Effectiveness of the Daniel Model in Enhancing Primary Students’ Learning of Cybersecurity Concepts
Downloads
This study investigated the effectiveness of Daniel's Model in teaching cybersecurity concepts to ninth-grade students in Amman, Jordan. A quasi-experimental design with two groups was employed; the experimental group received instruction based on Daniel's model, while the control group followed traditional teaching methods. The sample consisted of 120 students, was selected from ten international schools via convenience sampling, and was randomly assigned to the groups. Data were collected using a 33-item knowledge test covering four key domains of cybersecurity. Analysis in SPSS included an independent samples t-test and a paired samples t-test; in addition, effect size (η²) was calculated to understand the magnitude of the model impact. A higher score of digital threat knowledge and skills in terms of prevention, ethical behaviors, and data protection related to the model taught was noticeable among the experimental group, since the effect size (η²) varied from large (0.34) to very large (0.62). Also, in the delayed test, the experimental group showed no decline in performance, demonstrating that the model was effective in teaching knowledge and digital practices. Considering the results, it is recommended that Daniel's Model, combined with interactive techniques and scenario building, be integrated in teaching digital ethics and use of technology, in addition to training teachers on systematic implementation of desired, sustained outcomes of the model.
Downloads
[1] Zucule de Barros, M. J., & Lazarek, H. (2018). A cyber safety model for schools in Mozambique. ICISSP 2018 - Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018-January, 251–258. doi:10.5220/0006573802510258.
[2] Huraj, L., Lengyelfalusy, T., Hurajová, A., & Lajčin, D. (2023). Measuring Cyber Security Awareness: A Comparison between Computer Science and Media Science Students. TEM Journal, 12(2), 623–633. doi:10.18421/TEM122-05.
[3] Lamond, M., Prior, S., Renaud, K., & Wood, L. A. (2025). Teachers’ perspectives and practice of cybersecurity education in primary schools. Discover Education, 4(1), 312. doi:10.1007/s44217-025-00471-0.
[4] Mphatheni, M. R., & Maluleke, W. (2022). Cybersecurity as a response to combating cybercrime. International Journal of Research in Business and Social Science, 11(4), 384–396. doi:10.20525/ijrbs.v11i4.1714.
[5] Ismail, M., Madathil, N. T., Alalawi, M., Alrabaee, S., Al Bataineh, M., Melhem, S., & Mouheb, D. (2024). Cybersecurity activities for education and curriculum design: A survey. Computers in Human Behavior Reports, 16. doi:10.1016/j.chbr.2024.100501.
[6] Lamond, M., Renaud, K., Wood, L., & Prior, S. (2022). SOK: Young Children’s Cybersecurity Knowledge, Skills & Practice: A Systematic Literature Review. ACM International Conference Proceeding Series, 14–27. doi:10.1145/3549015.3554207.
[7] Yassin, W. A. K., & Raji, Z. H. (2012). The Constructivist Approach: Models and Strategies for Teaching Scientific Concepts. Noor Al-Hassan Library, Baghdad, Iraq.
[8] Pusey, P., & Sadera, W. A. (2011). Cyberethics, Cybersafety, and Cybersecurity: Preservice Teacher Knowledge, Preparedness, and the Need for Teacher Education to Make a Difference. Journal of Digital Learning in Teacher Education, 28(2), 82–85. doi:10.1080/21532974.2011.10784684.
[9] Quayyum, F., Cruzes, D. S., & Jaccheri, L. (2021). Cybersecurity awareness for children: A systematic literature review. International Journal of Child-Computer Interaction, 30. doi:10.1016/j.ijcci.2021.100343.
[10] Al-Barakat, A. A., AlAli, R. M., Alotaibi, S. B., Alrosaa, T. M., Abdullatif, A. K., & Zaher, A. M. (2026). The contribution of early science education in developing children awareness of carbon footprints. Scientific Reports, 16, 4271. doi:10.1038/s41598-025-34469-3.
[11] Nicholson, J., Terry, J., Beckett, H., & Kumar, P. (2021). Understanding young people’s experiences of cybersecurity. ACM International Conference Proceeding Series, 200–210. doi:10.1145/3481357.3481520.
[12] Lui, A., Womack, C., & Orton, P. (2025). Collaborative online international learning as a third space to improve students’ awareness of cybersecurity. Education and Information Technologies, 30(10), 13835–13856. doi:10.1007/s10639-025-13336-8.
[13] Hart, S., Margheri, A., Paci, F., & Sassone, V. (2020). Riskio: A Serious Game for Cyber Security Awareness and Education. Computers and Security, 95. doi:10.1016/j.cose.2020.101827.
[14] Catota, F. E., Granger Morgan, M., & Sicker, D. C. (2019). Cybersecurity education in a developing nation: The Ecuadorian environment. Journal of Cybersecurity, 5(1), 1. doi:10.1093/cybsec/tyz001.
[15] NCSC-JO. (2025). The Jordanian national cybersecurity framework. National Cyber Security Center – Jordan. Available online: https://ncsc.jo/ (accessed on March 2026).
[16] Al-Barakat, A. A., Al-Hassan, O. M., AlAli, R. M., Al-Hassan, M. M., & Al sharief, R. A. (2023). Role of female teachers of childhood education in directing children towards effective use of smart devices. Education and Information Technologies, 28(6), 7065–7087. doi:10.1007/s10639-022-11481-y.
[17] Bataineh, R. F., Bataineh, R. F., AlAli, R. M., Alotaibi, S. B., Al-Barakat, A. A., Al-Saud, K. M., Aboud, Y. Z., & Ibrahim, N. A. (2025). Digital Frontiers: The Transformative Potential of E-Learning in Cultivating Arab Primary School Learners’ Creativity. SAGE Open, 15(4), 21582440251408317. doi:10.1177/21582440251408317.
[18] Lazarov, W., Schafeitel-Tähtinen, T., Squillace, J., Martinasek, Z., Coufalikova, A., Helenius, M., Gallus, P., & Fujdiak, R. (2025). Lessons Learned from Using Cyber Range to Teach Cybersecurity at Different Levels of Education. Technology, Knowledge and Learning, 1-36. doi:10.1007/s10758-025-09840-y.
[19] Caulkins, B., Marlowe, T., & Reardon, A. (2019). Cybersecurity Skills to Address Today’s Threats. Advances in Intelligent Systems and Computing, 782, 187–192. doi:10.1007/978-3-319-94782-2_18.
[20] Amankwa, E. (2021). Relevance of Cybersecurity Education at Pedagogy Levels in Schools. Journal of Information Security, 12(04), 233–249. doi:10.4236/jis.2021.124013.
[21] Pencheva, D., Hallett, J., & Rashid, A. (2020). Bringing cyber to school: Integrating cybersecurity into secondary school education. IEEE Security and Privacy, 18(2), 68–74. doi:10.1109/MSEC.2020.2969409.
[22] Monteith, S., Bauer, M., Alda, M., Geddes, J., Whybrow, P. C., & Glenn, T. (2021). Increasing Cybercrime Since the Pandemic: Concerns for Psychiatry. Current Psychiatry Reports, 23(4), 18. doi:10.1007/s11920-021-01228-w.
[23] Rademaker, M. (2016). Assessing Cyber Security 2015. Information & Security: An International Journal, 34, 93–104. doi:10.11610/isij.3407.
[24] Blažič, A. J., & Blažič, B. J. (2025). Teaching and learning cybersecurity for European youth by applying interactive technology and smart education. Education and Information Technologies, 30(7), 9093–9120. doi:10.1007/s10639-024-13155-3.
[25] Prümmer, J., van Steen, T., & van den Berg, B. (2024). A systematic review of current cybersecurity training methods. Computers and Security, 136. doi:10.1016/j.cose.2023.103585.
[26] Robins, A. (2015). The ongoing challenges of computer science education research. Computer Science Education, 25(2), 115–119. doi:10.1080/08993408.2015.1034350.
[27] Bataineh, M., & Bataineh, R. (2024). Personal Learning Environment and Writing Performance: The Case of Jordanian Young EFL Learners. SiSal Journal, 15(1), 65–85. doi:10.37237/150102.
