Cyber Safety Awareness Among School Children: A Dissertation Research
VerifiedAdded on 2023/04/21
|64
|15843
|335
Thesis and Dissertation
AI Summary
This dissertation explores cyber safety awareness among school children, emphasizing the importance of internet safety education in the digital age. It addresses the increasing use of online tools by children and their vulnerability to cyber threats such as cyberbullying, phishing, and inappropriate content. The research identifies the need for effective cyber safety awareness programs in schools to equip children with the knowledge and skills to navigate the internet safely. The study includes a literature review, research methodology, data analysis from surveys conducted with school children, and recommendations for improving cyber safety education. It also acknowledges the limitations of the research and suggests future scope for further studies in this field, highlighting the critical role of community engagement in fostering a safer online environment for young learners. This assignment is available on Desklib, where students can find similar resources.

Running head: CYBER SAFETY AWARENESS AMONG SCHOOL CHILDREN
HRCOS82
2018
Assignment 02
Assignment unique code 612672
Student number: 46112340
Last name & Initials Uzamukunda MT
HRCOS82
2018
Assignment 02
Assignment unique code 612672
Student number: 46112340
Last name & Initials Uzamukunda MT
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1CYBER SAFETY AWARENESS AMONG SCHOOL CHILDREN
CYBER SAFETY AWARENESS AMONG SCHOOL CHILDREN
By
Marie Therese Uzamukunda
UNIVERSITY OF SOUTH AFRICA
by
A Research Dissertation submitted to the Faculty of Please enterSchool of
……..,University of South Africa, in partial fulfilment of the requirements for the
degree of …Bsc Honours Please enter …..in ……Computer Science
Johannesburg, 2019
CYBER SAFETY AWARENESS AMONG SCHOOL CHILDREN
By
Marie Therese Uzamukunda
UNIVERSITY OF SOUTH AFRICA
by
A Research Dissertation submitted to the Faculty of Please enterSchool of
……..,University of South Africa, in partial fulfilment of the requirements for the
degree of …Bsc Honours Please enter …..in ……Computer Science
Johannesburg, 2019

2CYBER SAFETY AWARENESS AMONG SCHOOL CHILDREN
Abstract
Internet plays a key role in daily lives of the children as it is one of the most important
medium of learning and communication. Among the children, internet is invaluable sources
to provide knowledge, skills along with encourage creativity among them. The growing
public concern regarding security of data, along with t dramatic increase in security attacks, is
creating a global debate on cyber security. Threats to cyber security remain unlimited. While
security solutions from security software to data protection are improving, attacks are
becoming more sophisticated; attackers are more sophisticated and more capable of attacking.
We hear about cyber-attacks, online frauds, phishing and ransomware in media every day. In
this world of digital information, it is vital for each of us to have a certain understanding of
cyber security and to know how to protect against online security threats. Regrettably, cyber
risks are encountered when using internet. The cyber risks can range from inappropriate
content, chat room “friends”, cyber bullying to sexting, online scams or identity theft.
Children may not have the required expertise or ability to handle those risks. How to make
sure children enjoy safer online involvement and how to protect them from online risks?
The cyber safety awareness program is implemented for the children so that it helps to aware
them of cyber threats. This program helps in teaching children how to use computer safely.
Keywords:Children, cyber risks, cyber awareness, cyber education
Abstract
Internet plays a key role in daily lives of the children as it is one of the most important
medium of learning and communication. Among the children, internet is invaluable sources
to provide knowledge, skills along with encourage creativity among them. The growing
public concern regarding security of data, along with t dramatic increase in security attacks, is
creating a global debate on cyber security. Threats to cyber security remain unlimited. While
security solutions from security software to data protection are improving, attacks are
becoming more sophisticated; attackers are more sophisticated and more capable of attacking.
We hear about cyber-attacks, online frauds, phishing and ransomware in media every day. In
this world of digital information, it is vital for each of us to have a certain understanding of
cyber security and to know how to protect against online security threats. Regrettably, cyber
risks are encountered when using internet. The cyber risks can range from inappropriate
content, chat room “friends”, cyber bullying to sexting, online scams or identity theft.
Children may not have the required expertise or ability to handle those risks. How to make
sure children enjoy safer online involvement and how to protect them from online risks?
The cyber safety awareness program is implemented for the children so that it helps to aware
them of cyber threats. This program helps in teaching children how to use computer safely.
Keywords:Children, cyber risks, cyber awareness, cyber education
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3CYBER SAFETY AWARENESS AMONG SCHOOL CHILDREN
Acknowledgement
I want to acknowledge the assistance of all the people who helped me complete this research
successfully. I would wish to show my gratitude towards my supervisor who has helped me
extensively in this study and without whose support I would not have been able to finish this
research. I would also like thank all the participants of the survey and the managers of Miss
Millie’s Fried Chicken, who have sportingly participated and cooperated with me in my
investigation. Without their support and response, this study would not have been possible.
Lastly, I would also express my gratitude to my friends and classmates who have assisted me
during my research.
Thanking you all.
Acknowledgement
I want to acknowledge the assistance of all the people who helped me complete this research
successfully. I would wish to show my gratitude towards my supervisor who has helped me
extensively in this study and without whose support I would not have been able to finish this
research. I would also like thank all the participants of the survey and the managers of Miss
Millie’s Fried Chicken, who have sportingly participated and cooperated with me in my
investigation. Without their support and response, this study would not have been possible.
Lastly, I would also express my gratitude to my friends and classmates who have assisted me
during my research.
Thanking you all.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4CYBER SAFETY AWARENESS AMONG SCHOOL CHILDREN
Table of Contents
Chapter 1: Introduction..............................................................................................................7
1.1 Introduction and background.......................................................................................7
1.2 Problem statement.......................................................................................................8
1.3 Main research question................................................................................................8
1.3.1 Sub research questions..............................................................................................8
1.4 The current cyber-security issues identified among school children...............................9
1.5 Identified community.......................................................................................................9
1.6 What is community engagement?....................................................................................9
1.7 Improvement of cyber awareness for children...............................................................10
1.8 Programs to be used for cyber safety awareness............................................................10
1.9 Structure of dissertation.................................................................................................11
1.10 Conclusion....................................................................................................................12
Chapter 2: Literature Review...................................................................................................13
2.1 Introduction....................................................................................................................13
2.2 Understanding Cyber Security.......................................................................................13
2.2.1 Disadvantages of cyber security..............................................................................13
2.3 Risks for Children using internet...................................................................................14
2.3.1 Content Risks..........................................................................................................15
2.3.2 Contact Risks..........................................................................................................15
2.3.3 Conduct Risks.........................................................................................................16
2.3.4 Security risks...........................................................................................................17
2.4 Information Security Awareness....................................................................................21
2.5 Security Awareness among school Children..................................................................21
2.5.1 Cyber Countermeasures..........................................................................................22
2.6 Literature gap.................................................................................................................23
Chapter 3: Research Methodology...........................................................................................24
Table of Contents
Chapter 1: Introduction..............................................................................................................7
1.1 Introduction and background.......................................................................................7
1.2 Problem statement.......................................................................................................8
1.3 Main research question................................................................................................8
1.3.1 Sub research questions..............................................................................................8
1.4 The current cyber-security issues identified among school children...............................9
1.5 Identified community.......................................................................................................9
1.6 What is community engagement?....................................................................................9
1.7 Improvement of cyber awareness for children...............................................................10
1.8 Programs to be used for cyber safety awareness............................................................10
1.9 Structure of dissertation.................................................................................................11
1.10 Conclusion....................................................................................................................12
Chapter 2: Literature Review...................................................................................................13
2.1 Introduction....................................................................................................................13
2.2 Understanding Cyber Security.......................................................................................13
2.2.1 Disadvantages of cyber security..............................................................................13
2.3 Risks for Children using internet...................................................................................14
2.3.1 Content Risks..........................................................................................................15
2.3.2 Contact Risks..........................................................................................................15
2.3.3 Conduct Risks.........................................................................................................16
2.3.4 Security risks...........................................................................................................17
2.4 Information Security Awareness....................................................................................21
2.5 Security Awareness among school Children..................................................................21
2.5.1 Cyber Countermeasures..........................................................................................22
2.6 Literature gap.................................................................................................................23
Chapter 3: Research Methodology...........................................................................................24

