Definition
Phishing is a social engineering attack which aims to manipulate people and encourage them to expose their confidential information. There are many different types of phishing attacks such as spear phishing, whaling, vishing, and smishing.
Introduction
Cybercrime is becoming a widespread problem that is posing an increased risk due to the increasing number of devices such as smartphones that are connected to the Internet. There is an increase in the usage of smartphones for a variety of applications, such as browsing the Internet, gaming, social networking, online banking, and attending to emails. The past three years have seen an increase in smartphone usage for email applications by 180% (Heinze et al. 2016). Furthermore, banking users will use their mobile devices to manage their current accounts over 2.3 billion times – more than the cumulative total...
References
Anderson, R.: Security Engineering: A guide to building dependable distributed systems, 2nd edn. Wiley (2008)
Arachchilage, N.A.G., Hameed, M.A.: Integrating self-efficacy into a gamified approach to thwart phishing attacks. CoRR. abs/1706.07748 (2017)
Arachchilage, N.A.G., Love, S.: Security awareness of computer users: a phishing threat avoidance perspective. Comput. Hum. Behav. 38, 304–312 (2014)
Butler, R.: A framework of anti-phishing measures aimed at protecting the online consumer's identity. Electron. Lib. 25(5), 517–533 (2007)
Chapman, P., Burket, J., Brumley, D.: PicoCTF: A Game-Based Computer Security Competition for High School Students. in 3GSE. (2014)
Cochin, C., et al.:, McAfee Labs Threats Report. (2014)
Denning, T., et al.: Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM (2013)
Deterding, S., et al.: From game design elements to gamefulness: defining gamification. In: Proceedings of the 15th international academic MindTrek conference: Envisioning future media environments. ACM (2011)
Dodge, R.C., Ferguson, A.J.: Using phishing for user email security awareness. In: IFIP International Information Security Conference. Springer (2006)
Dodge Jr., R.C., Carver, C., Ferguson, A.J.: Phishing for user security awareness. Comput. Secur. 26(1), 73–80 (2007)
Downs, J.S., Holbrook, M., Cranor, L.F.: Behavioral response to phishing risk. In: Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit. ACM (2007)
Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. In: Proceedings of the 16th international conference on World Wide Web, pp. 649–656. ACM, Banff (2007)
Forte, D.: Application delivery: pros and cons both virtual and real. Netw. Secur. 2009(12), 18–20 (2009)
Gee, J.P.: What video games have to teach us about learning and literacy. Computers in Entertainment (CIE). 1(1), 20–20 (2003)
Greenberg, A.: Phishing costs average organization $3.7 million per year. SC Media: Online (2016)
Heinze, A., Fletcher, G., Rashid, T., Cruz, A.: Digital and Social Media Marketing: a Results-Driven Approach. Routledge (2016)
Herzberg, A.: Why Johnny can't surf (safely)? Attacks and defenses for web users. Comput. Secur. 28(1–2), 63–71 (2009)
Hong, J.: The state of phishing attacks. Commun. ACM. 55(1), 74–81 (2012)
Kumaraguru, P., et al.: Protecting people from phishing: the design and evaluation of an embedded training email system. In: Proceedings of the SIGCHI conference on Human factors in computing systems. ACM (2007)
Lin, C., et al.: Efficient spear-phishing threat detection using hypervisor monitor. In: 2015 International Carnahan Conference on Security Technology (ICCST). (2015)
Quinn, C.N.: Engaging learning: Designing e-learning simulation games. Wiley (2005)
Rittle-Johnson, B., Koedinger, K.R.: Comparing Instructional Strategies for Integrating Conceptual and Procedural Knowledge. (2002)
Robila, S.A., Ragucci, J.W.: Don't be a phish: steps in user education. SIGCSE Bull. 38(3), 237–241 (2006)
Sheng, S., et al.: Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. (2007. p. 88–99
Sullins, L.L.: Phishing for a solutions: Domestic and international approaches to decreasing online identity theft. Emory Int. Law Rev. 20, 397–433 (2006)
Swapan, P.: Phishing counter measures and their effectiveness – literature review. Inf. Manag. Comput. Secur. 20(5), 382–420 (2012)
Thompson, S.T.C.: Helping the hacker? Library information. Security Soc. Eng. 25(4), 222–225 (2006)
Tseng, S.-S., et al.: Automatic content generation for anti-phishing education game. In: Electrical and Control Engineering (ICECE), 2011 International Conference. IEEE (2011)
Yohannis, A.R., Prabowo, Y.D., Waworuntu, A.: Defining Gamification: From lexical meaning and process viewpoint towards a gameful reality. In: Information Technology Systems and Innovation (ICITSI), 2014 International Conference. IEEE (2014)
Yue, C., Wang, H.: BogusBiter: A transparent protection against phishing attacks. ACM Transactions on Internet Technology (TOIT). 10(2), 6 (2010)
Zhang, Y., et al.: Phinding phish: Evaluating anti-phishing tools. In: Proceedings of the 14th annual network and distributed system security symposium (NDSS 2007). Citeseer (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this entry
Cite this entry
Al-Hamar, Y., Kolivand, H., Al-Hamar, A. (2021). Anti-Phishing Attacks in Gamification. In: Lee, N. (eds) Encyclopedia of Computer Graphics and Games. Springer, Cham. https://doi.org/10.1007/978-3-319-08234-9_383-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-08234-9_383-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08234-9
Online ISBN: 978-3-319-08234-9
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering