<doi_batch xmlns="http://www.crossref.org/schema/4.4.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" version="4.4.0"><head><doi_batch_id>3ef0ebb7-ee02-4e92-b101-cccf1e92f6e6</doi_batch_id><timestamp>20210309085513304</timestamp><depositor><depositor_name>naun</depositor_name><email_address>mdt@crossref.org</email_address></depositor><registrant>MDT Deposit</registrant></head><body><journal><journal_metadata language="en"><full_title>International Journal of Education and Information Technologies</full_title><issn media_type="electronic">2074-1316</issn><archive_locations><archive name="Portico"/></archive_locations><doi_data><doi>10.46300/9109</doi><resource>http://www.naun.org/cms.action?id=3037</resource></doi_data></journal_metadata><journal_issue><publication_date media_type="online"><month>4</month><day>30</day><year>2020</year></publication_date><publication_date media_type="print"><month>4</month><day>30</day><year>2020</year></publication_date><journal_volume><volume>14</volume><doi_data><doi>10.46300/9109.2020.14</doi><resource>http://www.naun.org/cms.action?id=23206</resource></doi_data></journal_volume></journal_issue><journal_article language="en"><titles><title>Movies as an Aid to Teach Principles of Cybersecurity and Cybercrime in Higher Education</title></titles><contributors><person_name sequence="first" contributor_role="author"><given_name>Antonios</given_name><surname>Andreatos</surname><affiliation>Dept. of Aeronautical SciencesDiv. of Computer Engineering &amp; Information ScienceHellenic Air Force AcademyDekeleia Air Force BaseDekeleia, Attica, 13671, Greece</affiliation></person_name></contributors><jats:abstract xmlns:jats="http://www.ncbi.nlm.nih.gov/JATS1"><jats:p>A pilot effort to raise students’awareness on the human factors of cybersecurityand cybercrime is presented. One day, instead oflectures, a commercial film was projected. Thestudents were able to identify most of the cyberattacksrelated to the technical backgroundgiven in the course, while they missed some of thefrauds committed by the actors, related to thepsycho-social and legal dimensions, which werenot covered in the syllabus. The students hadthe opportunity to acquire some insight aboutthe latter while enjoying the movie. The wholeexperiment was evaluated positively. Thus, it becameclear to the students that cybersecurity hasalso a psycho-social dimension which should notbe underestimated.</jats:p></jats:abstract><publication_date media_type="online"><month>9</month><day>24</day><year>2020</year></publication_date><publication_date media_type="print"><month>9</month><day>24</day><year>2020</year></publication_date><pages><first_page>76</first_page><last_page>82</last_page></pages><ai:program xmlns:ai="http://www.crossref.org/AccessIndicators.xsd" name="AccessIndicators"><ai:free_to_read start_date="2020-09-24"/><ai:license_ref applies_to="am" start_date="2020-09-24">https://www.naun.org/main/NAUN/educationinformation/2020/a202008-010(2020).pdf</ai:license_ref></ai:program><archive_locations><archive name="Portico"/></archive_locations><doi_data><doi>10.46300/9109.2020.14.10</doi><resource>https://www.naun.org/main/NAUN/educationinformation/2020/a202008-010(2020).pdf</resource></doi_data><citation_list><citation key="ref0"><unstructured_citation>Andreatos, A., “Designing educational scenarios to teach network security”, in Proc. of IEEE Educon2017, Athens, Greece.</unstructured_citation></citation><citation key="ref1"><doi>10.1145/322796.322806</doi><unstructured_citation>Adams, A. and Sasse, M. A., “Users are not the enemy:  Why users compromise computer security mechanisms and how to take remedial measures”,Communications of the ACM, Vol. 42, No. 12, 1999,pp. 40-46.</unstructured_citation></citation><citation key="ref2"><unstructured_citation>ENISA - European Union Agency For Network and Information Security, “Behavioural Sciences Re-search in the Field of Cybersecurity”. ISBN: 978-92-9204-267-7, DOI: 10.2824/324042, 2018.</unstructured_citation></citation><citation key="ref3"><doi>10.1016/j.cose.2015.10.006</doi><unstructured_citation>Safa, N. S., Von Solms, R. and Furnell, S., “Information security policy compliance model in organizations”, Computers and Security, 56, 2016. pp. 70-82.</unstructured_citation></citation><citation key="ref4"><unstructured_citation>McAlaney, J., Thackray, H. and Taylor, J., “The social psychology of cybersecurity”, The Psychologist,vol. 29, no. 9, 2016, pp. 686-689.</unstructured_citation></citation><citation key="ref5"><unstructured_citation>Cialdini, R. B., “Influence: Science and Practice (5thEdition)”, Englewood Cliffs, NJ: Prentice Hall, 2008.</unstructured_citation></citation><citation key="ref6"><doi>10.1109/educon.2017.7943091</doi><unstructured_citation>Taylor, J., McAlaney, J., James, S., Dale, J., Hodge,S., Thackray, H. and Richardson, C., “Teaching psychological principles to cybersecurity students”, In Proc. of IEEE Educon 2017, Athens, Greece, 2017.</unstructured_citation></citation><citation key="ref7"><doi>10.1109/te.2016.2636125</doi><unstructured_citation>Hamman, S.T., Hopkinson, K. M., Markham, R. L.,Chaplik, A. M. and Metzler, G.E., “Teaching game theory to improve adversarial thinking in cyber security students”, IEEE Transactions on Education, 99,2017, pp. 1-7.</unstructured_citation></citation><citation key="ref8"><doi>10.4018/978-1-60566-729-4.ch009</doi><unstructured_citation>Snelson, C., “Web-Based Video for e-Learning: Tap-ping into the YouTube phenomenon”. In H. H. Yang&amp; S. C. Yuen (Eds.), Collective Intelligence and E-Learning 2.0: Implications of Web-Based Communities and Networking, pp. 147-166. New York:  IGIGlobal, 2009.</unstructured_citation></citation><citation key="ref9"><unstructured_citation>Hammond, T. C., and Lee, J. K., “Editorial: Dig-ital video and social studies”, Contemporary Issues in Technology and Teacher Education, vol.10, no.1,2010 pp. 124-132.</unstructured_citation></citation><citation key="ref10"><doi>10.4236/ce.2017.89099</doi><unstructured_citation>Abdo, I. B., and Al-Awabdeh, A.-H., “Animated Videos Prove to be Beneficial in Teaching English Grammar as EFL: A Neurological Study of How Stu-dents Learn and Retain English Grammar”, Creative Education, vol. 8, 2017, pp. 1415-1423.</unstructured_citation></citation><citation key="ref11"><unstructured_citation>M. L. Niess and J. M. Walker, Digital Videos as Tools for Learning Mathematics. Contemporary Is-sues in Technology and Teacher Education, vol. 10,no. 1, 2010, pp. 100-105.</unstructured_citation></citation><citation key="ref12"><unstructured_citation>C. Efthimiou and R. Llewellyn, “Physics in Films”- A New Approach to Teaching Science, 2004.</unstructured_citation></citation><citation key="ref13"><unstructured_citation>Solis, M. and Orale, R. (2017). “Use of Movie Scenes as Simulations to Enhance Students’ Performance on Selected Physics Concepts”. Journal of Academic Research, 2, pp. 1-6.</unstructured_citation></citation><citation key="ref14"><unstructured_citation>Rogers, M. K., “The psyche of cyber criminals: A psycho-social perspective”. In G. Ghosh and E. Turrini (Eds.) Cyber crimes: A Multidisciplinary Analysis, 2010.</unstructured_citation></citation><citation key="ref15"><unstructured_citation>Leyden, J., “Top 10 best hacking films of all time”. Available:  https://portswigger.net/daily-swig/top-10-best-hacking-films-of-all-time, Apr. 2020.</unstructured_citation></citation><citation key="ref16"><unstructured_citation>Barrasso,    N.,    “7   Best   Movies   about Cyber security and Hacking”. Available: https://www.cybereason.com/blog/movies-about-cyber-security-hacking-crime, Apr. 2018.</unstructured_citation></citation><citation key="ref17"><unstructured_citation>Hacker, the story, 2016. Available: https://www.imdb.com/title/tt3173594/plotsummary?ref_=tt_stry_pl.</unstructured_citation></citation><citation key="ref18"><unstructured_citation>Cyber security ventures. Available: https://cybersecurity-ventures.com/movies-about-cybersecurity-and-hacking.</unstructured_citation></citation><citation key="ref19"><unstructured_citation>Hacker, the movie, 2016.    Available: http://www.imdb.com/title/tt3173594.</unstructured_citation></citation><citation key="ref20"><unstructured_citation>Oppenheim, A. N., “Questionnaire Design, Inter-viewing and Attitude Measurement” (chapters 7 &amp;8), London &amp; NY: Continuum, 1992.</unstructured_citation></citation><citation key="ref21"><unstructured_citation>Bricki, N. and Green, J., “A Guide to Using Qualitative Research Methodology”, 2002, p. 2. Available:   http://fieldresearch.msf.org/msf/bitstream/10144/84230/1/Qualita-tive+research+methodology.pdf.</unstructured_citation></citation><citation key="ref22"><unstructured_citation>Newman, W. L., “Social Research Methods: Qualitative and Quantitative Approaches (5th ed.)”, Boston: A&amp;B, pp. 268-288, 2003.</unstructured_citation></citation><citation key="ref23"><unstructured_citation>Creswell,  J.  W.,  “Research  design:   qualitative, quantitative, and mixed methods approaches”,Thousand Oaks, CA: Sage, 2003.</unstructured_citation></citation><citation key="ref24"><unstructured_citation>Tanenbaum, A. S. and Wetherall, D. J., “Computer Networks (5th ed.)”, Prentice Hall, 2011.</unstructured_citation></citation><citation key="ref25"><unstructured_citation>L. Pavlík, “Modeling the Impact of Selected Cyber Threats on the Organization’s Parameters in the Framework of Cyber Risk Insurance”, WSEAS Transactions on Business and Economics, vol. 15,2018, pp. 522-528.</unstructured_citation></citation><citation key="ref26"><doi>10.1080/19325037.2004.10603611</doi><unstructured_citation>Price, J. H. and Murnan J., “Research Limitations and the Necessity of Reporting Them”, American Journal of Health Education, vol. 35, 2004, pp. 66-67.</unstructured_citation></citation></citation_list></journal_article></journal></body></doi_batch>