5CYBER SAFETY AWARENESS AMONG SCHOOL CHILDREN
3.1 Introduction....................................................................................................................24
3.2 Research outline.............................................................................................................24
3.3 Research Paradigm.........................................................................................................24
3.3.1 Research Philosophy...............................................................................................24
3.3.2 Research approach..................................................................................................25
3.3.3 Research Design......................................................................................................25
3.4 Sampling method...........................................................................................................26
3.5 Research Strategy...........................................................................................................26
3.5.1 Justification for selection of research strategy (Survey).........................................27
3.6 Data collection methods.................................................................................................27
3.6.1 Quantitative Data Collection Method.....................................................................27
3.7 Accessibility issues........................................................................................................27
3.8 Ethical consideration......................................................................................................28
3.9 Data analysis..................................................................................................................28
3.10 Time table.....................................................................................................................28
3.11 Summary......................................................................................................................29
Chapter 4: Data analysis and findings......................................................................................30
4.0 Introduction....................................................................................................................30
4.1 Quantitative Data Representation and Interpretations.................................................30
4.1.1 Conducting survey questionnaires for the responses of 25 school children.........31
4.2 Summary........................................................................................................................47
Chapter 5: Conclusion and Recommendations........................................................................48
5.1 Conclusion......................................................................................................................48
5.2 Linking Objectives with Findings..................................................................................48
5.3 Recommendations..........................................................................................................50
5.4 Limitations of the research.............................................................................................51
5.5 Future Scope of research................................................................................................52
3.1 Introduction....................................................................................................................24
3.2 Research outline.............................................................................................................24
3.3 Research Paradigm.........................................................................................................24
3.3.1 Research Philosophy...............................................................................................24
3.3.2 Research approach..................................................................................................25
3.3.3 Research Design......................................................................................................25
3.4 Sampling method...........................................................................................................26
3.5 Research Strategy...........................................................................................................26
3.5.1 Justification for selection of research strategy (Survey).........................................27
3.6 Data collection methods.................................................................................................27
3.6.1 Quantitative Data Collection Method.....................................................................27
3.7 Accessibility issues........................................................................................................27
3.8 Ethical consideration......................................................................................................28
3.9 Data analysis..................................................................................................................28
3.10 Time table.....................................................................................................................28
3.11 Summary......................................................................................................................29
Chapter 4: Data analysis and findings......................................................................................30
4.0 Introduction....................................................................................................................30
4.1 Quantitative Data Representation and Interpretations.................................................30
4.1.1 Conducting survey questionnaires for the responses of 25 school children.........31
4.2 Summary........................................................................................................................47
Chapter 5: Conclusion and Recommendations........................................................................48
5.1 Conclusion......................................................................................................................48
5.2 Linking Objectives with Findings..................................................................................48
5.3 Recommendations..........................................................................................................50
5.4 Limitations of the research.............................................................................................51
5.5 Future Scope of research................................................................................................52
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6CYBER SAFETY AWARENESS AMONG SCHOOL CHILDREN
References................................................................................................................................53
Appendix 1: Survey questionnaires.........................................................................................57
References................................................................................................................................53
Appendix 1: Survey questionnaires.........................................................................................57
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CYBER SAFETY AWARENESS AMONG SCHOOL CHILDREN
Chapter 1: Introduction
1.1 Introduction and background
Kokkinoset al.(2016) stated that there is time of advanced Information Communication
Technology (ICT), where every aspect of our daily life is associated with learning. In current
era, internet is used for creation of useful resources by which people can get required
information at our fingerprints. The development of technology has led to many amazing
discoveries, better devices and better luxury products, while radically altering our daily lives.
Various highly developed Internet-connected gadgets have altered the way people interact,
learn, effort, shop, and play besides perform (Bele et al. 2014). At the same time, the
development of technology, its interactivity and increasing communication opportunities
represent risk for all its users, especially children.
