{"id":"https://openalex.org/W4389888117","doi":"https://doi.org/10.1109/iceei59426.2023.10346823","title":"Interactive STEM in Cyber Awareness Learning System","display_name":"Interactive STEM in Cyber Awareness Learning System","publication_year":2023,"publication_date":"2023-10-10","ids":{"openalex":"https://openalex.org/W4389888117","doi":"https://doi.org/10.1109/iceei59426.2023.10346823"},"language":"en","primary_location":{"id":"doi:10.1109/iceei59426.2023.10346823","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iceei59426.2023.10346823","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Electrical Engineering and Informatics (ICEEI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101152038","display_name":"Kamsuriah Ahmad","orcid":null},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Kamsuriah Ahmad","raw_affiliation_strings":["Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Selangor,Malaysia,43600"],"affiliations":[{"raw_affiliation_string":"Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Selangor,Malaysia,43600","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061842277","display_name":"Suhaila Zainudin","orcid":"https://orcid.org/0000-0003-2352-5312"},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Suhaila Zainudin","raw_affiliation_strings":["Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Selangor,Malaysia,43600"],"affiliations":[{"raw_affiliation_string":"Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Selangor,Malaysia,43600","institution_ids":["https://openalex.org/I885383172"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074952135","display_name":"Shahrina Shahrani","orcid":null},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Shahrina Shahrani","raw_affiliation_strings":["Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Selangor,Malaysia,43600"],"affiliations":[{"raw_affiliation_string":"Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Selangor,Malaysia,43600","institution_ids":["https://openalex.org/I885383172"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101152038"],"corresponding_institution_ids":["https://openalex.org/I885383172"],"apc_list":null,"apc_paid":null,"fwci":0.4589,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.72295928,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8855000138282776,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8855000138282776,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10533","display_name":"Teaching and Learning Programming","score":0.8823000192642212,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14345","display_name":"Scientific Research and Philosophical Inquiry","score":0.8355000019073486,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.8637393712997437},{"id":"https://openalex.org/keywords/stalking","display_name":"Stalking","score":0.6409822106361389},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5495461821556091},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.5371673107147217},{"id":"https://openalex.org/keywords/cyber-bullying","display_name":"Cyber bullying","score":0.4589783251285553},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4576936364173889},{"id":"https://openalex.org/keywords/harassment","display_name":"Harassment","score":0.4573809802532196},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4390571713447571},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.34486305713653564},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.32194697856903076},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.2929110527038574},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1684395968914032},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.1127023994922638}],"concepts":[{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.8637393712997437},{"id":"https://openalex.org/C2778030639","wikidata":"https://www.wikidata.org/wiki/Q163942","display_name":"Stalking","level":2,"score":0.6409822106361389},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5495461821556091},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.5371673107147217},{"id":"https://openalex.org/C3019496913","wikidata":"https://www.wikidata.org/wiki/Q494348","display_name":"Cyber bullying","level":3,"score":0.4589783251285553},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4576936364173889},{"id":"https://openalex.org/C2778976716","wikidata":"https://www.wikidata.org/wiki/Q3240539","display_name":"Harassment","level":2,"score":0.4573809802532196},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4390571713447571},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.34486305713653564},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.32194697856903076},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.2929110527038574},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1684395968914032},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.1127023994922638},{"id":"https://openalex.org/C118552586","wikidata":"https://www.wikidata.org/wiki/Q7867","display_name":"Psychiatry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iceei59426.2023.10346823","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iceei59426.2023.10346823","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 International Conference on Electrical Engineering and Informatics (ICEEI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5899999737739563}],"awards":[{"id":"https://openalex.org/G6829653636","display_name":null,"funder_award_id":"UKM-TR2022-13","funder_id":"https://openalex.org/F4320322699","funder_display_name":"Universiti Kebangsaan Malaysia"}],"funders":[{"id":"https://openalex.org/F4320322699","display_name":"Universiti Kebangsaan Malaysia","ror":"https://ror.org/00bw8d226"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2084294763","https://openalex.org/W2482927512","https://openalex.org/W2762939023","https://openalex.org/W2803424197","https://openalex.org/W2890841447","https://openalex.org/W2922087317","https://openalex.org/W2940600495","https://openalex.org/W2970715052","https://openalex.org/W3110813927","https://openalex.org/W3213585727","https://openalex.org/W4214877613","https://openalex.org/W6751801536"],"related_works":["https://openalex.org/W1648378477","https://openalex.org/W2032900633","https://openalex.org/W1559396486","https://openalex.org/W3214845967","https://openalex.org/W2911255625","https://openalex.org/W197818113","https://openalex.org/W4387348233","https://openalex.org/W4382995152","https://openalex.org/W2982160180","https://openalex.org/W158711604"],"abstract_inverted_index":{"The":[0,121,235],"internet":[1,26],"and":[2,27,81,206,231,245],"computer":[3],"applications":[4],"are":[5,194],"useful":[6],"to":[7,34,64,67,118,157,160,210],"everyday":[8],"life":[9],"but":[10],"without":[11],"proper":[12,254],"control,":[13],"it":[14,51,243],"can":[15,92],"threaten":[16],"everyone's":[17],"life.":[18],"Now,":[19],"the":[20,23,32,35,46,131,137,151,167,174],"dependence":[21],"on":[22,171,173],"use":[24,47],"of":[25,48,84,123,133,166,176,224,237,270],"social":[28],"media":[29],"has":[30,52,129,182],"opened":[31],"risk":[33],"new":[36],"threat":[37],"which":[38],"is":[39,42,87,112,140,155,233,242,266],"cybercrime.":[40],"Cybercrime":[41],"a":[43,54,107,263],"crime":[44,86],"through":[45,145],"computers,":[49],"where":[50],"become":[53],"major":[55],"challenge":[56],"faced":[57],"globally.":[58],"Therefore":[59],"they":[60,91],"(especially":[61],"students)":[62],"need":[63],"be":[65,119],"exposed":[66],"knowledge":[68],"about":[69],"cybercrimes":[70],"such":[71],"as":[72,250,252],"cyber":[73,75,77,108,124,152,177,190,215,275],"bullying,":[74],"stalking,":[76],"harassment,":[78],"identity":[79],"theft,":[80],"others.":[82],"Awareness":[83],"this":[85,104,239],"necessary":[88,156],"so":[89],"that":[90,111,193,268],"provide":[93],"preventive":[94],"measures":[95],"by":[96],"controlling":[97],"themselves":[98],"from":[99],"getting":[100],"caught":[101],"up":[102],"in":[103,162,187,214,248,256,274],"crime.":[105],"Therefore,":[106,150],"education":[109,125],"module":[110],"compatible":[113],"with":[114],"Malaysians'":[115,197],"culture":[116],"needs":[117],"developed.":[120],"importance":[122],"among":[126],"school":[127],"students":[128,161,247],"attracted":[130],"interest":[132],"many":[134],"parties.":[135],"However,":[136],"educational":[138],"approach":[139,209],"geared":[141],"towards":[142],"traditional":[143],"methods":[144],"lectures":[146],"or":[147],"informal":[148],"learning.":[149],"learning":[153,191,208,222,240,249,264,272],"package":[154,192],"give":[158,253],"exposure":[159],"increasing":[163],"their":[164],"awareness":[165],"cybercrime":[168],"threats.":[169],"Based":[170],"reviews":[172],"development":[175],"education,":[178],"until":[179],"today":[180],"there":[181],"been":[183],"no":[184],"comprehensive":[185],"effort":[186],"developing":[188],"interactive":[189],"suitable":[195],"for":[196],"culture.":[198],"This":[199],"study":[200],"used":[201],"STEM":[202,219,261],"(Science,":[203],"Technology,":[204],"Engineering":[205],"Mathematics)":[207],"increase":[211],"student":[212],"motivation":[213],"education.":[216,276],"To":[217,259],"support":[218],"approach,":[220,262],"five":[221],"principles":[223,273],"5E":[225,271],"(namely":[226],"engage,":[227],"explore,":[228],"explain,":[229],"elaborate,":[230],"evaluate)":[232],"adopted.":[234],"advantage":[236],"using":[238],"principle":[241],"encourages":[244],"motivates":[246],"well":[251],"guidance":[255],"skill":[257],"development.":[258],"adopt":[260],"model":[265],"proposed":[267],"consists":[269]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
