{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:09:42Z","timestamp":1755839382748,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,21]],"date-time":"2022-09-21T00:00:00Z","timestamp":1663718400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSA\/NSF","award":["H98230-21-1-0102"],"award-info":[{"award-number":["H98230-21-1-0102"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,21]]},"DOI":"10.1145\/3537674.3554741","type":"proceedings-article","created":{"date-parts":[[2022,9,7]],"date-time":"2022-09-07T16:08:30Z","timestamp":1662566910000},"page":"29-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Covert Eye Op App: An Offense Based Learning Approach Towards Developing Mobile Security Awareness and Interest in Cybersecurity"],"prefix":"10.1145","author":[{"given":"Ankur","family":"Chattopadhyay","sequence":"first","affiliation":[{"name":"Computer Science, Northern Kentucky University, USA"}]},{"given":"Tyler","family":"Poe","sequence":"additional","affiliation":[{"name":"Computer Science, Northern Kentucky University, USA"}]},{"given":"Hoang","family":"Nguyen","sequence":"additional","affiliation":[{"name":"Computer Science, Northern Kentucky University, USA"}]},{"given":"Abel","family":"Tsegaye","sequence":"additional","affiliation":[{"name":"Computer Science, Northern Kentucky University, USA"}]},{"given":"Lolar","family":"Moua","sequence":"additional","affiliation":[{"name":"Computer Science, University of Wisconsin - Green Bay (UWGB), USA"}]}],"member":"320","published-online":{"date-parts":[[2022,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"IT threat evaluation in Q1","author":"Gostev Alexander","year":"2016","unstructured":"Alexander Gostev , Roman Unuchek , Maria Garnaeva , Denis Makrushin , and Anton Ivanov . 2016. IT threat evaluation in Q1 2016 . Kaspersky Lab. Retrieved July 6, 2022, from https:\/\/itcafe.hu\/dl\/cnt\/2016-05\/128009\/q1_2016_mw_report_final_eng.pdf Alexander Gostev, Roman Unuchek, Maria Garnaeva, Denis Makrushin, and Anton Ivanov. 2016. IT threat evaluation in Q1 2016. Kaspersky Lab. Retrieved July 6, 2022, from https:\/\/itcafe.hu\/dl\/cnt\/2016-05\/128009\/q1_2016_mw_report_final_eng.pdf"},{"key":"e_1_3_2_1_2_1","first-page":"208","article-title":"Mobile Devices in Education. In Toward Sustainability Through Digital Technologies and Practices in the Eurasian Region","author":"Khalikova Anastassiya","year":"2020","unstructured":"Anastassiya Khalikova and Svetlana Silkina . 2020 . Mobile Devices in Education. In Toward Sustainability Through Digital Technologies and Practices in the Eurasian Region . IGI Global , 208 - 223 . https:\/\/doi.org\/10.4018\/978-1-7998-2551-7.ch012 10.4018\/978-1-7998-2551-7.ch012 Anastassiya Khalikova and Svetlana Silkina. 2020. Mobile Devices in Education. In Toward Sustainability Through Digital Technologies and Practices in the Eurasian Region. IGI Global, 208-223. https:\/\/doi.org\/10.4018\/978-1-7998-2551-7.ch012","journal-title":"IGI Global"},{"key":"e_1_3_2_1_3_1","volume-title":"Cybersecurity in the classroom: Bridging the gap between computer access and online safety. Cyber Security Capstone Research Project Reports, 1. Retrieved","author":"Malecki Andrew","year":"2022","unstructured":"Andrew Malecki . 2018. Cybersecurity in the classroom: Bridging the gap between computer access and online safety. Cyber Security Capstone Research Project Reports, 1. Retrieved July 6, 2022 , from https:\/\/scholar.valpo.edu\/cscrpr\/1 Andrew Malecki. 2018. Cybersecurity in the classroom: Bridging the gap between computer access and online safety. Cyber Security Capstone Research Project Reports, 1. Retrieved July 6, 2022, from https:\/\/scholar.valpo.edu\/cscrpr\/1"},{"key":"e_1_3_2_1_4_1","volume-title":"Mobile technology and home broadband","author":"Perrin Andrew","year":"2021","unstructured":"Andrew Perrin . 2021. Mobile technology and home broadband 2021 . Pew Research Center . Retrieved July 6, 2022, from https:\/\/www.pewresearch.org\/internet\/2021\/06\/03\/mobile-technology-and-home-broadband-2021\/ Andrew Perrin. 2021. Mobile technology and home broadband 2021. Pew Research Center. Retrieved July 6, 2022, from https:\/\/www.pewresearch.org\/internet\/2021\/06\/03\/mobile-technology-and-home-broadband-2021\/"},{"key":"e_1_3_2_1_5_1","volume-title":"Inside the twisted mind of the security professional. Wired. Retrieved","author":"Schneier Bruce","year":"2022","unstructured":"Bruce Schneier . 2008. Inside the twisted mind of the security professional. Wired. Retrieved July 6, 2022 , from https:\/\/www.wired.com\/2008\/03\/securitymatters-0320\/ Bruce Schneier. 2008. Inside the twisted mind of the security professional. Wired. Retrieved July 6, 2022, from https:\/\/www.wired.com\/2008\/03\/securitymatters-0320\/"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2015.7344089"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2013.45"},{"key":"e_1_3_2_1_8_1","first-page":"328","volume-title":"International Scientific Conference \u201cDigitalization of Education: History, Trends and Prospects\u201d (DETP 2020","author":"Sizova D. A.","year":"2005","unstructured":"D. A. Sizova , T. V. Sizova , and E. S. Adulova . 2020. M-learning as a new interactive technology in education . In International Scientific Conference \u201cDigitalization of Education: History, Trends and Prospects\u201d (DETP 2020 ). Atlantis Press , 328 - 334 . https:\/\/doi.org\/10.2991\/assehr.k. 2005 09.060 10.2991\/assehr.k.200509.060 D. A. Sizova, T. V. Sizova, and E. S. Adulova. 2020. M-learning as a new interactive technology in education. In International Scientific Conference \u201cDigitalization of Education: History, Trends and Prospects\u201d (DETP 2020). Atlantis Press, 328-334. https:\/\/doi.org\/10.2991\/assehr.k.200509.060"},{"key":"e_1_3_2_1_9_1","volume-title":"Vulnerability Research Team. Retrieved on","author":"DGODDARD.","year":"2013","unstructured":"DGODDARD. 2013 . Androrat \u2013 Android remote access tool . Vulnerability Research Team. Retrieved on June 24, 2022, from https:\/\/web.archive.org\/web\/20130721045317\/ http:\/\/vrt-blog.snort.org\/2013\/07\/androrat-android-remote-access-tool.html DGODDARD. 2013. Androrat \u2013 Android remote access tool. Vulnerability Research Team. Retrieved on June 24, 2022, from https:\/\/web.archive.org\/web\/20130721045317\/ http:\/\/vrt-blog.snort.org\/2013\/07\/androrat-android-remote-access-tool.html"},{"key":"e_1_3_2_1_10_1","volume-title":"households with children owning mobile devices 2011-2020. Statista. Retrieved","author":"Laricchia Federica","year":"2022","unstructured":"Federica Laricchia . 2022. U. S. households with children owning mobile devices 2011-2020. Statista. Retrieved July 6, 2022 , from https:\/\/www.statista.com\/statistics\/1293211\/mobile-devices-us-households-children\/ Federica Laricchia. 2022. U.S. households with children owning mobile devices 2011-2020. Statista. Retrieved July 6, 2022, from https:\/\/www.statista.com\/statistics\/1293211\/mobile-devices-us-households-children\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159591"},{"volume-title":"GenCyber. Accessed","year":"2022","key":"e_1_3_2_1_12_1","unstructured":"\u201c GenCyber.\u201d (n.d.) . GenCyber. Accessed July 16, 2022 , from https:\/\/www.gen-cyber.com\/ \u201cGenCyber.\u201d (n.d.). GenCyber. Accessed July 16, 2022, from https:\/\/www.gen-cyber.com\/"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC51732.2021.9375847"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2017.03.013"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11528-019-00419-w"},{"key":"e_1_3_2_1_16_1","first-page":"232","volume-title":"Proceedings of the 50th ACM Technical Symposium on Computer Science Education. ACM","author":"Lalande Jean-Fran\u00e7ois","unstructured":"Jean-Fran\u00e7ois Lalande , Val\u00e9rie Viet Triem Tong , Pierre Graux , Guillaume Hiet , Wojciech Mazurczyk , Habiba Chaoui , and Pascal Berthom\u00e9 . Teaching android mobile security . In Proceedings of the 50th ACM Technical Symposium on