Cybersecurity Awareness on Personal Data Protection Using Game-Based Learning
Abstract
The increasing digitalization in modern society has many positive effects on communication, business, education, banking, etc. However, it has also made people more vulnerable to a variety of cybersecurity risks. The rise in cyberattacks raises serious concerns about the lack of basic knowledge and awareness regarding cyber threats such as phishing, malware and password attacks. These cyber-threats can become dangerous for users as they can even cause identity theft and loss of money. The problem arises because lack of awareness of cybersecurity on personal data protection, a lack not a good understanding of how to protect the data, and a lack of knowledge to prevent cyber threats. Thus, this project proposes game-based learning to provide awareness and educate especially the youth on cybersecurity and personal data protection in a fun and effective way. The knowledge gained from the game can be applied to reduce the risks of cybercrimes. Agile methodology has been chosen for this project and has five phases which are requirement, design, development, testing, deployment and review. The enjoyment level of the game is evaluated by using an adaptation of the E-Game Flow Model including concentration, goal clarity, feedback, challenge, autonomy, immersion and knowledge improvement. Findings of enjoyment evaluation showed that the game receives an 82% level of agreeability by the game users. The game increases awareness among game users about cybersecurity. Future work for this game includes adding more levels into the game, covering other cyber threats and enhancing mobile devices.
Downloads
References
Al-Azawi, R., Al-Faliti, F. & Al-Blushi, M. (2016). Educational gamification vs. game-based learning: Comparative study. International journal of innovation, management and technology, 7(4), 132-136.
Bada, M., Sasse, A. M. & Nurse, J. R. (2019). Cyber security awareness campaigns: Why do they fail to change behavior? arXiv preprint arXiv: 1901.02672.
Bhavsar, V., Kadlak, A. & Sharma, S. (2018). Study on phishing attacks. Int. J. Comput. Appl, 182, 27-29.
Blancaflor, E., Esguerra, C., Fandiño, C., Gonzales, A. L., Nisperos, B. & Pono, L. (2021, March). A. Assessment of Student Vulnerability on the Download of Malware Disguised as Cracked Software. In Proceedings of the 11th Annual International Conference on Industrial Engineering and Operations Management Singapore.
Chanda, K. (2016). Password security: an analysis of password strengths and vulnerabilities. International Journal of Computer Network and Information Security, 8(7), 23.
Cybersecurity and Infrastructure Security Agency. (2021). What is cybersecurity? Retrieved from https://www.cisa.gov/what-cybersecurity
de Bruijn, H. & Janssen, M. (2017). Building cybersecurity awareness: The need for evidence-based framing strategies. Government Information Quarterly, 34(1), 1-7.
Garba, A. A., Siraj, M. M., Othman, S. H. & Musa, M. A. (2020). A study on cybersecurity awareness among students in Yobe State University, Nigeria: A quantitative approach. Int. J. Emerg. Technol, 11(5), 41-49.
Kova?evi?, A., Putnik, N. & Toškovi?, O. (2020). Factors related to cyber security behavior. IEEE Access, 8, 125140-125148.
Mai, P. T. & Tick, A. (2021). Cyber Security Awareness and behavior of youth in smartphone usage: A comparative study between university students in Hungary and Vietnam. Acta Polytech. Hung, 18, 67-89.
McCormick, M. (2012). Waterfall vs. Agile methodology. MPCS, N/A, 3.
Moallem, A. (2018, July). Cyber security awareness among college students. In International conference on applied human factors and ergonomics (pp. 79-87). Springer, Cham.
Moallem, A. (2019). Cybersecurity Awareness among Students and Faculty. CRC Press.
Rahman, N., Sairi, I., Zizi, N. A. M. & Khalid, F. (2020). The importance of cybersecurity education in school. International Journal of Information and Education Technology, 10(5), 378-382.
Sweetser, P. (2020, December). Game Flow 2020: 15 Years of a Model of Player Enjoyment. In 32nd Australian Conference on Human-Computer Interaction, 705-711.
Symantec. (2019). What is Malware? Retrieved from https://www.symantec.com/security-center/definition/malware
Wong, S. M., Leong, C. M. & Puah, C. H. (2020). Mobile Internet adoption in Malaysian suburbs: The moderating effect of gender. Asian Journal of Business Research, 9(3), 90-114.
Copyright (c) 2023 Zamlina binti Abdullah, Nurazian binti Mior Dahlan, Azlin binti Dahlan, Ahmad Faris Irfan bin, Ahmad Samsul Arifin
This work is licensed under a Creative Commons Attribution 4.0 International License.
Author (s) should affirm that the material has not been published previously. It has not been submitted and it is not under consideration by any other journal. At the same time author (s) need to execute a publication permission agreement to assume the responsibility of the submitted content and any omissions and errors therein. After submission of revised paper in the light of suggestions of the reviewers, the editorial team edits and formats manuscripts to bring uniformity and standardization in published material.
This work will be licensed under Creative Commons Attribution 4.0 International (CC BY 4.0) and under condition of the license, users are free to read, copy, remix, transform, redistribute, download, print, search or link to the full texts of articles and even build upon their work as long as they credit the author for the original work. Moreover, as per journal policy author (s) hold and retain copyrights without any restrictions.