A systematic review of multimedia tools for cybersecurity awareness and education

L Zhang-Kennedy, S Chiasson - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
We conduct a comprehensive review covering academic publications and industry products
relating to tools for cybersecurity awareness and education aimed at non-expert end-users …

[PDF][PDF] A review of using gaming technology for cyber-security awareness

F Alotaibi, S Furnell, I Stengel… - Int. J. Inf. Secur. Res …, 2016 - infonomics-society.org
Rapid development has been observed in the deployment of communication technologies
and the use of the Internet across the globe. Information exchange is the main aspect of use …

Game based cyber security training: are serious games suitable for cyber security training?

M Hendrix, A Al-Sherbaz… - International Journal of …, 2016 - pure.northampton.ac.uk
Security research and training is attracting a lot of investment and interest from governments
and the private sector. Most efforts have focused on physical security, while cyber security or …

Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education

T Denning, A Lerner, A Shostack, T Kohno - Proceedings of the 2013 …, 2013 - dl.acm.org
We scoped, designed, produced, and evaluated the effectiveness of a recreational tabletop
card game created to raise awareness of and alter perceptions regarding-computer security …

A serious game for eliciting social engineering security requirements

K Beckers, S Pape - 2016 IEEE 24th International …, 2016 - ieeexplore.ieee.org
Social engineering is the acquisition of information about computer systems by methods that
deeply include nontechnical means. While technical security of most critical systems is high …

Successful gamification of cybersecurity training

T van Steen, JRA Deeleman - Cyberpsychology, Behavior, and …, 2021 - liebertpub.com
The behavioral aspect of cybersecurity has gained more attention in recent years. By their
actions, people can improve the security of their devices and organizations, but also hinder …

Tailoring a persuasive game to promote secure smartphone behaviour

A Ganesh, C Ndulue, R Orji - Proceedings of the 2023 CHI Conference …, 2023 - dl.acm.org
The use of smartphones has become an integral part of everyone's lives. Due to the
ubiquitous nature and multiple functionalities of smartphones, the data handled by these …

PocketCTF: a fully featured approach for hosting portable attack and defense cybersecurity exercises

S Karagiannis, C Ntantogian, E Magkos, LL Ribeiro… - Information, 2021 - mdpi.com
Capture the flag (CTF) challenges are broadly used for engaging trainees in the technical
aspects of cybersecurity, maintaining hands-on lab exercises, and integrating gamification …

The best laid plans or lack thereof: Security decision-making of different stakeholder groups

B Shreeve, J Hallett, M Edwards… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Cyber security requirements are influenced by the priorities and decisions of a range of
stakeholders. Board members and Chief Information Security Officers (CISOs) determine …

PERSUADED: fighting social engineering attacks with a serious game

D Aladawy, K Beckers, S Pape - Trust, Privacy and Security in Digital …, 2018 - Springer
Social engineering is the clever manipulation of the human element to acquire information
assets. While technical security of most critical systems is high, the systems remain …