{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:09:18Z","timestamp":1760659758500,"version":"build-2065373602"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T00:00:00Z","timestamp":1757289600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,9,8]]},"DOI":"10.1109\/cns66487.2025.11194926","type":"proceedings-article","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T17:34:49Z","timestamp":1760549689000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Cybersecurity Awareness and Education for Young Internet Users: A Comprehensive Analysis of Prevention Strategies"],"prefix":"10.1109","author":[{"given":"Dolantina","family":"Hyka","sequence":"first","affiliation":[{"name":"Mediterranean University of Albania,Dept. of Information Technology,Tirana,Albania"}]},{"given":"Jurgen","family":"Me\u00e7aj","sequence":"additional","affiliation":[{"name":"Mediterranean University of Albania,Dept. of Information Technology,Tirana,Albania"}]},{"given":"Festim","family":"Kodra","sequence":"additional","affiliation":[{"name":"Mediterranean University of Albania,Dept. of Finance, Bank and Accounting,Tirana,Albania"}]},{"given":"Marija","family":"Milo\u0161evi\u0107","sequence":"additional","affiliation":[{"name":"Faculty of Electronic Engineering,Dept. of Computer Science,Ni&#x0161;,Serbia"}]},{"given":"Vladimir","family":"\u0106iri\u0107","sequence":"additional","affiliation":[{"name":"Faculty of Electronic Engineering,Dept. of Computer Science,Ni&#x0161;,Serbia"}]}],"member":"263","reference":[{"volume-title":"ECCC Digital Europe Cybersecurity Work Programme 2025-2027","year":"2025","key":"ref1"},{"issue":"1","key":"ref2","first-page":"23","article-title":"Emerging Social Engineering Tactics Targeting Youth: The Role of Gaming Platforms","volume":"10","author":"Wang","year":"2023","journal-title":"Cybersecurity Trends and Challenges"},{"issue":"2","key":"ref3","first-page":"39","article-title":"Cybersecurity Risks in Gaming Platforms: In-Game Chat and Modification Threats","volume":"8","author":"Thompson","year":"2023","journal-title":"Journal of Digital Gaming and Security"},{"issue":"2","key":"ref4","first-page":"65","article-title":"Social Media Risks for Youth: Unintentional Data Sharing and Privacy Violations","volume":"11","author":"Martinez","year":"2023","journal-title":"Journal of Digital Safety"},{"issue":"4","key":"ref5","first-page":"96","article-title":"Psychological Factors in Youth Cybersecurity: Risk Perception and Peer Influence","volume":"7","author":"Davidson","year":"2023","journal-title":"Journal of Adolescent Cyberpsychology"},{"issue":"3","key":"ref6","first-page":"102","article-title":"Comparative Study on Cybersecurity Educational Methods: Interactive Learning vs. Traditional Approaches","volume":"13","author":"Roberts","year":"2024","journal-title":"International Journal of Cyber Education"},{"issue":"2","key":"ref7","first-page":"78","article-title":"Age-Based Differences in Cybersecurity Learning: Effective Strategies for Younger and Older Adolescents","volume":"14","author":"Johnson","year":"2023","journal-title":"Educational Cybersecurity Journal"},{"issue":"1","key":"ref8","first-page":"47","article-title":"Challenges in Implementing Youth Cybersecurity Education: Teacher Training and Institutional Limitations","volume":"16","author":"Patel","year":"2024","journal-title":"Journal of Cybersecurity Policy"},{"issue":"3","key":"ref9","first-page":"58","article-title":"Parental Involvement in Cybersecurity Education: Reducing Security Incidents Among Young Users","volume":"12","author":"Chang","year":"2023","journal-title":"Cybersecurity and Education Review"},{"issue":"1","key":"ref10","first-page":"30","article-title":"Future Trends in Cybersecurity Education for Youth: Leveraging AI and VR","volume":"9","author":"Anderson","year":"2024","journal-title":"Journal of Digital Learning and Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3389\/feduc.2024.1375853"},{"issue":"4","key":"ref12","first-page":"112","article-title":"Interactive Learning in Cybersecurity: Gamification and Its Impact","volume":"15","author":"Garcia","year":"2023","journal-title":"Education Technology Review"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33019795"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3545945.3569750"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/FIE56618.2022.9962643"},{"key":"ref16","article-title":"Health care cyber security: Albania case study","author":"Hyka","year":"2023","journal-title":"Advanced Engineering Days (AED)"},{"key":"ref17","article-title":"Cybersecurity Knowledge Gap in Albanian Public Administration: Bridging the Cryptographic Training Divide to Enhance Data Security?","volume-title":"International Scientific-Methodical-Practical Conference On Sustainable Regional Development. Economics, Management, Law And Technology Opportunities","author":"Hyka","year":"2022"},{"key":"ref18","first-page":"23","article-title":"The Impact of Cybersecurity on High School Students: Challenges and Risks","volume-title":"5th International Conference on Scientific and Acaderruc Research ICSAR 2024","author":"Hyka","year":"2024"}],"event":{"name":"2025 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2025,9,8]]},"location":"Avignon, France","end":{"date-parts":[[2025,9,11]]}},"container-title":["2025 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11194903\/11194169\/11194926.pdf?arnumber=11194926","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T04:48:53Z","timestamp":1760590133000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11194926\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,8]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/cns66487.2025.11194926","relation":{},"subject":[],"published":{"date-parts":[[2025,9,8]]}}}