Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3341215.3356273acmconferencesArticle/Chapter ViewAbstractPublication Pageschi-playConference Proceedingsconference-collections
Work in Progress

What Could Go Wrong?: Raising Mobile Privacy and Security Awareness Through a Decision-Making Game

Published: 17 October 2019 Publication History

Abstract

Uninformed actions in privacy and security settings of mobile devices might cause data leaks. In many occasions, users may not be aware of such issues due to lack of knowledge on the topic. To raise interest and awareness towards this issue, extra effort might be needed. Game-based learning has proven to be an effective approach in terms of motivation and promotion of understanding. Humour is also considered to have the ability to create a positive attitude to the subject matter and reduce anxiety. To examine the interplay of games and humor, we developed What Could Go Wrong, a humorous decision-making game that helps users to better understand the consequences of applying security changes on a mobile device. We conducted a preliminary study comparing the game to two more models (a serious animated video and a humorous animated video), to analyze its impact on user's motivation as well as raising awareness of the topic. Our user study (n=21) shows that the game-based approach is more successful in engaging and raising awareness.

References

[1]
Saba Arshad, Munam Ali Shah, Abid Khan, and Mansoor Ahmed. 2016. Android Malware Detection & Protection: A Survey. International Journal of Advanced Computer Science and Applications 7, 2 (2016).
[2]
Mehrdad Bahrini, Nina Wenig, Marcel Meissner, Karsten Sohr, and Rainer Malaka. 2019. HappyPermi: Presenting Critical Data Flows in Mobile Application to Raise User Security Awareness. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (CHI EA '19). ACM, New York, NY, USA, Article LBW0262, 6 pages.
[3]
Oswald Barral, Ilkka Kosunen, and Giulio Jacucci. 2017. No Need to Laugh Out Loud: Predicting Humor Appraisal of Comic Strips Based on Physiological Signals in a Realistic Environment. ACM Trans. Comput.-Hum. Interact. 24, 6, Article 40 (Dec. 2017), 29 pages.
[4]
Tianying Chen, Jessica Hammer, and Laura Dabbish. 2019. Self-Efficacy-Based Game Design to Encourage Security Behavior Online. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (CHI EA '19). ACM, New York, NY, USA, Article LBW1610, 6 pages.
[5]
Sabrina Culyba. 2018. The Transformational Framework: A Process Tool for the Development of Transformational Games. (9 2018).
[6]
Cuong T. Do, Nguyen H. Tran, Choongseon Hong, Charles A. Kamhoua, Kevin A. Kwiat, Erik Blasch, Shaolei Ren, Niki Pissinou, and Sundaraja Sitharama Iyengar. 2017. Game Theory for Cyber Security and Privacy. ACM Comput. Surv. 50, 2, Article 30 (May 2017), 37 pages.
[7]
Claire Dormann, Pippin Barr, and Robert Biddle. 2006. Humour Theory and Videogames: Laughter in the Slaughter. In Proceedings of the 2006 ACM SIGGRAPH Symposium on Videogames (Sandbox '06). ACM, New York, NY, USA, 95--98.
[8]
Claire Dormann and Robert Biddle. 2006. Humour in game-based learning. Learning, Media and Technology 31, 4 (2006), 411--424.
[9]
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, and David Wagner. 2012. Android Permissions: User Attention, Comprehension, and Behavior. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12). ACM, New York, NY, USA, Article 3, 14 pages.
[10]
Geoffrey Hookham and Michael Meany. 2014. Perspective Shifting: Humour and Comedy in Games. In Proceedings of the 2014 Conference on Interactive Entertainment (IE2014). ACM, New York, NY, USA, Article 21, 8 pages.
[11]
Wout Joseph, Tom Deryckere, and Luc Martens. 2010. User-driven innovation? Challenges of user involvement in future technology analysis. Science and Public Policy 37 (02 2010).
[12]
Patrick Kelly, Sunny Consolvo, Lorrie Cranor, Jaeyeon Jung, Norman Sadeh, and David Wetherall. 2012. A Conundrum of Permissions: Installing Applications on an Android Smartphone. Proceedings of USEC 2012 7398 (03 2012).
[13]
Elmer EH Lastdrager. 2014. Achieving a consensual definition of phishing based on a systematic review of the literature. Crime Science 3, 1 (03 Sep 2014), 9.
[14]
Ilaria Liccardi, Joseph Pato, Daniel J. Weitzner, Hal Abelson, and David De Roure. 2014. No Technical Understanding Required: Helping Users Make Informed Choices About Access to Their Personal Data. In Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MOBIQUITOUS '14). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, Belgium, 140--150.
[15]
Ivan Lombardi. 2012. Not-so-Serious Games for Language Learning. Now with 99,9% More Humour on Top. Procedia Computer Science 15 (2012), 148 -- 158. 4th International Conference on Games and Virtual Worlds for Serious Applications(VS-GAMES'12).
[16]
Muhammad Baqer Mollah, Md Azad, and Athanasios Vasilakos. 2017. Security and Privacy Challenges in Mobile Cloud Computing: Survey and Way Ahead. Journal of Network and Computer Applications 84 (04 2017), 34--54.
[17]
Alexios Mylonas, Stelios Dritsas, Bill Tsoumas, and Dimitris Gritzalis. 2012. On the Feasibility of Malware Attacks in Smartphone Platforms. In E-Business and Telecommunications, Mohammad S. Obaidat, José L. Sevillano, and Joaquim Filipe (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 217--232.
[18]
David Olsen and Michael Mateas. 2009. Beep! Beep! Boom!: Towards a Planning Model of Coyote and Road Runner Cartoons. In Proceedings of the 4th International Conference on Foundations of Digital Games (FDG '09). ACM, New York, NY, USA, 145--152.
[19]
Joseph Polimeni and Jeffrey P. Reiss. 2006. The First Joke: Exploring the Evolutionary Origins of Humor. Evolutionary Psychology 4, 1 (2006).
[20]
Zikai Alex Wen, Zhiqiu Lin, Rowena Chen, and Erik Andersen. 2019. What.Hack: Engaging Anti-Phishing Training Through a Role-playing Phishing Simulation Game. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems (CHI '19). ACM, New York, NY, USA, Article 108, 12 pages.

Cited By

View all
  • (2024)A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprisesComputer Science Review10.1016/j.cosrev.2023.10059250:COnline publication date: 4-Mar-2024
  • (2023)CyberHero: An Adaptive Serious Game to Promote Cybersecurity AwarenessElectronics10.3390/electronics1217354412:17(3544)Online publication date: 22-Aug-2023
  • (2023)Tickling Proactivity: Exploring the Use of Humor in Proactive Voice AssistantsProceedings of the 22nd International Conference on Mobile and Ubiquitous Multimedia10.1145/3626705.3627777(294-320)Online publication date: 3-Dec-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI PLAY '19 Extended Abstracts: Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts
October 2019
859 pages
ISBN:9781450368711
DOI:10.1145/3341215
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 October 2019

Check for updates

Author Tags

  1. animation
  2. decision-making
  3. game-based learning
  4. humour
  5. privacy and security
  6. user awareness

Qualifiers

  • Work in progress

Conference

CHI PLAY '19
Sponsor:

Acceptance Rates

CHI PLAY '19 Extended Abstracts Paper Acceptance Rate 51 of 181 submissions, 28%;
Overall Acceptance Rate 421 of 1,386 submissions, 30%

Upcoming Conference

CHI PLAY '24
The Annual Symposium on Computer-Human Interaction in Play
October 14 - 17, 2024
Tampere , Finland

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)66
  • Downloads (Last 6 weeks)6
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A quest for research and knowledge gaps in cybersecurity awareness for small and medium-sized enterprisesComputer Science Review10.1016/j.cosrev.2023.10059250:COnline publication date: 4-Mar-2024
  • (2023)CyberHero: An Adaptive Serious Game to Promote Cybersecurity AwarenessElectronics10.3390/electronics1217354412:17(3544)Online publication date: 22-Aug-2023
  • (2023)Tickling Proactivity: Exploring the Use of Humor in Proactive Voice AssistantsProceedings of the 22nd International Conference on Mobile and Ubiquitous Multimedia10.1145/3626705.3627777(294-320)Online publication date: 3-Dec-2023
  • (2023)“Funny How?” A Serious Look at Humor in Conversational AgentsProceedings of the 5th International Conference on Conversational User Interfaces10.1145/3571884.3603761(1-7)Online publication date: 19-Jul-2023
  • (2023)Tailoring a Persuasive Game to Promote Secure Smartphone BehaviourProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581038(1-18)Online publication date: 19-Apr-2023
  • (2023)Cyber Suraksha: a card game for smartphone security awarenessInformation & Computer Security10.1108/ICS-05-2022-008731:5(576-600)Online publication date: 12-Jun-2023
  • (2022)Smartphone Security and Privacy – A Gamified Persuasive Approach with Protection Motivation TheoryPersuasive Technology10.1007/978-3-030-98438-0_7(89-100)Online publication date: 29-Mar-2022
  • (2021)PERMARUN- A Persuasive Game to Improve User Awareness and Self-Efficacy Towards Secure Smartphone BehaviourExtended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems10.1145/3411763.3451781(1-7)Online publication date: 8-May-2021
  • (2021)Augmented Reality-Based Cybersecurity Education on Phishing2021 IEEE International Conference on Artificial Intelligence and Virtual Reality (AIVR)10.1109/AIVR52153.2021.00052(228-231)Online publication date: Nov-2021
  • (2020)The Social EngineerExtended Abstracts of the 2020 Annual Symposium on Computer-Human Interaction in Play10.1145/3383668.3419917(59-63)Online publication date: 2-Nov-2020
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media