
Volume 12, Issue 3 (March 2025), Pages: 131-142

----------------------------------------------
Original Research Paper
Empowering Saudi youth: The ISAS framework for promoting online safety and cybersecurity awareness
Author(s):
Nawaf Alharbi 1, Halima Samra 2, *, Alice Li 3, Ben Soh 1
Affiliation(s):
1Department of Computing, Science and Information Technology, La Trobe University, Melbourne, Victoria 3086, Australia
2Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah 21589, Saudi Arabia
3La Trobe Business School, La Trobe University, Melbourne, Victoria 3086, Australia
Full text
Full Text - PDF
* Corresponding Author.
Corresponding author's ORCID profile: https://orcid.org/0000-0002-5199-3677
Digital Object Identifier (DOI)
https://doi.org/10.21833/ijaas.2025.03.014
Abstract
The increasing use of the Internet, along with the widespread access to social media, video games, and various online platforms, presents significant safety challenges, particularly for young people and teenagers. To address these concerns, this study develops and validates the Internet Security Awareness (ISAS) e-safety framework, designed to promote safe Internet usage among youth in Saudi Arabia. The framework was constructed based on a survey of 92 IT professionals and experts, ensuring its relevance and reliability. Data analysis was conducted using IBM SPSS for exploratory factor analysis (EFA) and IBM AMOS for confirmatory factor analysis (CFA). Of the 33 initial survey items, the study identified 5 items related to privacy, 4 items concerning security, 5 items addressing threats, and 3 items focusing on communication. The findings confirm that these four factors—privacy, security, threats, and communication—are strongly interrelated, demonstrating high validity and reliability. These factors were further examined to assess young people's behavioral intentions to adopt the ISAS e-safety framework in their online activities. This study offers valuable insights for IT professionals and educators while providing practical recommendations for managers aiming to enhance Internet safety awareness among young users.
© 2025 The Authors. Published by IASE.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords
Internet safety, E-safety framework, Youth awareness, Cybersecurity risks, Behavioral adoption
Article history
Received 14 October 2024, Received in revised form 3 February 2025, Accepted 9 March 2025
Acknowledgment
No Acknowledgment.
Compliance with ethical standards
Ethical considerations
This study was conducted in accordance with the ethical standards of La Trobe University and the 1964 Helsinki Declaration and its later amendments. Ethics approval for this research was obtained from the La Trobe University Human Ethics Committee (Reference number HEC21080). Participation was voluntary, and informed consent was obtained from all participants. All responses were collected anonymously, and participant confidentiality was strictly maintained.
Conflict of interest: The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Citation:
Alharbi N, Samra H, Li A, and Soh B (2025). Empowering Saudi youth: The ISAS framework for promoting online safety and cybersecurity awareness. International Journal of Advanced and Applied Sciences, 12(3): 131-142
Permanent Link to this page
Figures
Fig. 1 Fig. 2
Tables
Table 1 Table 2 Table 3
----------------------------------------------
References (49)
- Abdel-Salam DM, Alrowaili HI, Albedaiwi HK, Alessa AI, and Alfayyadh HA (2019). Prevalence of Internet addiction and its associated factors among female students at Jouf University, Saudi Arabia. Journal of the Egyptian Public Health Association, 94(1): 12. https://doi.org/10.1186/s42506-019-0009-6 [Google Scholar] PMid:32813134 PMCid:PMC7366308
- Akram J and Ping L (2020). How to build a vulnerability benchmark to overcome cyber security attacks. IET Information Security, 14(1): 60-71. https://doi.org/10.1049/iet-ifs.2018.5647 [Google Scholar]
