<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Cyber Security and Data Protection, July</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Preparing pre-service teachers for the digital era: Cyberethics, cybersafety, and cybersecurity skills as a core AI competency⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Termenzhy</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alla Kozhevnikova</string-name>
          <email>Kozhevnykova_Alla@mspu.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vitalii Susukailo</string-name>
          <email>vitalii.a.susukailo@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Bohdan Khmelnitsky Melitopol State Pedagogical University (Ukraine). Drawing on current</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>31</volume>
      <issue>2025</issue>
      <fpage>0000</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>This study explores the emerging concept of AI competency for educators and the integration of cyberethics, cybersafety, and cybersecurity (C3) skills into pre-service teacher education. While international research has advanced in defining and assessing AI literacy and competency, Ukrainian pedagogy is only beginning to adopt these concepts. The study reviews key global frameworks, including the UNESCO AI Competency Framework for Teachers and the AICE Framework by the University of Washington, and compares them with national initiatives in Ukraine. The paper presents the curriculum of the online elective course “Pedagogical Aspects of Using Artificial Intelligence in Secondary Education Institutions”, designed for pre-service mathematics teachers at Bohdan Khmelnitsky Melitopol State Pedagogical University. The course, based on the ADDIE instructional design model, aims to foster responsible AI integration and C3 awareness in education.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;artificial intelligence in education</kwd>
        <kwd>cyberethics</kwd>
        <kwd>cybersafety</kwd>
        <kwd>and cybersecurity in teaching</kwd>
        <kwd>pre-service teacher training</kwd>
        <kwd>AI literacy</kwd>
        <kwd>AI competency</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        As artificial intelligence (AI) continues to reshape the educational landscape, the role of teachers is
rapidly evolving. In preparing future educators for the digital era, it is no longer sufficient to focus
solely on technical proficiency or digital literacy. Instead, there is a growing need to develop their
AI competency that includes ethical awareness, critical thinking, and responsible digital
citizenship. Among these, the triad of cyberethics, cybersafety, and cybersecurity (also known as
C3) emerges as a foundational pillar of professional preparedness [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        There is no doubt that pre-service teachers must be equipped not only to integrate AI tools into
their pedagogical practice but also to navigate and model safe, ethical, and secure behavior in
increasingly complex digital environments. These competencies are essential for fostering trust,
protecting personal and institutional data, and ensuring equitable access to digital learning.
Moreover, they empower teachers to guide students in developing responsible digital habits and
resilience against online threats [
        <xref ref-type="bibr" rid="ref2 ref3 ref4 ref5">2–5</xref>
        ].
      </p>
      <p>This paper explores the integration of cyberethics, cybersafety, and cybersecurity into teacher
education as a core component of AI competency based on the pre-service teacher training at</p>
    </sec>
    <sec id="sec-2">
      <title>2. AI Competency for educators: A conceptual overview</title>
      <p>
        The use of artificial intelligence systems has led to the emergence of new concepts—AI literacy and
AI Competency. These concepts are relatively new to Ukrainian pedagogy, and, unlike in
international research, studies by domestic scholars devoted to the components, levels, and
methods of assessing AI literacy are extremely limited. There is no universally accepted definition
of these terms. However, it is important to highlight the foundational contribution of Long &amp;
Magerko (2020), who, in their article “What is AI Literacy?”, synthesized existing studies on AI
literacy and developed a comprehensive competency-based approach to its formation and
assessment. They [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] define AI literacy as “a set of competencies that enables individuals to
critically evaluate AI technologies, communicate and collaborate effectively with AI, and use AI as
a tool online, at home, and in the workplace.” They see this literacy as a set of 17 skills and as an
operational definition.