Computer Science Education. ACM , Minneapolis, MN , 232 - 238 . https:\/\/doi.org\/10.1145\/3287324.3287406 10.1145\/3287324.3287406 Jean-Fran\u00e7ois Lalande, Val\u00e9rie Viet Triem Tong, Pierre Graux, Guillaume Hiet, Wojciech Mazurczyk, Habiba Chaoui, and Pascal Berthom\u00e9. Teaching android mobile security. In Proceedings of the 50th ACM Technical Symposium on Computer Science Education. ACM, Minneapolis, MN, 232-238. https:\/\/doi.org\/10.1145\/3287324.3287406"},{"key":"e_1_3_2_1_17_1","volume-title":"Worldwide digital population as of","author":"Johnson Joseph","year":"2022","unstructured":"Joseph Johnson . 2022. Worldwide digital population as of April 2022 . Statista. Retrieved July 6, 2022, from https:\/\/www.statista.com\/statistics\/617136\/digital-population-worldwide\/ Joseph Johnson. 2022. Worldwide digital population as of April 2022. Statista. Retrieved July 6, 2022, from https:\/\/www.statista.com\/statistics\/617136\/digital-population-worldwide\/"},{"key":"e_1_3_2_1_18_1","first-page":"1","volume-title":"2017 IEEE Frontiers in Education Conference (FIE). IEEE","author":"Quain Kai","year":"2017","unstructured":"Kai Quain , Dan Lo , Hossain Shahriar , Lei Li , Fan Wu , and Prabir Bhattacharya . 2017 . Learning database security with hands-on mobile labs . In 2017 IEEE Frontiers in Education Conference (FIE). IEEE , Indianapolis, IN , 1 - 6 . https:\/\/doi.org\/10.1109\/FIE.2017.8190716 10.1109\/FIE.2017.8190716 Kai Quain, Dan Lo, Hossain Shahriar, Lei Li, Fan Wu, and Prabir Bhattacharya. 2017. Learning database security with hands-on mobile labs. In 2017 IEEE Frontiers in Education Conference (FIE). IEEE, Indianapolis, IN, 1-6. https:\/\/doi.org\/10.1109\/FIE.2017.8190716"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TALE48869.2020.9368440"},{"issue":"2","key":"e_1_3_2_1_20_1","first-page":"1","article-title":"Increasing students awareness of mobile privacy and security using modules","volume":"4","author":"Ghemri Lila","year":"2019","unstructured":"Lila Ghemri and Y. U. A. N. Shengli . 2019 . Increasing students awareness of mobile privacy and security using modules . Journal of Learning and Teaching in Digital Age 4 , 2 , 1 - 9 . Retrieved July 6, 2022, from https:\/\/dergipark.org.tr\/en\/pub\/joltida\/issue\/55474\/760111 Lila Ghemri and Y. U. A. N. Shengli. 2019. Increasing students awareness of mobile privacy and security using modules. Journal of Learning and Teaching in Digital Age 4, 2, 1-9. Retrieved July 6, 2022, from https:\/\/dergipark.org.tr\/en\/pub\/joltida\/issue\/55474\/760111","journal-title":"Journal of Learning and Teaching in Digital Age"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3162243"},{"issue":"1","key":"e_1_3_2_1_22_1","first-page":"1","article-title":"Why You Should Start with the Offense: How to Best Teach Cybersecurity's Core Concepts. In Colloquium for Information Systems Security Education","volume":"23","author":"Kranch Michael","year":"2019","unstructured":"Michael Kranch . 2019 . Why You Should Start with the Offense: How to Best Teach Cybersecurity's Core Concepts. In Colloquium for Information Systems Security Education . CISSE 23 , 1 , 1 - 12 . Retrieved July 6, 2022, from https:\/\/www.mjkranch.com\/docs\/pubs\/CISSE19_Why_You_Should_Start_with_the_Offense.pdf Michael Kranch. 2019. Why You Should Start with the Offense: How to Best Teach Cybersecurity's Core Concepts. In Colloquium for Information Systems Security Education. CISSE 23, 1, 1-12. Retrieved July 6, 2022, from https:\/\/www.mjkranch.com\/docs\/pubs\/CISSE19_Why_You_Should_Start_with_the_Offense.pdf","journal-title":"CISSE"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2013.6685091"},{"key":"e_1_3_2_1_24_1","first-page":"675","article-title":"Learning mobile security with android security labware. In Proceeding of the 44th ACM technical symposium on Computer science education. ACM, Denver","author":"Guo Minzhe","year":"2013","unstructured":"Minzhe Guo , Prabir Bhattacharya , Ming Yang , Kai Qian , and Li Yang . 2013 . Learning mobile security with android security labware. In Proceeding of the 44th ACM technical symposium on Computer science education. ACM, Denver , CO , 675 - 680 . https:\/\/doi.org\/10.1145\/2445196.2445394 10.1145\/2445196.2445394 Minzhe Guo, Prabir Bhattacharya, Ming Yang, Kai Qian, and Li Yang. 2013. Learning mobile security with android security labware. In Proceeding of the 44th ACM technical symposium on Computer science education. ACM, Denver, CO, 675-680. https:\/\/doi.org\/10.1145\/2445196.2445394","journal-title":"CO"},{"key":"e_1_3_2_1_25_1","volume-title":"National Initiative for Cybersecurity Education. Retrieved","author":"National K-12 Cybersecurity Education Implementation Plan. (n.d.).","year":"2022","unstructured":"National K-12 Cybersecurity Education Implementation Plan. (n.d.). National Initiative for Cybersecurity Education. Retrieved July 6, 2022 , from https:\/\/www.nist.gov\/system\/files\/documents\/2017\/04\/26\/nice_k12_implementation_plan.pdf National K-12 Cybersecurity Education Implementation Plan. (n.d.). National Initiative for Cybersecurity Education. Retrieved July 6, 2022, from https:\/\/www.nist.gov\/system\/files\/documents\/2017\/04\/26\/nice_k12_implementation_plan.pdf"},{"key":"e_1_3_2_1_26_1","volume-title":"Lexico.com dictionary. Retrieved","author":"Oxford University Press. 2021.","year":"2022","unstructured":"Oxford University Press. 2021. Cybersecurity . In Lexico.com dictionary. Retrieved July 6, 2022 , from https:\/\/www.lexico.com\/definition\/Cybersecurity Oxford University Press. 2021. Cybersecurity. In Lexico.com dictionary. Retrieved July 6, 2022, from https:\/\/www.lexico.com\/definition\/Cybersecurity"},{"issue":"2","key":"e_1_3_2_1_27_1","first-page":"109","article-title":"Intructional Perspective: A Course Module on Mobile Malware","volume":"1","author":"Johnson Perron","year":"2014","unstructured":"Perron Johnson , Philip Harris , Keheira Henderson , Xiaohong Yuan , and Li Yang . 2014 . Intructional Perspective: A Course Module on Mobile Malware . DLINE 1 , 2 , 109 - 116 . Retrieved July 6, 2022, from https:\/\/www.dline.info\/isej\/fulltext\/v1n2\/6.pdf Perron Johnson, Philip Harris, Keheira Henderson, Xiaohong Yuan, and Li Yang. 2014. Intructional Perspective: A Course Module on Mobile Malware. DLINE 1, 2, 109-116. Retrieved July 6, 2022, from https:\/\/www.dline.info\/isej\/fulltext\/v1n2\/6.pdf","journal-title":"DLINE"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.6"},{"key":"e_1_3_2_1_29_1","volume-title":"Smartphone subscriptions worldwide 2016-2027. Statista. Retrieved","author":"O'Dea S.","year":"2022","unstructured":"S. O'Dea . 2022. Smartphone subscriptions worldwide 2016-2027. Statista. Retrieved July 6, 2022 , from https:\/\/www.statista.com\/statistics\/330695\/number-of-smartphone-users-worldwide\/ S. O'Dea. 2022. Smartphone subscriptions worldwide 2016-2027. Statista. Retrieved July 6, 2022, from https:\/\/www.statista.com\/statistics\/330695\/number-of-smartphone-users-worldwide\/"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2016.7757365"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2978192.2978227"}],"event":{"name":"SIGITE '22: The 23rd Annual Conference on Information Technology Education","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"Chicago IL USA","acronym":"SIGITE '22"},"container-title":["Proceedings of the 23rd Annual Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3537674.3554741","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3537674.3554741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:50Z","timestamp":1750186970000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3537674.3554741"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,21]]},"references-count":31,"alternative-id":["10.1145\/3537674.3554741","10.1145\/3537674"],"URL":"https:\/\/doi.org\/10.1145\/3537674.3554741","relation":{},"subject":[],"published":{"date-parts":[[2022,9,21]]},"assertion":[{"value":"2022-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}