skip to main content
10.1145/3374135.3385276acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
research-article

Analysis of Player Behavior and EEG Readings in a Cybersecurity Game

Authors Info & Claims
Published:25 May 2020Publication History

ABSTRACT

This paper describes a study of player behavior and electroencephalography (EEG) headset readings while playing a cybersecurity educational video game. While difficulty was progressively increased, player actions and EEG readings were recorded, along with a pre- and post-test of student knowledge and opinions regarding information security awareness and perceived immersion. This study employed Brute Force, a tower defense game that teaches players to choose strong, unique, and memorable passwords. Participants reported significantly more responsible attitudes regarding the importance of strong, unique passwords. More successful players who played the full fifteen minutes tended to improve at identifying strong passwords from a list. After playing the game, participants were most likely to add password length and uniqueness as important password strategies.

References

  1. D. Afergan, E. Peck, E. Solovey, A. Jenkins, S. Hincks, E. Brown, R. Chang, and R. Jacob. Dynamic Difficulty using Brain Metrics of Workload. In Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, pages 3797--3806, Toronto, Canada, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. G. Andrade, G. Ramalho, H. Santana, and V. Corruble. Extending Reinforcement Learning to Provide Dynamic Game Balancing. In Proceedings of the Workshop on Reasoning, Representation, and Learning in Computer Games, 19th International Joint Conference on Artificial Intelligence (IJCAI), pages 7--12, Edinburgh, Scotland, 2005.Google ScholarGoogle Scholar
  3. M. Csíkszentmihályi. Finding flow: The Psychology of Engagement with Everyday Life. Basic Books, 1997.Google ScholarGoogle Scholar
  4. P. Demasi and J. de O Adriano. On-line Coevolution for Action Games. International Journal of Intelligent Games & Simulation, 2(2), 2003.Google ScholarGoogle Scholar
  5. P. Felicia. Developments in Current Game-based Learning Design and Deployment. IGI Global, 2012.Google ScholarGoogle Scholar
  6. C. Fox and J. H. Brockmyer. The Development of the Game Engagement Questionnaire: A Measure of Engagement in Video Game Playing: Response to Reviews. Interacting with Computers, 25(4):290--293, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  7. J. P. Gee. Good Video Games + Good Learning: Collected Essays on Video Games, Learning, and Literacy, volume 27. Peter Lang, 2007.Google ScholarGoogle Scholar
  8. C. Heunis. Export and Analysis of Emotiv Insight EEG Data via EEGLab.Google ScholarGoogle Scholar
  9. R. Hunicke. The Case for Dynamic Difficulty Adjustment in Games. In Proceedings of the 2005 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology, pages 429--433. ACM, 2005.Google ScholarGoogle Scholar
  10. A. McCormac, D. Calic, M. Butavicius, K. Parsons, T. Zwaans, and M. Pattinson. A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses. Australasian Journal of Information Systems, 21, 2017.Google ScholarGoogle Scholar
  11. K. Mikami, K. Kondo, et al. Adaptable Game Experience based on Player's Performance and EEG. In Nicograph International (NicoInt), 2017, pages 1--8. IEEE, Kyoto, Japan, 2017.Google ScholarGoogle Scholar
  12. A. Smith. What the Public Knows about Cybersecurity. Pew Research Center on Internet and American Life March, 22, 2017.Google ScholarGoogle Scholar
  13. D. Wheeler. zxcvbn: Realistic Password Strength Estimation. Dropbox Tech Blog, 2012.Google ScholarGoogle Scholar

Index Terms

  1. Analysis of Player Behavior and EEG Readings in a Cybersecurity Game

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ACM SE '20: Proceedings of the 2020 ACM Southeast Conference
        April 2020
        337 pages
        ISBN:9781450371056
        DOI:10.1145/3374135

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 25 May 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate178of377submissions,47%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader