Cyber Security Awareness on Social Media: Knowledge Sharing Among Orang Asli Students
DOI:
https://doi.org/10.24191/jcrinn.v10i1.495Keywords:
cybersecurity, cybersecurity awareness, privacy, social media, Orang Asli, Peer-to-peer, P2PAbstract
Cybersecurity is becoming more vital as we rely on digital devices and technology to navigate our everyday lives. When access to cyberspace is unrestricted to all levels of age, children use the internet daily for purposes like playing online games, using social media, or even doing their schoolwork. These circumstances have created an environment that makes them vulnerable to cybercrime threats. Therefore, the need to create awareness and training on cybersecurity is vital. However, our awareness program on safety protocol, and information privacy settings in WhatsApp, TikTok, and Instagram was aimed at Orang Asli students because they reside in rural regions with increasing access to digital technologies. Thus, targeted cybersecurity education can help them bridge the knowledge gap and protect them from online risks. The methodology consists of four phases: Phase 1: MCMC as the governmental body runs awareness campaigns, Phase 2 & 3: secondary students from SMK Bekok undergo expert-led training and workshops from lecturers, and Phase 4: create a sustainable educational cycle, wherein secondary students transmit their knowledge to primary students. In each phase, sets of questionnaires with pre and post-tests were distributed to assess the program’s impact. The results showed the program has successfully achieved its objectives of enhancing cybersecurity awareness among Orang Asli students. Knowledge transfer by applying a peer-to-peer approach gained better comprehension, higher engagement, and more effective learning outcomes. In addition, cultivates a collaborative learning atmosphere that advantages both students, simultaneously enriching the educational experience and fostering community engagement within the school
Downloads
References
Aphane, M. P. (2023). Cybersecurity awareness on cybercrime among the youth in Gauteng Province. International Journal of Social Science Research and Review, 6(8), 23-32.
Agarkar, A., & Agrawal, H. (2019). A review and vision on authentication and privacy preservation schemes in smart grid network. Security and Privacy, 2(2), e62. https://doi.org/10.1002/spy2.62
Alotaibi, G. (2024). A cybersecurity awareness model for the protection of saudi students from social media attacks. Engineering, Technology & Applied Science Research, 14(2), 13787-13795. https://doi.org/10.48084/etasr.7123
Ayyash, M., Alsboui, T., Alshaikh, O., Inuwa-Dute, I., Khan, S., & Parkinson, S. (2024). Cybersecurity education and awareness among parents and teachers: A survey of Bahrain. IEEE Access, 12, 86596-86617. https://doi.org/10.1109/ACCESS.2024.3416045
Albulayhi, M. S., & El Khediri, S. (2022). A comprehensive study on privacy and security on social media. International Journal of Interactive Mobile Technologies, 16(1), 1-18.
Awang, A (2014). Guru wanita rugi RM135,150 angkara phone scam. https://www.bharian.com.my/berita/kes/2024/07/1273869/guru-wanita-rugi-rm135150-angkara-phone-scam
Boulton, M. J., Boulton, L., Camerone, E., Down, J., Hughes, J., Kirkbride, C., ... & Sanders, J. (2016). Enhancing primary school children's knowledge of online safety and risks with the CATZ Cooperative Cross-Age Teaching Intervention: Results from a pilot study. Cyberpsychology, Behavior, and Social Networking, 19(10), 609-614. https://doi.org/10.1089/cyber.2016.004
Bernama. Negeri Sembilan orang asli advocacy and outreach programme wins WSIS 2024 Award. https://www.bernama.com/en/news.php?id=2289356. 2019.
Ciso, (2024) JIL Information Technology. Cybersecurity Awareness Hand Book,chromeextension://efaidnbmnnnibpcajpcglclefindmkaj/https://www.jiit.ac.in/sites/default/files/Cyber%20Security%20Awareness%20Hand%20Book.pdf.
Décieux, J. P., Heinen, A., & Willems, H. (2019). Social media and its role in friendship-driven interactions among young people: A mixed methods study. Young, 27(1), 18-31. https://doi.org/10.1177/1103308818755516
Florackis, C., Louca, C., Michaely, R., & Weber, M. (2023). Cybersecurity risk. The Review of Financial Studies, 36(1), 351-407. https://doi.org/10.1093/rfs/hhac024
Ganesin, A., Supayah, L., & Ibrahim, J. (2016). An overview of cyber security in Malaysia. Arabian Journal of Business and Management Review (Kuwait Chapter), 6(4), 12-20. https://j.arabianjbmr.com/index.php/kcajbmr/article/view/956
Goodyear, V. A., & Armour, K. M. (2019). Young people, social media and health (p. 232). Taylor & Francis.
Huey, L., & Ferguson, L. (2022). Another digital divide: Cybersecurity in Indigenous communities. CrimRxiv.
Jalil, M., Ali, N. H., Yunus, F., Zaki, F. A. M., Hsiung, L. H., & Almaayah, M. A. (2024). Cybersecurity awareness among secondary school students Post Covid-19 pandemic. Journal of Advanced Research in Applied Sciences and Engineering Technology, 37(1), 115-127.
Jian, N. J., & Kamsin, I. F. B. (2021, September). Cybersecurity awareness among the youngs in Malaysia by gamification. In 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021) (pp. 487-494). Atlantis Press. https://doi.org/10.2991/ahis.k.210913.061
Johnson, S., & Madnick, S. (2021). Government's role in shaping cybersecurity education: Policies and frameworks for national security. Cybersecurity Journal, 15(2), 78-92.
Johnson, D. W., & Johnson, R. T. (2020). Cooperation and competition: Theory and research. Interaction Book Company.
Kamsin, I. F., Khalid, F., Salleh, N. S. M., Hamdan, A., & Manaf, S. Z. A. (2021). The impact of orang asli students’ learning styles on their achievement of meaningful learning. International Journal of Engineering and Advanced Technology, 9(6), 285-292.
Nithya, S., & Rekha, B. (2023). Insights on data security schemes and authentication adopted in safeguarding social network. International Journal of Advanced Computer Science and Applications, 14(4), 474-483. https://www.proquest.com/openview/d7fd995deffc169ff9f9298ef89c0cb9/1?pq-origsite=gscholar&cbl=5444811
Noraida Harun & Noor Ashikin Hamid (2010). Akta Orang Asli 1954 (Akta 134): Sejauh mana melindungi hak orang asli: Satu kajian perbandingan. https://www.unisza.edu.my/perpustakaan/images/IDC/orang%20asli.pdf
Molok, N. N. A., Sapee, N., & Othman, A. A. (2023). Smart Ctzen: A digital storytelling app to empower youth’s awareness in cyber safety and security. Journal of Information Systems and Digital Technologies, 5(2), 108-120. https://doi.org/10.31436/jisdt.v5i2.436
Ooi, P. H. Y. (2007). ICT and the Orang Asli in Malaysia. In L. E., Dyson (Ed.), Information technology and indigenous people (pp. 55-57). IGI Global. https://doi.org/10.4018/978-1-59904-298-5.ch006
Pawar, S., & Palivela, H. (2022). LCCI: A framework for least cybersecurity controls to be implemented for small and medium enterprises (SMEs). International Journal of Information Management Data Insights, 2(1), 100080. https://doi.org/10.1016/j.jjimei.2022.100080
Sağlam, R. B., Miller, V., & Franqueira, V. N. (2023). A systematic literature review on cyber security education for children. IEEE Transactions on Education, 66(3), 274-286. https://doi.org/10.1109/TE.2022.3231019
Smith, J.J., (2023). Educators' perspectives on cybersecurity educational resources [Doctoral dissertation, Carleton University].
Smith, J., & Brown, L. (2020). The impact of expert-led cybersecurity education on student readiness. Journal of Information Security, 12(3), 45-60.
Smith, J., & Lee, K. (2021). Establishing effective academic progression criteria: A study on selection thresholds for intervention programs. Journal of Educational Assessment, 45(2), 123-137. https://doi.org/10.1016/j.jedut.2020.12.003
Shaw, J. M., Mitchell, C. A., Welch, A. J., & Williamson, M. J. (2015). Social media used as a health intervention in adolescent health: A systematic review of the literature. Digital Health, 1, 2055207615588395. https://doi.org/10.1177/20552076155883
Tashakkori, A., & Teddlie, C. (2021). Mixed Methodology: Combining Qualitative and Quantitative Approaches (3rd ed.). Sage.
Tahir (2019) Guru Orang Asli rugi ditipu scammer. https://www.sinarharian.com.my/article/47234/edisi/pahang/guru-orang-asli-rugi-ditipu-scammer
Wang, V., & Edwards, S. (2016). Strangers are friends I haven't met yet: a positive approach to young people's use of social media. Journal of Youth Studies, 19(9), 1204-1219. https://doi.org/10.1080/13676261.2016.1154933
Webb, B., Looi, J. C., Allison, S., Bidargaddi, N., & Bastiampillai, T. (2022). Point of view: Could social media use be contributing to rising rates of deliberate self-harm and suicide in Australian youth populations?. Australasian psychiatry, 30(6), 694-697. https://doi.org/10.1177/10398562221100093
Yeboah, A.D. and Gyebi, E.B., (2024). Comparison between gamification and instructor-led as user methods for effective cyber security awareness delivery. International Journal of Information Technology and Language Studies, 8(1).
Zulkifli, N., Ahmad, S.R., Yusoff, W.Y.W., Ahmad, A. and Amran, M.F.M., 2023. MCMC (DFRMS-MCMC). APS, p.371.