Phishing continues to be a difficult problem for individuals and organisations. Educational games and simulations have been increasingly acknowledged as versatile and powerful teaching tools, yet little work has examined how to engage users with these games. We explore this problem by conducting workshops with 9 younger adults and reporting on their expectations for cybersecurity educational games. We find a disconnect between casual and serious gamers, where casual gamers prefer simple games incorporating humour while serious gamers demand a congruent narrative or storyline. Importantly, both demographics agree that educational games should prioritise gameplay over information provision -- i.e. the game should be a game with educational co...
Nowadays, cybersecurity plays an integral role for everyone’s online presence where extensive usage ...
Ransomware attacks based on social engineering have been increasing since COVID-19. Attackers have c...
Young people are increasingly becoming responsible for the security of their devices, yet do not app...
Cybersecurity education has become increasingly critical as we spend more of our everyday lives onli...
Copyright @ 2014 IEEE. This is the author accepted version of this article.Games can be used to supp...
Games can be used to support learning in several domains, including the secure use of computers. How...
Since the dot-com bubble, the internet and its associated technologies have become an increasingly l...
Phishing attacks are challenging to detect and can have severe consequences. For example, in 2020 al...
[[abstract]]Internet phishing attack is increasing and causing enormous economic loss in recent year...
Phishing is a form of online identity theft, which attempts to appropriate confidential and sensitiv...
Phishing is a social engineering procedure in which a malicious actor impersonates a trusted third p...
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Th...
Phishing is an especially challenging cyber security threat as it does not attack computer systems, ...
Phishing is an online identity theft that aims to steal sensitive information such as username, pass...
Game based education is becoming more and more popular. This is because game based education provide...
Nowadays, cybersecurity plays an integral role for everyone’s online presence where extensive usage ...
Ransomware attacks based on social engineering have been increasing since COVID-19. Attackers have c...
Young people are increasingly becoming responsible for the security of their devices, yet do not app...
Cybersecurity education has become increasingly critical as we spend more of our everyday lives onli...
Copyright @ 2014 IEEE. This is the author accepted version of this article.Games can be used to supp...
Games can be used to support learning in several domains, including the secure use of computers. How...
Since the dot-com bubble, the internet and its associated technologies have become an increasingly l...
Phishing attacks are challenging to detect and can have severe consequences. For example, in 2020 al...
[[abstract]]Internet phishing attack is increasing and causing enormous economic loss in recent year...
Phishing is a form of online identity theft, which attempts to appropriate confidential and sensitiv...
Phishing is a social engineering procedure in which a malicious actor impersonates a trusted third p...
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Th...
Phishing is an especially challenging cyber security threat as it does not attack computer systems, ...
Phishing is an online identity theft that aims to steal sensitive information such as username, pass...
Game based education is becoming more and more popular. This is because game based education provide...
Nowadays, cybersecurity plays an integral role for everyone’s online presence where extensive usage ...
Ransomware attacks based on social engineering have been increasing since COVID-19. Attackers have c...
Young people are increasingly becoming responsible for the security of their devices, yet do not app...