      </p>
      <p>
        The study (Chiu, Ahmad, Ismailov&amp;Sanusi, 2024) presented the definitions of AI literacy and
competency and co-designed the framework with experienced AI teachers. AI literacy is defined as
“an individual’s ability to clearly explain how AI technologies work and impact society, as well as
to use them in an ethical and responsible manner and to effectively communicate and collaborate
with them in any setting. It focuses on knowing (i.e. knowledge and skills)”. AI competency is
defined as “an individual’s confidence and ability to clearly explain how AI technologies work and
impact society, as well as to use them in an ethical and responsible manner and to effectively
communicate and collaborate with them in any setting. They should have the confidence and
ability to self-reflect on their AI understanding for further learning. It focuses on how well
individuals use AI in beneficial ways” [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        Currently, there is a growing global effort to develop AI competency frameworks for educators
to support the meaningful and ethical integration of artificial intelligence in education. Notable
examples include the UNESCO AI Competency Framework for Teachers (AI CFT, 2024) [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], which
provides a strategic, human-centered approach to AI in education, and the AI Competency for
Educators (AICE) Framework (2025) [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] developed by Colleague AI (University of Washington),
which emphasizes practical, observable skills for educators to effectively use AI in instructional
settings. These frameworks reflect complementary approaches—from global policy guidance to
classroom-level implementation.
      </p>
      <p>The UNESCO AI CFT is a global, normative model designed to ensure the ethical, safe, and
inclusive integration of artificial intelligence in education. It outlines five key dimensions:
Humancentered mindset, Ethics of AI, AI foundations and applications, AI pedagogy, and AI for
professional learning (Figure 1). Grounded in the Sustainable Development Goals and UNESCO’s
ICT-CFT, the framework introduces three progressive levels of competence—Acquire, Deepen, and
Create—and is intended for shaping education policy, teacher certification, and international
standards.</p>
      <p>In contrast, the AICE Framework (2025) developed by Colleague AI is a practical,
practiceoriented model that defines AI competency through four interrelated dimensions: Functional (tool
fluency), Content (adaptation and critique), Pedagogical (instructional integration), and Ethical
(responsible use and modeling) (Figure 2). AICE shifts the focus from knowledge about AI to
observable, teachable educator practices. It is designed to support teacher professional growth,
selfassessment, micro-credentials, and EdTech development by making AI integration measurable,
actionable, and instructionally grounded.</p>
      <p>
        In Ukraine the concept of AI literacy was introduced in 2024 within the framework of the joint
project of the Ministry of Education and the Ministry of Digital Transformation of Ukraine titled
“Guidelines on Artificial Intelligence for General Secondary Education Institutions”. The working
group of Ukrainian researchers defines AI literacy as “understanding by participants of the
educational process of the basic principles of responsible use of artificial intelligence systems,
possessing the skills to recognize when AI is being used, as well as awareness of its limitations and
the risks associated with irresponsible use” [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        In addition to the concept of AI literacy, Ukrainian educators also introduce the term “AI
competency for educators”. This competency is “characterized by the knowledge, skills, and
attitudes necessary to understand and effectively use AI in various contexts: understanding the
roles of AI in education, using it in pedagogical practice in an ethical and effective way, and the
ability to identify AI and its applications” [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. It is noted that although AI competency is not
explicitly defined in the current Professional Teacher Standard in Ukraine [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], it is potentially
relevant to the implementation of all professional functions of a teacher and is an integral part of
educators’ ICT competence.
      </p>
      <p>
        Experts of the Ministry of Education and Science of Ukraine [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] have provided a detailed
description of the role and place of AI competency for teachers within the structure of the
UNESCO ICT Competency Framework for Teachers [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], and have identified five levels of AI
competency for teachers: A.1—Beginner, A.2—User, B.1—Integrator, B.2—Creator/Experimenter,
C. —Leader/Innovator. They have also outlined the correlation between the concepts of AI literacy
and AI competency (see Figure 3). As the diagram shows, AI literacy constitutes the foundational
levels (A.1 and A.2) of AI competency for teachers.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Integrating cyberethics, cybersafety, and cybersecurity into preservice teacher education</title>
      <p>
        In 2024, the cybersecurity threat landscape has reached an unprecedented scale and complexity.
