Cyber security awareness model (among children) using protection motivation theory: A review
List of Authors
  • Noor Suhana Sulaiman , Nur Sukinah Aziz

Keyword
  • Cyber Security Awareness, Protection Motivaton Theory, Children, Information Security

Abstract
  • In recent times, there has been a growing concern regarding children's cyber security due to their increased access to the Internet and exposure to various online threats. This issue has garnered significant attention as it poses a considerable risk to children's safety and well-being. As a result, research on children's cyber security awareness has become an area of rapid growth. To contribute to the understanding of this topic, this paper aims to review the latest findings regarding the application of the Protection Motivation Theory (PMT) in developing a Cyber Security Awareness Model for children. The Protection Motivation Theory offers a valuable framework for understanding individuals' motivations and decision-making processes regarding protective behaviors in the face of perceived threats. By applying PMT to children's cyber security awareness, researchers can gain insights into the factors that influence children's motivation to engage in protective actions while navigating the online environment. This review paper will explore and analyze recent studies that have employed the Protection Motivation Theory in developing Cyber Security Awareness Models tailored specifically for children. The models derived from PMT can provide a deeper understanding of children's threat appraisal, including their perception of the severity and vulnerability to online risks. Moreover, the coping appraisal aspect of PMT allows researchers to examine children's evaluation of the effectiveness and feasibility of protective actions, such as employing secure passwords, avoiding sharing personal information, and recognizing potential online dangers. By synthesizing the most recent research findings, this paper aims to contribute to the knowledge base on children's cyber security awareness. Understanding how the Protection Motivation Theory can be applied in the context of children's cyber security will enable the development of effective interventions and educational programs to enhance children's online safety. Ultimately, the goal is to empower children with the necessary skills and knowledge to protect themselves from online threats and make informed decisions while navigating the digital world.

Reference
  • [1] Noor Suhana Sulaiman, Azliza Yacob, Nur Sukinah Aziz, Nooraida Samsudin, Wan Ainul Alyani Wan Mohamed, Saadiah A Rahman, Wan Nur Idayu Tun Mohd Hassan, Akhyari Nasir, “A Review Of Cyber Security Awareness (CSA) Among Young Generation: Issue And Countermeasure,” 2021.

    [2] Juan Pablo Hourcade. Child-Computer Interaction. Createspace Independent Publishing Platform,2015

    [3] Eyvind Garder B. Gjertsen, Erlend Andreas Gjære, Maria Bartnes, And Waldo Rocha Flores. Gamification of Information Security Awareness and Training. In Proceedings of The 3rd International Conference On Information Systems Security and Privacy - Volume 1: ICISSP, Pages 59–70. INSTICC, Scitepress,2017.

    [4] Filippos Giannakas, Georgios Kambourakis, Andreas Papasalouros, And Stefanos Gritzalis. Security Education and Awareness for K-6 Going Mobile. International Journal of Interactive Mobile Technologies (Ijim), 10(2):41–48, 2016.

    [5] Filippos Giannakas, Andreas Papasalouros, Georgios Kambourakis, And Stefanos Gritzalis. A Comprehensive Cybersecurity Learning Platform for Elementary Education. Information Security Journal: A Global Perspective, 28(3):81–106, 2019

    [6] Farzana Quayyum, Daniela Cruzes and Letizia Jaccher. Cybersecurity Awareness for Children: A Systematic Literature Review. International Journal of Child-Computer Interaction 30(2):100343

    [7] Suzanne Prior and Karen Renaud. Age-Appropriate Password “Best Practice” Ontologies for Early Educators and Parents. International Journal of Child-Computer Interaction, 23-24:100169, 2020

    [8] Jun Zhao, Ge Wang, Carys Dally, Petr Slovak, Julian Edbrooke-Childs, Max Van Kleek, And Nigelshadbolt. ‘I Make Up a Silly Name’: Understanding Children’s Perception of Privacy Risks Online. In Proceedings of The 2019 CHI Conference On Human Factors in Computing Systems, CHI ’19, Page 1–13, New York, NY, USA, 2019. Association for Computing Machinery.

    [9] Priya Kumar, Jessica Vitak, Marshini Chetty, Tamara L. Clegg, Jonathan Yang, Brenna Mcnally,And Elizabeth Bonsignore. Co-Designing Online Privacy-Related Games and Stories with Children. In Proceedings of The 17th ACM Conference On Interaction Design and Children, IDC ’18, Page 67–79, Newyork, NY, USA, 2018. Association for Computing Machinery.

    [10] Elmer Lastdrager, Ines Carvajal Gallardo, Pieter Hartel, And Marianne Junger. How Effective Is Anti-Phishing Training for Children? In Thirteenth Symposium On Usable Privacy and Security (SOUPS 2017), Pages 229–239, Santa Clara, CA, July 2017. USENIX Association

    [11] Leah Zhang-Kennedy, Yomna Abdelaziz, And Sonia Chiasson. Cyberheroes: The Design and Evaluation of an Interactive ebook to Educate Children About Online Privacy. International Journal o Child-Computerinteraction, 2017.

    [12] Laurien Desimpelaere, Liselot Hudders, And Dieneke Van De Sompel. Knowledge as A Strategy for Privacyprotection: How A Privacy Literacy Training Affects Children’s Online Disclosure Behavior. Computers in Human Behavior, 110:106382, 2020

    [13] J.C. Read and P. Markopoulos. Child–Computer Interaction. International Journal of Child-Computerinteraction, 1(1):2 – 6, 2013

    [14] A. Tsirtsis, N. Tsapatsoulis, M. Stamatelatos, K. Papadamou, And M. Sirivianos. Cyber Security Risks for Minors: A Taxonomy and A Software Architecture. In 2016 11th International Workshop On Semantic and Social Media Adaptation and Personalization (SMAP), Pages 93–99, 2016

    [15] Elisabeth Staksrud, Kjartan ́Olafsson, And Sonia Livingstone. Does The Use of Social Networking Sites Increase Children’s Risk of Harm? Computers in Human Behavior, 29(1):40 – 50, 2013

    [16] Sonia Livingstone, Uwe Hasebrink, And Anke G ̈Orzig. Towards A General Model of Determinants of Risk and Safety. In Livingstone, Sonia, Haddon, Leslie and G ̈Orzig, Anke, (Eds.) Children, Risk and Safety on the Internet: Research and Policy Challenges in Comparative Perspective, Pages 323–337, Bristol, UK,2012. Policy Press

    [17] Ot ́Avio De Paula Albuquerque, Marcelo Fantinato, Judith Kelner, And Anna Priscilla De Albuquerque. Privacy in Smart Toys: Risks and Proposed Solutions. Electronic Commerce Research and Applications,39:100922, 2020.

    [18] Anthony T. Pinter, Pamela J. Wisniewski, Heng Xu, Mary Beth Rosson, And Jack M. Caroll. Adolescent Online Safety: Moving Beyond Formative Evaluations to Designing Solutions for The Future. In Proceedings of The 2017 Conference On Interaction Design and Children, IDC ’17, Page 352–357, New York, NY, USA, 2017. Association for Computing Machinery

    [19] Diego Fernando Gutierrez Aponte and Deborah Richards. Managing Cyber-Bullying in Online Educational Virtual Worlds. In Proceedings of The 9th Australasian Conference On Interactive Entertainment: Mattersof Life and Death, IE ’13, New York, NY, USA, 2013. Association for Computing Machinery

    [20] Lynette K. Watts, Jessyca Wagner, Benito Velasquez, And Phyllis I. Behrens. Cyberbullying in Higher Education: A Literature Review. Computers in Human Behavior, 69:268–274, 2017

    [21] Charles E Notar, Sharon Padgett, And Jessica Roden. Cyberbullying: A Review of the Literature. Universal Journal of Educational Research, 1(1):1–9, 2013

    [22] Karen P. Reed, R. Lyle Cooper, William R. Nugent, And Kathryn Russell. Cyberbullying: A Literature Review of Its Relationship to Adolescent Depression and Current Intervention Strategies. Journal of Human Behavior in The Social Environment, 26(1):37–45, 2016

    [23] Eric W. Owens, Richard J. Behun, Jill C. Manning, And Rory C. Reid. The Impact of Internet Pornography On Adolescents: A Review of the Research. Sexual Addiction & Compulsivity, 19(1-2):99–122, 2012

    [24] Faisal Alotaibi, Steven Furnell, Ingo Stengel, And Maria Papadaki. A Review of Using Gaming Technology for Cyber-Security Awareness. International Journal for Information Security Research (IJISR), 6(2):660–666, 2016.

    [25] Ian Cullinane, Catherine Huang, Thomas Sharkey, And Shamsi Moussavi. Cyber Security Education Through Gaming Cybersecurity Games Can Be Interactive, Fun, Educational and Engaging. J. Comput. Sci.Coll., 30(6):75–81, 2015

    [26] Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Walton Wider, Jegatheesan Rajadurai, Suhaidah Hussain and Siti Aminah Harun. Cyber–Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review. Soc. Sci. 2022, 11, 386, 2022

    [27] Ronald W. Rogers. A Protection Motivation Theory of Fear Appeals and Attitude Change1. The Journal of Psychology, 91(1):93–114, 1975. PMID: 28136248.

    [28] Nancy K. Janz and Marshall H. Becker. The Health Belief Model: A Decade Later. Health Education Quarterly, 11(1):1–47, 1984. PMID: 6392204.

    [29] Misha Teimouri, Seyed Rahim Benrazavi, Mark D. Griffiths, And Md Salleh Hassan. A Model of Online Protection to Reduce Children’s Online Risk Exposure: Empirical Evidence from Asia. Sexuality & Culture, 22:1205–1229, 2018.

    [30] Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Suhaidah Hussain and Walton Wider. Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks. Information 2022, 13, 413, 2022.

    [31] Catherine L. Anderson and Ritu Agarwa. Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions.

    [32] Zahra Bulbulia and Manoj Maharaj. Factors that Influence Young Adults’ Online Security Awareness in Durban in South Africa. Journal of Information Warfare. 2013.

    [33] I. M. Y. Woon, G. W. Tan, and R. T. Low. Protection Motivation Theory Approach to Home Wireless Security. 2005 — Twenty-Sixth International Conference on Information Systems Security and Assurance, 2005

    [34] Christian Andrean Pradigdya and Raden Venantius Hari Ginardi. User Awareness Design for Electronic Money User Using Protection Motivation Theory and NIST 800-50 Framework. The 1st International Conference on Business and Management of Technology (IConBMT), 2019

    [35] Ram Basnet. Learning to Detect Phishing URL. International Journal of Research in Engineering and Technology, 2014

    [36] Ritika, What Are Adversarial Attacks in Machine Learning and How to Prevent Them? Retrieved from: https://www.labellerr.com/blog/what-are-adversarial-attacks-in-machine-learning-and-how-can-you-prevent-them/, 1 July 2023