28
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Designing a Mobile Game for Home Computer Users to Protect Against Phishing Attacks

      Preprint
      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          This research aims to design an educational mobile game for home computer users to prevent from phishing attacks. Phishing is an online identity theft which aims to steal sensitive information such as username, password and online banking details from victims. To prevent this, phishing education needs to be considered. Mobile games could facilitate to embed learning in a natural environment. The paper introduces a mobile game design based on a story which is simplifying and exaggerating real life. We use a theoretical model derived from Technology Threat Avoidance Theory (TTAT) to address the game design issues and game design principles were used as a set of guidelines for structuring and presenting information. The overall mobile game design was aimed to enhance avoidance behaviour through motivation of home computer users to protect against phishing threats. The prototype game design is presented on Google App Inventor Emulator. We believe by training home computer users to protect against phishing attacks, would be an aid to enable the cyberspace as a secure environment.

          Related collections

          Author and article information

          Journal
          2016-02-11
          Article
          1602.03929
          36b5bd85-da08-406a-bce5-6368139a9c3f

          http://arxiv.org/licenses/nonexclusive-distrib/1.0/

          History
          Custom metadata
          8 in International Journal for e-Learning Security (IJeLS), Volume 1, Issue 1/2, March/June 2011. arXiv admin note: substantial text overlap with arXiv:1511.07093
          cs.CY cs.CR

          Applied computer science,Security & Cryptology
          Applied computer science, Security & Cryptology

          Comments

          Comment on this article