Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks

10/17/2017
by   Gaurav Misra, et al.
0

Phishing is an especially challenging cyber security threat as it does not attack computer systems, but targets the user who works on that system by relying on the vulnerability of their decision-making ability. Phishing attacks can be used to gather sensitive information from victims and can have devastating impact if they are successful in deceiving the user. Several anti-phishing tools have been designed and implemented but they have been unable to solve the problem adequately. This failure is often due to security experts overlooking the human element and ignoring their fallibility in making trust decisions online. In this paper, we present Phish Phinder, a serious game designed to enhance the user's confidence in mitigating phishing attacks by providing them with both conceptual and procedural knowledge about phishing. The user is trained through a series of gamified challenges, designed to educate them about important phishing related concepts, through an interactive user interface. Key elements of the game interface were identified through an empirical study with the aim of enhancing user interaction with the game. We also adopted several persuasive design principles while designing Phish Phinder to enhance phishing avoidance behaviour among users.

READ FULL TEXT

page 7

page 8

research
01/25/2023

Educational Game on Cryptocurrency Investment: Using Microeconomic Decision Making to Understand Macroeconomics Principles

Gamification is an effective strategy for motivating and engaging users,...
research
07/13/2023

Influence of the algorithm's reliability and transparency in the user's decision-making process

Algorithms have been becoming increasingly relevant for various decision...
research
04/16/2018

A framework for mitigating zero-day attacks in IoT

Internet of Things (IoT) aims at providing connectivity between every co...
research
12/18/2021

System Attack Modeling Techniques Critical Information Infrastructure

Every day around the world, various organizations are exposed to more th...
research
10/13/2022

A Game Theoretical vulnerability analysis of Adversarial Attack

In recent times deep learning has been widely used for automating variou...
research
05/28/2021

The Generation of Security Scoring Systems Leveraging Human Expert Opinion

While the existence of many security elements can be measured (e.g., vul...

Please sign up or login with your details

Forgot password? Click here to reset