{"id":"https://openalex.org/W4214837848","doi":"https://doi.org/10.1109/imcom53663.2022.9721733","title":"An Intelligent Gamification Tool to Boost Young Kids Cybersecurity Knowledge on FB Messenger","display_name":"An Intelligent Gamification Tool to Boost Young Kids Cybersecurity Knowledge on FB Messenger","publication_year":2022,"publication_date":"2022-01-03","ids":{"openalex":"https://openalex.org/W4214837848","doi":"https://doi.org/10.1109/imcom53663.2022.9721733"},"language":"en","primary_location":{"id":"doi:10.1109/imcom53663.2022.9721733","is_oa":false,"landing_page_url":"https://doi.org/10.1109/imcom53663.2022.9721733","pdf_url":null,"source":{"id":"https://openalex.org/S4363608555","display_name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079319503","display_name":"B. Fatokun Faith","orcid":null},"institutions":[{"id":"https://openalex.org/I4528857","display_name":"University of Kuala Lumpur","ror":"https://ror.org/026wwrx19","country_code":"MY","type":"education","lineage":["https://openalex.org/I4528857"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"B. Fatokun Faith","raw_affiliation_strings":["University of Kuala Lumpur,Malaysian Institute of Information Technology,Kuala Lumpur,Malaysia","Malaysian Institute of Information Technology, University of Kuala Lumpur, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"University of Kuala Lumpur,Malaysian Institute of Information Technology,Kuala Lumpur,Malaysia","institution_ids":["https://openalex.org/I4528857"]},{"raw_affiliation_string":"Malaysian Institute of Information Technology, University of Kuala Lumpur, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4528857"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044153218","display_name":"Zalizah Awang Long","orcid":"https://orcid.org/0000-0002-7861-530X"},"institutions":[{"id":"https://openalex.org/I4528857","display_name":"University of Kuala Lumpur","ror":"https://ror.org/026wwrx19","country_code":"MY","type":"education","lineage":["https://openalex.org/I4528857"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Zalizah Awang Long","raw_affiliation_strings":["University of Kuala Lumpur,Malaysian Institute of Information Technology,Kuala Lumpur,Malaysia","Malaysian Institute of Information Technology, University of Kuala Lumpur, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"University of Kuala Lumpur,Malaysian Institute of Information Technology,Kuala Lumpur,Malaysia","institution_ids":["https://openalex.org/I4528857"]},{"raw_affiliation_string":"Malaysian Institute of Information Technology, University of Kuala Lumpur, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I4528857"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101941109","display_name":"Suraya Hamid","orcid":"https://orcid.org/0000-0001-9075-7338"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Suraya Hamid","raw_affiliation_strings":["University of Malaya,Faculty of Computer Science &#x0026; IT,Department of Information Systems,Kuala Lumpur,Malaysia","Faculty of Computer Science &#x0026"],"affiliations":[{"raw_affiliation_string":"University of Malaya,Faculty of Computer Science &#x0026; IT,Department of Information Systems,Kuala Lumpur,Malaysia","institution_ids":["https://openalex.org/I33849332"]},{"raw_affiliation_string":"Faculty of Computer Science &#x0026","institution_ids":[]}]},{"author_position":"middle","author":{"id":null,"display_name":"O. Fatokun Johnson","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"O. Fatokun Johnson","raw_affiliation_strings":["Anchor University,Faculty of Science,Department of Mathematical Sciences,Lagos,Nigeria"],"affiliations":[{"raw_affiliation_string":"Anchor University,Faculty of Science,Department of Mathematical Sciences,Lagos,Nigeria","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025980566","display_name":"Christopher Ifeanyi Eke","orcid":"https://orcid.org/0000-0003-1325-2875"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Christopher Ifeanyi Eke","raw_affiliation_strings":["University of Malaya,Faculty of Computer Science &#x0026; IT,Department of Information Systems,Kuala Lumpur,Malaysia","Faculty of Computer Science &#x0026"],"affiliations":[{"raw_affiliation_string":"University of Malaya,Faculty of Computer Science &#x0026; IT,Department of Information Systems,Kuala Lumpur,Malaysia","institution_ids":["https://openalex.org/I33849332"]},{"raw_affiliation_string":"Faculty of Computer Science &#x0026","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085581530","display_name":"Azah Anir Norman","orcid":"https://orcid.org/0000-0001-5420-0452"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Azah Norman","raw_affiliation_strings":["University of Malaya,Faculty of Computer Science &#x0026; IT,Department of Information Systems,Kuala Lumpur,Malaysia","Faculty of Computer Science &#x0026"],"affiliations":[{"raw_affiliation_string":"University of Malaya,Faculty of Computer Science &#x0026; IT,Department of Information Systems,Kuala Lumpur,Malaysia","institution_ids":["https://openalex.org/I33849332"]},{"raw_affiliation_string":"Faculty of Computer Science &#x0026","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5079319503"],"corresponding_institution_ids":["https://openalex.org/I4528857"],"apc_list":null,"apc_paid":null,"fwci":1.7566,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.86454911,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10355","display_name":"Impact of Technology on Adolescents","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10355","display_name":"Impact of Technology on Adolescents","score":0.9872000217437744,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11197","display_name":"Digital Games and Media","score":0.98580002784729,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.980400025844574,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ingenuity","display_name":"Ingenuity","score":0.6604669094085693},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5565062165260315},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.536733865737915},{"id":"https://openalex.org/keywords/novelty","display_name":"Novelty","score":0.5152178406715393},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5060116648674011},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.47218313813209534},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.45892858505249023},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.4125974178314209},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.32105013728141785},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2988223731517792},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13751912117004395},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.1254402995109558}],"concepts":[{"id":"https://openalex.org/C2778154381","wikidata":"https://www.wikidata.org/wiki/Q105296908","display_name":"Ingenuity","level":2,"score":0.6604669094085693},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5565062165260315},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.536733865737915},{"id":"https://openalex.org/C2778738651","wikidata":"https://www.wikidata.org/wiki/Q16546687","display_name":"Novelty","level":2,"score":0.5152178406715393},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5060116648674011},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.47218313813209534},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.45892858505249023},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.4125974178314209},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.32105013728141785},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2988223731517792},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13751912117004395},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.1254402995109558},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C133425853","wikidata":"https://www.wikidata.org/wiki/Q60571","display_name":"Neoclassical economics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/imcom53663.2022.9721733","is_oa":false,"landing_page_url":"https://doi.org/10.1109/imcom53663.2022.9721733","pdf_url":null,"source":{"id":"https://openalex.org/S4363608555","display_name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 16th International Conference on Ubiquitous Information Management and Communication (IMCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1606333164","https://openalex.org/W1998933811","https://openalex.org/W2027762216","https://openalex.org/W2031924389","https://openalex.org/W2057148748","https://openalex.org/W2081655353","https://openalex.org/W2084343287","https://openalex.org/W2112205306","https://openalex.org/W2126133171","https://openalex.org/W2128985605","https://openalex.org/W2129887445","https://openalex.org/W2141057398","https://openalex.org/W2141667975","https://openalex.org/W2167117133","https://openalex.org/W2168620475","https://openalex.org/W2289534764","https://openalex.org/W2559689130","https://openalex.org/W2585251339","https://openalex.org/W2769011540","https://openalex.org/W2772252067","https://openalex.org/W2782445866","https://openalex.org/W2795230885","https://openalex.org/W2995594926","https://openalex.org/W3026471356"],"related_works":["https://openalex.org/W1528089385","https://openalex.org/W2894069061","https://openalex.org/W2901253749","https://openalex.org/W2468223644","https://openalex.org/W4238513149","https://openalex.org/W2364113653","https://openalex.org/W2994258365","https://openalex.org/W2616269406","https://openalex.org/W4295161771","https://openalex.org/W4289532678"],"abstract_inverted_index":{"With":[0],"the":[1,8,29,61,87,118,125,136,170,174,183,207,211,221,226,250],"blind":[2],"connectivity":[3],"of":[4,13,31,51,67,77,121,127,138,161,185,210,225,240],"many":[5],"individuals":[6],"across":[7],"Internet":[9],"today,":[10],"a":[11,35,128,218],"lot":[12],"cyber-crimes":[14],"and":[15,43,55,94,113,213,223,237],"cyber-assaults":[16],"occur":[17],"in":[18,173,217,244],"diverse":[19],"forms.":[20],"Cybersecurity":[21],"knowledge":[22,140,180,243],"among":[23],"kids":[24,142,234],"on":[25,82,111,143,194],"Facebook":[26,62,83],"Messenger":[27,63],"within":[28],"ages":[30],"6-12":[32],"years":[33],"is":[34,105,124,164,199],"major":[36,159],"concern":[37],"due":[38],"to":[39,47,57,134,150,168,176,188,201,215],"their":[40,45,52,256],"age":[41],"group":[42],"perhaps":[44],"inability":[46],"manage":[48],"security/privacy":[49],"issues":[50,58,74],"personal":[53],"information":[54],"attitudes":[56],"while":[59,248],"surfing":[60,249],"App.":[64],"In":[65],"view":[66],"this,":[68],"this":[69,104,122,162,204],"research":[70,99,172],"first":[71,171],"analysed":[72,89],"recent":[73,114],"regarding":[75],"cybersecurity":[76,139,192,242],"young":[78,190],"children,":[79],"focusing":[80],"more":[81],"Kids":[84],"Messenger.":[85,196],"All":[86],"data":[88],"were":[90],"gotten":[91],"from":[92],"secondary":[93],"tertiary":[95],"sources.":[96],"The":[97],"qualitative":[98],"approach":[100,181],"was":[101],"employed":[102],"as":[103,156,252,254],"purely":[106],"an":[107,178,245],"innovative":[108,179],"ideation":[109,208],"based":[110],"literature":[112],"security":[115],"publications.":[116],"Further,":[117],"innovativeness/":[119],"ingenuity":[120],"article":[123],"proposal":[126],"Gamification":[129,187],"Awareness":[130],"(GA)":[131],"prototype":[132],"designed":[133],"ensure":[135,232],"boost":[137,189,255],"for":[141],"FB":[144,195],"Messenger,":[145],"which":[146],"could":[147,231],"be":[148,169],"applicable":[149],"other":[151],"online":[152],"social":[153],"media":[154],"platforms":[155],"well.":[157],"A":[158],"novelty":[160],"paper":[163,205],"that,":[165],"it":[166,198],"seems":[167],"domain":[175],"propose":[177],"through":[182],"use":[184],"Intelligent":[186],"kid&#x2019;s":[191],"consciousness":[193],"Finally,":[197],"important":[200],"note":[202],"that":[203,233],"presents":[206],"stage":[209],"development":[212,222,259],"hopes":[214],"present":[216],"future":[219],"report":[220],"deployment":[224],"actual":[227],"gamification":[228],"technique.":[229],"This":[230],"are":[235],"fully":[236],"duly":[238],"aware":[239],"necessary":[241],"interactive":[246],"way,":[247],"Internet,":[251],"well":[253],"positive":[257],"healthy":[258],"online.":[260]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
