2018
DOI: 10.1016/j.infsof.2017.12.002
|View full text |Cite
|
Sign up to set email alerts
|

Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
54
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
8

Relationship

4
4

Authors

Journals

citations
Cited by 58 publications
(56 citation statements)
references
References 31 publications
0
54
0
2
Order By: Relevance
“…Accordingly, there has been a shift in thinking about the best ways of combating cybercrime to emphasise creating awareness and encouraging individuals to adopt better cybersecurity practices [31], including gamified approaches to educate users and improve their threat avoidance behaviour. Gamification shows promise as a technique to enhance the effectiveness of cybersecurity awareness programs, and several cybersecurity games have been developed to engage users better and change their behaviour to avoid cyberattacks [32].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Accordingly, there has been a shift in thinking about the best ways of combating cybercrime to emphasise creating awareness and encouraging individuals to adopt better cybersecurity practices [31], including gamified approaches to educate users and improve their threat avoidance behaviour. Gamification shows promise as a technique to enhance the effectiveness of cybersecurity awareness programs, and several cybersecurity games have been developed to engage users better and change their behaviour to avoid cyberattacks [32].…”
Section: Literature Reviewmentioning
confidence: 99%
“…For example, making internet not working for the target victim computer and further offer the victim to make it work. This will help him to introduce him/her as well as direct access to a computer to search and install what he/she wants Tailgating 16,26,27 In this type of attack, an attacker accesses the organization's premises without any legal identity just by following the authorized person of the organization…”
Section: Social Engineering Attacks References Explanationmentioning
confidence: 99%
“…Need & greed attack 16,27 In need and greed attack, the attacker first gathers information of the needs and greed for the victim and further uses this information to collect formation needed Direct approach 16,27 In this type of attack, an attacker directly approaches the victim to get the desired information Distraction approach 2,16 In this type of attack, an attacker involves in an activity to redirect victim's attention File masquerading 9 In File masquerading attack infected file is placed in the trusted folder. The victim when opens the folder will trust and execute the file without any fear…”
Section: Social Engineering Attacks References Explanationmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, in view of Pak Nejad et al (2014), data growth, technology expansion, and access to required resources can enhance the chances of cyber-risk. For other authors (e.g., Yasin, 2018), the increasing number of cyber threats and their associated costs have pressured many organizations to adopt the technology and use all possible tools and technologies in an attempt to protect its data and information from being hacked or stolen through the different means of technologies like software, programs, and risk management approaches. However, few studies have examined the effects of cyber-security on organizational internal process and the role of technological infrastructure in minimizing these effects.…”
Section: Introductionmentioning
confidence: 99%