skip to main content
10.1145/3397617.3398030acmconferencesArticle/Chapter ViewAbstractPublication PagesidcConference Proceedingsconference-collections
extended-abstract

Cyber security education for children through gamification: research plan and perspectives

Authors Info & Claims
Published:21 July 2020Publication History

ABSTRACT

With the advancement of technology and the development of new tools, games, applications and social media sites, it is getting difficult every day to keep up with threats and vulnerabilities associated with these tools, apps or websites, especially for children. The goal of this research is to investigate and further develop new knowledge and tools that will be helpful and effective to teach the children about cyber security by performing various gamified actions in a playful, engaging and motivating manner. The methodology of this research would be both qualitative and quantitative, using interviews, questionnaires, focus group and observations. Initially, this project will define the theoretical and existing practices of cyber security awareness education for children. In the next phase, this research will design and implement interventions based on learning activities like workshops and collaborative tasks; followed by empirical test and evaluation of the proposed interventions.

References

  1. Hamdan, Z., Obaid, I., Ali, A., Hussain, H., Rajan, A. V. and Ahamed, J. (2013). Protecting teenagers from potential internet security threats", International Conference on Cur-rent Trends in Information Technology (CTIT), pp. 143--152.Google ScholarGoogle ScholarCross RefCross Ref
  2. Gjertsen, E., Gjære, E., Bartnes, M. and Flores, W. (2017). Gamification of Information Security Awareness and Training. In Proceedings of the 3rd International Conference on Information Systems Security and Privacy (ICISSP), pp 59--70.Google ScholarGoogle ScholarCross RefCross Ref
  3. Giannakas, F., Kambourakis, G., Papasalouros, A., and Gritzalis, S. (2016). Security education and awareness for k-6 going mobile. International Journal of Interactive Mobile Technologies (ijim), 10(2), 41- 48.Google ScholarGoogle ScholarCross RefCross Ref
  4. Giannakas, F., Papasalouros, A., Kambourakis, G and Gritzalis, F. (2019). A comprehensive cybersecurity learning platform for elementary education, Information Security Journal: A Global Perspective, 28:3, 81--106.Google ScholarGoogle ScholarCross RefCross Ref
  5. Kim, B. (2015). The popularity of gamification in the mobile and social era, Library Technology Reports, 51(2), 5--9.Google ScholarGoogle Scholar
  6. Karagiorgas, D. N. and Niemann, S. (2017). Gamification and Game-Based Learning, Journal of Educational Technology Systems, 45(4), 499--519.Google ScholarGoogle ScholarCross RefCross Ref
  7. Kim, J. T. and Lee, W. H. (2015). Dynamical model for gamification of learning, Multimedia Tools and Applications, 74(19), 8483--8493.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. de Byl, P. (2013). Factors at play in tertiary curriculum gamification. International Journal of Game-Based Learning, 3(2), 1--21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Roepke, R. and Schroeder, U. (2019). The Problem with Teaching Defense against the Dark Arts: A Review of Game-based Learning Applications and Serious Games for Cyber Security Education. In Proceedings of the 11th International Conference on Computer Supported Education - Volume 2, pages 58--66.Google ScholarGoogle ScholarCross RefCross Ref
  10. Tsirtsis, A., Tsapatsoulis, N., Stamatelatos, M., Papadamou, K. and Sirivianos, M. (2016). Cyber security risks for minors: A taxonomy and a software architecture, 11th Inter-national Workshop on Semantic and Social Media Adaptation and Personalization, pp. 93--99.Google ScholarGoogle ScholarCross RefCross Ref
  11. Guan, J. and Huck, J. (2012). Children in the digital age: exploring issues of cybersecurity, In: Proceedings of the 2012 iConference, pp 506--507.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Wang, F. and Hannafin, M. J. (2005). Design-based research and technology-enhanced learning environments. Educational Technology Research and Development, volume 53, 5--23.Google ScholarGoogle ScholarCross RefCross Ref
  13. Kitchenham, B. A. (2004). Procedures for Undertaking Systematic Reviews, Joint Technical Report, Computer Science Department, Keele University (TR/SE-0401) and National ICT Australia Ltd. (0400011T.1).Google ScholarGoogle Scholar
  14. Reeves, T.C. (2006). Design research from a technology perspective. In J. van den Akker, K. Gravemeijer, S. McKenney & N. Nieveen (Eds.), Educational design research, p. 52--66. London: Routledge.Google ScholarGoogle Scholar
  15. Arachchilage, N. A. G. and Love, S. (2013). A game design framework for avoiding phishing attacks, Computers in Human Behavior, vol. 29, no. 3, pp. 706--714.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Raman, R., Lal, A. and Achuthan, K. (2014). Serious games based approach to cyber security concept learning: Indian context, 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), Coimbatore, pp. 1--5.Google ScholarGoogle ScholarCross RefCross Ref
  17. Micallef, N. and Arachchilage, N. A. G. (2017). Involving Users in the Design of a Serious Game for Security Questions Education. arXiv preprint arXiv:1710.03888.Google ScholarGoogle Scholar
  18. Beckers, K., Pape, S. and Fries, V. (2016). HATCH: hack and trick capricious humans-a serious game on social engineering, in Proceedings of the 30th International BCS Human Computer Interaction Conference: Companion Volume, p. 34: BCS Learning & Development Ltd.Google ScholarGoogle ScholarCross RefCross Ref
  19. "Cybersecurity Lab | NOVA Labs | PBS." [Online]. Retrieved March 28, 2020 from http://www.pbs.org/wgbh/nova/labs/lab/cyber.Google ScholarGoogle Scholar

Index Terms

  1. Cyber security education for children through gamification: research plan and perspectives

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IDC '20: Proceedings of the 2020 ACM Interaction Design and Children Conference: Extended Abstracts
      June 2020
      367 pages
      ISBN:9781450380201
      DOI:10.1145/3397617

      Copyright © 2020 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 21 July 2020

      Check for updates

      Qualifiers

      • extended-abstract

      Acceptance Rates

      Overall Acceptance Rate172of578submissions,30%

      Upcoming Conference

      IDC '24
      Interaction Design and Children
      June 17 - 20, 2024
      Delft , Netherlands

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader