{"id":"https://openalex.org/W4206790293","doi":"https://doi.org/10.1109/acit53391.2021.9677117","title":"Cybersecurity Awareness and Its Impact on Protecting Children in Cyberspace","display_name":"Cybersecurity Awareness and Its Impact on Protecting Children in Cyberspace","publication_year":2021,"publication_date":"2021-12-21","ids":{"openalex":"https://openalex.org/W4206790293","doi":"https://doi.org/10.1109/acit53391.2021.9677117"},"language":"en","primary_location":{"id":"doi:10.1109/acit53391.2021.9677117","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit53391.2021.9677117","pdf_url":null,"source":{"id":"https://openalex.org/S4363608487","display_name":"2021 22nd International Arab Conference on Information Technology (ACIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040851790","display_name":"Ayida AlShabibi","orcid":null},"institutions":[{"id":"https://openalex.org/I47818738","display_name":"Sultan Qaboos University","ror":"https://ror.org/04wq8zb47","country_code":"OM","type":"education","lineage":["https://openalex.org/I47818738"]}],"countries":["OM"],"is_corresponding":true,"raw_author_name":"Ayida AlShabibi","raw_affiliation_strings":["Information Studies. College of Arts and Social Sciences, Sultan Qaboos Universi, Muscat, Oman"],"affiliations":[{"raw_affiliation_string":"Information Studies. College of Arts and Social Sciences, Sultan Qaboos Universi, Muscat, Oman","institution_ids":["https://openalex.org/I47818738"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029465970","display_name":"Mohammed Nasser Al\u2010Suqri","orcid":"https://orcid.org/0000-0002-2673-3814"},"institutions":[{"id":"https://openalex.org/I47818738","display_name":"Sultan Qaboos University","ror":"https://ror.org/04wq8zb47","country_code":"OM","type":"education","lineage":["https://openalex.org/I47818738"]}],"countries":["OM"],"is_corresponding":false,"raw_author_name":"Mohammed Al-Suqri","raw_affiliation_strings":["Deanship of Postgraduate Studies, Sultan Qaboos University, Muscat, Oman"],"affiliations":[{"raw_affiliation_string":"Deanship of Postgraduate Studies, Sultan Qaboos University, Muscat, Oman","institution_ids":["https://openalex.org/I47818738"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5040851790"],"corresponding_institution_ids":["https://openalex.org/I47818738"],"apc_list":null,"apc_paid":null,"fwci":1.1345,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.78842165,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9848999977111816,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9750000238418579,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.9759602546691895},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.6904488205909729},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6752691864967346},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.563281774520874},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.4428052008152008},{"id":"https://openalex.org/keywords/novelty","display_name":"Novelty","score":0.4399802088737488},{"id":"https://openalex.org/keywords/situation-awareness","display_name":"Situation awareness","score":0.4141343832015991},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3985939025878906},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.37941837310791016},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3636608123779297},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.3446280360221863},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.24448877573013306},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.23198425769805908},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.13396117091178894},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10211434960365295}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.9759602546691895},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.6904488205909729},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6752691864967346},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.563281774520874},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.4428052008152008},{"id":"https://openalex.org/C2778738651","wikidata":"https://www.wikidata.org/wiki/Q16546687","display_name":"Novelty","level":2,"score":0.4399802088737488},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.4141343832015991},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3985939025878906},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.37941837310791016},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3636608123779297},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.3446280360221863},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.24448877573013306},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.23198425769805908},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.13396117091178894},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10211434960365295},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit53391.2021.9677117","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit53391.2021.9677117","pdf_url":null,"source":{"id":"https://openalex.org/S4363608487","display_name":"2021 22nd International Arab Conference on Information Technology (ACIT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 22nd International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Good health and well-being","id":"https://metadata.un.org/sdg/3","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W1995168238","https://openalex.org/W2081908994","https://openalex.org/W2462196336","https://openalex.org/W2596185890","https://openalex.org/W2725958610","https://openalex.org/W2786722149","https://openalex.org/W2788182110","https://openalex.org/W2805024488","https://openalex.org/W2886653580","https://openalex.org/W2896495907","https://openalex.org/W2899934017","https://openalex.org/W2903220614","https://openalex.org/W2906704993","https://openalex.org/W2910687894","https://openalex.org/W2922087317","https://openalex.org/W2922335955","https://openalex.org/W2972115433","https://openalex.org/W2979562261","https://openalex.org/W2982531453","https://openalex.org/W2985598955","https://openalex.org/W2992285883","https://openalex.org/W2995282616","https://openalex.org/W3007523149","https://openalex.org/W3011958014","https://openalex.org/W3030985719","https://openalex.org/W3089111173","https://openalex.org/W3093785893","https://openalex.org/W6719270882","https://openalex.org/W6760561184","https://openalex.org/W6760847452"],"related_works":["https://openalex.org/W2789356246","https://openalex.org/W2980609844","https://openalex.org/W2374270253","https://openalex.org/W2913449642","https://openalex.org/W2078167669","https://openalex.org/W1510448193","https://openalex.org/W4250327053","https://openalex.org/W2385674486","https://openalex.org/W279204092","https://openalex.org/W306982053"],"abstract_inverted_index":{"Objective:":[0],"Our":[1],"proposed":[2],"study":[3],"investigates":[4],"the":[5,26,38,57,77,85,95,115,121,127,134,154,178,182,186,193,199,237],"impact":[6,66,86],"of":[7,14,21,41,80,87,92,97,181,192,198,233],"cybersecurity":[8,62,81,93,107,155,234],"awareness":[9,82,108,118,156,235],"among":[10,23,236],"children":[11,24,45,69,98,111,135,163,173],"in":[12,17,70,83,99,120],"terms":[13],"protecting":[15,68],"them":[16,166],"cyberspace.":[18,71],"The":[19,51,74,151,195],"prevalence":[20],"cybercrime":[22],"at":[25],"global":[27,179,196],"and":[28,64,94,139,225],"national":[29],"levels":[30],"imposes":[31],"serious":[32],"concerns.":[33],"Cybercrimes":[34],"penetrated":[35],"largely":[36],"during":[37,177,214],"digital":[39],"transformation":[40],"education":[42,176],"that":[43,133,158],"facilitated":[44],"to":[46,61,131,147,164,174,208,230],"access":[47],"cyberspace":[48,100,168,171],"unconditionally.":[49],"Methodology:":[50],"research":[52],"is":[53,144,185],"based":[54],"on":[55,67,211],"reviewing":[56],"academic":[58],"literature":[59],"relevant":[60],"awareness\u2019s":[63],"its":[65],"Main":[72],"Findings:":[73],"findings":[75],"highlight":[76],"significant":[78],"role":[79],"reducing":[84],"cyberattacks":[88,226],"against":[89],"children.":[90],"Awareness":[91],"protection":[96],"are":[101,136],"interlinked":[102],"with":[103],"each":[104],"other.":[105],"Comprehensive":[106],"programs":[109,119],"for":[110,162,172],"can":[112,217],"significantly":[113],"reduce":[114],"spread.":[116],"Widespread":[117],"educational":[122],"curriculum":[123],"while":[124],"utilizing":[125],"all":[126],"required":[128],"safety":[129,143],"criteria":[130],"guarantee":[132],"Trustworthy,":[137],"secure,":[138],"ensuring":[140],"their":[141],"data":[142],"crucial":[145],"step":[146],"consider.":[148],"Social":[149],"Implications:":[150],"article":[152],"highlights":[153],"measures":[157],"should":[159],"be":[160],"considered":[161],"provide":[165],"safe":[167],"platforms.":[169],"Secure":[170],"get":[175],"spread":[180,197],"Corona":[183],"pandemic":[184],"dire":[187],"current":[188],"social":[189],"need.":[190],"Originality/Novelty":[191],"Study:":[194],"Coronavirus":[200],"has":[201],"considerably":[202],"affected":[203],"people\u2019s":[204],"daily":[205],"lives.":[206],"Due":[207],"increased":[209],"dependability":[210],"online":[212],"platforms":[213],"pandemic,":[215],"we":[216],"name":[218],"this":[219],"situation":[220],"as":[221],"cyber-pandemic.":[222],"Data":[223],"breaches":[224],"rises":[227],"dramatically":[228],"due":[229],"a":[231],"lack":[232],"citizens.":[238]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
