skip to main content
10.1145/3424954.3424958acmotherconferencesArticle/Chapter ViewAbstractPublication PageseiccConference Proceedingsconference-collections
research-article

Raising Security Awareness on Mobile Systems through Gamification

Published:12 January 2021Publication History

ABSTRACT

Smartphones are more and more included into our personal and business environment. A data leakage of personal data violates our privacy, leaked business data might even mean a huge financial loss. Thus, many companies provide IT-security training to their employers. Classic security workshops are often considered old-fashioned and boring. Thus, this work presents a novel, continuous mobile security training concept. This concept provides mechanism to generate game data based on automated IT-security analysis of installed apps on the user's smartphone. Thus, raising personal concern through revealing vulnerabilities of the user's own work environment. We also increase the user engagement through the identification of new game mechanisms such as multi-player and rewards through badges, levels or experience points.

References

  1. Appannie. 2017. Spotlight on Consumer App Usage. http://files.appannie.com.s3.amazonaws.com/reports/1705_Report_Consumer_App_Usage_EN.pdfGoogle ScholarGoogle Scholar
  2. P. Backlund and M. Hendrix. 2013. Educational games - Are they worth the effort? A literature survey of the effectiveness of serious games, In 2013 5th International Conference on Games and Virtual Worlds for Serious Applications (VS-GAMES). Games and Virtual Worlds for Serious Applications (VS-GAMES 2013) 5, 1--8. https://doi.org/10.1109/VS-GAMES.2013.6624226Google ScholarGoogle ScholarCross RefCross Ref
  3. IBM Corporation. 2014. Cyber Security Intelligence Index. Technical Report. IBM Corporation. https://i.crn.com/sites/default/files/ckfinderimages/userfiles/images/crn/custom/IBMSecurityServices2014.PDFGoogle ScholarGoogle Scholar
  4. C. Fellbaum and G.A. Miller. 1998. WordNet: An Electronic Lexical Database. MIT Press. https://books.google.de/books?id=Rehu8OOzMIMCGoogle ScholarGoogle Scholar
  5. Christopher Cunningham Gabe Zichermann. 2011. Gamification by Design, Implementing Game Mechanics in Web and Mobile Apps. O'Reilly Media.Google ScholarGoogle Scholar
  6. Jens Heider. 2020. Appicaptor. Fraunhofer SIT. https://www.sit.fraunhofer.de/en/appicaptor/Google ScholarGoogle Scholar
  7. Ryan J. Baxter, Darin Holderness, and David Wood. 2015. Applying Basic Gamification Techniques to IT Compliance Training: Evidence from the Lab and Field. Journal of Information Systems 30 (11 2015). https://doi.org/10.2308/isys-51341Google ScholarGoogle Scholar
  8. Kaspersky. 2000. KIPS: Kaspersky Interactive Protection Simulation. Kaspersky. Retrieved June 7, 2006 from https://media.kaspersky.com/en/business-security/enterprise/KL_SA_KIPS_overview_A4_Eng_web.pdfGoogle ScholarGoogle Scholar
  9. Kaspersky. 2017. The Human Factor in IT Security: How Employees are Making Businesses Vulnerable from Within. Kaspersky. https://www.kaspersky.com/blog/the-human-factor-in-it-security/Google ScholarGoogle Scholar
  10. William Aubrey Labuschagne and Mariki Eloff. 2014. The effectiveness of online gaming as part of a security awareness program. In 13th European Conference on Cyber Warfare and Security ECCWS-2014 The University of Piraeus Piraeus, Greece. 125.Google ScholarGoogle Scholar
  11. Trend Micro. 2015. The Fugle. http://targetedattacks.trendmicro.com/about-the-game.htmlGoogle ScholarGoogle Scholar
  12. Scott Nicholson. 2015. A RECIPE for Meaningful Gamification. Springer, Cham, 1--20. https://doi.org/10.1007/978-3-319-10208-5_1Google ScholarGoogle Scholar
  13. E. D. Oroszi. 2019. Security awareness escape room - a possible new method in improving security awareness of users. In 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). 1--4.Google ScholarGoogle ScholarCross RefCross Ref
  14. Andreas Papasalouros, Konstantinos Kanaris, and Konstantinos Kotis. 2008. Automatic Generation Of Multiple Choice Questions From Domain Ontologies.. In e-Learning. Citeseer, 427--434.Google ScholarGoogle Scholar
  15. PricewaterhouseCoopers. 2014. Key Findings from the 2014 US State of Cybercrime Survey. Technical Report. CERT Division of the Software Engineering Institute. https://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdfGoogle ScholarGoogle Scholar
  16. PricewaterhouseCoopers. 2020. Game of Threats. https://www.pwc.co.uk/issues/cyber-security-data-privacy/services/game-of-threats.htmlGoogle ScholarGoogle Scholar
  17. Naval Postgraduate School. 2020. CyberCIEGE. https://my.nps.edu/web/c3o/cyberciegeGoogle ScholarGoogle Scholar
  18. Z Cliffe Schreuders and EM Butterfield. 2016. Gamification for teaching and learning computer security in higher education. In 2016 USENIX Workshop on Advances in Security Education (ASE 16). USENIX Association.Google ScholarGoogle Scholar
  19. David Thornton and G Francia. 2014. Gamification of information systems and security training: Issues and case studies. Information Security Education Journal 1, 1 (2014), 16--24.Google ScholarGoogle Scholar

Index Terms

  1. Raising Security Awareness on Mobile Systems through Gamification

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      EICC '20: Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference
      November 2020
      72 pages
      ISBN:9781450375993
      DOI:10.1145/3424954

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 12 January 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader