{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:28:28Z","timestamp":1760171308374,"version":"3.37.3"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,5,1]],"date-time":"2023-05-01T00:00:00Z","timestamp":1682899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1903419,1903423"],"award-info":[{"award-number":["1903419,1903423"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,5,1]]},"DOI":"10.1109\/educon54358.2023.10125124","type":"proceedings-article","created":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T17:43:09Z","timestamp":1684777389000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["Impact of Smartphone-Based Interactive Learning Modules on Cybersecurity Learning at the High-School Level"],"prefix":"10.1109","author":[{"given":"Sai Sushmitha","family":"Sudha","sequence":"first","affiliation":[{"name":"The University of Toledo,EECS Department,Toledo,OH,USA,43560"}]},{"given":"Jyothi Priyanka","family":"Bandreddi","sequence":"additional","affiliation":[{"name":"The University of Toledo,EECS Department,Toledo,OH,USA,43560"}]},{"given":"Laxmi Mounika","family":"Podila","sequence":"additional","affiliation":[{"name":"The University of Toledo,EECS Department,Toledo,OH,USA,43560"}]},{"given":"Ramesh","family":"Govindula","sequence":"additional","affiliation":[{"name":"Purdue University Northwest,ECE Department,Hammond,IN,USA,46323"}]},{"given":"Austin","family":"Richardson","sequence":"additional","affiliation":[{"name":"Purdue University Northwest,ECE Department,Hammond,IN,USA,46323"}]},{"given":"Quamar","family":"Niyaz","sequence":"additional","affiliation":[{"name":"Purdue University Northwest,ECE Department,Hammond,IN,USA,46323"}]},{"given":"Xiaoli","family":"Yang","sequence":"additional","affiliation":[{"name":"CS Department,Fairfield,CT,USA,06824"}]},{"given":"Ahmad Y","family":"Javaid","sequence":"additional","affiliation":[{"name":"The University of Toledo,EECS Department,Toledo,OH,USA,43560"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/3194707.3194712"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1145\/2445196.2445394"},{"key":"ref15","first-page":"1","article-title":"Teaching mobile computing and mobile security","author":"yuan","year":"0","journal-title":"IEEE Frontiers in Education Conference (FIE) 2016"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ISECon.2015.7119924"},{"year":"0","author":"zweben","journal-title":"Computing degree and enrollment trends","key":"ref11"},{"key":"ref10","first-page":"150","article-title":"Evaluation of game-based learning in cybersecurity education for high school students","volume":"12","author":"jin","year":"2018","journal-title":"Journal of Education and Learning"},{"key":"ref2","first-page":"32","article-title":"Closing the cybersecurity skills gap","volume":"4","author":"vogel","year":"2016","journal-title":"Salus Journal"},{"year":"2022","author":"achten","journal-title":"Identity Theft Resource Center Q3 2022 Data Breach Report Compromises Victims Up from Q2 &#x2013; Record High Year Unlikely","key":"ref1"},{"key":"ref17","first-page":"10","article-title":"Developing an undergraduate information systems security track","volume":"11","author":"sharma","year":"2013","journal-title":"Information Systems Education Journal"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/2885990.2885991"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TALE48869.2020.9368440"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1155\/2019\/2786913"},{"year":"0","author":"malviya","journal-title":"Computing degree and enrollment trends","key":"ref8"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1016\/j.jcss.2014.02.005"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/S1353-4858(12)70104-6"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/978-3-642-03569-2_6"},{"key":"ref3","article-title":"The concept of mobile applications as educational tool to enhance information security awareness","author":"drevin","year":"2017","journal-title":"Saclay"},{"year":"2020","author":"clouse","journal-title":"An Explanatory Sequential Mixed Methods Study Examining the Effects of an Onboarding Training Program on Organizational Socialization and Commitment in a Middle Eastern Energy Company","key":"ref6"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.4236\/jis.2020.114012"}],"event":{"name":"2023 IEEE Global Engineering Education Conference (EDUCON)","start":{"date-parts":[[2023,5,1]]},"location":"Kuwait, Kuwait","end":{"date-parts":[[2023,5,4]]}},"container-title":["2023 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10125098\/10125107\/10125124.pdf?arnumber=10125124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,12]],"date-time":"2023-06-12T17:52:46Z","timestamp":1686592366000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10125124\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,1]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/educon54358.2023.10125124","relation":{},"subject":[],"published":{"date-parts":[[2023,5,1]]}}}