Re-evaluation of PhishI game and its utilisation in eliciting security requirements

被引:0
作者
Fatima, Rubia [1 ]
Yasin, Affan [1 ]
Liu, Lin [1 ]
Wang, Jianmin [1 ]
机构
[1] Tsinghua Univ, Sch Software, Beijing, Peoples R China
关键词
social engineering; phishing attack; awareness; security requirements elicitation; serious game; online information disclosure; human factor; DESIGN; MISUSE;
D O I
10.1504/IJICS.2024.138492
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The COVID-19 pandemic has sparked considerable alarm amongst the general community and has significantly affected the societal attitudes and perceptions. In the current era, social engineers are applying various strategies to exploit human weakness. Phishing, a social engineering technique, is one of the most widely used and effective ways to undermine human assets. In this research study, firstly, we aim to educate the participants regarding phishing attacks; secondly, the dangers associated with excessive online sharing; and thirdly, how to utilise game scenarios developed by the participants to elicit security requirements. We have employed various research methods, such as, survey, observation, personas development, and scenario-based technique to achieve these objectives. Our re-evaluation results show that the PhishI game effectively educates participants regarding phishing attacks and dangers associated with disclosing excessive online information.
引用
收藏
页码:294 / 321
页数:29
相关论文
共 63 条
  • [1] COVID-19 and Phishing: Effects of Human Emotions, Behavior, and Demographics on the Success of Phishing Attempts During the Pandemic
    Abroshan, Hossein
    Devos, Jan
    Poels, Geert
    Laermans, Eric
    [J]. IEEE ACCESS, 2021, 9 : 121916 - 121929
  • [2] User characteristics that influence judgment of social engineering attacks in social networks
    Albladi, Samar Muslah
    Weir, George R. S.
    [J]. HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2018, 8
  • [3] Amory A., 2003, South African Journal of Higher Education, V17, P206
  • [4] Arachchilage N. A. G., 2011, 2011 International Conference on Information Society (i-Society), P485
  • [5] A game design framework for avoiding phishing attacks
    Arachchilage, Nalin Asanka Gamagedara
    Love, Steve
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2013, 29 (03) : 706 - 714
  • [6] Trust and Social Engineering in Human Robot Interaction: Will a Robot Make You Disclose Sensitive Information, Conform to Its Recommendations or Gamble?
    Aroyo, Alexander Mois
    Rea, Francesco
    Sandini, Giulio
    Sciutti, Alessandra
    [J]. IEEE ROBOTICS AND AUTOMATION LETTERS, 2018, 3 (04): : 3701 - 3708
  • [7] Adopting automated whitelist approach for detecting phishing attacks
    Azeez, Nureni Ayofe
    Misra, Sanjay
    Margaret, Ihotu Agbo
    Fernandez-Sanz, Luis
    Abdulhamid, Shafi'i Muhammad
    [J]. COMPUTERS & SECURITY, 2021, 108
  • [8] Baral Gitanjali, 2019, 2019 Cybersecurity and Cyberforensics Conference (CCC). Proceedings, P102, DOI 10.1109/CCC.2019.000-1
  • [9] Baslyman M, 2016, PROCEEDINGS OF THE 2016 APWG SYMPOSIUM ON ELECTRONIC CRIME RESEARCH (ECRIME), P91
  • [10] A Serious Game for Eliciting Social Engineering Security Requirements
    Beckers, Kristian
    Pape, Sebastian
    [J]. 2016 IEEE 24TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2016, : 16 - 25