Research Article

The good practices for implementation of cyber security education for school children

Dana Ondrušková 1 * , Richard Pospíšil 1
More Detail
1 Department of Economic and Managerial Studies, Faculty of Arts, Palacky University Olomouc, Olomouc, CZECH REPUBLIC* Corresponding Author
Contemporary Educational Technology, 15(3), July 2023, ep435, https://doi.org/10.30935/cedtech/13253
Published Online: 08 May 2023, Published: 01 July 2023
OPEN ACCESS   3050 Views   2971 Downloads
Download Full Text (PDF)

ABSTRACT

The increasing use of the Internet calls upon the need for adequate cyber security awareness to better face the risk and dangers connected with the online environment. This research presents an experiment that revealed the cyber security awareness of children at Czech primary schools. They were tested for their skills to distinguish different online risks. After the pre-testing children received training and with the time delay they filled in very similar questionnaires. The re-testing measured how well the children retained the training and their ability to use the skills in the virtual environment. The results show only a moderate level of cyber security awareness at the initial testing. The one-off training had only an insignificant impact on their online behavior. The research reveals an important finding. One-off training does not affect their responsive online behavior and is not a suitable solution for effectively improving online safety skills. The task is to involve cyber security awareness education in the whole educational process. Based on the literature and conducted research this paper provides a set of recommendations for the designers of the cyber security school curriculum.

CITATION (APA)

Ondrušková, D., & Pospíšil, R. (2023). The good practices for implementation of cyber security education for school children. Contemporary Educational Technology, 15(3), ep435. https://doi.org/10.30935/cedtech/13253

