2011
DOI: 10.20533/ijels.2046.4568.2011.0003
|View full text |Cite
|
Sign up to set email alerts
|

Designing a Mobile Game for Home Computer Users to Protect Against “Phishing Attacks”

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 32 publications
(12 citation statements)
references
References 31 publications
0
12
0
Order By: Relevance
“…Similar study was also conducted at the Indiana University [45]. Arachchilage and Cole [46] designed an educational mobile game for home computers to protect users from phishing attacks. The game was designed to educate users to recognize phishing URLs.…”
Section: User Educationmentioning
confidence: 92%
“…Similar study was also conducted at the Indiana University [45]. Arachchilage and Cole [46] designed an educational mobile game for home computers to protect users from phishing attacks. The game was designed to educate users to recognize phishing URLs.…”
Section: User Educationmentioning
confidence: 92%
“…All Arachchilage and Cole [11,12] designed a mobile game design prototype as an educational tool to teach home computer users to protect themselves against phishing attacks. Their research proposed a mobile game design for learning, based on a story, which simplifies and exaggerates real life situations.…”
Section: Related Workmentioning
confidence: 99%
“…Once the developer has identified the salient issues, they are faced with second question, what principles should guide the structure of this information. A theoretical model derived from Technology Threat Avoidance Theory (TTAT) was used to address those mobile game design issues and the mobile game design principles were used as a set of guidelines for structuring and presenting information in the mobile game design context [6,11]. The objective of their anti-phishing mobile game design was to teach the user how to identify phishing URLs and emails, which is one of many ways to identify a phishing attack.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations