Skip to main content

A Novel Framework for the Development of Age Appropriate Information Security Serious Games

  • Conference paper
  • First Online:
Human Aspects of Information Security and Assurance (HAISA 2022)

Abstract

Serious games have been shown to be an effective tool when teaching information security concepts to children and adults alike. However, due to the different ways in which people learn during different stages of their life, developing effective games for children can be a non-trivial task. In this paper, a novel framework is introduced that aims to simplify the process of developing serious games for children by making use of well-known developmental psychology principles. The framework is based on Erikson’s Theory of Psychosocial Development, as well as Bandura’s Social Cognitive Theory. Both of these theories are well-known within the field of developmental psychology, and have been shown to be valid in prior studies. To validate the proposed framework, a number of existing serious games from the literature is used in order to determine if the framework could have been used to develop the extant games. The framework, developed from a psychological basis, matches the games found in the literature. This suggests that the framework is a valid approach when developing age appropriate information security games.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dang-Pham, D., Kautz, K., Hoang, A.-P., Pittayachawan, S.: Identifying information security opinion leaders in organizations: insights from the theory of social power bases and social network analysis. Comput. Secur. 112, 102505 (2022)

    Article  Google Scholar 

  2. McLeod, A., Dolezel, D.: Information security policy non-compliance: can capitulation theory explain user behaviors? Comput. Secur. 112, 102526 (2022)

    Article  Google Scholar 

  3. López, A.U., et al.: Analysis of computer user behavior, security incidents and fraud using self-organizing maps. Comput. Secur. 83, 38–51 (2019)

    Article  Google Scholar 

  4. Tsai, C.-Y., Shih, W.-L., Hsieh, F.-P., Chen, Y.-A., Lin, C.-L., Wu, H.-J.: Using the arcs model to improve undergraduates’ perceived information security protection motivation and behavior. Comput. Educ. 104449 (2022)

    Google Scholar 

  5. Moody, G.D., Siponen, M., Pahnila, S.: Toward a unified model of information security policy compliance. MIS Q. 42(1), 285–311 (2018)

    Article  Google Scholar 

  6. Holgersson, J., Kävrestad, J., Nohlberg, M.: Cybersecurity and digital exclusion of seniors: what do they fear? In: International Symposium on Human Aspects of Information Security and Assurance, pp. 12–21, Springer (2021)

    Google Scholar 

  7. Kemper, G.: Improving employees’ cyber security awareness. Comput. Fraud Secur. 2019(8), 11–14 (2019)

    Article  Google Scholar 

  8. Chen, Y.-T., Shih, W.-L., Lee, C.-H., Wu, P.-L., Tsai, C.-Y.: Relationships among undergraduates’ problematic information security behavior, compulsive internet use, and mindful awareness in taiwan. Comput. Educ. 164, 104131 (2021)

    Article  Google Scholar 

  9. Furnell, S., Thomson, K.-L.: Recognising and addressing ‘security fatigue.’ Comput. Fraud Secur. 2009(11), 7–11 (2009)

    Article  Google Scholar 

  10. Bernard, L., Raina, S., Taylor, B., Kaza, S.: Minimizing cognitive overload in cybersecurity learning materials: an experimental study using eye-tracking. In: IFIP World Conference on Information Security Education, pp. 47–63, Springer (2021)

    Google Scholar 

  11. Jaffray, A., Finn, C., Nurse, J.R.: Sherlocked: a detective-themed serious game for cyber security education. In: International Symposium on Human Aspects of Information Security and Assurance, pp. 35–45, Springer (2021)

    Google Scholar 

  12. Cone, B.D., Irvine, C.E., Thompson, M.F., Nguyen, T.D.: A video game for cyber security training and awareness. Comput. Secur. 26(1), 63–72 (2007)

    Article  Google Scholar 

  13. Allers, J., Drevin, G., Snyman, D., Kruger, H., Drevin, L.: Children’s awareness of digital wellness: a serious games approach. In: IFIP World Conference on Information Security Education, pp. 95–110, Springer (2021)

