Research Article
The good practices for implementation of cyber security education for school children
More Detail
1 Department of Economic and Managerial Studies, Faculty of Arts, Palacky University Olomouc, Olomouc, CZECH REPUBLIC* Corresponding Author
Contemporary Educational Technology, 15(3), July 2023, ep435, https://doi.org/10.30935/cedtech/13253
Published Online: 08 May 2023, Published: 01 July 2023
OPEN ACCESS 3050 Views 2971 Downloads
ABSTRACT
The increasing use of the Internet calls upon the need for adequate cyber security awareness to better face the risk and dangers connected with the online environment. This research presents an experiment that revealed the cyber security awareness of children at Czech primary schools. They were tested for their skills to distinguish different online risks. After the pre-testing children received training and with the time delay they filled in very similar questionnaires. The re-testing measured how well the children retained the training and their ability to use the skills in the virtual environment. The results show only a moderate level of cyber security awareness at the initial testing. The one-off training had only an insignificant impact on their online behavior. The research reveals an important finding. One-off training does not affect their responsive online behavior and is not a suitable solution for effectively improving online safety skills. The task is to involve cyber security awareness education in the whole educational process. Based on the literature and conducted research this paper provides a set of recommendations for the designers of the cyber security school curriculum.
CITATION (APA)
Ondrušková, D., & Pospíšil, R. (2023). The good practices for implementation of cyber security education for school children. Contemporary Educational Technology, 15(3), ep435. https://doi.org/10.30935/cedtech/13253
REFERENCES
- Al Zou’bi, R. M. (2022). The impact of media and information literacy on students’ acquisition of the skills needed to detect fake news. Journal of Media Literacy Education, 14(2), 58-71. https://doi.org/10.23860/JMLE-2022-14-2-5
- Alwanain, M. I. (2021). How do children interact with phishing attacks? International Journal of Computer Science & Network Security, 21(3), 127-133. https://doi.org/10.22937/IJCSNS.2021.21.3.17
- Amo, L. C., Liao R., Frank, E., Rao, H. R., & Upadhyaya, S. (2019). Cybersecurity interventions for teens: Two time-based approaches. IEEE Transactions on Education, 62(2), 134-140. https://doi.org/10.1109/TE.2018.2877182
- Ascoott, T. (2020). Is media literacy the magic bullet for fake news? The Interpretor.
- Celliers, M., & Hattingh, M. (2020). A systematic review on fake news themes reported in literature. In M. Hattingh, M. Matthee, H. Smuts, I. Pappas, Y. K. Dwivedi, & M. Mäntymäkin(Eds.), Responsible design, implementation and use of information and communication technology (pp. 223-234). Springer. https://doi.org/10.1007/978-3-030-45002-1_19
- Chugh, R., & Turnbull, D. (2023). Gamification in education: A citation network analysis using CitNetExplorer. Contemporary Educational Technology, 15(2), ep405. https://doi.org/10.30935/cedtech/12863
- Cortesi, S., Hasse, A., Lombana-Bermudez, A., Kim, S., & Gasser, U. (2020). Youth and digital citizenship+ (plus): Understanding skills for a digital world. Berkman Klein Center Research Publication, 2020-2, 1-91. https://doi.org/10.2139/ssrn.3557518
- Feng, Y., & Xie, W. (2014). Teens’ concern for privacy when using social networking sites: An analysis of socialization agents and relationships with privacy-protecting behaviors. Computers in Human Behavior, 33, 153-162. https://doi.org/10.1016/j.chb.2014.01.009
- Finkelhor, D., Walsh, K., Jones, L., Mitchell, K., & Collier, A. (2021). Youth Internet safety education: Aligning programs with the evidence base. Trauma Violence & Abuse, 22(5), 1233-1247. https://doi.org/10.1177/1524838020916257
- Giannakas, F., Papasalouros, A., Kambourakis, G., & Gritzalis, S. (2019). A comprehensive cybersecurity learning platform for elementary education. Information Security Journal: A Global Perspective, 28(3), 81-106. https://doi.org/10.1080/19393555.2019.1657527
- Khalifa, A. L. (2000). Intuition and creativity. Gharib Publishing House.
- Lamond, M., Renaud, K., Wood, L., & Prior, S. (2022). SOK: Young children’s cybersecurity knowledge, skills & practice: A systematic literature review. In Proceedings of the 2022 European Symposium on Usable Security (pp. 14-27). https://doi.org/10.1145/3549015.3554207
- Lastdrager, E., Gallardo, I.C., Hartel, P., & Junger, M. (2017). How effective is {anti-phishing} training for children? In Proceedings of the 13th Symposium on Usable Privacy and Security (pp. 229-239).
- Leyland, A. H., & Goldstein, H. (2001). Multilevel modelling of health statistics. John Wiley & Sons.
- Liao, T., & Lin, I. (2017). A survey of Blockchain Security Issues and Challenges. International Journal of Network Security, 19(5), 653-659.
