[1] Noor Suhana Sulaiman, Azliza Yacob, Nur Sukinah Aziz, Nooraida Samsudin, Wan Ainul Alyani Wan Mohamed, Saadiah A Rahman, Wan Nur Idayu Tun Mohd Hassan, Akhyari Nasir, “A Review Of Cyber Security Awareness (CSA) Among Young Generation: Issue And Countermeasure,” 2021.
[2] Juan Pablo Hourcade. Child-Computer Interaction. Createspace Independent Publishing Platform,2015
[3] Eyvind Garder B. Gjertsen, Erlend Andreas Gjære, Maria Bartnes, And Waldo Rocha Flores. Gamification of Information Security Awareness and Training. In Proceedings of The 3rd International Conference On Information Systems Security and Privacy - Volume 1: ICISSP, Pages 59–70. INSTICC, Scitepress,2017.
[4] Filippos Giannakas, Georgios Kambourakis, Andreas Papasalouros, And Stefanos Gritzalis. Security Education and Awareness for K-6 Going Mobile. International Journal of Interactive Mobile Technologies (Ijim), 10(2):41–48, 2016.
[5] Filippos Giannakas, Andreas Papasalouros, Georgios Kambourakis, And Stefanos Gritzalis. A Comprehensive Cybersecurity Learning Platform for Elementary Education. Information Security Journal: A Global Perspective, 28(3):81–106, 2019
[6] Farzana Quayyum, Daniela Cruzes and Letizia Jaccher. Cybersecurity Awareness for Children: A Systematic Literature Review. International Journal of Child-Computer Interaction 30(2):100343
[7] Suzanne Prior and Karen Renaud. Age-Appropriate Password “Best Practice” Ontologies for Early Educators and Parents. International Journal of Child-Computer Interaction, 23-24:100169, 2020
[8] Jun Zhao, Ge Wang, Carys Dally, Petr Slovak, Julian Edbrooke-Childs, Max Van Kleek, And Nigelshadbolt. ‘I Make Up a Silly Name’: Understanding Children’s Perception of Privacy Risks Online. In Proceedings of The 2019 CHI Conference On Human Factors in Computing Systems, CHI ’19, Page 1–13, New York, NY, USA, 2019. Association for Computing Machinery.
[9] Priya Kumar, Jessica Vitak, Marshini Chetty, Tamara L. Clegg, Jonathan Yang, Brenna Mcnally,And Elizabeth Bonsignore. Co-Designing Online Privacy-Related Games and Stories with Children. In Proceedings of The 17th ACM Conference On Interaction Design and Children, IDC ’18, Page 67–79, Newyork, NY, USA, 2018. Association for Computing Machinery.
[10] Elmer Lastdrager, Ines Carvajal Gallardo, Pieter Hartel, And Marianne Junger. How Effective Is Anti-Phishing Training for Children? In Thirteenth Symposium On Usable Privacy and Security (SOUPS 2017), Pages 229–239, Santa Clara, CA, July 2017. USENIX Association
[11] Leah Zhang-Kennedy, Yomna Abdelaziz, And Sonia Chiasson. Cyberheroes: The Design and Evaluation of an Interactive ebook to Educate Children About Online Privacy. International Journal o Child-Computerinteraction, 2017.
[12] Laurien Desimpelaere, Liselot Hudders, And Dieneke Van De Sompel. Knowledge as A Strategy for Privacyprotection: How A Privacy Literacy Training Affects Children’s Online Disclosure Behavior. Computers in Human Behavior, 110:106382, 2020
[13] J.C. Read and P. Markopoulos. Child–Computer Interaction. International Journal of Child-Computerinteraction, 1(1):2 – 6, 2013
[14] A. Tsirtsis, N. Tsapatsoulis, M. Stamatelatos, K. Papadamou, And M. Sirivianos. Cyber Security Risks for Minors: A Taxonomy and A Software Architecture. In 2016 11th International Workshop On Semantic and Social Media Adaptation and Personalization (SMAP), Pages 93–99, 2016
[15] Elisabeth Staksrud, Kjartan ́Olafsson, And Sonia Livingstone. Does The Use of Social Networking Sites Increase Children’s Risk of Harm? Computers in Human Behavior, 29(1):40 – 50, 2013
[16] Sonia Livingstone, Uwe Hasebrink, And Anke G ̈Orzig. Towards A General Model of Determinants of Risk and Safety. In Livingstone, Sonia, Haddon, Leslie and G ̈Orzig, Anke, (Eds.) Children, Risk and Safety on the Internet: Research and Policy Challenges in Comparative Perspective, Pages 323–337, Bristol, UK,2012. Policy Press
[17] Ot ́Avio De Paula Albuquerque, Marcelo Fantinato, Judith Kelner, And Anna Priscilla De Albuquerque. Privacy in Smart Toys: Risks and Proposed Solutions. Electronic Commerce Research and Applications,39:100922, 2020.
[18] Anthony T. Pinter, Pamela J. Wisniewski, Heng Xu, Mary Beth Rosson, And Jack M. Caroll. Adolescent Online Safety: Moving Beyond Formative Evaluations to Designing Solutions for The Future. In Proceedings of The 2017 Conference On Interaction Design and Children, IDC ’17, Page 352–357, New York, NY, USA, 2017. Association for Computing Machinery
[19] Diego Fernando Gutierrez Aponte and Deborah Richards. Managing Cyber-Bullying in Online Educational Virtual Worlds. In Proceedings of The 9th Australasian Conference On Interactive Entertainment: Mattersof Life and Death, IE ’13, New York, NY, USA, 2013. Association for Computing Machinery
[20] Lynette K. Watts, Jessyca Wagner, Benito Velasquez, And Phyllis I. Behrens. Cyberbullying in Higher Education: A Literature Review. Computers in Human Behavior, 69:268–274, 2017
[21] Charles E Notar, Sharon Padgett, And Jessica Roden. Cyberbullying: A Review of the Literature. Universal Journal of Educational Research, 1(1):1–9, 2013
[22] Karen P. Reed, R. Lyle Cooper, William R. Nugent, And Kathryn Russell. Cyberbullying: A Literature Review of Its Relationship to Adolescent Depression and Current Intervention Strategies. Journal of Human Behavior in The Social Environment, 26(1):37–45, 2016
[23] Eric W. Owens, Richard J. Behun, Jill C. Manning, And Rory C. Reid. The Impact of Internet Pornography On Adolescents: A Review of the Research. Sexual Addiction & Compulsivity, 19(1-2):99–122, 2012
[24] Faisal Alotaibi, Steven Furnell, Ingo Stengel, And Maria Papadaki. A Review of Using Gaming Technology for Cyber-Security Awareness. International Journal for Information Security Research (IJISR), 6(2):660–666, 2016.
[25] Ian Cullinane, Catherine Huang, Thomas Sharkey, And Shamsi Moussavi. Cyber Security Education Through Gaming Cybersecurity Games Can Be Interactive, Fun, Educational and Engaging. J. Comput. Sci.Coll., 30(6):75–81, 2015
[26] Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Walton Wider, Jegatheesan Rajadurai, Suhaidah Hussain and Siti Aminah Harun. Cyber–Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review. Soc. Sci. 2022, 11, 386, 2022
[27] Ronald W. Rogers. A Protection Motivation Theory of Fear Appeals and Attitude Change1. The Journal of Psychology, 91(1):93–114, 1975. PMID: 28136248.
[28] Nancy K. Janz and Marshall H. Becker. The Health Belief Model: A Decade Later. Health Education Quarterly, 11(1):1–47, 1984. PMID: 6392204.
[29] Misha Teimouri, Seyed Rahim Benrazavi, Mark D. Griffiths, And Md Salleh Hassan. A Model of Online Protection to Reduce Children’s Online Risk Exposure: Empirical Evidence from Asia. Sexuality & Culture, 22:1205–1229, 2018.
[30] Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Suhaidah Hussain and Walton Wider. Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks. Information 2022, 13, 413, 2022.
[31] Catherine L. Anderson and Ritu Agarwa. Practicing Safe Computing: A Multimethod Empirical Examination of Home Computer User Security Behavioral Intentions.
[32] Zahra Bulbulia and Manoj Maharaj. Factors that Influence Young Adults’ Online Security Awareness in Durban in South Africa. Journal of Information Warfare. 2013.
[33] I. M. Y. Woon, G. W. Tan, and R. T. Low. Protection Motivation Theory Approach to Home Wireless Security. 2005 — Twenty-Sixth International Conference on Information Systems Security and Assurance, 2005
[34] Christian Andrean Pradigdya and Raden Venantius Hari Ginardi. User Awareness Design for Electronic Money User Using Protection Motivation Theory and NIST 800-50 Framework. The 1st International Conference on Business and Management of Technology (IConBMT), 2019
[35] Ram Basnet. Learning to Detect Phishing URL. International Journal of Research in Engineering and Technology, 2014
[36] Ritika, What Are Adversarial Attacks in Machine Learning and How to Prevent Them? Retrieved from: https://www.labellerr.com/blog/what-are-adversarial-attacks-in-machine-learning-and-how-can-you-prevent-them/, 1 July 2023