{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:24:13Z","timestamp":1767338653842,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:00:00Z","timestamp":1606262400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:00:00Z","timestamp":1606262400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T00:00:00Z","timestamp":1606262400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,25]]},"DOI":"10.1109\/icspis51252.2020.9340128","type":"proceedings-article","created":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T08:05:49Z","timestamp":1612944349000},"page":"1-4","source":"Crossref","is-referenced-by-count":4,"title":["Introducing a Mobile App to Increase Cybersecurity Awareness in MENA"],"prefix":"10.1109","author":[{"given":"Hadeel Mohammed","family":"Jawad","sequence":"first","affiliation":[{"name":"Oakland University,Michigan,USA"}]},{"given":"Samir","family":"Tout","sequence":"additional","affiliation":[{"name":"Eastern Michigan University,Michigan,USA"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2014.09.006"},{"journal-title":"Murach's Android Programming","year":"2015","author":"murach","key":"ref11"},{"journal-title":"quizizz com","article-title":"About Us-Quizizz","year":"0","key":"ref12"},{"journal-title":"Learning platform Quizizz raises $3 mln from Nexus Venture Partners","year":"2018","author":"chaudhary","key":"ref13"},{"journal-title":"Kaspersky com","article-title":"Kaspersky Middle East","year":"0","key":"ref14"},{"journal-title":"Aitnews com","article-title":"The Arabic News Gate for Information Technology","year":"0","key":"ref15"},{"journal-title":"Google com","article-title":"Beware of the Hacker - apps on Google play","year":"0","key":"ref16"},{"journal-title":"UN Broadband Comission","article-title":"Cyber Violence against Women and Girls: A World-wide Wakeup","year":"2015","key":"ref17"},{"journal-title":"Designing the User Interface Strategies for Effective Human-Computer Interaction","year":"2016","author":"shneiderman","key":"ref18"},{"key":"ref19","first-page":"227","article-title":"Bringing ADDIE to life: Instructional design at its best","volume":"12","author":"peterson","year":"2003","journal-title":"Journal of Educational Multimedia and Hypermedia"},{"key":"ref4","article-title":"New UTSA game to teach cybersecurity to elementary kids","author":"macy","year":"2020","journal-title":"Utsa edu"},{"key":"ref3","article-title":"The 10 most spoken languages in the world","author":"lane","year":"2019","journal-title":"Babbel com"},{"journal-title":"Google com","article-title":"Cyber security news - apps on Google play","year":"0","key":"ref6"},{"journal-title":"Google com","article-title":"The Egyptian Programmer - apps on Google play","year":"0","key":"ref5"},{"key":"ref8","article-title":"The biggest data breaches in the Middle East 2020","author":"lago","year":"2020","journal-title":"CIO com"},{"journal-title":"Google com","article-title":"Cyber threat news - apps on Google play","year":"0","key":"ref7"},{"journal-title":"Checkpoint com","article-title":"2020 Vision: Check Point's cyber-security predictions for the coming year - Check Point Software","year":"2019","key":"ref2"},{"key":"ref1","article-title":"The top 20 security predictions for 2020","author":"lohrmann","year":"2019","journal-title":"Govtech com"},{"key":"ref9","article-title":"Cybersecurity Challenges in the Middle East","author":"aboul-enein","year":"2017","journal-title":"GCspy"},{"key":"ref20","first-page":"323","article-title":"Raising engagement in e-learning through gamification","author":"muntean","year":"0","journal-title":"6th International Conference on Virtual Learning"}],"event":{"name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","start":{"date-parts":[[2020,11,25]]},"location":"DUBAI, United Arab Emirates","end":{"date-parts":[[2020,11,26]]}},"container-title":["2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9340125\/9340126\/09340128.pdf?arnumber=9340128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,27]],"date-time":"2022-06-27T20:25:05Z","timestamp":1656361505000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9340128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,25]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icspis51252.2020.9340128","relation":{},"subject":[],"published":{"date-parts":[[2020,11,25]]}}}