Skip to main content

2019 | OriginalPaper | Buchkapitel

Gamification Techniques for Raising Cyber Security Awareness

verfasst von : Sam Scholefield, Lynsay A. Shepherd

Erschienen in: HCI for Cybersecurity, Privacy and Trust

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to the prevalence of online services in modern society, such as internet banking and social media, it is important for users to have an understanding of basic security measures in order to keep themselves safe online. However, users often do not know how to make their online interactions secure, which demonstrates an educational need in this area. Gamification has grown in popularity in recent years and has been used to teach people about a range of subjects. This paper presents an exploratory study investigating the use of gamification techniques to educate average users about password security, with the aim of raising overall security awareness. To explore the impact of such techniques, a role-playing quiz application (RPG) was developed for the Android platform to educate users about password security. Results gained from the work highlighted that users enjoyed learning via the use of the password application, and felt they benefitted from the inclusion of gamification techniques. Future work seeks to expand the prototype into a full solution, covering a range of security awareness issues.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bhagavatula, C., Ur, B., Iacovino, K., Kywe, S., Cranor, L., Savvides, M.: Biometric authentication on iPhone and Android: usability, perceptions, and influences on adoption. In: Proceedings of the USEC 2015, 8 February 2015, San Diego, CA, pp. 1–10 (2015) Bhagavatula, C., Ur, B., Iacovino, K., Kywe, S., Cranor, L., Savvides, M.: Biometric authentication on iPhone and Android: usability, perceptions, and influences on adoption. In: Proceedings of the USEC 2015, 8 February 2015, San Diego, CA, pp. 1–10 (2015)
4.
Zurück zum Zitat Shepherd, L.A., Archibald, J.: Security awareness and affective feedback: categorical behaviour vs. reported behaviour. In: 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), London, pp. 1–6 (2017) Shepherd, L.A., Archibald, J.: Security awareness and affective feedback: categorical behaviour vs. reported behaviour. In: 2017 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), London, pp. 1–6 (2017)
5.
Zurück zum Zitat Kelley, P.G., Bresee, J., Cranor, L.F., Reeder, R.W.: A nutrition label for privacy. In: Proceedings of the 5th Symposium on Usable Privacy and Security, p. 4. ACM (2009) Kelley, P.G., Bresee, J., Cranor, L.F., Reeder, R.W.: A nutrition label for privacy. In: Proceedings of the 5th Symposium on Usable Privacy and Security, p. 4. ACM (2009)
7.
Zurück zum Zitat Furnell, S., Jusoh, A., Katsabas, D.: The challenges of understanding and using security: a survey of end-users. Comput. Secur. 25(1), 27–35 (2006)CrossRef Furnell, S., Jusoh, A., Katsabas, D.: The challenges of understanding and using security: a survey of end-users. Comput. Secur. 25(1), 27–35 (2006)CrossRef
8.
Zurück zum Zitat Shay, R., et al.: A spoonful of sugar? In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems - CHI 2015, pp. 2903–2912 (2015) Shay, R., et al.: A spoonful of sugar? In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems - CHI 2015, pp. 2903–2912 (2015)
9.
Zurück zum Zitat De Carné De Carnavalet, X., Mannan M.: A large-scale evaluation of high-impact password strength meters. ACM Trans. Inf. Syst. Secur. 18(1), Article no. 1 (2015) De Carné De Carnavalet, X., Mannan M.: A large-scale evaluation of high-impact password strength meters. ACM Trans. Inf. Syst. Secur. 18(1), Article no. 1 (2015)
10.
Zurück zum Zitat Egelman, S., Sotirakopoulos, A., Muslukhov, I., Beznosov, K., Herley, C.: Does my password go up to eleven? In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI 2013, pp. 2379–2388 (2013) Egelman, S., Sotirakopoulos, A., Muslukhov, I., Beznosov, K., Herley, C.: Does my password go up to eleven? In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems - CHI 2013, pp. 2379–2388 (2013)
11.
Zurück zum Zitat Ciampa, M.: A comparison of password feedback mechanisms and their impact on password entropy. Inf. Manag. Comput. Secur. 21(5), 344–359 (2013)CrossRef Ciampa, M.: A comparison of password feedback mechanisms and their impact on password entropy. Inf. Manag. Comput. Secur. 21(5), 344–359 (2013)CrossRef
12.
Zurück zum Zitat Witte, K.: Putting the fear back into fear appeals: the extended parallel process model. Commun. Monogr. 59(4), 329–349 (1992)CrossRef Witte, K.: Putting the fear back into fear appeals: the extended parallel process model. Commun. Monogr. 59(4), 329–349 (1992)CrossRef
13.
Zurück zum Zitat Vance, A., Eargle, D., Ouimet, K., Straub, D.: Enhancing password security through interactive fear appeals: a web-based field experiment. In: 2013 46th Hawaii International Conference on System Sciences, pp. 2988–2997 (2013) Vance, A., Eargle, D., Ouimet, K., Straub, D.: Enhancing password security through interactive fear appeals: a web-based field experiment. In: 2013 46th Hawaii International Conference on System Sciences, pp. 2988–2997 (2013)
16.
