Security and Privacy From a Legal, Ethical, and Technical Perspective 2020
DOI: 10.5772/intechopen.91159
|View full text |Cite
|
Sign up to set email alerts
|

The Role of Gamification in Privacy Protection and User Engagement

Abstract: The interaction between users and several technologies has rapidly increased. In people's daily habits, the use of several applications for different reasons has been introduced. The provision of attractive services is an important aspect that it should be considered during their design. The implementation of gamification supports this, while game elements create a more entertaining and appealing environment. At the same time, due to the collection and record of users' information within them, security and pri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 50 publications
(70 reference statements)
0
5
0
Order By: Relevance
“…Amorim et al [65] suggest the use of gamification techniques as an alternative to provide data privacy training to practitioners of an organization. Mavroeidi et al [53] also investigated the use of Gamification for privacy requirements elicitation and the engagement of the users.…”
Section: Rq2 What Is the Perception Of Privacy Among Ict Practitionmentioning
confidence: 99%
“…Amorim et al [65] suggest the use of gamification techniques as an alternative to provide data privacy training to practitioners of an organization. Mavroeidi et al [53] also investigated the use of Gamification for privacy requirements elicitation and the engagement of the users.…”
Section: Rq2 What Is the Perception Of Privacy Among Ict Practitionmentioning
confidence: 99%
“…Similarly, when developing gamification platforms and applications, we need to ensure the cybersecurity and the privacy of the data and the different end-users. Robust measures must be implemented to ensure patient information remains confidential and protected ( [39]: [40]).…”
Section: Challenges and Considerationsmentioning
confidence: 99%
“…Since these rights have to be guarantee during all the software lifecycle, we have included it in the maintenance activity. To integrate the legal requirements imposed by the GDPR into the UP [18], we propose a procedure with the following steps: 4. Otherwise, we evaluated the next article.…”
Section: A Proceduresmentioning
confidence: 99%
“…Amorim et al [3] suggest the use of gamification techniques as an option for providing practitioners at an organization with data privacy training. Mavroeidi et al [18] also investigated the use of gamification for privacy requirements elicitation and engagement with the users. Perera et al [22] proposed a guide based on the Privacy by-Design framework including a set of best practices to help software engineers to ensure user data privacy during the development of Internet of Things (IoT) applications.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation