7 FUTURE WORK
Future research should explore the long-term
retention of cybersecurity knowledge among middle
school students and investigate the effectiveness of
different teaching methods in various educational
settings. Additionally, expanding the study to include
a more diverse group of students and exploring the
role of parental involvement in cybersecurity
education could provide further insights into
improving cybersecurity awareness at a young age.
REFERENCES
Rawat, Danda B., Doku, Ronald, & Garuba, Moses. (2019).
"Cybersecurity in Big Data Era: From Securing Big
Data to Data-Driven Security." Proceedings of the
IEEE International Conference on Services Computing
(SCC), 2019, pp. 10-1109. https://doi.org/10.
1109/TSC.2019.2907247.
"Understanding Cyber Threats." Norton. Retrieved from
https://us.norton.com/internetsecurity-malware-what-
are-cyber-threats.html (This is a website source and not
a conference proceeding.)
Al-Shanfari, Issam, Mohamed, Warusia, & Abdullah,
Raihana. (2020). "Identify of Factors Affecting
Information Security Awareness and Weight Analysis
Process." Proceedings of the International Conference
on Advances in Engineering and Technology Research,
2020, vol. 9, pp. 2249-8958. https://doi.org/10.
35940/ijeat.C4775.029320.
"Cyber Security Fundamentals." (2024). CompTIA.
Retrieved from https://www.comptia.org/ (This is a
web source, not a conference proceeding.)
Michael, K. (2008). "Social and Organizational Aspects of
Information Security Management." Proceedings of the
IADIS e-Society Conference, 9-12 April, Algarve,
Portugal, pp. 1-8.
Zwilling, Moti, et al. (2022). "Cyber Security Awareness,
Knowledge and Behavior: A Comparative Study."
Proceedings of the 62nd International Conference on
Information Systems and Security, Jan. 2022, pp. 82–
97. https://doi.org/10.1080/08874417.2020.1712269.
Alotaibi, F., Furnell, S., Stengel, I., & Papadaki, M. (2016).
"A Review of Using Gaming Technology for Cyber-
Security Awareness." Proceedings of the International
Conference on Information Systems and Security
Research, 2016, vol. 6(2), pp. 660-666.
Johnson, M. (2019). "Cybersecurity Awareness Training:
Why it Fails." Proceedings of the 12th International
Conference on Information Security and Privacy, 2019,
pp. 121-127.
Akter, Shahriar, et al. (2022). "Reconceptualizing
Cybersecurity Awareness Capability in the Data-
Driven Digital Economy." Proceedings of the Annals of
Operations Research International Conference, Aug.
2022. https://doi.org/10.1007/s10479-022-04844-8.
Bauer, S., & Bernroider, E. W. (2017). "An Empirical Study
of Information Security Awareness Programs in the
Banking Sector." Proceedings of the International
Conference on Information Security and Applications,
2017, vol. 35, pp. 23-33.
Bitton, R., Gonen, Y., Giyora, I., & Elovici, Y. (2020).
Phishing attacks detected: Leveraging phishing
awareness to predict training improvements.
Information Security Journal: A Global Perspective,
29(1), 18-30.
Lee, S. Y., & Rao, H. R. (2016). Cybersecurity Awareness
Capabilities (CSAC): Impact on cybersecurity
compliance. Journal of Computer Information Systems,
56(4), 310-319.
Zhou, Y., Zhang, Y., Wu, X., & Chen, D. (2020). Exploring
psychological factors in cybersecurity awareness: Self-
efficacy, risk awareness, and social support. Computers
in Human Behavior, 107, 106281.
Zwilling, M., Netzer, D., Dell, M., & Yechezkel, G. (2022).
The influence of cybersecurity awareness on the
adoption of cybersecurity tools across countries.
Computers & Security, 108, 102319.
Zhang, Z., He, W., Li, W., & Abdous, M. H. (2021).
Cybersecurity awareness training programs: A cost–
benefit analysis framework. Industrial Management &
Data Systems, 121(3), 613-636.
Hijji, M., & Alam, G. (2022). Cybersecurity Awareness and
Training (CAT) framework for remote working
employees. Sensors, 22(22), 8663.
Ahmad, N., Mokhtar, U. A., Fauzi, W. F. P., Othman, Z. A.,
Yeop, Y. H., & Sheikh Abdullah, S. N. H. (2018).
Cyber Security Situational Awareness among Parents.
2018 Cyber Resilience Conference (CRC), Putrajaya,
Malaysia, pp. 1-3. doi: 10.1109/CR.2018.8626830.
Prior, S., & Renaud, K. (2020). Age-appropriate password
“best practice” ontologies for early educators and
parents. International Journal of Child-Computer
Interaction, 23–24, Article 100169.
Desimpelaere, L., Hudders, L., & Van de Sompel, D.
(2020). Knowledge as a strategy for privacy protection:
How a privacy literacy training affects children’s online
disclosure behavior. Computers in Human Behavior,
110, Article 106382.
Sulaiman, N. S., et al. (2022). A Review of Cyber Security
Awareness (CSA) Among Young Generation: Issue
and Countermeasure. In Al-Emran, M., Al-Sharafi, M.
A., Al-Kabi, M. N., & Shaalan, K. (Eds.), Proceedings
of International Conference on Emerging Technologies
and Intelligent Systems. ICETIS 2021. Lecture Notes in
Networks and Systems (Vol. 322). Springer, Cham.
https://doi.org/10.1007/978-3-030-85990-9_76
National Institute of Standards and Technology (NIST).
(2020). National Initiative for Cybersecurity Education
(NICE) Cybersecurity Workforce Framework (NIST
Special Publication 800-181 Rev. 1).
https://doi.org/10.6028/NIST.SP.800-181r1.