According to Microsoft Digital Defense Report [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], their systems detect over 600 million
cyberattacks every day. Globally, the state of cybersecurity in education remains a growing
concern as schools, colleges, and universities become increasingly reliant on digital technologies
and online learning platforms. Thus, education and research sector became the second most
targeted sector by nation-state threat actors (21% of cyberattacks). In addition to offering
intelligence such as research and policy discussions, education and research institutions are often
used as testing grounds by threat actors before they pursue their actual targets. Educational
institutions are frequent targets of cyberattacks due to the vast amount of sensitive data they
handle and often limited cybersecurity infrastructure.
      </p>
      <p>
        This alarming statistic highlights the urgent need to create a cybersecure educational
environment that can protect students, educators, and institutions from growing digital threats.
Consequently, the integration of cybersecurity awareness and practices into pre-service teacher
training becomes essential. In addition to addressing technical and ethical aspects of cyber
education, it is important to consider the role of innovative digital tools in enhancing cybersecurity
awareness and skills among pre-service teachers. Recent studies emphasize the importance of
integrated information systems, such as electronic record books, to guarantee the integrity and
security of distance learning environments [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Moreover, AI-driven approaches for analyzing
digital evidence and behavior patterns can support the development of more effective cybersecurity
curricula and forensic readiness in educational settings [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Intelligent rule-based systems also
contribute to the automation of cybersecurity policy enforcement and adaptive control mechanisms
within educational infrastructures [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. The holistic management of information protection,
supported by decision support systems, further strengthens institutional resilience against
emerging cyber threats [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. Finally, methodologies for establishing Information Security
Management Systems (ISMS) provide essential frameworks for embedding cybersecurity culture
and practice into educational institutions [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Advancements in secure authentication and
authorization services ensure that future educators not only understand cybersecurity principles
but can also apply robust user management practices [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Additionally, frameworks for
information classification aligned with SOC 2 Type II standards help educational organizations
maintain compliance and protect sensitive data effectively [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <p>Future educators must be equipped not only with pedagogical and digital skills but also with the
knowledge and competencies to recognize, prevent, and respond to cyber risks within the school
context.</p>
      <p>
        Although learning institutions have been quick to profit from the Internet’s gifts, they have
been slow to recognize their responsibility to educate their communities about cyberethics,
cybersafety, and cybersecurity (Pusey&amp;Sadera, 2011). Cyberethics, cybersafety, and cybersecurity,
also known as C3, are interconnected domains focused on responsible and secure technology
use [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Cyberethics refers to the moral choices individuals make when using Internet-capable
technologies and digital media. Issues related to cyberethics include copyright infringement, online
etiquette, hacking, and internet addiction [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Cybersafety encompasses the actions individuals
take to minimize the dangers they may encounter while using Internet-connected technologies.
Common cybersafety concerns include online predators, unwanted communications, computer
viruses, and spyware. This domain also emphasizes raising awareness about how user behavior can
contribute to the spread of malware and the various tactics (such as phishing, pharming, and
spoofing) used to deceive individuals online.Cybersecurity involves technical measures designed
to protect data, identity information, and hardware from unauthorized access or damage [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
Cybersecurity practices include the use of antivirus software, Internet content filters, firewalls, and
secure password protocols.
      </p>
      <p>
        The rise of artificial intelligence in teaching and administration further amplifies the need for
secure systems that protect students’ privacy and ensure data integrity. Creating a safe and
resilient digital learning environment is essential not only for safeguarding information but also for
fostering trust, supporting inclusive access, and enabling effective use of innovative technologies in
education. In this context, pre-service teachers, trained in the information age, should possess the
skills that would allow them to utilize educational information and communication technologies
actively and effectively and be competent in technology-based applications such as
computerassisted education [
        <xref ref-type="bibr" rid="ref22 ref23 ref8">8, 22, 23</xref>
        ].
