Creating Mass Cyber Security Awareness Among Children, Parents And Teachers Through Appropriate Training And Campaign Mechanism

Authors

  • Dhuha Nasser Shamis Al-Nomani MIDDLE EAST COLLEGE
  • Sumayia Abdullah Muhanna Al Nabhani
  • Syed Thoufeeq Ahmed

Keywords:

Cyber threats, Cyber security, Awareness

Abstract

Nowadays, we are currently and completely living in an age where the use of internet has become the second nature of millions of people around the globe. With the continuous development and growth of the internet providing new services and applications to different users, many of them are also becoming more and more active in engaging with the internet and because of this they are more likely become vulnerable to different malicious threats and risks brought along by the Internet such malwares, viruses, cyber bullying, identity theft, unauthorized access, hacking and other malicious threats. Furthermore, these risks and attacks can greatly affect and threatened the safety and security of each users especially those that have limited knowledge and understanding about  cyber space and are not aware of the threats that comes along with the Internet and the means on how to protect and secure themselves from these  risks.  This paper aims to provide essential information’s to all users, by conducting a program about cyber security awareness for all stakeholders of different age groups. Moreover, the aim is to deliver message to the community to be aware from potential risks that occur from cyber security. 

With the underlying consequences of having limited knowledge, understanding and relevant information regarding cyberspace or internet, this project study also will equip and empower as well as educate each users enough information and awareness through different cyber security awareness sessions and campaign mechanisms

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References or Bibliography

] The National Institute of Standards and Technology U.S Department of Commerce

. http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf

] Bulgurcu, B., Cavusoglu, H. and Benbasat, I., 2010. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3), pp.523-548.

. Ben-Asher, N. and Gonzalez, C., 2015. Effects of cyber security knowledge on attack detection. Computers in Human Behavior, 48, pp.51-61.

] Cone, B.D., Irvine, C.E., Thompson, M.F. and Nguyen, T.D., 2007. A video game for cyber security training and awareness. computers & security, 26(1), pp.63-72.

] Colwill, C., 2009. Human factors in information security: The insider threat–Who can you trust these days?. Information security technical report, 14(4), pp.186-196.

] Franke, U. and Brynielsson, J., 2014. Cyber situational awareness–a systematic review of the literature. Computers & Security, 46, pp.18-31 .

] Maqousi, Ali, Tatiana Balikhina, and Michael Mackay. "An effective method for information security awareness raising initiatives." International Journal of Computer Science & Information Technology 5.2 (2013): 63.

] Zhang, Chen, and Janet J. Prichard. "AN EMPIRICAL STUDY OF CYBER SECURITY PERCEPTIONS, AWARENESS AND PRACTICE."

] Kritzinger, Elmarie, and Sebastiaan H. von Solms. "Cyber security for home users: A new way of protection through awareness enforcement." Computers & Security 29.8 (2010): 840-847.

] Castells, Manuel. The rise of the network society: The information age: Economy, society, and culture. Vol. 1. John Wiley & Sons, 2011.

] Goyal, Mohit. "Ethics and Cyber Crime in India." International Journal of Engineering and Management Research 2 (2012): 2250-0758.

] Carr, Jeffrey. Inside cyber warfare: Mapping the cyber underworld. " O'Reilly Media, Inc.", 2011.

] Zhang, Yanping, et al. "A survey of cyber crimes." Security and Communication Networks 5.4 (2012): 422-437.

] Dawson, Maurice, Jorja Wright, and Marwan Omar. "Mobile Devices: The Case for Cyber Security." New Threats and Countermeasures in Digital Crime and Cyber Terrorism (2015): 8.

] Thomson, Kerry-Lynn, Rossouw von Solms, and Lynette Louw. "Cultivating an organizational information security culture." Computer Fraud & Security2006.10 (2006): 7-11.

] Arachchilage, Nalin Asanka Gamagedara, and Steve Love. "Security awareness of computer users: A phishing threat avoidance perspective." Computers in Human Behavior 38 (2014): 304-312.

] Peltier, Thomas R. Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press, 2016.

. Anderson, Ross J. Security engineering: a guide to building dependable distributed systems. John Wiley & Sons, 2010.

] Newman, Robert C. Computer security: Protecting digital resources. Jones & Bartlett Publishers, 2009.

Published

06-01-2022

How to Cite

Al-Nomani, D. N. S. ., Al Nabhani, S. A. M. ., & Ahmed, S. T. . (2022). Creating Mass Cyber Security Awareness Among Children, Parents And Teachers Through Appropriate Training And Campaign Mechanism. Journal of Student Research. Retrieved from https://www.jsr.org/index.php/path/article/view/1536