The internet is used by young children and parents and it is critical to involve the role
players in ICT as well as cyber safety awareness, mainly in the schools those provided access
to the ICT devices. ICT is used in the schools with increasing number of learners. ICT
devices are exposed to schools which are consisted of cell phones, tablets to the computer
laboratory.Higher skills levels mean that children have more and more confidence in the use
of the Internet, although they are not mature and have no broader awareness to be safe on
the internet (Chandarman and Van Niekerk, 2018). Due to lack of awareness of internet
usage, the children and teenagers are possibly in danger and are often unsure what to do
about unsuitable materials on the internet. Parents know that they have short of information,
abilities in addition to considerate of this innovative technology that is needed to converse
children how to continue harmless on the Internet. This shows that children have more skills
in using technology than their parents. Many parents experience discomfort with position
setback as well as have fears related to Internet use by children. The parents are feared of that
if their children are using the internet for any unethical purposes or they are sharing of any
confidential data in any website (Sharples et al. 2009).
Internet use exposes children to many different online threats such as cyber bullying,
sharing of private information, phishing, scams, downloading of malware and cyber
predators. There is lack of skills among children to manage the cyber threats. In order to
overcome with the cyber threats, there is controlling over access of children so that the hacker
cannot access to any confidential data (Creswell, 2009). Hence, to allow children to use
Chapter 1: Introduction
1.1 Introduction and background
Kokkinoset al.(2016) stated that there is time of advanced Information Communication
Technology (ICT), where every aspect of our daily life is associated with learning. In current
era, internet is used for creation of useful resources by which people can get required
information at our fingerprints. The development of technology has led to many amazing
discoveries, better devices and better luxury products, while radically altering our daily lives.
Various highly developed Internet-connected gadgets have altered the way people interact,
learn, effort, shop, and play besides perform (Bele et al. 2014). At the same time, the
development of technology, its interactivity and increasing communication opportunities
represent risk for all its users, especially children.
The internet is used by young children and parents and it is critical to involve the role
players in ICT as well as cyber safety awareness, mainly in the schools those provided access
to the ICT devices. ICT is used in the schools with increasing number of learners. ICT
devices are exposed to schools which are consisted of cell phones, tablets to the computer
laboratory.Higher skills levels mean that children have more and more confidence in the use
of the Internet, although they are not mature and have no broader awareness to be safe on
the internet (Chandarman and Van Niekerk, 2018). Due to lack of awareness of internet
usage, the children and teenagers are possibly in danger and are often unsure what to do
about unsuitable materials on the internet. Parents know that they have short of information,
abilities in addition to considerate of this innovative technology that is needed to converse
children how to continue harmless on the Internet. This shows that children have more skills
in using technology than their parents. Many parents experience discomfort with position
setback as well as have fears related to Internet use by children. The parents are feared of that
if their children are using the internet for any unethical purposes or they are sharing of any
confidential data in any website (Sharples et al. 2009).
Internet use exposes children to many different online threats such as cyber bullying,
sharing of private information, phishing, scams, downloading of malware and cyber
predators. There is lack of skills among children to manage the cyber threats. In order to
overcome with the cyber threats, there is controlling over access of children so that the hacker
cannot access to any confidential data (Creswell, 2009). Hence, to allow children to use

8CYBER SAFETY AWARENESS AMONG SCHOOL CHILDREN
opportunities offered by Internet and to protect them from cyber threats, it is necessary to
provide them with the knowledge and skills to stay safe on the Internet. Therefore, it is
required to aware the young school children about the security issues and their impact on
their daily lives. Therefore, it can be said that adequate learning and consciousness programs
will be more successful in raising awareness of cybersecurity for protection of children on
Internet. Therefore, it is important that suitable educational programs are introduced in
schools to allow children to develop harmless, smarter and more accountable Internet users.
1.2 Problem statement
In this present era of modern technology and trend, uses of online
tools and technology are increasing among school children. This is the most
vulnerable group of children that get targeted in socio-pathological incidents. As explained
by Livingstone et al. (2018, p.82), children in South Africa are gradually becoming
victimized of threats of social networks. Educational values and awareness are important in
this aspect. Therefore, the problem at present is to identify the role of awareness creation in
cyber safety among school children.
1.3 Main research question
The main research question for this research is:
What are the most suitable approaches and programs that could bring awareness among
school children about cyber safety in order to follow better practices related to internet, smart
phones and other cyber technologies?
