{"id":"https://openalex.org/W4407638650","doi":"https://doi.org/10.1109/acit62805.2024.10876919","title":"Guidelines to Develop a Cybersecurity Policy in Schools, Perspectives Informed from Jordanian Cybercrime Law","display_name":"Guidelines to Develop a Cybersecurity Policy in Schools, Perspectives Informed from Jordanian Cybercrime Law","publication_year":2024,"publication_date":"2024-12-10","ids":{"openalex":"https://openalex.org/W4407638650","doi":"https://doi.org/10.1109/acit62805.2024.10876919"},"language":"en","primary_location":{"id":"doi:10.1109/acit62805.2024.10876919","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62805.2024.10876919","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 25th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072415989","display_name":"Ahmad Ghandour","orcid":"https://orcid.org/0000-0003-4445-7443"},"institutions":[{"id":"https://openalex.org/I91633459","display_name":"Middle East University","ror":"https://ror.org/059bgad73","country_code":"JO","type":"education","lineage":["https://openalex.org/I91633459"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Ahmad Ghandour","raw_affiliation_strings":["Middle East University,Faculty of Business,Amman,Jordan"],"affiliations":[{"raw_affiliation_string":"Middle East University,Faculty of Business,Amman,Jordan","institution_ids":["https://openalex.org/I91633459"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050029919","display_name":"Brendon J. Woodford","orcid":"https://orcid.org/0000-0001-5202-9700"},"institutions":[{"id":"https://openalex.org/I80281795","display_name":"University of Otago","ror":"https://ror.org/01jmxt844","country_code":"NZ","type":"education","lineage":["https://openalex.org/I80281795"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Brendon J. Woodford","raw_affiliation_strings":["University of Otago,School of Computing,Dunedin,New Zealand"],"affiliations":[{"raw_affiliation_string":"University of Otago,School of Computing,Dunedin,New Zealand","institution_ids":["https://openalex.org/I80281795"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5072415989"],"corresponding_institution_ids":["https://openalex.org/I91633459"],"apc_list":null,"apc_paid":null,"fwci":0.8118,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.83282203,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9767000079154968,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.972599983215332,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.9682661294937134},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5428724884986877},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.5218371748924255},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.4642186164855957},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.40255749225616455},{"id":"https://openalex.org/keywords/criminology","display_name":"Criminology","score":0.36165863275527954},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.18170279264450073},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1477026343345642},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08044159412384033}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.9682661294937134},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5428724884986877},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.5218371748924255},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.4642186164855957},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.40255749225616455},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.36165863275527954},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.18170279264450073},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1477026343345642},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08044159412384033}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit62805.2024.10876919","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit62805.2024.10876919","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 25th International Arab Conference on Information Technology (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W3016741745","https://openalex.org/W3127796451","https://openalex.org/W3201567054","https://openalex.org/W4230945962","https://openalex.org/W4280518408","https://openalex.org/W4286656335","https://openalex.org/W4313446163","https://openalex.org/W4324093415","https://openalex.org/W4379471562","https://openalex.org/W4392691143","https://openalex.org/W4394598662","https://openalex.org/W4399388563","https://openalex.org/W4402406704","https://openalex.org/W6803518538","https://openalex.org/W7005359375"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2338899373","https://openalex.org/W4252285266","https://openalex.org/W199254545","https://openalex.org/W2476504758","https://openalex.org/W4248464163","https://openalex.org/W2997836625","https://openalex.org/W111175386"],"abstract_inverted_index":{"For":[0],"educational":[1,156,186,232],"institutions":[2],"the":[3,6,23,40,51,59,84,133,149,226],"introduction":[4],"of":[5,12,18,27,58,62,79,113,136,165,209,228],"Jordanian":[7,66,80,129,171],"Cybercrime":[8,130],"Law":[9,131],"No.":[10],"17":[11],"2023":[13],"added":[14],"an":[15],"extra":[16],"dimension":[17],"stricter":[19],"legal":[20,118,154],"compliance":[21,119],"to":[22,38,128,147,152,158,173,224],"already":[24],"challenging":[25],"task":[26],"developing":[28],"cybersecurity":[29,63,92,161,210],"policies.":[30],"As":[31],"a":[32,55,77,175,184,192,207],"response,":[33],"this":[34,44,48,166,217],"paper":[35],"presents":[36],"guidelines":[37,85,115],"support":[39],"education":[41],"sector":[42],"in":[43,65,126,203,231],"regard.":[45],"What":[46],"underpins":[47],"work":[49],"is":[50,116,169],"knowledge":[52],"gained":[53],"from":[54,73,199],"comprehensive":[56],"examination":[57],"current":[60],"state":[61],"practices":[64],"schools.":[67],"Then,":[68],"combining":[69],"case":[70],"studies,":[71],"insight":[72],"expert":[74],"consultations,":[75],"and":[76,94,106,108,132,145,155,182,202,214,222],"review":[78],"cybercrime":[81,180],"legislation":[82],"informed":[83],"on":[86,220],"how":[87,117],"schools":[88,172],"should":[89],"approach":[90,190],"effective":[91],"policy":[93],"implementation.":[95],"The":[96,163],"findings":[97],"combine":[98],"essential":[99],"elements":[100],"which":[101],"span":[102],"strategy,":[103],"standards,":[104],"hardware":[105],"software,":[107],"training.":[109],"A":[110],"core":[111],"theme":[112],"these":[114],"can":[120,196],"be":[121,197],"achieved":[122],"for":[123,142,170],"school":[124,143],"policies":[125],"relation":[127],"negative":[134],"effects":[135],"non-compliance.":[137],"These":[138],"outcomes":[139],"have":[140],"ramifications":[141],"administrators":[144,221],"policymakers":[146,223],"acknowledge":[148],"urgent":[150],"need":[151],"integrate":[153],"strategies":[157],"strengthen":[159],"their":[160],"practices.":[162],"intent":[164],"recommended":[167],"framework":[168,218],"strike":[174],"balance":[176],"complying":[177],"with":[178],"national":[179],"laws":[181],"fostering":[183],"secure":[185],"environment.":[187],"This":[188],"proactive":[189],"has":[191],"dual":[193],"purpose.":[194],"Institutions":[195],"protected":[198],"cyber":[200],"threats":[201],"doing":[204],"so":[205],"promoting":[206],"culture":[208],"awareness":[211],"among":[212],"students":[213],"staff.":[215],"However,":[216],"relies":[219],"navigate":[225],"complexities":[227],"digital":[229],"security":[230],"environments.":[233]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
