Phishing is an online identity theft that aims to steal sensitive information such as username, password and online banking details from its victims. Phishing education needs to be considered as a means to combat this threat. This book focuses on a design and development of a mobile game prototype as an educational tool helping computer users to protect themselves against phishing attacks. The elements of a game design framework for avoiding phishing attacks were used to address the game design issues.
The mobile game design aimed to enhance the users’ avoidance behaviour through motivation to protect themselves against phishing threats. A think-aloud study was conducted, along with a pre- and post-test, to assess the game design framework though the developed mobile game prototype.
The study results showed a significant improvement of participants’ phishing avoidance behaviour in their post-test assessment.
Furthermore, the study findings suggest that participants’ threat perception, safeguard effectiveness, self-efficacy, perceived severity and perceived susceptibility elements positively impact threat avoidance behaviour, whereas safeguard cost had a negative impact on it.
This eBook examines the security awareness issues surrounding computer use with particular attention to a malicious IT threat avoidance perspective.
Security exploits can include malicious IT threats such as computer programs which can disturb the normal behaviour of computer systems (viruses), malicious software (malware), unsolicited e-mail (spam), monitoring software (spyware), attempting to make computer resources unavailable to its intended users (Distributed Denial-of-Service or DDoS attack), the art of human hacking (social engineering) and online identity theft (phishing).
File Type: PDF
File Size: 4.29 MB
Total Pages: 208
Direct Link Mega:
Download Now
Direct Link AnonFiles:
Download Now
Direct Link Mediafire:
Download Now
Direct Link Solidfiles:
Download Now
Direct Link Sabercathost:
Download Now
Direct Link Tusfiles:
Download Now

Comments
Post a Comment