[28] Chen, W., He, Y., Tian, X., & He, W. (2021).Exploring cybersecurity education at the K-12 level. Proceedings of SITE Interactive Conference. Association for the Advancement of Computing in Education, 108-114.
[29] Chindrus, C., & Caruntu, C. F. (2023). Challenges and Solutions in Designing a Network Architecture for Red and Blue Cybersecurity Competitions. 2023 27th International Conference on System Theory, Control and Computing, ICSTCC 2023 - Proceedings, 528–533. doi:10.1109/ICSTCC59206.2023.10308435.
[30] Cole, S. V. (2022). Impact of Capture The Flag (CTF)-style vs. Traditional Exercises in an Introductory Computer Security Class. Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE, 1, 470–476. doi:10.1145/3502718.3524806.
[31] Coenraad, M., Pellicone, A., Ketelhut, D. J., Cukier, M., Plane, J., & Weintrop, D. (2020). Experiencing Cybersecurity One Game at a Time: A Systematic Review of Cybersecurity Digital Games. Simulation and Gaming, 51(5), 586–611. doi:10.1177/1046878120933312.
[32] Bataineh, R. F., & Alghareeb, M. B. (2025). Starfall as a Catalyst for Kuwaiti EFL Young Learners’ Reading Comprehension: A Teacher’s Reflections. Journal of Ethnic and Cultural Studies, 12(1), 141–153. doi:10.29333/ejecs/2338.
[33] Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R., & Upadhyaya, S. J. (2009). Internet and online information privacy: An exploratory study of preteens and early teens. IEEE Transactions on Professional Communication, 52(2), 167–182. doi:10.1109/TPC.2009.2017985.
[34] Hong, W. C. H., Chi, C. Y., Liu, J., Zhang, Y. F., Lei, V. N. L., & Xu, X. S. (2023). The influence of social education level on cybersecurity awareness and behaviour: a comparative study of university students and working graduates. Education and Information Technologies, 28(1), 439–470. doi:10.1007/s10639-022-11121-5.
[35] Antunes, M., Silva, C., & Marques, F. (2021). An integrated cybernetic awareness strategy to assess cybersecurity attitudes and behaviours in school context. Applied Sciences (Switzerland), 11(23), 11269. doi:10.3390/app112311269.
[36] Blažic, B. J., & Blažic, A. J. (2024). Towards Modern Teaching and Effective Learning of Cybersecurity. Proceedings of International Conference on Research in Education and Science (ISTES), 10(1), 1809–1821.
[37] Burns, M. A., Johnson, V. N., Grasman, K., Habibi, S., Smith, K. A., Kaehr, A., Lacar, M. F., & Yam, B. (2023). Pedagogically Grounded Techniques and Technologies for Enhancing Student Learning. Advances in Engineering Education, 11(3), 77–107. doi:10.18260/3-1-1153-36049.
[38] Han, L., Harries, J., & Brown, P. (2013). Building a virtual constructivist learning environment for learning computing security and forensics. ITALICS Innovations in Teaching and Learning in Information and Computer Sciences, 12(1), 49–61. doi:10.11120/ital.2013.00006.
[39] Dhungana, R. K., Gurung Dr, L., & Poudyal, H. (2023). Cybersecurity challenges and awareness of the multi-generational learners in Nepal. Journal of Cybersecurity Education, Research and Practice, 2023(2), 5. doi:10.32727/8.2023.17.
[40] Rajbhandari, J., & Rana, K. (2023). Cyberbullying on Social Media: an Analysis of Teachers’ Unheard Voices and Coping Strategies in Nepal. International Journal of Bullying Prevention, 5(2), 95–107. doi:10.1007/s42380-022-00121-1.
[41] Shillair, R., Esteve-González, P., Dutton, W. H., Creese, S., Nagyfejeo, E., & von Solms, B. (2022). Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise. Computers and Security, 119, 102756. doi:10.1016/j.cose.2022.102756.
[42] Dimitriadou, E., & Lanitis, A. (2023). A critical evaluation, challenges, and future perspectives of using artificial intelligence and emerging technologies in smart classrooms. Smart Learning Environments, 10(1), 12. doi:10.1186/s40561-023-00231-3.
[43] Al-Janabi, S., & Al-Shourbaji, I. (2016). A Study of Cyber Security Awareness in Educational Environment in the Middle East. Journal of Information and Knowledge Management, 15(1), 1650007. doi:10.1142/S0219649216500076.
[44] Attia, M. A., & Ali, M. (2015). Constructivism and its Applications Modern Teaching Strategies. Dar Al-Methodology, Amman, Jordan.
[45] Witsenboer, J. W. A., Sijtsma, K., & Scheele, F. (2022). Measuring cyber secure behavior of elementary and high school students in the Netherlands. Computers and Education, 186. doi:10.1016/j.compedu.2022.104536.
[46] Taherdoost, H. (2024). Towards an Innovative Model for Cybersecurity Awareness Training. Information (Switzerland), 15(9), 512. doi:10.3390/info15090512.
[47] van Steen, T., Norris, E., Atha, K., & Joinson, A. (2020). What (if any) behaviour change techniques do government-led cybersecurity awareness campaigns use? Journal of Cybersecurity, 6(1), 1–8. doi:10.1093/CYBSEC/TYAA019.
[48] Zorlu, E. (2023). An Examination of the Relationship between College Students’ Cyberbullying Awareness and Ability to Ensure their Personal Cybersecurity. Journal of Learning and Teaching in Digital Age, 8(1), 55–70. doi:10.53850/joltida.1087377.
[49] Salazar, M., Gaviria, J., Laorden, C., & Bringas, P. G. (2013). Enhancing cybersecurity learning through an augmented reality-based serious game. IEEE Global Engineering Education Conference, EDUCON, 602–607. doi:10.1109/EduCon.2013.6530167.
[50] Stoilova, M., Nandagiri, R., & Livingstone, S. (2021). Children’s understanding of personal data and privacy online–a systematic evidence mapping. Information Communication and Society, 24(4), 557–575. doi:10.1080/1369118X.2019.1657164.
[51] Saglam, R. B., Miller, V., & Franqueira, V. N. L. (2023). A Systematic Literature Review on Cyber Security Education for Children. IEEE Transactions on Education, 66(3), 274–286. doi:10.1109/TE.2022.3231019.
[52] Alqahtani, M. A. (2022). Factors Affecting Cybersecurity Awareness among University Students. Applied Sciences (Switzerland), 12(5), 2589. doi:10.3390/app12052589.
[53] Pramod, D., & Raman, R. (2014). A study on the user perception and awareness of smartphone security. International Journal of Applied Engineering Research, 9(23), 19133–19144.
[54] Modise, E. (2023). Remote working responsible for surge in cybersecurity threats in Africa, according to INTERPOL. TechCabal, Lagos, Nigeria. Available online: https://techcabal.com/2023/07/04/remote-working-cybersecurity-africa/ (accessed on March 2026).
[55] Shen, L. W., Mammi, H. K., & Din, M. M. (2021). Cyber Security Awareness Game (CSAG) for Secondary School Students. 2021 International Conference on Data Science and Its Applications, ICoDSA 2021, 48–53. doi:10.1109/ICoDSA53588.2021.9617548.
[56] Huang, K., Madnick, S., Zhang, F., & Siegel, M. (2022). Varieties of public–private co-governance on cybersecurity within the digital trade: implications from Huawei’s 5G. Journal of Chinese Governance, 7(1), 81–110. doi:10.1080/23812346.2021.1923230.
[57] Chang, C. Y., & Hwang, G. J. (2019). Trends in digital game-based learning in the mobile era: A systematic review of journal publications from 2007 to 2016. International Journal of Mobile Learning and Organisation, 13(1), 68–90. doi:10.1504/IJMLO.2019.096468.
[58] Santelices, R. B. (2025). A Students’ Perspective on Cybersecurity Awareness and Education. International Journal of Research and Innovation in Social Science, IX(IIIS), 7976–7988. doi:10.47772/ijriss.2025.903sedu0597.
- This work (including HTML and PDF Files) is licensed under a Creative Commons Attribution 4.0 International License.



