REFERENCES

  1. Al Zou’bi, R. M. (2022). The impact of media and information literacy on students’ acquisition of the skills needed to detect fake news. Journal of Media Literacy Education, 14(2), 58-71. https://doi.org/10.23860/JMLE-2022-14-2-5
  2. Alwanain, M. I. (2021). How do children interact with phishing attacks? International Journal of Computer Science & Network Security, 21(3), 127-133. https://doi.org/10.22937/IJCSNS.2021.21.3.17
  3. Amo, L. C., Liao R., Frank, E., Rao, H. R., & Upadhyaya, S. (2019). Cybersecurity interventions for teens: Two time-based approaches. IEEE Transactions on Education, 62(2), 134-140. https://doi.org/10.1109/TE.2018.2877182
  4. Ascoott, T. (2020). Is media literacy the magic bullet for fake news? The Interpretor.
  5. Celliers, M., & Hattingh, M. (2020). A systematic review on fake news themes reported in literature. In M. Hattingh, M. Matthee, H. Smuts, I. Pappas, Y. K. Dwivedi, & M. Mäntymäkin(Eds.), Responsible design, implementation and use of information and communication technology (pp. 223-234). Springer. https://doi.org/10.1007/978-3-030-45002-1_19
  6. Chugh, R., & Turnbull, D. (2023). Gamification in education: A citation network analysis using CitNetExplorer. Contemporary Educational Technology, 15(2), ep405. https://doi.org/10.30935/cedtech/12863
  7. Cortesi, S., Hasse, A., Lombana-Bermudez, A., Kim, S., & Gasser, U. (2020). Youth and digital citizenship+ (plus): Understanding skills for a digital world. Berkman Klein Center Research Publication, 2020-2, 1-91. https://doi.org/10.2139/ssrn.3557518
  8. Feng, Y., & Xie, W. (2014). Teens’ concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy-protecting behaviors. Computers in Human Behavior, 33, 153-162. https://doi.org/10.1016/j.chb.2014.01.009
  9. Finkelhor, D., Walsh, K., Jones, L., Mitchell, K., & Collier, A. (2021). Youth Internet safety education: Aligning programs with the evidence base. Trauma Violence & Abuse, 22(5), 1233-1247. https://doi.org/10.1177/1524838020916257
  10. Giannakas, F., Papasalouros, A., Kambourakis, G., & Gritzalis, S. (2019). A comprehensive cybersecurity learning platform for elementary education. Information Security Journal: A Global Perspective, 28(3), 81-106. https://doi.org/10.1080/19393555.2019.1657527
  11. Khalifa, A. L. (2000). Intuition and creativity. Gharib Publishing House.
  12. Lamond, M., Renaud, K., Wood, L., & Prior, S. (2022). SOK: Young children’s cybersecurity knowledge, skills & practice: A systematic literature review. In Proceedings of the 2022 European Symposium on Usable Security (pp. 14-27). https://doi.org/10.1145/3549015.3554207
  13. Lastdrager, E., Gallardo, I.C., Hartel, P., & Junger, M. (2017). How effective is {anti-phishing} training for children? In Proceedings of the 13th Symposium on Usable Privacy and Security (pp. 229-239).
  14. Leyland, A. H., & Goldstein, H. (2001). Multilevel modelling of health statistics. John Wiley & Sons.
  15. Liao, T., & Lin, I. (2017). A survey of Blockchain Security Issues and Challenges. International Journal of Network Security, 19(5), 653-659.
  16. Lorenz, B., Kikkas, K., & Osula, K. (2018). Development of children’s cyber security competencies in Estonia. In P. Zaphiris, & A. Ioannou (Eds.), Learning and collaboration technologies. Learning and teaching (pp. 473-482). Springer. https://doi.org/10.1007/978-3-319-91152-6_36
  17. Mason, L. E., Krutka, D., & Stoddard, J. (2018). Media literacy, democracy, and the challenge of fake news. Journal of Media Literacy Education, 10(2), 1-10. https://doi.org/10.23860/JMLE-2018-10-2-1
  18. McGettrick, A. (2013). Toward effective cybersecurity education. Security and Privacy Magazine, 11(6), 66-68. https://doi.org/10.1109/msp.2013.155
  19. McKnight, K., O’Malley , K., & Bassett, K. (2016). Teaching in a digital age: How educators use technology to improve student learning. Journal of Research on Technology in Education, 48(3), 194-211. https://doi.org/10.1080/15391523.2016.1175856
  20. Mehta, K. (2022). Should cybersecurity be made part of the school curriculum? World Economic Forum.
  21. Mrah, I., & Tizaoui, H. (2018). The rise of misinformation in the digital age: Moroccan students’ attitudes and perceptions of fake news online. Journal of English Language Teaching and Linguistics, 3(2), 117-135. https://doi.org/10.21462/jeltl.v3i2.137
  22. Page, B. (2019). 9 steps to successfully detect fake news. Better Marketing. https://bettermarketing.pub/9-ways-to-detect-fake-news-an-insiders-guide-61aa425f5a6f
  23. Patterson A., Ryckman L., & Guerra C. (2022). A systematic review of the education and awareness interventions to prevent online child sexual abuse. Journal of Child & Adolescent Trauma, 15, 857-867. https://doi.org/10.1007/s40653-022-00440-x
  24. Penncheva, D., Hallett, J., & Rashid, A. (2020). Bringing cyber to school: Integrating cybersecurity into secondary school education. IEEE Security and Privacy Magazine, 18(2), 68-74. https://doi.org/10.1109/MSEC.2020.2969409
  25. Qiu, X., Diego, O., Sherazi, A., Flammini, A., & Filippo M. (2017). Limited individual attention and online virality of low-quality information. Human Nature, 1(7), 1-7. https://doi.org/10.1038/s41562-017-0132
  26. Quayyum, F., Cruzes, D. S., & Jaccheri, L. (2021). Cybersecurity awareness for children: A systematic literature review. International Journal of Child-Computer Interaction, 30, 100343. https://doi.org/10.1016/j.ijcci.2021.100343
  27. Shamsi, A. (2019). Effectiveness of cyber security awareness program for young children: A case study in UAE. International Journal of Information Technology and Language Studies, 3(2), 8-29. https://doi.org/10.13140/RG.2.2.28488.14083
  28. Shi, C., Wei, B., Wei, S., Wang, W., & Liu, H. (2021). A quantitative discriminant method of elbow point for the optimal number of clusters in clustering algorithm. EURASIP Journal on Wireless Communications and Networking, 31. https://doi.org/10.1186/s13638-021-01910-w
  29. Smalheiser, N. (2017). Data literacy: How to make your experiments robust and reproducible. Academic Press.
  30. Sullivan, G., & Feinn, R., (2012). Using effect size—or why the P value is not enough september. Journal of Graduate Medical Education, 4(3), 279-82. https://doi.org/10.4300/JGME-D-12-00156.1
  31. Taylor, J., McAlaney, J., Hodge, S., Thackray, H., & Richardson, C. (2017). Teaching psychological principles to cybersecurity students. In Proceedings of the IEEE Global Engineering Education Conference (pp. 1782-1789). IEEE. https://doi.org/10.1109/EDUCON.2017.7943091
  32. Tsirtsis, A., Tsapatsoulis, N., Stamatelatos, M., Papadamou, K., & Sirivianos, M. (2016). Cyber security risks for minors: A taxonomy and a software architecture. In Proceedings of the 11th International Workshop on Semantic and Social Media Adaptation and Personalization (pp. 93-99). https://doi.org/10.1109/SMAP.2016.7753391
  33. Vanderhoven, E., Willems, B., Van Hove, S., All, A. & Schellens, T. (2015). Wait and see? studying the teacher’s role during in-class educational gaming. In European Conference on Games Based Learning (pp. 540-547).
  34. Venter, I. M., Blignaut, R. J., Renaud, K., & Venter, M. A. (2019). Cyber security education is as essential as “the three R’s”. Heliyon, 5(12), ep02855. https://doi.org/10.1016/j.heliyon.2019.e02855
  35. Waldock, K. E., Miller, V., Li, S., & Franqueira, V. (2022). A report on developing cyber skills amongst children and young people. Institute of Cyber Security for Society, University of Kent.
  36. Winter, E., Costello, A., O’Brien, M., & Hickey, G. (2021). Teachers’ use of technology and the impact of COVID-19. Irish Educational Studies, 40(2), 235-246. https://doi.org/10.1080/03323315.2021.1916559
  37. Zhang-Kennedy, L., Abdelaziz, Y., & Chiasson, S. (2017). Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy. International Journal of Child-Computer Interaction, 13, 10-18. https://doi.org/10.1016/j.ijcci.2017.05.001
  38. Zhao, G. W., Dally, C., Slovak, P., Edbrooke-Childs, J., Van Kleek, M., & Shadbolt, N. (2019). ‘I make up a silly name’: Understanding children’s perception of privacy risks online. In Proceedings of the 2019 Conference on Human Factors in Computing Systems, (pp. 1-13). ACM. https://doi.org/10.1145/3290605.3300336