1.3.1 Sub research questions
What is the current cyber safety awareness situation for children
at school in South Africa?
Which programs could be used to educate cyber safety for children
at school and home?
What are the methods used to create cyber safety awareness programs for young
children and parents?
What are the challenges in creating cyber safety awareness among
young learners?
opportunities offered by Internet and to protect them from cyber threats, it is necessary to
provide them with the knowledge and skills to stay safe on the Internet. Therefore, it is
required to aware the young school children about the security issues and their impact on
their daily lives. Therefore, it can be said that adequate learning and consciousness programs
will be more successful in raising awareness of cybersecurity for protection of children on
Internet. Therefore, it is important that suitable educational programs are introduced in
schools to allow children to develop harmless, smarter and more accountable Internet users.
1.2 Problem statement
In this present era of modern technology and trend, uses of online
tools and technology are increasing among school children. This is the most
vulnerable group of children that get targeted in socio-pathological incidents. As explained
by Livingstone et al. (2018, p.82), children in South Africa are gradually becoming
victimized of threats of social networks. Educational values and awareness are important in
this aspect. Therefore, the problem at present is to identify the role of awareness creation in
cyber safety among school children.
1.3 Main research question
The main research question for this research is:
What are the most suitable approaches and programs that could bring awareness among
school children about cyber safety in order to follow better practices related to internet, smart
phones and other cyber technologies?
1.3.1 Sub research questions
What is the current cyber safety awareness situation for children
at school in South Africa?
Which programs could be used to educate cyber safety for children
at school and home?
What are the methods used to create cyber safety awareness programs for young
children and parents?
What are the challenges in creating cyber safety awareness among
young learners?
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9CYBER SAFETY AWARENESS AMONG SCHOOL CHILDREN
1.4 The current cyber-security issues identified among school children
Use of ICT tools is integral part of new education system which has created a
vulnerable situation for school children in South Africa. As commented by Livingstone,
Mascheroni and Staksrud (2018, p.1103), mobile penetration in South Africa is 65.8% and
97.9% of young learners possess cell phones or have access to internet. It has been seen that
41.2% users spend more than 3 hours a day on internet and 60.1% of them have emerged in
cell phones (Khurana, Bleakley, Jordan and Romer, 2015, p.1039). In addition, 79% of
school children tell about monitored internet and cell phone usage. However, Livingstone et
al. (2017, p.85) argued that 63% of children are devoid of any parental guidance in issues
such as cybercrime and safety against this. However, school intervention programs have been
implemented to provide awareness of cyber safety processes. This research intends to help in
identifying probable challenges and developing awareness program schedules for
enlightenment of young children on this current issue. The issues can be tackled with the
support of reading promotions, seminars, posters, and brochure. These programs should
include practical guidelines for raising awareness in cyber security measures related to
mobile phone hacking, computer terrorism, and information warfare. The researcher had
identified some of cyber security issues in the research and obtained from different sitessuch
as keep the personal information safe, cyber bullying, hacking of password, online privacy,
social network, digital footprint, free downloads, phishing scams and cookies.Those cyber
threats are required to be considered before planning for the cyber safety programs.
1.5 Identified community
The identified community is the young learners of school going age of South Africa. As
explained by Naplavovaet al. (2014, p.3546), South Africa has 32.5% of students who are
victims of cyberbullying, 65% of students among them are targeted through Facebook. On
the other hand, 37% of students are victims at personal level and 42% are victimized by
anonymous individual. In this research program, the targeted community is the school
children who lack cyber awareness and fall victims.
