Figure 6 - uploaded by Johannes Alexander König
Content may be subject to copyright.
Options after touching the "Show shutdown menu" button (Button translation inserted) Quest 3 serious content: During the chat the camera suddenly moves onto the main screen of the bridge. Depending on whether the player locked his screen in Quest 2 or not there is a different email-like message on the screen. If he forgot to lock his screen the participant is addressed directly by his name and the mail is sent from his terminal. But if he locked his screen in Quest 2 the message is addressed to a crew member and sent from the crew member's terminal. In both cases the captain points out that someone made a joke and that it is important to lock the screen always. (Serious goal: more frequent screen locking) (see Figure 6) Quest 4 gameplay: The participant will be requested to the security chef. They chat about the infected ghost-drive and the security chef points out that he needs help to generate new passwords that are good to remember. Quest 4 serious content: The password generation is wrapped in a mini-game. During the game, the participant has to shot on eight words that will be the long enough to be a good base for the password generation. If the participant shoots a short word he loses one of the already collected long words. However, after the collection of words the player modifies the words to passwords. For that, he selects a character he wants to change or add (e.g., a 1 for an i, etc.) and tries to shoot down the wished character. As he makes the changes, he sees a constantly changing display indicating how secure the password currently is. By that, the participant gets a feel for what makes a password secure. (Serious goal: teach how to build a safe password) (see Figure 7).

Options after touching the "Show shutdown menu" button (Button translation inserted) Quest 3 serious content: During the chat the camera suddenly moves onto the main screen of the bridge. Depending on whether the player locked his screen in Quest 2 or not there is a different email-like message on the screen. If he forgot to lock his screen the participant is addressed directly by his name and the mail is sent from his terminal. But if he locked his screen in Quest 2 the message is addressed to a crew member and sent from the crew member's terminal. In both cases the captain points out that someone made a joke and that it is important to lock the screen always. (Serious goal: more frequent screen locking) (see Figure 6) Quest 4 gameplay: The participant will be requested to the security chef. They chat about the infected ghost-drive and the security chef points out that he needs help to generate new passwords that are good to remember. Quest 4 serious content: The password generation is wrapped in a mini-game. During the game, the participant has to shot on eight words that will be the long enough to be a good base for the password generation. If the participant shoots a short word he loses one of the already collected long words. However, after the collection of words the player modifies the words to passwords. For that, he selects a character he wants to change or add (e.g., a 1 for an i, etc.) and tries to shoot down the wished character. As he makes the changes, he sees a constantly changing display indicating how secure the password currently is. By that, the participant gets a feel for what makes a password secure. (Serious goal: teach how to build a safe password) (see Figure 7).

Source publication
Article
Full-text available
To train end users how to interact with digital systems is indispensable to ensure a strong computer security. 'Competence Developing Game'-based approaches are particularly suitable for this purpose because of their motivation-and simulation-aspects. In this paper the Competence Developing Game 'GHOST' for cybersecurity awareness trainings and its...

Context in source publication

Context 1
... both cases the captain points out that someone made a joke and that it is important to lock the screen always. (Serious goal: more frequent screen locking) (see Figure 6) Quest 4 gameplay: The participant will be requested to the security chef. They chat about the infected ghost-drive and the security chef points out that he needs help to generate new passwords that are good to remember. ...

Similar publications

Conference Paper
Full-text available
Organisations have a tendency of worrying about their vulnerabilities to outsider threat when contrasted with their weakness to insider threats despite the way that industry-particular research proposes that a substantial amount of security breaches begin from a trusted insider(employee) within the organisation. Insiders frequently unconsciously pa...
Chapter
Full-text available
Internet of Things (IoT) becomes a key source to big sensing data streams. Big data streams become a key research issue to process in a resource-constrained IoT devices, but security concerns in big sensing data streams are still an open research problem. This paper presents an overview of the big data stream security classifications in the context...
Technical Report
Full-text available
Recently developed Distributed Energy Resource (DER) interoperability standards include communication and cybersecurity requirements. In 2018, the US national interconnection standard, IEEE 1547, was revised to require DER to include a SunSpec Modbus, IEEE 2030.5 (Smart Energy Profile, SEP 2.0), or IEEE 1815 (DNP3) communication interface but does...
Thesis
Full-text available
It is imperative to note the internet, together with other technologies such as computers, have been credited for offering new windows into the global world. They have allowed organizations to improve their processes and respond to the needs of clients and other relevant stakeholders. Unfortunately, such technologies also expose modern enterprises...

Citations

... Directly related to the acquisition of competencies in business games is an intrinsic motivation to learn, as it describes the desire to learn and to acquire competencies in the respective educational situation [2,5]. This relationship is supported by the simulation studies [6,42]. Moreover, participants groups are discussed as another influencing factor on the acquisition of competencies since they promote social learning [8,43]. ...
Chapter
Even though the benefits of learning with business games are well known and accepted among the scientific community, there are only few approaches of making the results of business games measurable by virtue of the difficult evaluation of the multitude of influencing factors of learning effects and success. Moreover, there are only few findings about general conditions influencing learning and high-quality results of business games. In order to gain an overview on the current state of knowledge, the paper provides main results of a literature review about learning effects and success of business games and their influencing components, covering publications from 2010 to 2020.One of the first and most salient results of the literature review are that the participants’ learning effects are strongly connected with the learners’ motivation and with their overall satisfaction as well as with the realism of the game. In a similar vein, the acceptance of business games is correlated with the realism of the business game, the group during the game and the acquisition of competencies and learning through the game. Thus, the paper emphasizes which elements are important for evaluating learning effects and acceptance of business games and which components influence them in detail.Keywordsbusiness gameslearning effectsacceptance of business gamesfurther educationsystematic literature review
... This should incorporate both performance-and practice-based metrics to capture a comprehensive understanding of learner development. Where possible, pre/post-intervention testing can help to establish the efficacy of an intervention; several studies across the literature engaged in this type of testing (Deeb & Hickey, 2019;Konig & Wolf, 2018;Mostafa & Faragallah, 2019;Raman, et al., 2014;Ross & Bennett, 2020;Tobarra, et al., 2020) but many lacked evaluation. ...
Article
The effectiveness of gamification in educational technology and digital learning environments has been the subject of research for over a decade. Gamified interventions encourage active learning by promoting role-playing, mentalisation, and experimentation. Learner-centred approaches have been shown to increase learning outcomes compared to traditional methods in some domains. Although the behavioural drivers associated with gamified learning are now well documented, practical advice for game designers who produce workplace training is much less common. This paper proposes the RAD-SIM framework for behaviourally effective cybersecurity games design, whereby psychological and behavioural principles are combined with learning theories to facilitate practical game-based learning. Using the framework will increase the engagement and retention of knowledge of the end-user. Although designed with cybersecurity training in mind, there are implications for educational game design in general. Future avenues for research, including potential case studies in practice, increasing the customisability of gamified interventions, and utilising natural data from organisations are considered. Social Machines conducted this work funded by the Research Institute for Sociotechnical Cyber Security (RISCS
... Our main finding is, that few games include detailed explanations of conceptual knowledge. There are only two games (NoPhish and Anti-Phishing Phil) which focus on URLs, and explain how to determine the registrable domain Anti-Phishing Phil [5] ATMSG/CSAG [24] Birds Life [25] codecanyon d cyberaware [26] CyberCraft [27] GHOST [28] NoPhish [29] OpenDNS e Sophos f whatdothack [30] whatthehack [31] WithGoogle (RD) of a URL (as defined by the WHATWG URL standard 6 ). NoPhish goes beyond this and takes apart the structure of URLs in detail, making it the game with the most detailed explanations. ...
Chapter
Game-based learning is a promising approach to anti-phishing education, as it fosters motivation and can help reduce the perceived difficulty of the educational material. Over the years, several prototypes for game-based applications have been proposed, that follow different approaches in content selection, presentation, and game mechanics. In this paper, a literature and product review of existing learning games is presented. Based on research papers and accessible applications, an in-depth analysis was conducted, encompassing target groups, educational contexts, learning goals based on Bloom’s Revised Taxonomy, and learning content. As a result of this review, we created the publications on games (POG) data set for the domain of anti-phishing education. While there are games that can convey factual and conceptual knowledge, we find that most games are either unavailable, fail to convey procedural knowledge or lack technical depth. Thus, we identify potential areas of improvement for games suitable for end-users in informal learning contexts.
Article
Full-text available
Obwohl Planspiele vielfach in Schule, Studium sowie Aus- und Fortbildung eingesetzt werden, ist die Datenlage hinsichtlich ihrer Wirkungen unübersichtlich. In einem Literaturreview wurden daher 137 Publikationen aus den Jahren 2010 bis 2020 zu Einflussfaktoren und Wirkung von Planspielen untersucht. Zentrales Ergebnis ist, dass das Lernen der Teilnehmenden stark mit deren Motivation, ihrer Zufriedenheit mit dem Planspiel und insbesondere mit der Realitätsnähe des Spiels zusammenhängen. Ob Planspiele als Lernmethode akzeptiert werden, hängt ebenso von der Realitätsnähe, der Gruppe während des Spiels und dem Erwerb von Kompetenzen ab. Gestaltungsimplikationen und eine zukünftige Forschungsagenda runden diesen Beitrag ab.