      </p>
      <p>
        The research study of cyber security awareness among students of higher education in India
(Kant, 2023) found that Indian students living in urban areas were found to be more aware of cyber
security than students living in rural areas, however, no significant difference was found between
them based on the level of study, gender or the nature of the course [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ].
      </p>
      <p>
        In Turkey, according to Haseski (2020), pre-service teachers should improve their competency
in cyber security, furthermore, personal cyber security achievement score was a significant
predictor of the attitude towards computer-assisted education. In the article «Cyber Security Skills
of Pre-Service Teachers as a Factor in Computer-Assisted Education» various recommendations
were presented for future studies and applications on the subject [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>
        In the USA the study “Pre-Service Teachers’ Perceptions of Information Assurance and Cyber
Security” [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ] indicated a lack of best practices in information assurance that was no different from
that of general computer end-users to protect personal electronic information (Agamba&amp; Keengwe,
2014). There is clear demand for cyber security education that will require effort beyond simple
declarative knowledge of security principles to more robust acquisition of security skills for
applying then in authentic digital threat environments in the USA (Navarrete, 2023) [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
      </p>
      <p>The Ukrainian scholars, Kovalenko and Osypchuk (2024), in their article, describe the
safe educational environment within general secondary education institutions in Ukraine,
which includes a cyber-safe educational component. This environment contributes to the
professional development of educators through the implementation of various measures aimed
at ensuring cybersecurity within schools. The scholars outline a cybersecurity policy for general
secondary education institutions, which can be implemented through recommendations such as
setting strong passwords and updating them regularly, as well as keeping device software and
operating systems up to date to prevent cyberattacks [27].</p>
    </sec>
    <sec id="sec-4">
      <title>4. Designing a course on C3 skills and AI competency for pre-service teachers</title>
      <p>In Ukraine, the issue of creating a cybersafe educational environment is particularly pressing.
According to the UNICEF report “Life for Children During the War” (2024) [28], 60% of children
aged 7 to 18 are engaged in hybrid forms of learning, while 17% of students are enrolled in distance
education. In frontline areas, 53% of children aged 6–17 study exclusively online due to the ongoing
war. In Ukraine, approximately 30 universities (including Bohdan Khmelnitsky Melitopol State
Pedagogical University) have been forcibly relocated to safer regions due to occupation and active
hostilities. The educational process is ongoing online, supported by cloud technologies and
educational platforms.</p>
      <p>This shift toward online and hybrid learning environments increases children’s exposure to
cyber risks such as phishing, cyberbullying, identity theft, and exposure to harmful content. In such
a context, Ukrainian educators must also be competent in cybersafety, cyberethics, and
cybersecurity to ensure that digital learning is not only effective but also safe and ethically
responsible.</p>
      <p>Therefore, teacher training programs must prioritize the development of cybersecurity
competencies. This includes equipping pre-service teachers with practical knowledge and skills to
identify, prevent, and respond to cyber threats, create protective digital policies in schools, and
educate students on responsible online behavior.</p>
      <p>Our research focuses on the issue of preparing future teachers to effectively use the potential of
artificial intelligence in their professional practice [29]. In particular, it addresses the development
1 Introduction: Digital transformation in education and
the role of AI
Fundamentals of AI: Concepts, algorithms, examples
Educational applications of AI: adaptive learning,
chatbots, generative tools
Pedagogical transformation: Changing roles of teachers
in AI-driven environments
Ethics, digital rights, and responsibilities in AI usage</p>
      <sec id="sec-4-1">
        <title>Basics of cybersecurity in educational settings</title>
      </sec>
      <sec id="sec-4-2">
        <title>AI-related threats to privacy and safety: phishing,</title>
        <p>deepfakes, data breaches
AI for teaching mathematics
Practical strategies for safe and responsible AI use in
schools
10 Final session: Student project presentations and
reflection
4
6
4
4
8
8
8
8
6
4</p>
      </sec>
      <sec id="sec-4-3">
        <title>Lecture + discussion</title>
      </sec>
      <sec id="sec-4-4">
        <title>Lecture + workshop</title>
      </sec>
      <sec id="sec-4-5">
        <title>Webinar + case studies</title>
      </sec>
      <sec id="sec-4-6">
        <title>Lecture + reflection</title>
      </sec>
      <sec id="sec-4-7">
        <title>Webinar +</title>
        <p>situational analysis</p>
      </sec>
      <sec id="sec-4-8">
        <title>Lecture + practical session</title>
      </sec>
      <sec id="sec-4-9">
        <title>Case analysis +</title>
        <p>group work</p>
      </sec>
      <sec id="sec-4-10">
        <title>Lecture + workshop</title>
      </sec>
      <sec id="sec-4-11">
        <title>Mini-projects +</title>
        <p>simulations</p>
      </sec>
      <sec id="sec-4-12">
        <title>Presentations</title>
        <p>of their competencies in the areas of digital safety, cyberethics, and cybersecurity (C3) in displaced
university in Ukraine.</p>
        <p>We have developed a syllabus for the online elective course “Pedagogical Aspects of Using
Artificial Intelligence in Secondary Education Institutions” designed for students majoring in
Secondary Education (Mathematics) at both the first and second levels of higher education
(2 ECTS, 60 hours) at Bohdan Khmelnitsky Melitopol State Pedagogical University (Ukraine). The
provisional course outline is presented in Table 1.</p>
        <p>The main aim of this course is to develop a comprehensive understanding among pre-service
teachers of the pedagogical opportunities, challenges, and limitations of using AI in secondary
mathematical education, with a specific focus on C3 issues: cyber-ethics, cybersecurity, and the
cyber-safety in digital learning environment. Course is based on UNESCO AI CFT, AI
Competency for Educators Framework and Guidelines on Artificial Intelligence for General
Secondary Education Institutions from the Ministry of Education and Science of Ukraine. Assessment
course methods include ongoing assessment (quizzes, participation, and case discussions),
miniproject (lesson or digital activity involving AI tools) and final presentation of project outcomes.</p>
        <p>The course was developed based on the ADDIE instructional design model [30], which involves
a step-by-step approach to the creation of educational products. The process included five key
stages: analysis of learning needs (Analysis), designing the structure and content (Design),
development of learning materials (Development), practical implementation (Implementation), and
evaluation of effectiveness (Evaluation). The course “Pedagogical Aspects of Using Artificial
Intelligence in Secondary Education Institutions” will be integrated into the learning
management system (LMS) of Bohdan Khmelnitsky Melitopol State Pedagogical University—
Moodle.
At the end of the course, students are offered to complete a Generative Artificial Intelligence
Literacy Test (GLAT), developed by a group of Australian researchers [31]. This is the only
available specialized instrument that takes into account the specific features of generative AI and
has been developed in accordance with established procedures in psychological and educational
measurement. The test consists of 20 multiple-choice items covering four dimensions: “Knowledge
and Understanding,” “Application,” “Evaluation and Creation,” and “Ethics.” We translated the
GLAT test items into Ukrainian and adapted it for Ukrainian students. This particular test will be
used in our pedagogical experiment as a diagnostic tool for assessing AI literacy among prospective
mathematics teachers, as it offers a reliable and more objective method for evaluating literacy in
the field of generative AI.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>Priority directions for our further research include the scientific justification of pedagogical
conditions that ensure the preparation of pre-service teachers for the implementation of AI
technologies in their professional activities and development of their C3 skills; the creation of
methodological recommendations for fostering pre-service teachers’ readiness to use AI
technologies in the educational process; as well as conducting a pedagogical experiment to evaluate
the effectiveness of the developed elective course in forming this readiness among pre-service
teachers.</p>
    </sec>
    <sec id="sec-6">
      <title>Declaration on Generative AI</title>
      <p>While preparing this work, the authors used the AI programs Grammarly Pro and GPT-4o to
correct text grammar and Strike Plagiarism to search for possible plagiarism. After using this tool,
the authors reviewed and edited the content as needed and took full responsibility for the
publication’s content.
[27] V. Kovalenko, T. Osypchuk. The Problem of Developing Digital Competence in Cyber Security
of Teachers of General Secondary Education Institutions, Physical Math. Educ. 39(2) (2024) 35–
41. doi:10.31110/fmo2024.v39i2-05
[28] UNICEF. Life for Children during the War. Ukraine, 2024. https://www.unicef.org/ukraine/en/
documents/life-children-during-war
[29] O. A. Termenzhy, A. V. Kozhevnykova. Comparative Analysis of Modern Tools for Assessing
AI-Literacy, Tsyfrovyzatsiia osvity: upravlinnia zminamy: zb. nauk. pr. za materialamy
Vseukrainskoi naukovo-praktychnoi konferentsii «Tsyfrovyzatsiia osvity: upravlinnia
zminamy», 2025, 269–275.
[30] S. Kurt. The ADDIE Model: Instructional Design Educational Technology, 2024.</p>
      <p>http://educationaltechnology.net/the-addie-model-instructional-design/
[31] Y. Jina, R. Martinez-Maldonadoa, D. Gaševićaand, L. Yana. GLAT: The Generative AI Literacy
Assessment Test, 2024. doi:10.48550/arXiv.2411.00283</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>P.</given-names>
            <surname>Pusey</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W. A.</given-names>
            <surname>Sadera</surname>
          </string-name>
          . Cyberethics, Cybersafety, and
          <article-title>Cybersecurity: Preservice Teacher Knowledge, Preparedness, and the Need for Teacher Education to Make a Difference. J. Digital Learning in Teacher Education</article-title>
          , 
          <volume>28</volume>
          (
          <issue>2</issue>
          ),
          <year>2011</year>
          .
          <fpage>82</fpage>
          -
          <lpage>85</lpage>
          . doi:
          <volume>10</volume>
          .1080/21532974.
          <year>2011</year>
          .10784684
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>O.</given-names>
            <surname>Burov</surname>
          </string-name>
          , et al.,
          <source>Cybersecurity in Educational Networks, Advances in Intelligent Systems and Computing</source>
          ,
          <volume>359</volume>
          -
          <fpage>364</fpage>
          ,
          <year>2020</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -39512-4_
          <fpage>56</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <article-title>Implementation of Active Learning in the Master's Program on Cybersecurity, Advances in Computer Science for Engineering and Education II, vol</article-title>
          .
          <volume>938</volume>
          (
          <year>2020</year>
          )
          <fpage>610</fpage>
          -
          <lpage>624</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -16621-2_
          <fpage>57</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          , et al.,
          <article-title>Implementation of Active Cybersecurity Education in Ukrainian Higher School</article-title>
          , Information Technology for Education,
          <source>Science, and Technics</source>
          , vol.
          <volume>178</volume>
          (
          <year>2023</year>
          )
          <fpage>533</fpage>
          -
          <lpage>551</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -35467-0_
          <fpage>32</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Astafieva</surname>
          </string-name>
          , et al.,
          <article-title>Formation of High School Students' Resistance to Destructive Information Influences</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          (
          <year>2023</year>
          )
          <fpage>87</fpage>
          -
          <lpage>96</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Long</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Magerko</surname>
          </string-name>
          . What Is AI Literacy?
          <article-title>Competencies and Design Considerations</article-title>
          ,
          <source>in: 2020 CHI Conference on Human Factors in Computing Systems</source>
          ,
          <year>2020</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          . doi:
          <volume>10</volume>
          .1145/3313831.3376727
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>T. K. F. Chiu</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          <string-name>
            <surname>Ahmad</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Ismailov</surname>
          </string-name>
          , I. T. Sanusi,
          <source>What are Artificial Intelligence Literacy</source>
          and
          <article-title>Competency? A Comprehensive Framework to Support Them, Computers</article-title>
          and Education Open,
          <volume>6</volume>
          (
          <year>2024</year>
          ). doi:
          <volume>10</volume>
          .1016/j.caeo.