- Alnajim AM, Habib S, Islam M, AlRawashdeh HS, and Wasim M (2023). Exploring cybersecurity education and training techniques: A comprehensive review of traditional, virtual reality, and augmented reality approaches. Symmetry, 15(12): 2175. https://doi.org/10.3390/sym15122175 [Google Scholar]
- Alqurashi RK, AlZain MA, Soh B, Masud M, and Al-Amri J (2020). Cyber-attacks and impacts: A case study in Saudi Arabia. International Journal, 9(1): 217-224. https://doi.org/10.30534/ijatcse/2020/33912020 [Google Scholar]
- Amichai-Hamburger Y and Etgar S (2018). Personality and Internet use: The case of introversion and extroversion. In: Attrill-Smith A, Fullwood C, Keep M, and Kuss DJ (Eds.), The Oxford handbook of cyberpsychology. Oxford University Press, Oxford, UK. https://doi.org/10.1093/oxfordhb/9780198812746.013.4 [Google Scholar]
- Amichai-Hamburger Y, Wainapel G, and Fox S (2002). On the Internet no one knows I'm an introvert": Extroversion, neuroticism, and Internet interaction. Cyberpsychology and Behavior: The Impact of The Internet, Multimedia and Virtual Reality on Behavior and Society, 5(2): 125–128. https://doi.org/10.1089/109493102753770507 [Google Scholar] PMid:12025878
- Anthony JL, Assel MA, and Williams JM (2007). Exploratory and confirmatory factor analyses of the DIAL-3: What does this "developmental screener" really measure? Journal of School Psychology, 45(4): 423-438. https://doi.org/10.1016/j.jsp.2007.02.003 [Google Scholar]
- Awang Z, Afthanorhan A, Mohamad M, and Asri MAM (2015). An evaluation of measurement model for medical tourism research: The confirmatory factor analysis approach. International Journal of Tourism Policy, 6(1): 29-45. https://doi.org/10.1504/IJTP.2015.075141 [Google Scholar]
- Barayan SS, Al Dabal BK, Abdelwahab MM, Shafey MM, and Al Omar RS (2018). Health-related quality of life among female university students in Dammam district: Is Internet use related? Journal of Family and Community Medicine, 25(1): 20-28. https://doi.org/10.4103/jfcm.JFCM_66_17 [Google Scholar] PMid:29386958 PMCid:PMC5774039
- Browne KD and Hamilton-Giachritsis C (2005). The influence of violent media on children and adolescents: A public-health approach. The Lancet, 365(9460): 702-710. https://doi.org/10.1016/S0140-6736(05)17952-5 [Google Scholar] PMid:15721477
- Byrne BM (2001). Structural equation modeling with AMOS, EQS, and LISREL: Comparative approaches to testing for the factorial validity of a measuring instrument. International Journal of Testing, 1(1): 55-86. https://doi.org/10.1207/S15327574IJT0101_4 [Google Scholar]
- Campbell S, Greenwood M, Prior S, Shearer T, Walkem K, Young S, Bywaters D, and Walker K (2020). Purposive sampling: Complex or simple? Research case examples. Journal of Research in Nursing, 25(8): 652-661. https://doi.org/10.1177/1744987120927206 [Google Scholar] PMid:34394687 PMCid:PMC7932468
- Caplan SE (2005). A social skill account of problematic Internet use. Journal of Communication, 55(4): 721-736. https://doi.org/10.1111/j.1460-2466.2005.tb03019.x [Google Scholar]
- Chen W, Gao Y, Xie W, Gong L, Lu K, Wang W, Li Y, Liu X, Zhang H, Dong H, and Zhang W (2014). Genome-wide association analyses provide genetic and biochemical insights into natural variation in rice metabolism. Nature Genetics, 46(7): 714-721. https://doi.org/10.1038/ng.3007 [Google Scholar] PMid:24908251
- Choong YY, Theofanos M, Renaud K, and Prior S (2019). Case study: Exploring children's password knowledge and practices. In the Proceedings 2019 Workshop on Usable Security (USEC), The Internet Society, San Diego, USA. https://doi.org/10.14722/usec.2019.23027 [Google Scholar]
- Cohen-Almagor R (2018). Social responsibility on the Internet: Addressing the challenge of cyberbullying. Aggression and Violent Behavior, 39: 42-52. https://doi.org/10.1016/j.avb.2018.01.001 [Google Scholar]
- Cranmer S (2013). Listening to excluded young people's experiences of e-safety and risk. Learning, Media and Technology, 38(1): 72-85. https://doi.org/10.1080/17439884.2012.658405 [Google Scholar]
- Edwards S, Nolan A, Henderson M, Mantilla A, Plowman L, and Skouteris H (2018). Young children's everyday concepts of the Internet: A platform for cyber-safety education in the early years. British Journal of Educational Technology, 49(1): 45-55. https://doi.org/10.1111/bjet.12529 [Google Scholar]
- Fabrigar LR and Wegener DT (2011). Exploratory factor analysis. Oxford University Press, Oxford, UK. https://doi.org/10.1093/acprof:osobl/9780199734177.001.0001 [Google Scholar]
- Hassan T, Alam MM, Wahab A, and Hawlader MD (2020). Prevalence and associated factors of Internet addiction among young adults in Bangladesh. Journal of the Egyptian Public Health Association, 95(1): 3. https://doi.org/10.1186/s42506-019-0032-7 [Google Scholar] PMid:32813097 PMCid:PMC7364753
- Hope A (2010). Seductions of risk, social control and resistance to school surveillance. In: Monahan T and Torres RD (Eds.), Schools under Surveillance: Cultures of control in public education: 230-245. Rutgers University Press, New Brunswick and London, UK. https://doi.org/10.36019/9780813548265-014 [Google Scholar]
- Kääriäinen M, Kanste O, Elo S, Pölkki T, Miettunen J, and Kyngäs H (2011). Testing and verifying nursing theory by confirmatory factor analysis. Journal of Advanced Nursing, 67(5): 1163-1172. https://doi.org/10.1111/j.1365-2648.2010.05561.x [Google Scholar] PMid:21226874
- Kabali HK, Irigoyen MM, Nunez-Davis R, Budacki JG, Mohanty SH, Leister KP, and Bonner RL (2015). Exposure and use of mobile media devices by young children. Pediatrics, 136(6): 1044-1050. https://doi.org/10.1542/peds.2015-2151 [Google Scholar] PMid:26527548
- Khan HU and Hammami H (2019). Measuring Internet addiction in Europe-based knowledge societies: A case study of France. International Journal of Business Information Systems, 32(2): 199-218. https://doi.org/10.1504/IJBIS.2019.103075 [Google Scholar]
- Krasteva N (2018). Existing dangers for the child on the internet. International Conference Knowledge-Based Organization, 24(2): 206-211. https://doi.org/10.1515/kbo-2018-0091 [Google Scholar]
- Kruger H, Drevin L, and Steyn T (2010). A vocabulary test to assess information security awareness. Information Management and Computer Security, 18(5): 316–327. https://doi.org/10.1108/09685221011095236 [Google Scholar]
- Lim M and Hastie T (2015). Learning interactions via hierarchical group-lasso regularization. Journal of Computational and Graphical Statistics, 24(3): 627-654. https://doi.org/10.1080/10618600.2014.938812 [Google Scholar] PMid:26759522 PMCid:PMC4706754
- Longstreet P and Brooks S (2017). Life satisfaction: A key to managing Internet and social media addiction. Technology in Society, 50: 73-77. https://doi.org/10.1016/j.techsoc.2017.05.003 [Google Scholar]
- Lorenz B, Kikkas K, and Laanpere M (2012). Comparing children's e-safety strategies with guidelines offered by adults. Electronic Journal of e-Learning, 10(3): 326-338. [Google Scholar]
- Lorenz B, Kikkas K, Laanpere M, and Laugasson E (2016). A model to evaluate digital safety concerns in school environment. In the Learning and Collaboration Technologies: 3rd International Conference, LCT 2016, Held as Part of HCI International 2016, Springer International Publishing. Toronto, Canada: 707-721. https://doi.org/10.1007/978-3-319-39483-1_64 [Google Scholar]
- Lorenz B, Kikkas K, Sõmer T, and Laugasson E (2019). Cybersecurity within the curricula of informatics: the Estonian perspective. In the 12th International Conference on Informatics in Schools: Situation, Evolution, and Perspectives, Springer International Publishing, Larnaca, Cyprus: 159-171. https://doi.org/10.1007/978-3-030-33759-9_13 [Google Scholar]
- MacKenzie SB, Podsakoff PM, and Podsakoff NP (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35(2): 293-334. https://doi.org/10.2307/23044045 [Google Scholar]
- Majid S, Chang YK, and Foo S (2016). Auditing information literacy skills of secondary school students in Singapore. Journal of Information Literacy, 10(1): 44-66. https://doi.org/10.11645/10.1.2068 [Google Scholar]
- Majid S, Foo S, and Chang YK (2020). Appraising information literacy skills of students' in Singapore. Aslib Journal of Information Management, 72(3): 379-394. https://doi.org/10.1108/AJIM-01-2020-0006 [Google Scholar]
- McDaniel AE (2013). Securing the information and communications technology global supply chain from exploitation: Developing a strategy for education, training, and awareness. In the Proceedings of the Informing Science and Information Technology Education Conference, Informing Science Institute, Porto, Portugal: 313–324. https://doi.org/10.28945/1813 [Google Scholar]
- McIntyre E, Wiener KK, and Saliba AJ (2015). Compulsive Internet use and relations between social connectedness, and introversion. Computers in Human Behavior, 48: 569-574. https://doi.org/10.1016/j.chb.2015.02.021 [Google Scholar]
- Östlund U, Kidd L, Wengström Y, and Rowa-Dewar N (2011). Combining qualitative and quantitative research within mixed method research designs: A methodological review. International Journal of Nursing Studies, 48(3): 369-383. https://doi.org/10.1016/j.ijnurstu.2010.10.005 [Google Scholar] PMid:21084086 PMCid:PMC7094322
- Parmaxi A, Papadamou K, Sirivianos M, and Stamatelatos M (2017). E-safety in Web 2.0 learning environments: A research synthesis and implications for researchers and practitioners. In the Learning and Collaboration Technologies. Novel Learning Ecosystems: 4th International Conference, Springer International Publishing, Vancouver, Canada, 249-261. https://doi.org/10.1007/978-3-319-58509-3_20 [Google Scholar]
- Podsakoff PM, MacKenzie SB, and Podsakoff NP (2012). Sources of method bias in social science research and recommendations on how to control it. Annual Review of Psychology, 63(1): 539-569. https://doi.org/10.1146/annurev-psych-120710-100452 [Google Scholar] PMid:21838546
- Rababah JA, Al-Hammouri MM, and Aldalaykeh M (2022). Validation and measurement invariance of the Arabic health literacy questionnaire. Heliyon, 8(4): e09301. https://doi.org/10.1016/j.heliyon.2022.e09301 [Google Scholar] PMid:35497048 PMCid:PMC9043993
- Rader E, Wash R, and Brooks B (2012). Stories as informal lessons about security. In Proceedings of the Eighth Symposium on Usable Privacy and Security, ACM, Washington D.C., USA: 1-17. https://doi.org/10.1145/2335356.2335364 [Google Scholar] PMid:22465494 PMCid:PMC3358468
- Reda M, Rabie M, Mohsen N, and Hassan A (2012). Problematic Internet users and psychiatric morbidity in a sample of Egyptian adolescents. Psychology, 3(8): 626-631. https://doi.org/10.4236/psych.2012.38096 [Google Scholar]
- Sahin M and Lok S (2018). Relationship between physical activity levels and Internet addiction of adults. Journal of Depression and Anxiety, 7(2): 1-4. https://doi.org/10.4172/2167-1044.1000310 [Google Scholar]
- Shek DT and Yu L (2014). Confirmatory factor analysis using AMOS: A demonstration. International Journal on Disability and Human Development, 13(2): 191-204. https://doi.org/10.1515/ijdhd-2014-0305 [Google Scholar]
- van der Walt M, Maree K, and Ellis S (2008). A mathematics vocabulary questionnaire for use in the intermediate phase. South African Journal of Education, 28(4): 489-504. https://doi.org/10.15700/saje.v28n4a210 [Google Scholar]
- Wang WC and Cunningham EG (2005). Comparison of alternative estimation methods in confirmatory factor analyses of the general health questionnaire. Psychological Reports, 97(1): 3-10. https://doi.org/10.2466/pr0.97.1.3-10 [Google Scholar] PMid:16279297
- Young KS (2004). Internet addiction: A new clinical phenomenon and its consequences. American Behavioral Scientist, 48(4): 402-415. https://doi.org/10.1177/0002764204270278 [Google Scholar]
- Zhang H, Zhang J, Cheng S, Lu S, and Shi C (2012). Role of constraints in Chinese calligraphic landscape experience: An extension of a leisure constraints model. Tourism Management, 33(6): 1398-1407. https://doi.org/10.1016/j.tourman.2012.01.001 [Google Scholar]
- Zou Y, Roundy K, Tamersoy A, Shintre S, Roturier J, and Schaub F (2020). Examining the adoption and abandonment of security, privacy, and identity theft protection practices. In the Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, ACM, Honolulu, USA: 1-15. https://doi.org/10.1145/3313831.3376570 [Google Scholar]
|