Playful Secure Participation
PDF (Deutsch)

Keywords

Games
Spiele
Lernen
Serious Games

How to Cite

Röpke, René. 2019. “Playful Secure Participation: A Review of Game-Based Learning Applications on IT Security and Security Practices”. MediaEducation: Journal for Theory and Practice of Media Education 36 (Teilhabe): 170-85. https://doi.org/10.21240/mpaed/36/2019.11.21.X.

License

Copyright (c) 2019 René Röpke

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.

Abstract

In a world dominated by digital media, interaction with IT systems and the Internet is child‘s play for some and a major challenge for others. But what seems intuitive is not immediately right – or safe. In terms of secure practices, many lack basic knowledge and skills about IT security and information technology. Game-based approaches to imparting the necessary knowledge and skills should enable secure participation in this digitalized world. This paper presents a two-fold review of game-based learning applications and serious games on IT security and security practices that analyzes and evaluates publications and available applications based on two hypotheses. While there are many publications from the field of research that are also suitable for end users without previous knowledge, there are only a few games that are actually available. Moreover, games available online do not provide sustainable knowledge and skills that enable safe participation. It takes context and relevance to teach secure practices for the use of IT systems and the Internet. With the development of new games that take these aspects into account, end users can experience a motivating introduction to IT security.

https://doi.org/10.21240/mpaed/36/2019.11.21.X

References

Abt, Clark. 1970. «Serious Games.» Viking Press, Inc., Nueva York.

Alotaibi, Faisal, Steven Furnell, Ingo Stengel, und Maria Papadaki. 2016. «A Review of Using Gaming Technology for Cyber-Security Awareness.»

Ariffin, Mazeyanti M, Wan Fatimah Wan Ahmad, und Suziah Sulaiman. 2016. «Investigating the Educational Effectiveness of Gamebased Learning for IT Education.» In Computer and Information Sciences (ICCOINS), 2016 3rd International Conference on, 570–73.

Compte, Alexis Le, David Elizondo, und Tim Watson. 2015. «A Renewed Approach to Serious Games for Cyber Security.» In Cyber Conflict: Architectures in Cyberspace (CyCon), 2015 7th International Conference on, 203–16.

CTFtime.org. 2018. «All about CTF (Capture The Flag).» 2018.

Deterding, Sebastian, Rilla Khaled, Lennart E Nacke, und Dan Dixon. 2011. «Gamification: Toward a Definition.» In CHI 2011 Gamification Workshop Proceedings. Vol. 12.

Dewey, Chad M, und Chad Shaffer. 2016. «Advances in Information SEcurity EDucation.» In Electro Information Technology (EIT), 2016 IEEE International Conference on, 133–38.

Gondree, Mark, Zachary N J Peterson, und Tamara Denning. 2013. «Security through Play.» IEEE Security & Privacy, no. 3. IEEE: 64–67.

Gondree, Mark, Zachary N J Peterson, und Portia Pusey. 2016. «Talking about Talking about Cybersecurity Games.»

Hendrix, Maurice, Ali Al-Sherbaz, und Bloom Victoria. 2016. «Game Based Cyber Security Training: Are Serious Games Suitable for Cyber Security Training?» International Journal of Serious Games 3 (1): 53–61.

Ion, Iulia, Rob Reeder, und Sunny Consolvo. 2015. «‘... No One Can Hack My Mind’: Comparing Expert and Non-Expert Security Practices.» In SOUPS, 15:1–20.

Irvine, Cynthia E, Michael F Thompson, und Ken Allen. 2005. «CyberCIEGE: Gaming for Information Assurance.» IEEE Security & Privacy 3 (3). IEEE: 61–64.

Pastor, Vicente, Gabriel Díaz, und Manuel Castro. 2010. «State-of-the-Art Simulation Systems for Information Security Education, Training and Awareness.» In Education Engineering (EDUCON), 2010 IEEE, 1907–16.

Prensky, M. 2001. «Digital Game-Based Learning, McGraw-Hill & Paragon House, New York.»

Raman, Raghu, Athira Lal, und Krishnashree Achuthan. 2014. «Serious Games Based Approach to Cyber Security Concept Learning: Indian Context.» In Green Computing Communication and Electrical Engineering (ICGCCEE), 2014 International Conference on, 1–5.

Seitz, Tobias, und Heinrich Hussmann. 2017. «PASDJO: Quantifying Password Strength Perceptions with an Online Game.» In Proceedings of the 29th Australian Conference on Computer-Human Interaction, 117–25.

Son, Joon, Chinedum Irrechukwu, und Patrick Fitzgibbons. 2012. «Virtual Lab for Online Cyber Security Education.» Communications of the IIMA 12 (4): 5.

Tioh, Jin-Ning, Mani Mina, und Douglas W Jacobson. 2017. «Cyber Security Training a Survey of Serious Games in Cyber Security.» In Frontiers in Education Conference (FIE), 1–5. IEEE.

Wolf, Martin R, und Johannes A König. 2017. «Competence Developing Games.» INFORMATIK 2017. Gesellschaft für Informatik, Bonn.

Zyda, Michael. 2005. «From Visual Simulation to Virtual Reality to Games.» Computer 38 (9). IEEE: 25–32.