Assisted Phishing Simulation<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"_What_the_Project_Was\"><\/span>\u00a0What the Project Was<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>At <strong>Eminence High School<\/strong>, a cybersecurity teacher designed a classroom activity where students <em>created simulated phishing emails<\/em> to raise awareness among staff about how easy it is to be tricked online.<\/p>\n<ul>\n<li>Students were allowed to use <strong>generative AI tools<\/strong> to write convincing phishing messages \u2014 reflecting how real attackers increasingly use AI.<\/li>\n<li>The school\u2019s tech team <em>deliberately delivered<\/em> these simulated messages to staff email inboxes as part of the exercise.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"_What_Happened_in_the_Simulation\"><\/span>\u00a0What Happened in the Simulation<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>A first phishing email <em>generated without AI<\/em> succeeded in getting <strong>14 staff members to click a fake link<\/strong>.<\/li>\n<li>A second email <em>crafted with AI help<\/em> got <em>more clicks,<\/em> more quickly and convincingly.<\/li>\n<li>All clicks were on <strong>simulated test links<\/strong>, not real malware or harmful sites.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"_Why_It_Worked\"><\/span>\u00a0Why It Worked<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The simulation showed that:<\/p>\n<ul>\n<li><strong>AI can make deceptive emails more convincing<\/strong>, even when written by students.<\/li>\n<li>Staff \u2014 like anyone \u2014 can be vulnerable to well\u2011written phishing messages.<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Case_Study_2_%E2%80%94_Ethical_Framework_Consent_Process\"><\/span><strong>Case Study 2 \u2014 Ethical Framework &amp; Consent Process<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Before running the simulation, the teacher and school took deliberate steps to <em>frame it ethically<\/em>:<\/p>\n<h3><span class=\"ez-toc-section\" id=\"_Clear_Rules_and_Agreements\"><\/span>\u00a0Clear Rules and Agreements<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>Parents and students signed an <strong>acceptable\u2011use agreement<\/strong> for technology that included consent for this exercise.<\/li>\n<li>The teacher discussed <strong>ethical technology use<\/strong> with students \u2014 emphasizing this was training, not mischief.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"_Why_This_Matters\"><\/span>\u00a0Why This Matters<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>This helped ensure:<\/p>\n<ul>\n<li>Participants understood <em>why<\/em> the exercise existed (to learn, not to deceive).<\/li>\n<li>Staff were not exposed to real security risks beyond awareness\u2011raising.<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Comments_From_Educators_and_Experts\"><\/span><strong>Comments From Educators and Experts<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"_Teacher_Leading_the_Project\"><\/span>\u00a0Teacher Leading the Project<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The cybersecurity teacher said the simulation helped teachers <em>experience<\/em> how phishing works \u2014 an experience that reading about it doesn\u2019t fully provide.<br \/>\nShe described it as <em>an effective wake\u2011up call<\/em> on how easy it is to fall for realistic threats.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"_School_Technology_Director\"><\/span>\u00a0School Technology Director<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The technology director remarked that while results showed many clicks on test links, the real success was <em>in starting a conversation about cybersecurity best practices<\/em>.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"_Broader_Cybersecurity_Educators\"><\/span>\u00a0Broader Cybersecurity Educators<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Security education experts note:<\/p>\n<ul>\n<li>Simulations can be more impactful than lectures because <em>they put people in the role of decision\u2011maker<\/em>.<\/li>\n<li>Using AI to craft simulated phishing messages reflects <em>real tactics attackers may use<\/em>, making training more realistic. (General cybersecurity training research)<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"What_These_Cases_Teach\"><\/span><strong>What These Cases Teach<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"_1_AI_Can_Be_a_Double%E2%80%91Edged_Sword\"><\/span>\u00a01. <strong>AI Can Be a Double\u2011Edged Sword<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>Tools that make writing easier can also help craft deceptive messages.<\/li>\n<li>Teaching people how these tools can be misused helps improve real\u2011world defenses.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"2_Active_Simulations_Boost_Awareness\"><\/span>2. <strong>Active Simulations Boost Awareness<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>Staff often <em>think they know<\/em> what phishing looks like \u2014 but clicking behavior shows how deceptive real wording can be.<\/li>\n<li>Realistic simulations help close that awareness gap.<\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"_3_Ethics_and_Consent_Are_Key\"><\/span>\u00a03. <strong>Ethics and Consent Are Key<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li>Without clear consent and ethical framing, such exercises could harm trust.<\/li>\n<li>Getting buy\u2011in from students, parents, and staff ensures the learning goal stays clear.<\/li>\n<\/ul>\n<hr \/>\n<h2><span class=\"ez-toc-section\" id=\"Expert_Perspectives_on_Phishing_Simulations\"><\/span><strong>Expert Perspectives on Phishing Simulations<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Cybersecurity training research supports the value of simulations when combined with:<\/p>\n<ul>\n<li>Immediate feedback for participants<\/li>\n<li>Follow\u2011up lessons on how to recognize red flags<\/li>\n<li>Ongoing awareness campaigns<\/li>\n<\/ul>\n<p>In other words, simulations <em>should be part of<\/em> (not the whole of) cybersecurity education.