Review
Version 1
Preserved in Portico This version is not peer-reviewed
A Review of Gamification Applied to Phishing
Version 1
: Received: 7 March 2020 / Approved: 8 March 2020 / Online: 8 March 2020 (16:14:56 CET)
How to cite: Tchakounté, F.; Kanmogne Wabo, L.; Atemkeng, M. A Review of Gamification Applied to Phishing. Preprints 2020, 2020030139. https://doi.org/10.20944/preprints202003.0139.v1 Tchakounté, F.; Kanmogne Wabo, L.; Atemkeng, M. A Review of Gamification Applied to Phishing. Preprints 2020, 2020030139. https://doi.org/10.20944/preprints202003.0139.v1
Abstract
Phishing is a set of devastating techniques which lure target users to provide critical resources. They are successful because they rely on human weaknesses. Gamification which is a recent and non-traditional learning method with purpose to motivate and engage user to carry out activities, is more and more applied to prevent such cyber threats. This paper provides the first survey of gamified solutions dedicated to educate against phishing from 2007 to 2019. The investigation is conducted on eight proposals in terms of core concepts, game mechanics and learning process. We provide three taxonomies of dimensions to systematically characterize researches on gamified solutions, discuss lacks of surveyed works and opens further orientations to enhance this research area. Some key results are: solutions do not consider elementary level of knowledge and do no offer basic notions; solutions are not adapted to general audience and therefore not reliably applicable in different contexts; platforms partially educate about phishing; learners are evaluated predictably and within a short period. This study constitutes a cornerstone to understand and enhance research on phishing education.
Keywords
education; cyber threats; gamification; phishing; survey; taxonomies
Subject
Computer Science and Mathematics, Software
Copyright: This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Comments (0)
We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.
Leave a public commentSend a private comment to the author(s)
* All users must log in before leaving a comment