{"id":"https://openalex.org/W3127158541","doi":"https://doi.org/10.1109/icspis51252.2020.9340128","title":"Introducing a Mobile App to Increase Cybersecurity Awareness in MENA","display_name":"Introducing a Mobile App to Increase Cybersecurity Awareness in MENA","publication_year":2020,"publication_date":"2020-11-25","ids":{"openalex":"https://openalex.org/W3127158541","doi":"https://doi.org/10.1109/icspis51252.2020.9340128","mag":"3127158541"},"language":"en","primary_location":{"id":"doi:10.1109/icspis51252.2020.9340128","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icspis51252.2020.9340128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053544313","display_name":"Hadeel Mohammed Jawad","orcid":null},"institutions":[{"id":"https://openalex.org/I177721651","display_name":"Oakland University","ror":"https://ror.org/01ythxj32","country_code":"US","type":"education","lineage":["https://openalex.org/I177721651"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hadeel Mohammed Jawad","raw_affiliation_strings":["Oakland University,Michigan,USA","Oakland University, Michigan, USA"],"affiliations":[{"raw_affiliation_string":"Oakland University,Michigan,USA","institution_ids":["https://openalex.org/I177721651"]},{"raw_affiliation_string":"Oakland University, Michigan, USA","institution_ids":["https://openalex.org/I177721651"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041918012","display_name":"Samir Tout","orcid":"https://orcid.org/0000-0002-3775-299X"},"institutions":[{"id":"https://openalex.org/I138216421","display_name":"Eastern Michigan University","ror":"https://ror.org/02ehshm78","country_code":"US","type":"education","lineage":["https://openalex.org/I138216421"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Samir Tout","raw_affiliation_strings":["Eastern Michigan University,Michigan,USA","Eastern Michigan University, Michigan, USA"],"affiliations":[{"raw_affiliation_string":"Eastern Michigan University,Michigan,USA","institution_ids":["https://openalex.org/I138216421"]},{"raw_affiliation_string":"Eastern Michigan University, Michigan, USA","institution_ids":["https://openalex.org/I138216421"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5053544313"],"corresponding_institution_ids":["https://openalex.org/I177721651"],"apc_list":null,"apc_paid":null,"fwci":0.2631,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.63040121,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10731","display_name":"Educational Games and Gamification","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/3204","display_name":"Developmental and Educational Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10731","display_name":"Educational Games and Gamification","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/3204","display_name":"Developmental and Educational Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11197","display_name":"Digital Games and Media","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13194","display_name":"ICT in Developing Communities","score":0.9233999848365784,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.7455427646636963},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7139454483985901},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.6565322875976562},{"id":"https://openalex.org/keywords/arabic","display_name":"Arabic","score":0.6096943616867065},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.5848969221115112},{"id":"https://openalex.org/keywords/mobile-apps","display_name":"Mobile apps","score":0.576158881187439},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5323774218559265},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5075036883354187},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5038866400718689},{"id":"https://openalex.org/keywords/android-app","display_name":"Android app","score":0.46212220191955566},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4328264594078064}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.7455427646636963},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7139454483985901},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.6565322875976562},{"id":"https://openalex.org/C96455323","wikidata":"https://www.wikidata.org/wiki/Q13955","display_name":"Arabic","level":2,"score":0.6096943616867065},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.5848969221115112},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.576158881187439},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5323774218559265},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5075036883354187},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5038866400718689},{"id":"https://openalex.org/C2988045736","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android app","level":3,"score":0.46212220191955566},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4328264594078064},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icspis51252.2020.9340128","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icspis51252.2020.9340128","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 3rd International Conference on Signal Processing and Information Security (ICSPIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/5","display_name":"Gender equality","score":0.699999988079071}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1569654560","https://openalex.org/W2326713822","https://openalex.org/W2479485957","https://openalex.org/W2503005446","https://openalex.org/W2615105309","https://openalex.org/W4383863801","https://openalex.org/W6634199197"],"related_works":["https://openalex.org/W2362574935","https://openalex.org/W1926248","https://openalex.org/W3118687971","https://openalex.org/W2363507101","https://openalex.org/W3159372857","https://openalex.org/W4320401378","https://openalex.org/W1517527854","https://openalex.org/W2922039621","https://openalex.org/W2887633424","https://openalex.org/W2290452149"],"abstract_inverted_index":{"Cybersecurity":[0],"experts":[1],"predict":[2],"that":[3,19,32],"cybersecurity":[4,69],"is":[5],"going":[6],"to":[7,17,39,56,71],"be":[8,115],"the":[9,53,61,101,118,122],"new":[10,49],"cold":[11],"war.":[12],"Arab":[13],"countries":[14,36],"are":[15,20,37,104],"exposed":[16,38],"cyber-attacks":[18],"aimed":[21],"at":[22],"stealing":[23],"personal":[24],"data":[25,113],"and":[26,64,70,78,86,89,97,109],"trade":[27],"secrets.":[28],"Furthermore,":[29],"statistics":[30],"show":[31],"women":[33],"in":[34,52,60,117],"such":[35],"different":[40],"forms":[41],"of":[42,75,100,121],"cyber":[43],"violence.":[44],"This":[45],"paper":[46],"introduces":[47],"a":[48],"mobile":[50],"app":[51,81,112],"Arabic":[54],"language":[55],"educate":[57],"Arab-speaking":[58],"people":[59],"Middle":[62],"East":[63],"North":[65],"Africa":[66],"(MENA)":[67],"about":[68],"increase":[72],"their":[73],"awareness":[74],"information":[76,93],"assurance":[77,94],"cybercrimes.":[79],"The":[80,111],"was":[82],"developed":[83],"for":[84],"Android":[85],"iOS":[87],"devices":[88],"it":[90],"includes":[91],"multiple-choice":[92],"questions,":[95],"terms,":[96],"articles.":[98],"Examples":[99],"term":[102],"definitions":[103],"Two-Factor":[105],"Authentication,":[106],"Ethical":[107],"Hacking,":[108],"Honeypot.":[110],"could":[114],"increased":[116],"next":[119],"update":[120],"app.":[123]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2026-01-13T01:12:25.745995","created_date":"2025-10-10T00:00:00"}
