Re-evaluation of PhishI game and its utilisation in eliciting security requirements

被引:0
作者
Fatima, Rubia [1 ]
Yasin, Affan [1 ]
Liu, Lin [1 ]
Wang, Jianmin [1 ]
机构
[1] Tsinghua Univ, Sch Software, Beijing, Peoples R China
关键词
social engineering; phishing attack; awareness; security requirements elicitation; serious game; online information disclosure; human factor; DESIGN; MISUSE;
D O I
10.1504/IJICS.2024.138492
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The COVID-19 pandemic has sparked considerable alarm amongst the general community and has significantly affected the societal attitudes and perceptions. In the current era, social engineers are applying various strategies to exploit human weakness. Phishing, a social engineering technique, is one of the most widely used and effective ways to undermine human assets. In this research study, firstly, we aim to educate the participants regarding phishing attacks; secondly, the dangers associated with excessive online sharing; and thirdly, how to utilise game scenarios developed by the participants to elicit security requirements. We have employed various research methods, such as, survey, observation, personas development, and scenario-based technique to achieve these objectives. Our re-evaluation results show that the PhishI game effectively educates participants regarding phishing attacks and dangers associated with disclosing excessive online information.
引用
收藏
页码:294 / 321
页数:29
相关论文
共 63 条
[21]  
Ghanbari H., 2015, Journal of Systems and Software, V109
[22]   Game Based Cyber Security Training: are Serious Games suitable for cyber security training? [J].
Hendrix, Maurice ;
Al-Sherbaz, Ali ;
Bloom, Victoria .
INTERNATIONAL JOURNAL OF SERIOUS GAMES, 2016, 3 (01) :53-61
[23]   The influence of data theft on the share prices and systematic risk of consumer electronics companies [J].
Hinz, Oliver ;
Nofer, Michael ;
Schiereck, Dirk ;
Trillig, Julian .
INFORMATION & MANAGEMENT, 2015, 52 (03) :337-347
[24]   Misuse and abuse cases:: Getting past the positive [J].
Hope, P ;
McGraw, G ;
Antón, AI .
IEEE SECURITY & PRIVACY, 2004, 2 (03) :90-92
[25]  
Jin G., 2018, J Educ Learn (EduLearn), V12, P150, DOI [DOI 10.11591/EDULEARN.V12I1.7736, 10.11591/edulearn.v12i1.7736]
[26]  
Kalnins R, 2017, APPL COMPUT SYST, V21, P38, DOI 10.1515/acss-2017-0005
[27]   Requirements knowledge acquisition from online user forums [J].
Khan, Javed Ali ;
Liu, Lin ;
Wen, Lijie .
IET SOFTWARE, 2020, 14 (03) :242-253
[28]   Security Education against Phishing: A Modest Proposal for a Major Rethink [J].
Kirlappos, Iacovos ;
Sasse, M. Angela .
IEEE SECURITY & PRIVACY, 2012, 10 (02) :24-32
[29]   Phishing: An economic analysis of cybercrime perpetrators [J].
Konradt, Christian ;
Schilling, Andreas ;
Werners, Brigitte .
COMPUTERS & SECURITY, 2016, 58 :39-46
[30]  
Kumar R., 2018, Research Methodology: A Step-By-Step Guide for Beginners