A Review of Using Gaming Technology for Cyber-Security Awareness

Rapid development has been observed in the deployment of communication technologies and the use of the Internet across the globe. Information exchange is the main aspect of use of such technologies in everyday life. Crimes associated with the misuse of information on the Internet are on the increase and are resulting in various losses. Saudi Arabia is one of the fastest developing countries in the Middle East, where the uptake of communication technologies such as the Internet and mobile technologies has risen sharply in recent years. These technologies are relatively new to the region when compared to developed countries. Therefore, the crimes associated with these technologies may be new to the people in the region. Our previous study has found that there is an immediate need for launching awareness programs about cyber security and cyber-attacks, keeping in view of the rising Internet and mobile usage in the country. A mobile gaming application was preferred by the participants in the previous study to address the issue of creating awareness. Considering the results from the previous study, this paper reviews various studies focusing on gaming applications and the effectiveness of their usage in creating cyber security awareness. Different gaming applications are studied and compared, and majority of the studies proved to be effective in creating awareness among the users. However, there are few aspects which need to be considered such as suitability or tailoring the applications/games according to the user needs and requirements, issue specific games etc. The review of the previous studies and gaming applications in this paper has found that mobile gaming applications are effective in creating cyber security awareness.

[1]  Manuel Castro,et al.  State-of-the-art simulation systems for information security education, training and awareness , 2010, IEEE EDUCON 2010 Conference.

[2]  Cynthia E. Irvine,et al.  Teaching Objectives of a Simulation Game for Computer Security , 2003 .

[3]  Matthew Kam,et al.  Let's play chinese characters: mobile learning approaches via culturally inspired group games , 2010, CHI.

[4]  Victoria Bloom,et al.  Game Based Cyber Security Training: are Serious Games suitable for cyber security training? , 2016, Int. J. Serious Games.

[5]  S. Ariyapperuma,et al.  Internet security games as a pedagogic tool for teaching network security , 2005, Proceedings Frontiers in Education 35th Annual Conference.

[6]  Zbigniew Michalewicz,et al.  Applying Puzzle-Based Learning to Cyber-Security Education , 2013, InfoSecCD.

[7]  Dino Schweitzer,et al.  Using visualization to teach security , 2009 .

[8]  Kenneth Geers Live Fire Exercise: Preparing for Cyber War , 2010 .

[9]  Andreea Molnar,et al.  EducaMovil: mobile educational games made easy , 2011 .

[10]  Zachary N. J. Peterson,et al.  Security through play , 2013, IEEE Security & Privacy.

[11]  Steve Love,et al.  Security awareness of computer users: A phishing threat avoidance perspective , 2014, Comput. Hum. Behav..

[12]  Ying-Tien Wu,et al.  A Review on the Concepts and Instructional Methods of Mini Digital Physics Games of PHYSICSGAMES.NET , 2011, Edutainment.

[13]  Stanislav Kurkovsky,et al.  Engaging students through mobile game development , 2009, SIGCSE '09.

[14]  Tadayoshi Kohno,et al.  Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education , 2013, CCS.

[15]  Antonella De Angeli,et al.  Explore! possibilities and challenges of mobile learning , 2008, CHI.

[16]  Kenton O'Hara,et al.  Social Impact , 2019, Encyclopedia of Food and Agricultural Ethics.

[17]  Michael Weber,et al.  Mobile learning - challenges and potentials , 2007, Int. J. Mob. Learn. Organisation.

[18]  Patrick G. Nyeste,et al.  Training Users to Counteract Phishing , 2010, Work.

[19]  Helmut Hlavacs,et al.  A Case Study of a Learning Game about the Internet , 2014, GameDays.

[20]  Rae A. Earnshaw,et al.  Designing Augmented Reality Games for Mobile Learning Using an Instructional-Motivational Paradigm , 2009, 2009 International Conference on CyberWorlds.

[21]  Steve Love,et al.  A game design framework for avoiding phishing attacks , 2013, Comput. Hum. Behav..