    Google Scholar 

  14. Dunkel, C.S., Harbke, C.: A review of measures of Erikson’s stages of psychosocial development: evidence for a general factor. J. Adult Dev. 24(1), 58–76 (2017)

    Article  Google Scholar 

  15. Erikson, E.H.: Childhood and society. Paladin Grafton Books (1993)

    Google Scholar 

  16. Bandura, A.: Social cognitive theory: an agentic perspective. Asian J. Soc. Psychol. 2(1), 21–41 (1999)

    Article  Google Scholar 

  17. Bandura, A.: Social Learning Theory. Prentice Hall (1977)

    Google Scholar 

  18. Nwosu, H.E., Obidike, P.C., Ugwu, J.N., Udeze, C.C., Okolie, U.C.: Applying social cognitive theory to placement learning in business firms and students’ entrepreneurial intentions. Int. J. Manag. Educ. 20(1), 100602 (2022)

    Article  Google Scholar 

  19. Woods, E.K., Fly, A.D., Dickinson, S.L., Chen, X.: P18 a test of social cognitive theory on fruit and vegetable intake in indiana high school students. J. Nutr. Educ. Behav. 53(7), S32 (2021)

    Article  Google Scholar 

  20. Maree, J.G.: The psychosocial development theory of Erik Erikson: critical overview. Early Child Dev. Care 191(7–8), 1107–1121 (2021)

    Article  Google Scholar 

  21. McGaw, J., Vance, A., White, S., Mongta, S.: Whose place? Lessons from a case study of a guardianship determination for an Australian indigenous child. Health Place 73, 102739 (2022)

    Article  Google Scholar 

  22. Sokol, J.T.: Identity development throughout the lifetime: an examination of Eriksonian theory. Graduate J. Counsel. Psychol. 1(2), 1–10 (2009)

    Google Scholar 

  23. Louw, D., Louw, A.: Child and Adolescent Development. Psychology publications (2014)

    Google Scholar 

  24. Blake, S., Winsor, D.L., Allen, L.: Child Development and the Use of Technology: Perspectives, Applications and Experiences. Information Science Reference (2011)

    Google Scholar 

  25. Snyman, D.P., Drevin, G.R., Kruger, H.A., Drevin, L., Allers, J.: A wolf, hyena, and fox game to raise cybersecurity awareness among pre-school children. In: International Symposium on Human Aspects of Information Security and Assurance, pp. 91–101, Springer (2021)

    Google Scholar 

  26. Pérez, J., Torres, R., Brand, S.V.: Cyberkids: video game for raising cyber security awareness in children. In: 2020 39th International Conference of the Chilean Computer Science Society (SCCC), pp. 1–8 (2020)

    Google Scholar 

  27. Pbs.Org: The cybersecurity lab – educator guide | nova labs | pbs. https://www.pbs.org/wgbh/nova/labs/about-cyber-lab/educator-guide/. Accessed 6 Apr 2022

  28. Rogers, S.: Level Up! The Guide to Great Video Game Design. John Wiley & Sons (2014)

    Google Scholar 

  29. Green, C.S., Bavelier, D.: Action video game modifies visual selective attention. Nature 423(6939), 534–537 (2003)

    Article  Google Scholar 

  30. Mostafa, M., Faragallah, O.S.: Development of serious games for teaching information security courses. IEEE Access 7, 169293–169305 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rudi Serfontein .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Serfontein, R., Serfontein, R. (2022). A Novel Framework for the Development of Age Appropriate Information Security Serious Games. In: Clarke, N., Furnell, S. (eds) Human Aspects of Information Security and Assurance. HAISA 2022. IFIP Advances in Information and Communication Technology, vol 658. Springer, Cham. https://doi.org/10.1007/978-3-031-12172-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-12172-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-12171-5

  • Online ISBN: 978-3-031-12172-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics