{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:11:22Z","timestamp":1767337882738,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031735370"},{"type":"electronic","value":"9783031735387"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-73538-7_8","type":"book-chapter","created":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T07:45:20Z","timestamp":1735285520000},"page":"80-89","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Identity Shield: Cultivating Privacy Awareness Through AR for\u00a0Young Adults"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3590-5737","authenticated-orcid":false,"given":"Menna","family":"Singergy","sequence":"first","affiliation":[]},{"given":"John","family":"Ehab","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Rasslan","sequence":"additional","affiliation":[]},{"given":"Caroline","family":"Sabty","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5841-1692","authenticated-orcid":false,"given":"Alia","family":"El-Bolock","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,28]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107376","volume":"136","author":"M Alanazi","year":"2022","unstructured":"Alanazi, M., Freeman, M., Tootell, H.: Exploring the factors that influence the cybersecurity behaviors of young adults. Comput. Hum. Behav. 136, 107376 (2022)","journal-title":"Comput. Hum. Behav."},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Antonova, A., Bontchev, B.: Exploring puzzle-based learning for building effective and motivational maze video games for education. In: EDULEARN19 Proceedings, pp. 2425\u20132434. IATED, 2019","DOI":"10.21125\/edulearn.2019.0658"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Argyridou, E., et\u00a0al.: Cyber hygiene methodology for raising cybersecurity and data privacy awareness in health care organizations: concept study. J. Med. Internet Res. 25, e41294 (2023)","DOI":"10.2196\/41294"},{"issue":"3","key":"8_CR4","first-page":"114","volume":"4","author":"A Bangor","year":"2009","unstructured":"Bangor, A., Kortum, P., Miller, J.: Determining what individual SUS scores mean: adding an adjective rating scale. J. Usability Stud. 4(3), 114\u2013123 (2009)","journal-title":"J. Usability Stud."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Barth, S., de Jong, M.D., Junger, M., Hartel, P.H., Roppelt, J.C.: Putting the privacy paradox to the test: online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics Inform. 41, 55\u201369 (2019)","DOI":"10.1016\/j.tele.2019.03.003"},{"key":"8_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmedr.2020.101058","volume":"17","author":"D Burnes","year":"2020","unstructured":"Burnes, D., DeLiema, M., Langton, L.: Risk and protective factors of identity theft victimization in the united states. Prev. Med. Rep. 17, 101058 (2020)","journal-title":"Prev. Med. Rep."},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Djaouti, D., Alvarez, J., Jessel, J.P.: Classifying serious games: the G\/P\/S model. In: Handbook of Research on Improving Learning and Motivation through Educational Games: Multidisciplinary Approaches, pp. 118\u2013136. IGI global, 2011","DOI":"10.4018\/978-1-60960-495-0.ch006"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Harteveld, C., Sutherland, S.C.: The goal of scoring: exploring the role of game performance in educational games. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 2235\u20132244, 2015","DOI":"10.1145\/2702123.2702606"},{"issue":"5","key":"8_CR9","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MITP.2012.72","volume":"14","author":"Anurag Kumar Jain and Devendra Shanbhag","year":"2012","unstructured":"Anurag Kumar Jain and Devendra Shanbhag: Addressing security and privacy risks in mobile applications. IT Prof. 14(5), 28\u201333 (2012)","journal-title":"IT Prof."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Karagiannis, S., Papaioannou, T., Magkos, E., Tsohou, A.: Game-based information security\/privacy education and awareness: theory and practice. In: European, Mediterranean, and Middle Eastern Conference on Information Systems, pp. 509\u2013525. Springer, 2020","DOI":"10.1007\/978-3-030-63396-7_34"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Li, Y., Li, Y., Yan, Q., Deng, R.H.: Privacy leakage analysis in online social networks. Comput. Secur. 49, 239\u2013254 (2015)","DOI":"10.1016\/j.cose.2014.10.012"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Malandrino, D., Petta, A., Scarano, V., Serra, L., Spinelli, R., Krishnamurthy, B.: Privacy awareness about information leakage: who knows what about me? In: Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, pp. 279\u2013284 (2013)","DOI":"10.1145\/2517840.2517868"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Messina, A., et\u00a0al.: Developing a video game as an awareness and research tool based on SARS-CoV-2 epidemiological dynamics and motivational perspectives. Transbound. Emerg. Diseases 2023 (2023)","DOI":"10.1155\/2023\/8205408"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Meyer-Lee, G., Shang, J., Wu, J.: Location-leaking through network traffic in mobile augmented reality applications. In: IEEE 37th International Performance Computing and Communications Conference, pp. 1\u20138. IEEE, 2018","DOI":"10.1109\/PCCC.2018.8711065"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Mohamed, H., El Bolock, A., Sabty, C.: Intrusionhunter: detection of cyber threats in big data (2023)","DOI":"10.5220\/0012081900003541"},{"key":"8_CR16","unstructured":"Mukherjee, D., Ahmadi, A., Pour, M.V., Reardon, J.: An empirical study on user reviews targeting mobile apps\u2019 security & privacy. arXiv preprint\u00a0arXiv:2010.06371 2020"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Nicholson, J., Javed, Y., Dixon, M., Coventry, L., Ajayi, O.D., Anderson, P.: Investigating teenagers\u2019 ability to detect phishing messages. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 140\u2013149. IEEE, 2020","DOI":"10.1109\/EuroSPW51379.2020.00027"},{"issue":"5\u20136","key":"8_CR18","first-page":"1","volume":"114","author":"P Nyoni","year":"2018","unstructured":"Nyoni, P., Velempini, M.: Privacy and user awareness on facebook. S. Afr. J. Sci. 114(5\u20136), 1\u20135 (2018)","journal-title":"S. Afr. J. Sci."},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Pachhala, N., Jothilakshmi, S., Battula, B.P.: A comprehensive survey on identification of malware types and malware classification using machine learning techniques. In: 2021 2nd International Conference on Smart Electronics and Communication (ICOSEC), pp. 1207\u20131214. IEEE (2021)","DOI":"10.1109\/ICOSEC51865.2021.9591763"},{"key":"8_CR20","unstructured":"Prager, R.H.P.: Exploring the use of role-playing games in education. The MT Review, 2019"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Protopsaltis, A., et al.: Scenario-based serious games repurposing. In: Proceedings of the 29th ACM International Conference on Design of Communication, pp. 37\u201344 (2011)","DOI":"10.1145\/2038476.2038484"},{"issue":"2","key":"8_CR22","doi-asserted-by":"publisher","first-page":"569","DOI":"10.15516\/cje.v17i2.555","volume":"17","author":"N Putnik","year":"2015","unstructured":"Putnik, N., Boskovic, M.: The impact of media on students\u2019 perception of the security risks associated with internet social networking-a case study. Croatian Journal of Education: Hrvatski \u010dasopis za odgoj i obrazovanje 17(2), 569\u2013595 (2015)","journal-title":"Croatian Journal of Education: Hrvatski \u010dasopis za odgoj i obrazovanje"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Rodriguez, R., Mifsud, D., Wickens, C., Williams, A.S., Tarre, K., Crane, P., Ortega, F.R.: Virtual reality compensatory aid for improved weapon splash-zone awareness. In: International Conference on Human-Computer Interaction, pp. 533\u2013544. Springer, 2021","DOI":"10.1007\/978-3-030-77599-5_36"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Sadeghian, A., Zamani, M., Shanmugam, B.: Security threats in online social networks. In: 2013 International Conference on Informatics and Creative Multimedia, pp. 254\u2013258 (2013)","DOI":"10.1109\/ICICM.2013.50"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Sindermann, C., Schmitt, H.S., Kargl, F., Herbert, C., Montag, C.: Online privacy literacy and online privacy behavior\u2013the role of crystallized intelligence and personality. Int. J. Hum.\u2013Comput. Interact. 37(15), 1455\u20131466 (2021)","DOI":"10.1080\/10447318.2021.1894799"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Stavroulakis, P., Stamp, M.: Handbook of information and communication security. Springer Science & Business Media, 2010","DOI":"10.1007\/978-3-642-04117-4"},{"issue":"1","key":"8_CR27","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1080\/10447318.2022.2041894","volume":"39","author":"B Tadic","year":"2023","unstructured":"Tadic, B., Rohde, M., Randall, D., Wulf, V.: Design evolution of a tool for privacy and security protection for activists online: cyberactivist. Int. J. Hum. Comput. Interact. 39(1), 249\u2013271 (2023)","journal-title":"Int. J. Hum. Comput. Interact."},{"key":"8_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106290","volume":"122","author":"C Tao","year":"2020","unstructured":"Tao, C., Guo, H., Huang, Z.: Identifying security issues for mobile applications based on user review summarization. Inf. Softw. Technol. 122, 106290 (2020)","journal-title":"Inf. Softw. Technol."},{"key":"8_CR29","doi-asserted-by":"publisher","first-page":"85094","DOI":"10.1109\/ACCESS.2020.2992807","volume":"8","author":"Z Wang","year":"2020","unstructured":"Wang, Z., Sun, L., Zhu, H.: Defining social engineering in cybersecurity. IEEE Access 8, 85094\u201385115 (2020)","journal-title":"IEEE Access"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Xu, Y., et\u00a0al.: Image encryption based on synchronization of fractional chaotic systems. Commun. Nonlinear Sci. Numer. Simul. 19(10), 3735\u20133744 (2014)","DOI":"10.1016\/j.cnsns.2014.02.029"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Zhu, H., Xiong, H., Ge, Y., Chen, E.: Mobile app recommendations with security and privacy awareness. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 951\u2013960 (2014)","DOI":"10.1145\/2623330.2623705"}],"container-title":["Lecture Notes in Networks and Systems","Methodologies and Intelligent Systems for Technology Enhanced Learning, 14th International Conference"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-73538-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,27]],"date-time":"2024-12-27T08:06:41Z","timestamp":1735286801000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-73538-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031735370","9783031735387"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-73538-7_8","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"28 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MIS4TEL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference in Methodologies and intelligent Systems for Techhnology Enhanced Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salamanca","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mistel2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.mis4tel-conference.net\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}