          <year>2024</year>
          .100171
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>D.</given-names>
            <surname>Maher</surname>
          </string-name>
          .
          <string-name>
            <surname>Pre-Service</surname>
            <given-names>Teachers</given-names>
          </string-name>
          ' Digital Competencies to Support School Students' Digital Literacies,
          <source>Handbook of Research on Literacy and Digital Technology Integration in Teacher Education</source>
          ,
          <year>2019</year>
          ,
          <fpage>29</fpage>
          -
          <lpage>46</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. Sun. AI</surname>
          </string-name>
          <article-title>Competency for Educators (AICE) Framework: Defining and Developing Practical AI Competency in Education, 2025</article-title>
          . https://www.colleague.
          <article-title>ai/ai-competency-foreducators-aice-framework/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>[10] Guidelines on Artificial Intelligence for General Secondary Education Institutions Project of the Ministry of Education and the Ministry of Digital Transformation of Ukraine</source>
          ,
          <year>2024</year>
          . https://mon.gov.ua/static-objects/mon/sites/1/news/2024/05/21/Instruktyvno.metodychni.reko mendatsiyi.
          <source>shchodo.SHI</source>
          .v.ZZSO-
          <volume>22</volume>
          .
          <fpage>05</fpage>
          .
          <year>2024</year>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Professional</surname>
            <given-names>Standard</given-names>
          </string-name>
          “
          <article-title>Teacher of a General Secondary Education Institution” Ministry of Education and</article-title>
          Science of Ukraine,
          <year>2024</year>
          . https://mon.gov.ua/npa/pro-zatverdzhenniaprofesiinoho
          <article-title>-standartu-vchytel-zakladu-zahalnoi-serednoi-osvity</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>UNESCO ICT Competency Framework for Teachers</surname>
          </string-name>
          ,
          <year>2018</year>
          . https://unesdoc.unesco.org/ark:/ 48223/pf0000265721
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <source>[13] Microsoft Digital Defense Report: The Foundations and New Frontiers of Cybersecurity</source>
          ,
          <year>2024</year>
          . https://www.microsoft.com/en-us/security/security-insider/threat-landscape/microsoft-digitaldefense
          <source>-report-2024</source>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hulak</surname>
          </string-name>
          , et al.,
          <article-title>Formation of Requirements for the Electronic RecordBook in Guaranteed Information Systems of Distance Learning</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          ,
          <source>(CPITS</source>
          <year>2021</year>
          ),
          <volume>2923</volume>
          ,
          <year>2021</year>
          ,
          <fpage>137</fpage>
          -
          <lpage>142</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O.</given-names>
            <surname>Mykhaylova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Fedynyshyn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kyrychok</surname>
          </string-name>
          ,
          <article-title>Person-of-Interest Detection on Mobile Forensics Data-AI-Driven Roadmap</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          ,
          <volume>3654</volume>
          ,
          <year>2024</year>
          ,
          <fpage>239</fpage>
          -
          <lpage>251</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Vasilishyn</surname>
          </string-name>
          , et al.,
          <article-title>Information Technologies for the Synthesis of Rule Databases of an Intelligent Lighting Control System</article-title>
          ,
          <source>J. Theor. Appl. Inf. Technol</source>
          .
          <volume>100</volume>
          (
          <issue>5</issue>
          ) (
          <year>2022</year>
          )
          <fpage>1340</fpage>
          -
          <lpage>1353</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>V.</given-names>
            <surname>Lakhno</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kozlovskii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Boiko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mishchenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Opirskyy</surname>
          </string-name>
          ,
          <article-title>Management of Information Protection based on the Integrated Implementation of Decision Support Systems</article-title>
          ,
          <source>EasternEuropean J. Enterprise Technol</source>
          .
          <volume>5</volume>
          (
          <issue>9</issue>
          (
          <issue>89</issue>
          )) (
          <year>2017</year>
          )
          <fpage>36</fpage>
          -
          <lpage>41</lpage>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2017</year>
          .111081
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V.</given-names>
            <surname>Susukailo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Opirsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Yaremko</surname>
          </string-name>
          ,
          <article-title>Methodology of ISMS Establishment Against Modern Cybersecurity Threats</article-title>
          ,
          <source>in: Lecture Notes in Electrical Engineering</source>
          , Springer International Publishing, Cham,
          <year>2021</year>
          ,
          <fpage>257</fpage>
          -
          <lpage>271</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -92435-5_
          <fpage>15</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>D.</given-names>
            <surname>Shevchuk</surname>
          </string-name>
          , et al.,
          <source>Designing Secured Services for Authentication</source>
          , Authorization, and Accounting of Users,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems (CPITS-2023-II)</source>
          ,
          <volume>3550</volume>
          ,
          <year>2023</year>
          ,
          <fpage>217</fpage>
          -
          <lpage>225</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>O.</given-names>
            <surname>Deineka</surname>
          </string-name>
          , et al.,
          <article-title>Information Classification Framework According to SOC 2 Type II, in: Cybersecurity Providing in Information and Telecommunication Systems II (CPITS-II</article-title>
          <year>2024</year>
          ),
          <volume>3826</volume>
          ,
          <year>2024</year>
          ,
          <fpage>182</fpage>
          -
          <lpage>189</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>D.</given-names>
            <surname>Pruitt-Mentle. C3 Framework Promoting Responsible Use</surname>
          </string-name>
          .
          <source>Educational Technology Policy, Research and Outreach</source>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>H. I.</given-names>
            <surname>Haseski</surname>
          </string-name>
          .
          <article-title>Cyber Security Skills of Pre-Service Teachers as a Factor in Computer-assisted Education, Int</article-title>
          .
          <source>J. Res. Educ. Sci. (IJRES)</source>
          ,
          <volume>6</volume>
          (
          <issue>3</issue>
          ),
          <year>2020</year>
          ,
          <fpage>484</fpage>
          -
          <lpage>500</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>A.</given-names>
            <surname>List</surname>
          </string-name>
          ,
          <source>Defining Digital Literacy Development: An Examination of Pre-Service Teachers' Beliefs, Computers &amp; Education</source>
          ,
          <volume>138</volume>
          ,
          <year>2019</year>
          ,
          <fpage>146</fpage>
          -
          <lpage>158</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kant</surname>
          </string-name>
          .
          <article-title>Cyber-Security Awareness in India: How Much Students of Higher Education Are Aware? GESJ: Educ</article-title>
          .
          <source>Sci. Psychol</source>
          .
          <volume>2</volume>
          (
          <issue>67</issue>
          )
          <fpage>59</fpage>
          -
          <lpage>72</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>J.</given-names>
            <surname>Agamba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Keengwe</surname>
          </string-name>
          ,
          <string-name>
            <surname>Pre-Service</surname>
            <given-names>Teachers</given-names>
          </string-name>
          '
          <article-title>Perceptions of Information Assurance</article-title>
          and
          <string-name>
            <given-names>Cyber</given-names>
            <surname>Security</surname>
          </string-name>
          ,
          <source>Int. J. Inf. Commun. Technol. Educ</source>
          .
          <volume>8</volume>
          (
          <issue>2</issue>
          ) (
          <year>2014</year>
          )
          <fpage>94</fpage>
          -
          <lpage>101</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>C.</given-names>
            <surname>Navarrete</surname>
          </string-name>
          .
          <article-title>Preparing Pre-Service Teachers to Teach Cyber Security Education: Examining Theoretical Approaches</article-title>
          ,
          <source>in: ICERI2023 Proceedings</source>
          ,
          <year>2023</year>
          ,
          <fpage>2215</fpage>
          -
          <lpage>2221</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>