Brinol, P., et al.: Ease and persuasion: multiple processes, meanings, and effects (2013)
Google Scholar
Brown, S.J., et al.: Educational video game for juvenile diabetes: results of a controlled trial. Med. Inform. (1997). https://doi.org/10.3109/14639239709089835
CrossRef
Google Scholar
Chen, Y.-X., et al.: Opportunities for persuasive technology to motivate heavy computer users for stretching exercise. In: Spagnolli, A., Chittaro, L., Gamberini, L. (eds.) PERSUASIVE 2014. LNCS (LNAI), vol. 8462, pp. 25–30. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-07127-5_3
CrossRef
Google Scholar
Chittaro, L., Sioni, R.: Turning the classic snake mobile game into a location–based exergame that encourages walking. In: Bang, M., Ragnemalm, E.L. (eds.) PERSUASIVE 2012. LNCS, vol. 7284, pp. 43–54. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31037-9_4
CrossRef
Google Scholar
CISCO: Cyber Attack - What Are Common Cyberthreats? – Cisco. https://www.cisco.com/c/en/us/products/security/common-cyberattacks.html#~types-of-cyber-attacks. Accessed 31 Oct 2019
Desurvire, H., et al.: Using heuristics to evaluate the playability of games. In: Extended Abstracts of the 2004 Conference on Human Factors and Computing Systems - CHI 2004 (2004). https://doi.org/10.1145/985921.986102
Dickinson, A., et al.: UKKO: enriching persuasive location based games with environmental sensor data. In: CHI PLAY 2015 Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play (2015). https://doi.org/10.1145/2793107.2810324
Dreamy Dingo: Matching games Memory games Pairs: Remembery. https://play.google.com/store/apps/details?id=ua.krou.remembery&hl=en. Accessed 21 Oct 2019
Fogg, B.: Creating persuasive technologies: an eight-step design process. In: Proceedings of the 4th International Conference on Persuasive Technology – Persuasive 2009 (2009). https://doi.org/10.1145/1541948.1542005
Webroot Inc.: Nearly 1.5 Million New Phishing Sites Created Each Month | Webroot. https://www.webroot.com/us/en/about/press-room/releases/nearly-15-million-new-phishing-sites. Accessed 01 Nov 2019
Jagatic, T.N., et al.: Social phishing. Commun. ACM (2007). https://doi.org/10.1145/1290958.1290968
CrossRef
Google Scholar
Jakobsson, M.: The human factor in phishing. Priv. Secur. Consum. Inf. (2007). https://cofense.com/wp-content/uploads/2017/11/Enterprise-Phishing-Resiliency-and-Defense-Report-2017.pdf
Kadomura, A., et al.: Sensing fork and persuasive game for improving eating behavior (2013). https://doi.org/10.1145/2494091.2494112
Kumaraguru, P., et al.: School of phish: a real-world evaluation of anti-phishing training categories and subject descriptors. In: Proceedings of the 5th Symposium Usable Privacy Security - SOUPS 2009, p. 12 (2009). https://doi.org/10.1145/1572532.1572536
Lin, T., et al.: A persuasive game to encourage healthy dietary behaviors of kindergarten children. In: Adjunct Proceedings of the 8th International Conference on Ubiquitous Computing (2006)
Google Scholar
Magma Mobile: MatchUp: Exercise your Memory. https://play.google.com/store/apps/details?id=com.magmamobile.game.MatchUp&hl=en. Accessed 12 Oct 2019
Misra, G., et al.: Phish phinder: a game design approach to enhance user confidence in mitigating phishing attacks (2017)
Google Scholar
Ndulue, C., Orji, R.: STD PONG: an African-centric persuasive game for risky sexual. In: Adjunct Proceedings of the Persuasive Technology Conference (2018)
Google Scholar
Nielsen, J., Molich, R.: Heuristic evaluation of user interfaces. In: CHI 1990 Proceedings of the SIGCHI Conference on Human Factors in Computing System (1990). https://doi.org/10.1145/97243.97281
Oinas-Kukkonen, H., Harjumaa, M.: Persuasive systems design: key issues, process model, and system features. Commun. Assoc. Inf. Syst. 24(1), 485–500 (2009)
Google Scholar
Orji, R., et al.: LunchTime: a slow-casual game for long-term dietary behavior change. Pers. Ubiquit. Comput. 17(6), 1211–1221 (2013). https://doi.org/10.1007/s00779-012-0590-6
CrossRef
Google Scholar
PhishFindR: Phishing Database. https://github.com/mitchellkrogza/Phishing.Database. Accessed 30 Sept 2019
PhishMe Inc.: Analysis of Susceptibility, Resiliency and Defense Against Simulated and Real Phishing Attacks (2017)
Google Scholar
Samudrala, R.: List of spammers’ e-mail addresses. http://www.ram.org/ramblings/philosophy/spam/spammers.html. Accessed 30 Sept 2019
Sheng, S., et al.: Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In: ACM International Conference Proceeding Series (2007). https://doi.org/10.1145/1280680.1280692
Symantec: ISTR Internet Security Threat Report Volume 23 (2018)
Google Scholar
Yoon, S., Godwin, A.: Enhancing self-management in children with sickle cell disease through playing a CD-ROM educational game: a pilot study. J. Pediatr. Nurs. 33, 60–63, 72 (2007)
Google Scholar
Yu, W.D., et al.: A phishing vulnerability analysis of web based systems. In: Proceedings - IEEE Symposium on Computers and Communications, pp. 326–331 (2008). https://doi.org/10.1109/ISCC.2008.4625681