Increasing cybersecurity awareness among teenagers through digital education and simulation
Keywords:
Cybersecurity Awareness, Digital Education, Gamification, Simulation Tools, TeenagersAbstract
This community service aims to explore the role of digital education and simulation tools in enhancing cybersecurity awareness among teenagers. The review examines various educational methods, including e-learning platforms, gamification, and phishing simulations, to evaluate their effectiveness in increasing cybersecurity knowledge and skills. The methodology involves analyzing relevant studies from academic databases, combining both qualitative and quantitative research. Key findings suggest that interactive digital education and simulations significantly improve teenagers' ability to recognize and address online threats. However, challenges remain regarding long-term retention and engagement. The review highlights the growing importance of these tools in educating teenagers, emphasizing the need for their integration into educational settings. Trends include the use of gamification and simulations, while gaps in research, such as long-term effectiveness and cultural influences, remain. Recommendations for future initiatives include AI-driven simulations and incorporating cybersecurity education into social media platforms for broader reach.
References
Bakker, S. (2024). Immersive Virtual Reality and Cybersecurity: Combatting Social Engineering in a Healthcare Context. University of Twente.
Balk, E. M., Chung, M., Chen, M. L., Chang, L. K. W., & Trikalinos, T. A. (2013). Data extraction from machine-translated versus original language randomized trial reports: a comparative study. Systematic Reviews, 2, 1–6.
Benchimol, E. I., Smeeth, L., Guttmann, A., Harron, K., Moher, D., Petersen, I., Sørensen, H. T., von Elm, E., Langan, S. M., & Committee, R. W. (2015). The REporting of studies Conducted using Observational Routinely-collected health Data (RECORD) statement. PLoS Medicine, 12(10), e1001885.
Bennett, W. L. (2007). Civic life online: Learning how digital media can engage youth. The MIT Press.
Bernstein, B. E., Kamal, M., Lindblad-Toh, K., Bekiranov, S., Bailey, D. K., Huebert, D. J., McMahon, S., Karlsson, E. K., Kulbokas, E. J., & Gingeras, T. R. (2005). Genomic maps and comparative analysis of histone modifications in human and mouse. Cell, 120(2), 169–181.
Bramer, W. M., De Jonge, G. B., Rethlefsen, M. L., Mast, F., & Kleijnen, J. (2018). A systematic approach to searching: an efficient and complete method to develop literature searches. Journal of the Medical Library Association: JMLA, 106(4), 531.
Buchan, M. C., Bhawra, J., & Katapally, T. R. (2024). Navigating the digital world: development of an evidence-based digital literacy program and assessment tool for youth. Smart Learning Environments, 11(1), 8.
Chassiakos, Y. L. R., & Stager, M. (2020). Current trends in digital media: How and why teens use technology. In Technology and adolescent health (pp. 25–56). Elsevier.
Cortesi, S., Hasse, A., Lombana-Bermudez, A., Kim, S., & Gasser, U. (2020). Youth and digital citizenship+ (plus): Understanding skills for a digital world. Berkman Klein Center Research Publication, 2020–2.
Curry, L. A., Nembhard, I. M., & Bradley, E. H. (2009). Qualitative and mixed methods provide unique contributions to outcomes research. Circulation, 119(10), 1442–1452.
Delen, D., Zaim, H., Kuzey, C., & Zaim, S. (2013). A comparative analysis of machine learning systems for measuring the impact of knowledge management practices. Decision Support Systems, 54(2), 1150–1160.
Dym, B., & Fiesler, C. (2020). Social norm vulnerability and its consequences for privacy and safety in an online community. Proceedings of the ACM on Human-Computer Interaction, 4(CSCW2), 1–24.
Fouad, N. S. (2022). The security economics of EdTech: vendors’ responsibility and the cybersecurity challenge in the education sector. Digital Policy, Regulation and Governance, 24(3), 259–273.
Gusenbauer, M., & Haddaway, N. R. (2020). Which academic search systems are suitable for systematic reviews or meta‐analyses? Evaluating retrieval qualities of Google Scholar, PubMed, and 26 other resources. Research Synthesis Methods, 11(2), 181–217.
Hamdan, Z., Obaid, I., Ali, A., Hussain, H., Rajan, A. V, & Ahamed, J. (2013). Protecting teenagers from potential internet security threats. 2013 International Conference on Current Trends in Information Technology (CTIT), 143–152.
Hamilton, A. B., & Finley, E. P. (2019). Qualitative methods in implementation research: An introduction. Psychiatry Research, 280, 112516.
Harris, J. D., Quatman, C. E., Manring, M. M., Siston, R. A., & Flanigan, D. C. (2014). How to write a systematic review. The American Journal of Sports Medicine, 42(11), 2761–2768.
Hjørland, B. (2015). Classical databases and knowledge organization: A case for boolean retrieval and human decision‐making during searches. Journal of the Association for Information Science and Technology, 66(8), 1559–1575.
Hoffmann, T. C., Glasziou, P. P., Boutron, I., Milne, R., Perera, R., Moher, D., Altman, D. G., Barbour, V., Macdonald, H., & Johnston, M. (2014). Better reporting of interventions: template for intervention description and replication (TIDieR) checklist and guide. Bmj, 348.
Huang, B. (2024). Navigating digital divide: exploring the influence of ideological and political education on cyber security and digital literacy amid information warfare. Current Psychology, 1–22.
Jain, A. K., Sahoo, S. R., & Kaubiyal, J. (2021). Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems, 7(5), 2157–2177.
James, C. (2009). Young people, ethics, and the new digital media: A synthesis from the GoodPlay Project. The MIT Press.
Johnson, M. (2016). Cyber crime, security and digital intelligence. Routledge.
Joshi, R., & Rehman, S. (2023). Raising Awareness of Social Engineering among Adolescents: Psychological and Cybersecurity Perspective. In Cybersecurity for Decision Makers (pp. 99–109). CRC Press.
Kam, H.-J., Menard, P., Ormond, D., & Crossler, R. E. (2020). Cultivating cybersecurity learning: An integration of self-determination and flow. Computers & Security, 96, 101875.
Kaur, G., Bonde, U., Pise, K. L., Yewale, S., Agrawal, P., Shobhane, P., Maheshwari, S., Pinjarkar, L., & Gangarde, R. (2024). Social Media in the Digital Age: A Comprehensive Review of Impacts, Challenges and Cybercrime. Engineering Proceedings, 62(1), 6.
Knobloch, K., Yoon, U., & Vogt, P. M. (2011). Preferred reporting items for systematic reviews and meta-analyses (PRISMA) statement and publication bias. Journal of Cranio-Maxillofacial Surgery, 39(2), 91–92.
Koutsos, T. M., Menexes, G. C., & Dordas, C. A. (2019). An efficient framework for conducting systematic literature reviews in agricultural sciences. Science of the Total Environment, 682, 106–117.
Laczi, S. A., & Póser, V. (2024). Navigating Children’s Cybersecurity Landscape: Understanding the impact of cyberbullying, online harrasment and identity theft on children. 2024 IEEE 18th International Symposium on Applied Computational Intelligence and Informatics (SACI), 1–6.
Livingston, J. D., Milne, T., Fang, M. L., & Amari, E. (2012). The effectiveness of interventions for reducing stigma related to substance use disorders: a systematic review. Addiction, 107(1), 39–50.
Long, H. A., French, D. P., & Brooks, J. M. (2020). Optimising the value of the critical appraisal skills programme (CASP) tool for quality appraisal in qualitative evidence synthesis. Research Methods in Medicine & Health Sciences, 1(1), 31–42.
Majid, U., & Vanstone, M. (2018). Appraising qualitative research for evidence syntheses: a compendium of quality appraisal tools. Qualitative Health Research, 28(13), 2115–2131.
McFadden, M. L. (2021). Cybersecurity Experiential Leadership Learning. Northeastern University.
Megele, C. (2017). Safeguarding children and young people online: A guide for practitioners. Policy Press.
Mishra, A., Gupta, B. B., & Gupta, D. (2018). Identity Theft, Malware, and Social Engineering in Dealing with Cybercrime. In Computer and Cyber Security (pp. 627–648). Auerbach Publications.
Montgomery, K. C., & Chester, J. (2009). Interactive food and beverage marketing: targeting adolescents in the digital age. Journal of Adolescent Health, 45(3), S18–S29.
Okpokwasili, O. A., & Onwuatuegwu, I. N. (2023). Online Predators: Protecting Teenagers from Internet Sexual Exploitation. International Journal of Modern Science and Research Technology, 1(23), 324–334.
Organization, W. H. (2020). Youth-centered digital health interventions: a framework for planning, developing and implementing solutions with and for young people. World Health Organization.
Ortiz, E. (2017). Developing an Insider Threat Experimental Environment.
Owusu, S. (2023). Bridging the Cybersecurity Workforce Skill Gap With Experiential Learning: The Role of Cybersecurity Clinics. Marymount University.
Panic, N., Leoncini, E., de Belvis, G., Ricciardi, W., & Boccia, S. (2013). Evaluation of the endorsement of the preferred reporting items for systematic reviews and meta-analysis (PRISMA) statement on the quality of published systematic review and meta-analyses. PloS One, 8(12), e83138.
Pham, M. T., Rajić, A., Greig, J. D., Sargeant, J. M., Papadopoulos, A., & McEwen, S. A. (2014). A scoping review of scoping reviews: advancing the approach and enhancing the consistency. Research Synthesis Methods, 5(4), 371–385.
Reid Chassiakos, Y. L., Radesky, J., Christakis, D., Moreno, M. A., Cross, C., Hill, D., Ameenuddin, N., Hutchinson, J., Levine, A., & Boyd, R. (2016). Children and adolescents and digital media. Pediatrics, 138(5).
Saharan, V. A., Kulhari, H., Jadhav, H., Pooja, D., Banerjee, S., & Singh, A. (2020). Introduction to research methodology. In Principles of Research Methodology and Ethics in Pharmaceutical Sciences (pp. 1–46). CRC Press.
Samala, A. D., Rawas, S., Criollo-C, S., Fortuna, A., Feng, X., Prasetya, F., Uluçay, N. Ö., Jaya, P., & Hidayat, R. (2024). Social Media in Education: Trends, Roles, Challenges, and Opportunities for Digital-Native Generations–A Systematic Literature Review. Asian Journal of University Education, 20(3), 524–539.
Sithira, V., & Nguwi, Y.-Y. (2014). A study on the adolescent online security issues. International Journal of Multidisciplinary and Current Research, 2, 596–601.
Sovacool, B. K., Axsen, J., & Sorrell, S. (2018). Promoting novelty, rigor, and style in energy social science: Towards codes of practice for appropriate methods and research design. Energy Research & Social Science, 45, 12–42.
Srivastava, A. K. (2024). Critical Analysis of Cybersecurity Awareness Programs in School Education. Library Progress International, 44(3), 18282–18303.
Tsirtsis, A., Tsapatsoulis, N., Stamatelatos, M., Papadamou, K., & Sirivianos, M. (2016). Cyber security risks for minors: A taxonomy and a software architecture. 2016 11th International Workshop on Semantic and Social Media Adaptation and Personalization (SMAP), 93–99.
Watkins, S. C. (2009). The young and the digital: What the migration to social-network sites, games, and anytime, anywhere media means for our future. Beacon Press.
West, D. M. (2012). Digital schools: How technology can transform education. Brookings Institution Press.
Willard, N. E. (2007). Cyberbullying and cyberthreats: Responding to the challenge of online social aggression, threats, and distress. Research press.
Zhang-Kennedy, L., & Chiasson, S. (2021). A systematic review of multimedia tools for cybersecurity awareness and education. ACM Computing Surveys (CSUR), 54(1), 1–39.
Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82–97.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Fristi Riandari, Virdyra Tasril, Rama Prameswara Ritonga

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

