Advertisement

PrivaCity

A Chatbot Game to Raise Privacy Awareness Among Teenagers
  • Erlend Berger
  • Torjus H. Sæthre
  • Monica DivitiniEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11913)

Abstract

Privacy is a well-known concern connected to teenagers’ use of e.g., social media, mobile apps, and wearables. An increasing number of schools are looking for ways to integrate this topic in their activities, as part of informatics subjects or integrated in other subjects as part of basic digital competences. This paper explores how chatbot serious games, i.e. games that evolves as a conversation between a player and a software agent, can be used as a tool to raise privacy awareness. We present PrivaCity, a chatbot game to raise privacy awareness in smart cities. Focus on smart cities is motivated by a predominant focus in existing games on what to share and not to share on social networks. Little is done to learn about the risks of the digital footprints, when data is collected about the citizens across a multitude of devices, digital services, and ubiquitous digital sensors. The paper presents the game design, implementation, and evaluation.

Keywords

Chatbot games Privacy awareness Smart cities 

Notes

Acknowledgements

The research is co-funded by the NFR IKTPLUSS project ALerT, #270969. We thank the students and teachers who joined the evaluation.

References

  1. 1.
    Acquisti, A., et al.: Nudges for privacy and security. ACM Comput. Survey 50(3), 1–41 (2017)CrossRefGoogle Scholar
  2. 2.
    Barab, S.A., Gresalfi, M., Ingram-Goble, A.: Transformational play: using games to position person, content, and context. Educ. Res. 39(7), 525–536 (2010)CrossRefGoogle Scholar
  3. 3.
    Bergen, E., Solberg, D.F., Sæthre, T.H., Divitini, M.: Supporting the co-design of games for privacy awareness. In: Auer, M.E., Tsiatsos, T. (eds.) ICL 2018. AISC, vol. 916, pp. 888–899. Springer, Cham (2020).  https://doi.org/10.1007/978-3-030-11932-4_82CrossRefGoogle Scholar
  4. 4.
    Blythe, J.M., Coventry, L.: Cyber security games: a new line of risk. In: Herrlich, M., Malaka, R., Masuch, M. (eds.) ICEC 2012. LNCS, vol. 7522, pp. 600–603. Springer, Heidelberg (2012).  https://doi.org/10.1007/978-3-642-33542-6_80CrossRefGoogle Scholar
  5. 5.
    Cetto, A., Netter, M., Pernul, G., Richthammer, C., Riesner, M., Roth, C., Sänger, J.: Friend Inspector: A Serious Game to Enhance Privacy Awareness in Social Networks (2014)Google Scholar
  6. 6.
    Chen, J.: Flow in games (and everything else). Commun. ACM 50(4), 31–34 (2007)CrossRefGoogle Scholar
  7. 7.
    Cherry, K.: Extrinsic vs. Intrinsic Motivation: What’s the Difference? Very well Mind (2019). https://www.verywellmind.com/differences-between-extrinsic-and-intrinsic-motivation-2795384. Accessed Aug 2019
  8. 8.
    Connolly, T.M., et al.: A systematic literature review of empirical evidence on computer games and serious games. Comput. Educ. 59(2), 661–686 (2012)CrossRefGoogle Scholar
  9. 9.
    Crabtree, A., Tolmie, P., Knight, W.: Repacking ‘Privacy’ for a networked world. Comput. Support. Coop. Work. (CSCW) 26(4-6), 453–488 (2017)CrossRefGoogle Scholar
  10. 10.
    Dickey, M.D.: Murder on Grimm Isle: the impact of game narrative design in an educational game-based learning environment. Br. J. Educ. Technol. 42(3), 456–469 (2011)CrossRefGoogle Scholar
  11. 11.
    Fadhil, A., Villafiorita, A.: An adaptive learning with gamification & conversational UIs: the rise of CiboPoliBot. In: Adjunct Publication of UMAP 2017, pp. 408–412. ACM (2017)Google Scholar
  12. 12.
    Interland - Be Internet Awesome. https://beinternetawesome.withgoogle.com/. Accessed Aug 2019
  13. 13.
    Jeuring, J., et al.: Communicate! — a serious game for communication skills —. In: Conole, G., Klobučar, T., Rensing, C., Konert, J., Lavoué, É. (eds.) EC-TEL 2015. LNCS, vol. 9307, pp. 513–517. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-24258-3_49CrossRefGoogle Scholar
  14. 14.
    Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: a multidimensional developmental theory. J. Soc. Issues 33(3), 22–42 (1977)CrossRefGoogle Scholar
  15. 15.
    Lebeuf, C., Storey, M.A., Zagalsky, A.: Software bots. IEEE Soft. 35(1), 18–23 (2018). ISSN: 0740-7459CrossRefGoogle Scholar
  16. 16.
    McLaren, D., Agyeman, J.: Sharing Cities: A Case for Truly Smart and Sustainable Cities. Urban and Industrial Environments. MIT Press, Cambridge (2015)Google Scholar
  17. 17.
    Neto, J.N., et al.: Solis’Curse - a cultural heritage game using voice interaction with a virtual agent. In: 2011 Third International Conference on Games and Virtual Worlds for Serious Applications, pp. 164–167 (2011)Google Scholar
  18. 18.
    Nissenbaum, H.: Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press, Stanford (2009)Google Scholar
  19. 19.
    Othlinghaus, J., Hoppe, H.U.: Supporting group reflection in a virtual role-playing environment. In: Poppe, R., Meyer, J.-J., Veltkamp, R., Dastani, M. (eds.) INTETAIN 2016 2016. LNICST, vol. 178, pp. 292–298. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-49616-0_30CrossRefGoogle Scholar
  20. 20.
    Ravyse, W.S., et al.: Success factors for serious games to enhance learning: a systematic review. Virtual Real. 21(1), 31–58 (2017)CrossRefGoogle Scholar
  21. 21.
    Rollings, A., Adams, E.: Andrew Rollings and Ernest Adams on Game Design. NRG Series. New Riders, ‎Indianapolis (2003)Google Scholar
  22. 22.
    Stobert, E., et al.: Teaching authentication as a life skill. IEEE Secur. Priv. 16(5), 82–85 (2018).  https://doi.org/10.1109/MSP.2018.3761712CrossRefGoogle Scholar
  23. 23.
    Vanderhoven, E., Schellens, T., Valcke, M.: Educating Teens about the risks on social network sites. Huelva 22(43), 123–131 (2014)Google Scholar
  24. 24.
    Westin, A.F.: Privacy and freedom. Wash. Lee Law Rev. 25(1), 166 (1968)Google Scholar
  25. 25.
    van Zoonen, L.: Privacy concerns in smart cities. Gov. Inf. Q. 33(3), 472–480 (2016). Open and Smart Governments: Strategies, Tools, and ExperiencesCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Erlend Berger
    • 1
  • Torjus H. Sæthre
    • 1
  • Monica Divitini
    • 1
    Email author
  1. 1.Department of Computer ScienceNorwegian University of Science and TechnologyTrondheimNorway

Personalised recommendations