{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:17:58Z","timestamp":1757542678626,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,21]]},"DOI":"10.1109\/acit53391.2021.9677117","type":"proceedings-article","created":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T21:26:35Z","timestamp":1642454795000},"page":"1-6","source":"Crossref","is-referenced-by-count":5,"title":["Cybersecurity Awareness and Its Impact on Protecting Children in Cyberspace"],"prefix":"10.1109","author":[{"given":"Ayida","family":"AlShabibi","sequence":"first","affiliation":[]},{"given":"Mohammed","family":"Al-Suqri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2019.0226"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2018.1463133"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1037\/vio0000223"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2018.02.003"},{"first-page":"73","year":"2020","author":"stavrou","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.36941\/jesr-2020-0094"},{"key":"ref37","article-title":"Cybersecurity education in a developing nation: The Ecuadorian environment","volume":"5","author":"catota","year":"2019","journal-title":"Cybersecurity"},{"key":"ref36","first-page":"1","article-title":"Cybersecurity education in a developing nation: The Ecuadorian environment","volume":"5","author":"catota","year":"2019","journal-title":"Cybersecurity"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2019.1685142"},{"key":"ref34","article-title":"Fostering a safer cyberspace for children","author":"khan","year":"2020","journal-title":"G20 Insights - Digit Transform"},{"year":"2018","author":"sadaghiani-tabrizi","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.00424"},{"key":"ref11","first-page":"281","article-title":"RAISING AWARENESS OF CYBERCRIME - THE USE OF EDUCATION AS A MEANS OF PREVENTION AND PROTECTION","author":"bele","year":"2014","journal-title":"Proc 10th Int Conf Mob Learn"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1177\/1071181311551233"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.01.016"},{"key":"ref14","article-title":"An Approach To Weigh Cybersecurity Awareness Questions In Academic Institutions Based On Principle Component Analysis: A Case Study Of Saudi Arabia Digital forensic project View project Factors motivating inside threat attacks View project An Approach To","author":"alshourbaji","year":"2021","journal-title":"Indep Res Soc Media Areas Incl Res ethics"},{"year":"2010","key":"ref15","first-page":"1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1080\/07380569.2019.1677433"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2019.e02855"},{"year":"2019","author":"ganesh","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/NCS.2018.00009"},{"key":"ref28","first-page":"73","article-title":"Reviewing cyber security social engineering training and awareness programs-pitfalls and ongoing issues","volume":"11","author":"aldawood","year":"2019","journal-title":"Futures"},{"year":"2021","author":"bada","key":"ref4"},{"year":"2021","author":"kumar","key":"ref27"},{"year":"2020","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TALE.2018.8615162"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/iCCECE49321.2020.9231229"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s20113011"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2014.01.1207"},{"key":"ref7","article-title":"Cybersecurity Awareness Is About Both &#x2018;Knowing&#x2019; and &#x2018;Doing&#x2019;","author":"martin","year":"2014","journal-title":"Secur Intell"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2017.2715174"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2017.02.007"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCI.2019.8821951"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3390\/fi11030073"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2019.1668738"},{"first-page":"201","year":"2018","author":"hina","key":"ref21"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2018.11.003"},{"year":"2019","author":"gerard","key":"ref24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.18844\/wjet.v11i1.3978"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1142\/S2424862218500148"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106311"},{"year":"2019","author":"har\u00e1n","key":"ref25"}],"event":{"name":"2021 22nd International Arab Conference on Information Technology (ACIT)","start":{"date-parts":[[2021,12,21]]},"location":"Muscat, Oman","end":{"date-parts":[[2021,12,23]]}},"container-title":["2021 22nd International Arab Conference on Information Technology (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9677036\/9677041\/09677117.pdf?arnumber=9677117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:57:49Z","timestamp":1652201869000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9677117\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,21]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/acit53391.2021.9677117","relation":{},"subject":[],"published":{"date-parts":[[2021,12,21]]}}}