- Lorenz, B., Kikkas, K., & Osula, K. (2018). Development of children’s cyber security competencies in Estonia. In P. Zaphiris, & A. Ioannou (Eds.), Learning and collaboration technologies. Learning and teaching (pp. 473-482). Springer. https://doi.org/10.1007/978-3-319-91152-6_36
- Mason, L. E., Krutka, D., & Stoddard, J. (2018). Media literacy, democracy, and the challenge of fake news. Journal of Media Literacy Education, 10(2), 1-10. https://doi.org/10.23860/JMLE-2018-10-2-1
- McGettrick, A. (2013). Toward effective cybersecurity education. Security and Privacy Magazine, 11(6), 66-68. https://doi.org/10.1109/msp.2013.155
- McKnight, K., O’Malley , K., & Bassett, K. (2016). Teaching in a digital age: How educators use technology to improve student learning. Journal of Research on Technology in Education, 48(3), 194-211. https://doi.org/10.1080/15391523.2016.1175856
- Mehta, K. (2022). Should cybersecurity be made part of the school curriculum? World Economic Forum.
- Mrah, I., & Tizaoui, H. (2018). The rise of misinformation in the digital age: Moroccan students’ attitudes and perceptions of fake news online. Journal of English Language Teaching and Linguistics, 3(2), 117-135. https://doi.org/10.21462/jeltl.v3i2.137
- Page, B. (2019). 9 steps to successfully detect fake news. Better Marketing. https://bettermarketing.pub/9-ways-to-detect-fake-news-an-insiders-guide-61aa425f5a6f
- Patterson A., Ryckman L., & Guerra C. (2022). A systematic review of the education and awareness interventions to prevent online child sexual abuse. Journal of Child & Adolescent Trauma, 15, 857-867. https://doi.org/10.1007/s40653-022-00440-x
- Penncheva, D., Hallett, J., & Rashid, A. (2020). Bringing cyber to school: Integrating cybersecurity into secondary school education. IEEE Security and Privacy Magazine, 18(2), 68-74. https://doi.org/10.1109/MSEC.2020.2969409
- Qiu, X., Diego, O., Sherazi, A., Flammini, A., & Filippo M. (2017). Limited individual attention and online virality of low-quality information. Human Nature, 1(7), 1-7. https://doi.org/10.1038/s41562-017-0132
- Quayyum, F., Cruzes, D. S., & Jaccheri, L. (2021). Cybersecurity awareness for children: A systematic literature review. International Journal of Child-Computer Interaction, 30, 100343. https://doi.org/10.1016/j.ijcci.2021.100343
- Shamsi, A. (2019). Effectiveness of cyber security awareness program for young children: A case study in UAE. International Journal of Information Technology and Language Studies, 3(2), 8-29. https://doi.org/10.13140/RG.2.2.28488.14083
- Shi, C., Wei, B., Wei, S., Wang, W., & Liu, H. (2021). A quantitative discriminant method of elbow point for the optimal number of clusters in clustering algorithm. EURASIP Journal on Wireless Communications and Networking, 31. https://doi.org/10.1186/s13638-021-01910-w
- Smalheiser, N. (2017). Data literacy: How to make your experiments robust and reproducible. Academic Press.
- Sullivan, G., & Feinn, R., (2012). Using effect size—or why the P value is not enough september. Journal of Graduate Medical Education, 4(3), 279-82. https://doi.org/10.4300/JGME-D-12-00156.1
- Taylor, J., McAlaney, J., Hodge, S., Thackray, H., & Richardson, C. (2017). Teaching psychological principles to cybersecurity students. In Proceedings of the IEEE Global Engineering Education Conference (pp. 1782-1789). IEEE. https://doi.org/10.1109/EDUCON.2017.7943091
- Tsirtsis, A., Tsapatsoulis, N., Stamatelatos, M., Papadamou, K., & Sirivianos, M. (2016). Cyber security risks for minors: A taxonomy and a software architecture. In Proceedings of the 11th International Workshop on Semantic and Social Media Adaptation and Personalization (pp. 93-99). https://doi.org/10.1109/SMAP.2016.7753391
- Vanderhoven, E., Willems, B., Van Hove, S., All, A. & Schellens, T. (2015). Wait and see? studying the teacher’s role during in-class educational gaming. In European Conference on Games Based Learning (pp. 540-547).
- Venter, I. M., Blignaut, R. J., Renaud, K., & Venter, M. A. (2019). Cyber security education is as essential as “the three R’s”. Heliyon, 5(12), ep02855. https://doi.org/10.1016/j.heliyon.2019.e02855
- Waldock, K. E., Miller, V., Li, S., & Franqueira, V. (2022). A report on developing cyber skills amongst children and young people. Institute of Cyber Security for Society, University of Kent.
- Winter, E., Costello, A., O’Brien, M., & Hickey, G. (2021). Teachers’ use of technology and the impact of COVID-19. Irish Educational Studies, 40(2), 235-246. https://doi.org/10.1080/03323315.2021.1916559
- Zhang-Kennedy, L., Abdelaziz, Y., & Chiasson, S. (2017). Cyberheroes: The design and evaluation of an interactive ebook to educate children about online privacy. International Journal of Child-Computer Interaction, 13, 10-18. https://doi.org/10.1016/j.ijcci.2017.05.001
- Zhao, G. W., Dally, C., Slovak, P., Edbrooke-Childs, J., Van Kleek, M., & Shadbolt, N. (2019). ‘I make up a silly name’: Understanding children’s perception of privacy risks online. In Proceedings of the 2019 Conference on Human Factors in Computing Systems, (pp. 1-13). ACM. https://doi.org/10.1145/3290605.3300336