Security Education and Awareness for K-6 Going Mobile

Nowadays, due to widespread participation of elementary school children in cyberspace activities, basic cybersecurity education and awareness is deemed necessary. Within this context, knowledge acquisition in this timely and important field has greater chances to be more fruitful when the learner is properly motivated. Also, it is anticipated to be more joyful when knowledge is acquired in the form of a digital game-based activity. The paper at hand discusses the development of a novel mobile app called CyberAware, destined to cybersecurity education and awareness. At present, the game is designed for K-6 children in order to support either or both formal or informal learning. Additionally, due to its mobile characteristics, the game can be experienced as an outdoor or classroom activity. Finally, opposite to similar studies found in the literature so far, our attention is not solely drawn to game’s technological aspects but equally to the educational factor. This is achieved through the consideration and use of the ARCS motivational model already from the game’s design phase.

[1]  Markus Jakobsson,et al.  Using Cartoons to Teach Internet Security , 2008, Cryptologia.

[2]  Georgios Kambourakis,et al.  CyberAware: A mobile game-based app for cybersecurity education and awareness , 2015, 2015 International Conference on Interactive Mobile Communication Technologies and Learning (IMCL).

[3]  Jan O. Borchers A pattern approach to interaction design , 2001, DIS '00.

[4]  Lorrie Faith Cranor,et al.  Teaching Johnny not to fall for phish , 2010, TOIT.

[5]  Theodore J. Kopcha,et al.  Instructional Design Models , 2014 .

[6]  David S. Stein,et al.  Situated Learning in Adult Education. ERIC Digest No. 195. , 1998 .

[7]  Thomas W. Malone,et al.  Toward a Theory of Intrinsically Motivating Instruction , 1981, Cogn. Sci..

[8]  J. Keller Development and use of the ARCS model of instructional design , 1987 .

[9]  James O. Carey,et al.  The systematic design of instruction , 1978 .

[10]  Sharon E. Smaldino,et al.  Instructional Technology and Media for Learning , 2013 .

[11]  Charles B. Hodges Designing to Motivate: Motivational Techniques to Incorporate in E-Learning Experiences , 2004 .

[12]  Nalin Asanka Gamagedara Arachchilage,et al.  Design a mobile game for home computer users to prevent from “phishing attacks” , 2011, International Conference on Information Society (i-Society 2011).

[13]  Jon E. Roeckelein,et al.  Elsevier's Dictionary of Psychological Theories , 2006 .

[14]  Dorota Mularczyk,et al.  The Encyclopedia of Educational Technology , 1999, J. Educ. Technol. Soc..

[15]  Benjamin S. Bloom,et al.  A Taxonomy for Learning, Teaching, and Assessing: A Revision of Bloom's Taxonomy of Educational Objectives , 2000 .

[16]  Lorrie Faith Cranor,et al.  Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.