Zurück zum Zitat Zichermann, G., Cunningham, C.: Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps. O’Reilly, Sebastopol (2011) Zichermann, G., Cunningham, C.: Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps. O’Reilly, Sebastopol (2011)
19.
Zurück zum Zitat Ibanez, M., Di-Serio, A., Delgado-Kloos, C.: Gamification for engaging computer science students in learning activities: a case study. IEEE Trans. Learn. Technol. 7(3), 291–301 (2014)CrossRef Ibanez, M., Di-Serio, A., Delgado-Kloos, C.: Gamification for engaging computer science students in learning activities: a case study. IEEE Trans. Learn. Technol. 7(3), 291–301 (2014)CrossRef
20.
Zurück zum Zitat O’Donovan, S., Gain, J., Marais, P.: A case study in the gamification of a university-level games development course. In: Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference, pp. 242–251. ACM (2013) O’Donovan, S., Gain, J., Marais, P.: A case study in the gamification of a university-level games development course. In: Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference, pp. 242–251. ACM (2013)
25.
Zurück zum Zitat Jin, G., Tu, M., Kim, T., Heffron, J., White, J.: Evaluation of game-based learning in cybersecurity education for high school students. J. Educ. Learn. (EduLearn) 12(1), 150 (2018)CrossRef Jin, G., Tu, M., Kim, T., Heffron, J., White, J.: Evaluation of game-based learning in cybersecurity education for high school students. J. Educ. Learn. (EduLearn) 12(1), 150 (2018)CrossRef
26.
Zurück zum Zitat Coull, N., et al.: On the use of serious games technology to facilitate large-scale training in cybercrime response. In: European Police Science and Research Bulletin, Special Conference Edition, no. 3, pp. 123–130 (2017) Coull, N., et al.: On the use of serious games technology to facilitate large-scale training in cybercrime response. In: European Police Science and Research Bulletin, Special Conference Edition, no. 3, pp. 123–130 (2017)
28.
Zurück zum Zitat Canova, G., Volkamer, M., Bergmann, C., Reinheimer, B.: NoPhish app evaluation: lab and retention study. In: NDSS Workshop on Usable Security, pp. 1–10 (2015) Canova, G., Volkamer, M., Bergmann, C., Reinheimer, B.: NoPhish app evaluation: lab and retention study. In: NDSS Workshop on Usable Security, pp. 1–10 (2015)
30.
Zurück zum Zitat Gómez-Pérez, E., Ostrosky-Solís, F.: Attention and memory evaluation across the life span: heterogeneous effects of age and education. J. Clin. Exp. Neuropsychol. 28(4), 477–494 (2006)CrossRef Gómez-Pérez, E., Ostrosky-Solís, F.: Attention and memory evaluation across the life span: heterogeneous effects of age and education. J. Clin. Exp. Neuropsychol. 28(4), 477–494 (2006)CrossRef
33.
Zurück zum Zitat Furnell, S., Thomson, K.: Recognising and addressing ‘security fatigue’. Comput. Fraud Secur. 2009(11), 7–11 (2009)CrossRef Furnell, S., Thomson, K.: Recognising and addressing ‘security fatigue’. Comput. Fraud Secur. 2009(11), 7–11 (2009)CrossRef
34.
Zurück zum Zitat Herley, C.: So long, and no thanks for the externalities: the rational rejection of security advice by users. In: Proceedings of the 2009 workshop on New security Paradigms Workshop, pp. 133–144. ACM, September 2009 Herley, C.: So long, and no thanks for the externalities: the rational rejection of security advice by users. In: Proceedings of the 2009 workshop on New security Paradigms Workshop, pp. 133–144. ACM, September 2009
35.
Zurück zum Zitat Domínguez, A., Saenz-de-Navarrete, J., de-Marcos, L., Fernández-Sanz, L., Pagés, C., Martínez-Herráiz, J.: Gamifying learning experiences: Practical implications and outcomes. Comput. Educ. 63, 380–392 (2013)CrossRef Domínguez, A., Saenz-de-Navarrete, J., de-Marcos, L., Fernández-Sanz, L., Pagés, C., Martínez-Herráiz, J.: Gamifying learning experiences: Practical implications and outcomes. Comput. Educ. 63, 380–392 (2013)CrossRef
36.
Zurück zum Zitat Ur, B., et al.: How does your password measure up? The effect of strength meters on password creation. In: Security 2012 Proceedings of the 21st USENIX Conference on Security Symposium (2012) Ur, B., et al.: How does your password measure up? The effect of strength meters on password creation. In: Security 2012 Proceedings of the 21st USENIX Conference on Security Symposium (2012)
37.
Zurück zum Zitat Dehn, D., Van Mulken, S.: The impact of animated interface agents: a review of empirical research. Int. J. Hum Comput Stud. 52(1), 1–22 (2000)CrossRef Dehn, D., Van Mulken, S.: The impact of animated interface agents: a review of empirical research. Int. J. Hum Comput Stud. 52(1), 1–22 (2000)CrossRef
38.
Zurück zum Zitat Parker, L., Lepper, M.: Effects of fantasy contexts on children’s learning and motivation: Making learning more fun. J. Pers. Soc. Psychol. 62(4), 625–633 (1992)CrossRef Parker, L., Lepper, M.: Effects of fantasy contexts on children’s learning and motivation: Making learning more fun. J. Pers. Soc. Psychol. 62(4), 625–633 (1992)CrossRef
39.
Zurück zum Zitat Okan, Z.: Edutainment: is learning at risk? Br. J. Edu. Technol. 34(3), 255–264 (2003)CrossRef Okan, Z.: Edutainment: is learning at risk? Br. J. Edu. Technol. 34(3), 255–264 (2003)CrossRef
Metadaten
Titel
Gamification Techniques for Raising Cyber Security Awareness
verfasst von
Sam Scholefield
Lynsay A. Shepherd
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-22351-9_13