Cybersecurity education has become increasingly critical as we spend more of our everyday lives online. Research shows that college students are mostly unaware of the many online dangers. To teach students about cybersecurity using their preferred medium, gaming, we developed an educational 2D game called “Bird’s Life” that aims to teach college students, as well as general interest individuals, about phishing. Players will come to understand phishing attacks and how to avoid them in real-world scenarios through a fun gaming context. The game can be deployed to multiple platforms such as PC, web, and mobile devices. To measure the effect of this game on learning the concepts of cybersecurity, a pre-test, post-test, and online survey were de...
Copyright @ 2014 IEEE. This is the author accepted version of this article.Games can be used to supp...
Nowadays, cybersecurity plays an integral role for everyone’s online presence where extensive usage ...
Games can be used to support learning in several domains, including the secure use of computers. How...
Cybersecurity education has become increasingly critical as we spend more of our everyday lives onli...
Cybersecurity education has become increasingly critical as we spend more of our everyday lives onli...
[[abstract]]Internet phishing attack is increasing and causing enormous economic loss in recent year...
Phishing continues to be a difficult problem for individuals and organisations. Educational games an...
Phishing is a form of online identity theft, which attempts to appropriate confidential and sensitiv...
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Th...
Since the dot-com bubble, the internet and its associated technologies have become an increasingly l...
Serious games can challenge users in competitive and entertaining ways. Educators have used serious ...
Phishing attacks are challenging to detect and can have severe consequences. For example, in 2020 al...
Phishing is a form of online identity theft, which attempts to appropriate confidential and sensitiv...
Phishing is an online identity theft that aims to steal sensitive information such as username, pass...
Abstract Phishing is an online identity theft that aims to steal sensitive information such as usern...
Copyright @ 2014 IEEE. This is the author accepted version of this article.Games can be used to supp...
Nowadays, cybersecurity plays an integral role for everyone’s online presence where extensive usage ...
Games can be used to support learning in several domains, including the secure use of computers. How...
Cybersecurity education has become increasingly critical as we spend more of our everyday lives onli...
Cybersecurity education has become increasingly critical as we spend more of our everyday lives onli...
[[abstract]]Internet phishing attack is increasing and causing enormous economic loss in recent year...
Phishing continues to be a difficult problem for individuals and organisations. Educational games an...
Phishing is a form of online identity theft, which attempts to appropriate confidential and sensitiv...
This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University.Th...
Since the dot-com bubble, the internet and its associated technologies have become an increasingly l...
Serious games can challenge users in competitive and entertaining ways. Educators have used serious ...
Phishing attacks are challenging to detect and can have severe consequences. For example, in 2020 al...
Phishing is a form of online identity theft, which attempts to appropriate confidential and sensitiv...
Phishing is an online identity theft that aims to steal sensitive information such as username, pass...
Abstract Phishing is an online identity theft that aims to steal sensitive information such as usern...
Copyright @ 2014 IEEE. This is the author accepted version of this article.Games can be used to supp...
Nowadays, cybersecurity plays an integral role for everyone’s online presence where extensive usage ...
Games can be used to support learning in several domains, including the secure use of computers. How...