Ahmad, N., Mokhtar, U., Fariza Paizi Fauzi, W., Othman, Z., Hakim Yeop, Y., & Huda Sheikh Abdullah, S. (2019). Cyber Security Situational Awareness among Parents. Proceedings of the 2018 Cyber Resilience Conference, CRC 2018.
Auckett, N. (2015). GameMaker Essentials.
Alotaibi, F., Furnell, S., Stengel, I., & Papadaki, M. (2017). A Survey of Cyber-Security Awareness in Saudi Arabia. International Conference for Internet Technology and Secured Transactions.
Denham , A. (2018). Using a digital game as an advance organizer. Educational Technology Research, pp. 66:1-24.
Game, Y. (2019). YoYo Game:make 2D game with Game Maker. Retrieved from https://www.yoyogames.com/
goleman, d., boyatzis, R., & Mckee, A. (2019). Creative thinking in digital game design and development: A case study. Journal of Chemical Information and Modeling, pp. 1689-1699.
Jenson, J., & Droumeva , M. (2016). Exploring Media Literacy and Computational Thinking: A Game Maker Curriculum Study. Electronic Journal of e-Learning, v14 n2 p111-121 2016.
Johnson, C. (2017, may). Learning to Program with Game Maker. Online Submission, International Journal of Computer Science Education in Schools.
Kasurinen , J., & Kettunen , M. (2018, MAY). LEARNING CYBER SECURITY: TEACHING TECHNICALLY CHALLENGING TOPICS WITH GAMES AND VIRTUAL LABORATORIES. International Journal on Information Technologies & Security, pp. 103-114.
Onwubiko, C. (2015). Cyber Security Operations Centre Security Monitoring for protecting Business and supporting Cyber Defense Strategy. nternational Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA, pp. 1-10.
Stavrou, E. (2018). Enhancing Cyber Situational Awareness : A New Perspective of Password Auditing Tools. 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), pp. 1-4.
Stroud, F. (2020). mobile device security. Retrieved from webopedia: https://www.webopedia.com/TERM/M/mobile-device-security.html
techopedia. (2017, February 16). Data Protection. Retrieved from techopedia: https://www.techopedia.com/definition/29406/data-protection
Turner, L. A., Johnson, R. B., & Christensen, L. B. (2014). Research Methods, Design, and Analysis. Pearson Education Limited.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers and Security, pp. 97-102.
Wang, L., & Chen, M. (2010). Learning programming concepts through game design: A PCT perspective. DIGITEL 2010 - The 3rd IEEE International Conference on Digital Game and Intelligent Toy Enhanced Learning, pp. 219-221.
Yasina, A., Liu, L., Li, T., Wang, J., & Zowghi, D. (2018). Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG). Information and Software Technology, pp. 179-200.
Zimmerma, E., Tekinbaş, S., & Salen, K. (2004). Rules of Play: Game Design Fundamentals.