1.6 What is community engagement?
Community engagement is referred to as the process of collaborative work and
decision-making. As explained by Kokkinos, Antoniadou, Asdre and Voulgaridou (2016,
p.439), community engagement can occur with geographical proximity with similar
1.4 The current cyber-security issues identified among school children
Use of ICT tools is integral part of new education system which has created a
vulnerable situation for school children in South Africa. As commented by Livingstone,
Mascheroni and Staksrud (2018, p.1103), mobile penetration in South Africa is 65.8% and
97.9% of young learners possess cell phones or have access to internet. It has been seen that
41.2% users spend more than 3 hours a day on internet and 60.1% of them have emerged in
cell phones (Khurana, Bleakley, Jordan and Romer, 2015, p.1039). In addition, 79% of
school children tell about monitored internet and cell phone usage. However, Livingstone et
al. (2017, p.85) argued that 63% of children are devoid of any parental guidance in issues
such as cybercrime and safety against this. However, school intervention programs have been
implemented to provide awareness of cyber safety processes. This research intends to help in
identifying probable challenges and developing awareness program schedules for
enlightenment of young children on this current issue. The issues can be tackled with the
support of reading promotions, seminars, posters, and brochure. These programs should
include practical guidelines for raising awareness in cyber security measures related to
mobile phone hacking, computer terrorism, and information warfare. The researcher had
identified some of cyber security issues in the research and obtained from different sitessuch
as keep the personal information safe, cyber bullying, hacking of password, online privacy,
social network, digital footprint, free downloads, phishing scams and cookies.Those cyber
threats are required to be considered before planning for the cyber safety programs.
1.5 Identified community
The identified community is the young learners of school going age of South Africa. As
explained by Naplavovaet al. (2014, p.3546), South Africa has 32.5% of students who are
victims of cyberbullying, 65% of students among them are targeted through Facebook. On
the other hand, 37% of students are victims at personal level and 42% are victimized by
anonymous individual. In this research program, the targeted community is the school
children who lack cyber awareness and fall victims.
1.6 What is community engagement?
Community engagement is referred to as the process of collaborative work and
decision-making. As explained by Kokkinos, Antoniadou, Asdre and Voulgaridou (2016,
p.439), community engagement can occur with geographical proximity with similar
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10CYBER SAFETY AWARENESS AMONG SCHOOL CHILDREN
situational interests. This helps in providing social activities that effective problem solving
and wellbeing. Community engages in present issue can help in creating awareness programs
for school goers. Opportunities for bringing change and development can be achieved
through the cooperation of community.
Proper ICT application and general awareness creation can be achieved through the
integration of community into research project. According to Maxwell (2008, p.246), cyber
community awareness community engagement helps in creating awareness and educating
young school students about risks involved in unguided use of cyber technology. Community
engagement helps in facilitating encouragement and educational programs to make them
aware of the use of computer skills and promote good security practices. This might help in
developing countermeasures to deal with this issue.
1.7 Improvement of cyber awareness for children
The proposed cyber security awareness program aims to educate young school goers
on basic computer security and safe and secure online usage (Kokkinos et al. 2016, p.441).
Furthermore, the proposed cyber security awareness program also aims to prepare children on
use of internet applications and new applications for cyberspace. The goal is to raise
awareness and understanding of the Internet's dangers in providing the knowledge needed to
make the right decisions in Internet-related situations. According to Hymelet al. (2015, p.16),
the proposed cyber security awareness program is not a PC literacy program but can be
enhanced and clear as a way of self-defence for users of Internet. Target audiences are
children that are computer users who have computing skills. The security awareness theory is
used by the researchers to understand expected outcomes related to selected research topic
(Stephanou, 2009).
1.8 Programs to be used for cyber safety awareness
Cyber safety awareness programs can be arranged in such a way that school students
get interested and motivated through the program. As stated by von Solms and von Solms
(2014, p.185), fun activities through the use of ICT can help in creating awareness in a
motivating way, such as security crossword puzzles, workshop in security awareness and
showing a movie to depict pros and cons of using cyber technology.
situational interests. This helps in providing social activities that effective problem solving
and wellbeing. Community engages in present issue can help in creating awareness programs
for school goers. Opportunities for bringing change and development can be achieved
through the cooperation of community.
Proper ICT application and general awareness creation can be achieved through the
integration of community into research project. According to Maxwell (2008, p.246), cyber
community awareness community engagement helps in creating awareness and educating
young school students about risks involved in unguided use of cyber technology. Community
engagement helps in facilitating encouragement and educational programs to make them
aware of the use of computer skills and promote good security practices. This might help in
developing countermeasures to deal with this issue.
1.7 Improvement of cyber awareness for children
The proposed cyber security awareness program aims to educate young school goers
on basic computer security and safe and secure online usage (Kokkinos et al. 2016, p.441).
Furthermore, the proposed cyber security awareness program also aims to prepare children on
use of internet applications and new applications for cyberspace. The goal is to raise
awareness and understanding of the Internet's dangers in providing the knowledge needed to
make the right decisions in Internet-related situations. According to Hymelet al. (2015, p.16),
the proposed cyber security awareness program is not a PC literacy program but can be
enhanced and clear as a way of self-defence for users of Internet. Target audiences are
children that are computer users who have computing skills. The security awareness theory is
used by the researchers to understand expected outcomes related to selected research topic
(Stephanou, 2009).
1.8 Programs to be used for cyber safety awareness
Cyber safety awareness programs can be arranged in such a way that school students
get interested and motivated through the program. As stated by von Solms and von Solms
(2014, p.185), fun activities through the use of ICT can help in creating awareness in a
motivating way, such as security crossword puzzles, workshop in security awareness and
showing a movie to depict pros and cons of using cyber technology.

11CYBER SAFETY AWARENESS AMONG SCHOOL CHILDREN
Security Crossword Puzzles: It is a security practice used where a clue with question
mark is provided. It means particular clue demands for second look. The clue is a play
of words used for the security purposes.
Security Awareness Day (workshop): A workshop is conducted to poses regarding
protection of physical and informational assets of the organization.
Promote reading: The parents and young children should read articles on
cybersecurity awareness.
Seminars: Seminars are conducted on weekly basis to aware people of the cyber
threats and their possible solutions.
Posters, banners and brochure: Those are used to design images in HD regarding the
cybersecurity.
These programs need to be planned previously with the collaboration of community and
practical guidance from experts in the field of cybercrime and security measures.
1.9 Structure of dissertation
Following are the structure of the dissertation which is consisted of chapters such as:
Chapter 1: Introduction of topic, research aim, questions and objectives: This
chapter provides a brief summary of the background related to selected research topic. It also
discusses about the aim of the study and questions based on which the entire research work is
carried out.
Chapter 2: Literature review: The literature study discusses about the cybersecurity
threats among the young children due to using of ICT devices in schools. The methods are
also discussed use to prevent from the cyber threats.
Chapter 3: Research methodology: The methods and procedures are discussed help
to collect information related to selected research topic. Primary data collection method is
used by use of survey method where questionnaire is selected to analyze the topic.
Chapter 4: Research findings and analysis: This part analyzes the data which are
collected from the responses of research participants. Each of the data is analyzed by
providing answers to each of survey questions.
Chapter 5: Conclusion and recommendations: The research outcome is provided in
this chapter with linking the research questions with the outcomes.
Security Crossword Puzzles: It is a security practice used where a clue with question
mark is provided. It means particular clue demands for second look. The clue is a play
of words used for the security purposes.
Security Awareness Day (workshop): A workshop is conducted to poses regarding
protection of physical and informational assets of the organization.
Promote reading: The parents and young children should read articles on
cybersecurity awareness.
Seminars: Seminars are conducted on weekly basis to aware people of the cyber
threats and their possible solutions.
Posters, banners and brochure: Those are used to design images in HD regarding the
cybersecurity.
These programs need to be planned previously with the collaboration of community and
practical guidance from experts in the field of cybercrime and security measures.
1.9 Structure of dissertation
Following are the structure of the dissertation which is consisted of chapters such as:
Chapter 1: Introduction of topic, research aim, questions and objectives: This
chapter provides a brief summary of the background related to selected research topic. It also
discusses about the aim of the study and questions based on which the entire research work is
carried out.
Chapter 2: Literature review: The literature study discusses about the cybersecurity
threats among the young children due to using of ICT devices in schools. The methods are
also discussed use to prevent from the cyber threats.
Chapter 3: Research methodology: The methods and procedures are discussed help
to collect information related to selected research topic. Primary data collection method is
used by use of survey method where questionnaire is selected to analyze the topic.
Chapter 4: Research findings and analysis: This part analyzes the data which are
collected from the responses of research participants. Each of the data is analyzed by
providing answers to each of survey questions.
Chapter 5: Conclusion and recommendations: The research outcome is provided in
this chapter with linking the research questions with the outcomes.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 64
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.