A Game or Notes? The Use of a Customized Mobile Game to Improve Teenagers’ Phishing Knowledge, Case of Tanzania

Author:

Panga Rosemary Cosmas TlatlaaORCID,Marwa Janeth,Ndibwile Jema DavidORCID

Abstract

Recently, phishing attacks have been increasing tremendously, and attackers discover new techniques every day to deceive users. With the advancement of technology, teenagers are considered the most technologically advanced generation, having grown up with the availability of the internet and mobile devices. However, as end-users, they are also considered the weakest link for these attacks to be successful, as they still show poor cybersecurity hygiene and practices. Despite several efforts to educate and provide awareness on the prevention of phishing attacks, less has been done to develop tools to educate teenagers about protecting themselves from phishing attacks considering their differences in social-economic and social culture. This research contributes a customized educational mobile game that fits the African context due to the participants’ existing differences in social-economic and social culture. We initially conducted a survey to assess teenagers’ phishing and cybersecurity knowledge in secondary schools categorized as international, private, and government schools. We then developed a customized mobile game based on the African context taking into consideration participants’ differences in social-economic and social culture. We compared the performance of phishing knowledge of teenagers using a game and a traditional teaching method. The traditional teaching method was presented by the reading notes method. The results revealed that teenagers’ phishing and cybersecurity knowledge differs based on their socioeconomic and social culture. For instance, international, private scholars, and those who live in urban areas have better phishing knowledge than those from government schools and those who live in rural areas. On the other hand, participants who had a poor performance in the first assessment improved their knowledge after playing the game. In addition, participants who played the game had retained their phishing knowledge more, two weeks later, than their counterparts who read only notes.

Funder

Ministry of Education, Science and Technology, Tanzania

Publisher

MDPI AG

Subject

General Medicine

Reference44 articles.

1. A Review of Using Gaming Technology for Cyber-Security Awareness

2. 29 Must-know Cybersecurity Statistics for 2020: Cyber Observer https://www.cyber-observer.com/cyber-news-29-statistics-for-2020-cyber-observer

3. The World Factbook;Agency,2018

4. Quartely Communications Statistics: Tanzania Communications Regulatory Authority;Authority TCR,2021

5. Investigating teenagers’ ability to detect phishing messages;Nicholson;Proceedings of the 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW),2020

Cited by 3 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Safe Digital Teens: an App to Address Technology-Related Risks for Adolescents;Proceedings of the 2024 International Conference on Information Technology for Social Good;2024-09-04

2. Gamification of Cybersecurity Awareness for Non-IT Professionals: A Systematic Literature Review;International Journal of Serious Games;2024-03-22

3. Mobile Money Phishing Cybercrimes: Vulnerabilities, Taxonomies, Characterization from an Investigation in Cameroon;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3