Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

A Review of Gamification Applied to Phishing

Version 1 : Received: 7 March 2020 / Approved: 8 March 2020 / Online: 8 March 2020 (16:14:56 CET)

How to cite: Tchakounté, F.; Kanmogne Wabo, L.; Atemkeng, M. A Review of Gamification Applied to Phishing. Preprints 2020, 2020030139. https://doi.org/10.20944/preprints202003.0139.v1 Tchakounté, F.; Kanmogne Wabo, L.; Atemkeng, M. A Review of Gamification Applied to Phishing. Preprints 2020, 2020030139. https://doi.org/10.20944/preprints202003.0139.v1

Abstract

Phishing is a set of devastating techniques which lure target users to provide critical resources. They are successful because they rely on human weaknesses. Gamification which is a recent and non-traditional learning method with purpose to motivate and engage user to carry out activities, is more and more applied to prevent such cyber threats. This paper provides the first survey of gamified solutions dedicated to educate against phishing from 2007 to 2019. The investigation is conducted on eight proposals in terms of core concepts, game mechanics and learning process. We provide three taxonomies of dimensions to systematically characterize researches on gamified solutions, discuss lacks of surveyed works and opens further orientations to enhance this research area. Some key results are: solutions do not consider elementary level of knowledge and do no offer basic notions; solutions are not adapted to general audience and therefore not reliably applicable in different contexts; platforms partially educate about phishing; learners are evaluated predictably and within a short period. This study constitutes a cornerstone to understand and enhance research on phishing education.

Keywords

education; cyber threats; gamification; phishing; survey; taxonomies

Subject

Computer Science and Mathematics, Software

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.