Study on Cyber Safety Awareness among Malaysian Primary Students A Case Study: QR Code Game in SK Bangi

Authors

  • Nor Azlina Abd Rahman sia Pacific University of Technology & Innovation, Technology Park Malaysia, Bukit Jalil, Kuala Lumpur, Malaysia Author
  • Zety Marlia Zainal Abidin Asia Pacific University of Technology & Innovation, Technology Park Malaysia, Bukit Jalil, Kuala Lumpur, Malaysia Author

DOI:

https://doi.org/10.61841/bg5r7630

Keywords:

Cyber Safety Awareness, Primary School Students, Cyber Security Education.

Abstract

 This paper explore the coverage and exposure towards the cyber safety awareness among primary school student in Malaysia and later present a study on the practical approach in infusing the cyber safety awareness through multiple platform in increasing the level of understanding of the student about the matter. QR code technology was used as a platform to engage with the students and develop interesting learning environment where the students will involve in activities rather than just sitting and listening to the lecture or talk. Mix method was used and the sample consisted of 5 teachers and 50 children aged 10-11 years old in a primary school. As data collection tools, an observation and interview form were used. The qualitative methodology are used in observing the primary student exposures towards the knowledge on regards of the security risks and threat and the understanding on how the student react and overcome those issues. The findings and recommendation from this study are fundamental in enhancing the approach in delivering the cyber safety awareness to the student apart from only using the school as the medium 

Downloads

Download data is not yet available.

References

[1] Tekerek, Mehmet & Tekerek, Adem. (2015). A Research on Students’ Information Security Awareness.

Turkish Journal of Education. 2. 10.19128/turje.181065.

[2] Saieed, Z., 2017. The Star. Retrived February 28, 2019 from https://www.thestar.com.my/

business/business-news/2017/05/20/rates-of-cyber-crime-higher-now/

[3] Wau Animation, (2013). Ejen Ali animation series. Retrieved June 16, 2019 from

http://www.wau.my/main/

[4] Kim Kiduk, (2016). The Net. Retrieved June 16, 2019 from https://www.imdb.com/title/tt0113957/[5] James Ponsoldt, (2017). The Circle. Retrieved from June 16, 2019 from https://www.imdb.com/

title/tt4287320/

[6] Tarter, A., 2017. Importance of Cyber Security. Retrieved March 2019 from https://link.springer.com/

chapter/10.1007/978-3-319-53396-4_15.

[7] Cone, B.D., 2007. A video game for cyber security training and awareness. Retrieved February 5, 2019

fromhttps:ieeexplore.ieee.org/document/7359553

[8] Giannakas, F., 2015. CyberAware: A mobile game-based app for cybersecurity education and awareness.

Retrieved February, 2019 from https://ieeexplore.ieee.org/document/7359553/

[9] Maimum, Siti, and Mohammed (2009). Teaching and Learning Process with Integration of ICT A Study on

Smart Schools of Malaysia. Wseas Transactions on Information Science and Applications. 6 (8). pp. 1380-

1390. Retrieved April 16, 2019 from https://www.researchgate.net/publication/ 234830936_

Teaching_and_learning_process_with_intergration_of_ICT_a_study_on_smart_schools_of_Malaysia.

[10] Internet Safety (for Parents) - KidsHealth. 2019. Internet Safety (for Parents) - KidsHealth. Retrieved April

16, 2019 from https://kidshealth.org/en/parents/net-safety.html

[11] Grey, A., 2011. Cybersafety in early childhood education. Australasian Journal of Early Childhood, 36(2),

pp.77-81.

[12] Butler, K., 2010. Cybersafety in the Classroom. District Administration, 46(6), p.53.

[13] Smith, L.J., Gradisar, M. and King, D.L., 2015. Parental influences on adolescent video game play: a study

of accessibility, rules, limit setting, monitoring, and cybersafety. Cyberpsychology, Behavior, and Social

Networking, 18(5), pp.273-279.

[14] Kementerian Pendididkan Malaysia (2017), Teknologi Maklumat dan Komunikasi Tahun 6, Dewan Bahasa

dan Pustaka

[15] Kementerian Pendididkan Malaysia (2017), Teknologi Maklumat dan Komunikasi Tahun 4, Dewan Bahasa

dan Pustaka. ISBN: 9789834613044

[16] P. Mary Jeyanthi, Santosh Shrivastava Kumar “The Determinant Parameters of Knowledge Transfer among

Academicians in Colleges of Chennai Region”, Theoretical Economics Letters, 2019, 9, 752-760, ISSN

Online: 2162-2086, DOI: 10.4236/tel.2019.94049, which is in B category of ABDC

List. https://www.scirp.org/journal/Home.aspx?IssueID=12251

[17] P. Mary Jeyanthi, “An Empirical Study of Fraudulent and Bankruptcy in Indian Banking Sectors”, The

Empirical Economics Letters, Vol.18; No. 3, March 2019, ISSN: 1681-8997, which is in C category of

ABDC List. http://www.eel.my100megs.com/volume-18-number-3.htm

[18] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Hybrid Metaheuristic techniques”, International

Journal of Business Intelligence Research, - Volume 5, Issue 1, April-2014.

URL: https://dl.acm.org/citation.cfm?id=2628938; DOI: 10.4018/ijbir.2014010105, which is in C category

of ABDC List.

[19] P. Mary Jeyanthi, “INDUSTRY 4.O: The combination of the Internet of Things (IoT) and the Internet of

People (IoP)”, Journal of Contemporary Research in Management, Vol.13; No. 4 Oct-Dec, 2018, ISSN:

0973-9785.

[20] P. Mary Jeyanthi, "The transformation of Social media information systems leads to Global business: An

Empirical Survey", International Journal of Technology and Science (IJTS), issue 3, volume 5, ISSN

Online: 2350-1111 (Online). URL: http://www.i3cpublications.org/M-IJTS-061801.pdf

[21] P. Mary Jeyanthi,” An Empirical Study of Fraud Control Techniques using Business Intelligence in

Financial Institutions”, Vivekananda Journal of Research Vol. 7, Special Issue 1, May 2018, ISSN 2319-

8702(Print), ISSN 2456-7574(Online). URL: http://vips.edu/wp-content/uploads/2016/09/Special-IssueVJR-conference-2018.pdf Page no: 159-164.

[22] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Artificial bear Optimization

Approach”, International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-

2013. URL: https://www.ijser.org/onlineResearchPaperViewer.aspx?Business-Intelligence-Artificial-BearOptimization-Ap-proach.pdf

[23] 8. Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Optimization techniques for Decision

Making”, International Journal of Engineering Research and Technology, Volume 2, Issue 8, August-

2013. URL: https://www.ijert.org/browse/volume-2-2013/august-2013-edition?start=140

[24] Mary Jeyanthi, S and Karnan, M.: “A New Implementation of Mathematical Models with metaheuristic

Algorithms for Business Intelligence”, International Journal of Advanced Research in Computer and

Communication Engineering, Volume 3, Issue 3, March-2014. URL: https://ijarcce.com/wpcontent/uploads/2012/03/IJARCCE7F-a-mary-prem-A-NEW-IMPLEMENTATION.pdf

[25] Dr. Mary Jeyanthi: “Partial Image Retrieval Systems in Luminance and Color Invariants: An Empirical

Study”, International Journal of Web Technology (ISSN: 2278-2389) – Volume-4, Issue-2.

URL: http://www.hindex.org/2015/p1258.pdf

[26] Dr. Mary Jeyanthi: “CipherText Policy attribute-based Encryption for Patients Health Information in Cloud

Platform”, Journal of Information Science and Engineering (ISSN: 1016-2364)

[27] Mary Jeyanthi, P, Adarsh Sharma, Purva Verma: “Sustainability of the business and employment

generation in the field of UPVC widows” (ICSMS2019).

[28] Mary Jeyanthi, P: “An Empirical Survey of Sustainability in Social Media and Information Systems across

emerging countries”, International Conference on Sustainability Management and Strategy”

(ICSMS2018).

[29] Mary Jeyanthi, P: “Agile Analytics in Business Decision Making: An Empirical Study”, International

Conference on Business Management and Information Systems” (ICBMIS2015).

[30] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence – soft computing Techniques”, International

Conference on Mathematics in Engineering & Business Management (ICMEB 2012).

[31] Mary Jeyanthi, S and Karnan, M.: “A Comparative Study of Genetic algorithm and Artificial Bear

Optimization algorithm in Business Intelligence”, International Conference on Mathematics in Engineering

& Business Management (ICMEB 2012).

[32] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Optimization for Decision

Making”, 2011 IEEE International Conference on Computational Intelligence and Computing Research

(2011 IEEE ICCIC).

[33] Mary Jeyanthi, S and Karnan, M.: “Business Intelligence: Data Mining and Decision making to overcome

the Financial Risk”, 2011 IEEE International Conference on Computational Intelligence and Computing

Research (2011 IEEE ICCIC).

[34] Dr. Mary Jeyanthi, S: “Pervasive Computing in Business Intelligence”, State level seminar on Computing

and Communication Technologies. (SCCT-2015)

[35] Dr.P.Mary Jeyanthi, “Artificial Bear Optimization (ABO) – A new approach of Metaheuristic algorithm for

Business Intelligence”, ISBN no: 978-93-87862-65-4, Bonfring Publication. Issue Date: 01-Apr-2019

[36] Dr.P. Mary Jeyanthi, “Customer Value Management (CVM) – Thinking Inside the box” – ISBN: 978-93-

87862-94-4, Bonfring Publication, Issue Date: 16-Oct-2019.

[37] Jeyanthi, P.M., & Shrivastava, S.K. (2019). The Determinant Parameters of Knowledge Transfer among

Academicians in Colleges of Chennai Region. Theoretical Economics Letters, 9(4), 752-760.

Downloads

Published

31.10.2019

How to Cite

Abd Rahman, N. A., & Zainal Abidin, Z. M. (2019). Study on Cyber Safety Awareness among Malaysian Primary Students A Case Study: QR Code Game in SK Bangi. International Journal of Psychosocial Rehabilitation, 23(4), 1343-1354. https://doi.org/10.61841/bg5r7630