<\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Full Case Study: High School Students Use AI to Teach Phishing Awareness What Happened At Eminence High School, a cybersecurity teacher implemented a phishing&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[270,90],"tags":[],"class_list":["post-19351","post","type-post","status-publish","format-standard","hentry","category-digital-marketing","category-news-update"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Students Use AI to Raise Cybersecurity Awareness Through Phishing Email Simulation - Lite14 Tools &amp; Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Students Use AI to Raise Cybersecurity Awareness Through Phishing Email Simulation - Lite14 Tools &amp; Blog\" \/>\n<meta property=\"og:description\" content=\"&nbsp; Full Case Study: High School Students Use AI to Teach Phishing Awareness What Happened At Eminence High School, a cybersecurity teacher implemented a phishing...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/\" \/>\n<meta property=\"og:site_name\" content=\"Lite14 Tools &amp; Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-26T14:39:44+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2\"},\"headline\":\"Students Use AI to Raise Cybersecurity Awareness Through Phishing Email Simulation\",\"datePublished\":\"2026-02-26T14:39:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/\"},\"wordCount\":1122,\"publisher\":{\"@id\":\"https:\/\/lite14.net\/blog\/#organization\"},\"articleSection\":[\"Digital Marketing\",\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/\",\"url\":\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/\",\"name\":\"Students Use AI to Raise Cybersecurity Awareness Through Phishing Email Simulation - Lite14 Tools &amp; Blog\",\"isPartOf\":{\"@id\":\"https:\/\/lite14.net\/blog\/#website\"},\"datePublished\":\"2026-02-26T14:39:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lite14.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Students Use AI to Raise Cybersecurity Awareness Through Phishing Email Simulation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lite14.net\/blog\/#website\",\"url\":\"https:\/\/lite14.net\/blog\/\",\"name\":\"Lite14 Tools &amp; Blog\",\"description\":\"Email Marketing Tools &amp; Digital Marketing Updates\",\"publisher\":{\"@id\":\"https:\/\/lite14.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lite14.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lite14.net\/blog\/#organization\",\"name\":\"Lite14 Tools &amp; Blog\",\"url\":\"https:\/\/lite14.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png\",\"contentUrl\":\"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png\",\"width\":191,\"height\":178,\"caption\":\"Lite14 Tools &amp; Blog\"},\"image\":{\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lite14.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/lite14.net\/blog\"],\"url\":\"https:\/\/lite14.net\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Students Use AI to Raise Cybersecurity Awareness Through Phishing Email Simulation - Lite14 Tools &amp; Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/","og_locale":"en_US","og_type":"article","og_title":"Students Use AI to Raise Cybersecurity Awareness Through Phishing Email Simulation - Lite14 Tools &amp; Blog","og_description":"&nbsp; Full Case Study: High School Students Use AI to Teach Phishing Awareness What Happened At Eminence High School, a cybersecurity teacher implemented a phishing...","og_url":"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/","og_site_name":"Lite14 Tools &amp; Blog","article_published_time":"2026-02-26T14:39:44+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#article","isPartOf":{"@id":"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/"},"author":{"name":"admin","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2"},"headline":"Students Use AI to Raise Cybersecurity Awareness Through Phishing Email Simulation","datePublished":"2026-02-26T14:39:44+00:00","mainEntityOfPage":{"@id":"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/"},"wordCount":1122,"publisher":{"@id":"https:\/\/lite14.net\/blog\/#organization"},"articleSection":["Digital Marketing","News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/","url":"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/","name":"Students Use AI to Raise Cybersecurity Awareness Through Phishing Email Simulation - Lite14 Tools &amp; Blog","isPartOf":{"@id":"https:\/\/lite14.net\/blog\/#website"},"datePublished":"2026-02-26T14:39:44+00:00","breadcrumb":{"@id":"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/lite14.net\/blog\/2026\/02\/26\/students-use-ai-to-raise-cybersecurity-awareness-through-phishing-email-simulation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lite14.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Students Use AI to Raise Cybersecurity Awareness Through Phishing Email Simulation"}]},{"@type":"WebSite","@id":"https:\/\/lite14.net\/blog\/#website","url":"https:\/\/lite14.net\/blog\/","name":"Lite14 Tools &amp; Blog","description":"Email Marketing Tools &amp; Digital Marketing Updates","publisher":{"@id":"https:\/\/lite14.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lite14.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lite14.net\/blog\/#organization","name":"Lite14 Tools &amp; Blog","url":"https:\/\/lite14.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png","contentUrl":"https:\/\/lite14.net\/blog\/wp-content\/uploads\/2025\/09\/cropped-lite-logo.png","width":191,"height":178,"caption":"Lite14 Tools &amp; Blog"},"image":{"@id":"https:\/\/lite14.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/551c62581e407fcec8cf1f76df97b5d2","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lite14.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37de671670ea9023731c3f3ef83c84b6d7d6faeffecd87fb98e3ec10aecc15bd?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/lite14.net\/blog"],"url":"https:\/\/lite14.net\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/19351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/comments?post=19351"}],"version-history":[{"count":1,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/19351\/revisions"}],"predecessor-version":[{"id":19352,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/posts\/19351\/revisions\/19352"}],"wp:attachment":[{"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/media?parent=19351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/categories?post=19351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lite14.net\/blog\/wp-json\/wp\/v2\/tags?post=19351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}