Skip to main content

Anti-Phishing Attacks in Gamification

  • Living reference work entry
  • First Online:
Encyclopedia of Computer Graphics and Games

Synonyms

Social engineering attacks, Spear phishing, Phishing attacks, Cybersecurity attacks, Phishing and game attacks.

Definition

Phishing is a social engineering attack which aims to manipulate people and encourage them to expose their confidential information. There are many different types of phishing attacks such as spear phishing, whaling, vishing, and smishing.

Introduction

Cybercrime is becoming a widespread problem that is posing an increased risk due to the increasing number of devices such as smartphones that are connected to the Internet. There is an increase in the usage of smartphones for a variety of applications, such as browsing the Internet, gaming, social networking, online banking, and attending to emails. The past three years have seen an increase in smartphone usage for email applications by 180% (Heinze et al. 2016). Furthermore, banking users will use their mobile devices to manage their current accounts over 2.3 billion times – more than the cumulative total...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Anderson, R.: Security Engineering: A guide to building dependable distributed systems, 2nd edn. Wiley (2008)

    Google Scholar 

  • Arachchilage, N.A.G., Hameed, M.A.: Integrating self-efficacy into a gamified approach to thwart phishing attacks. CoRR. abs/1706.07748 (2017)

    Google Scholar 

  • Arachchilage, N.A.G., Love, S.: Security awareness of computer users: a phishing threat avoidance perspective. Comput. Hum. Behav. 38, 304–312 (2014)

    Article  Google Scholar 

  • Butler, R.: A framework of anti-phishing measures aimed at protecting the online consumer's identity. Electron. Lib. 25(5), 517–533 (2007)

    Article  Google Scholar 

  • Chapman, P., Burket, J., Brumley, D.: PicoCTF: A Game-Based Computer Security Competition for High School Students. in 3GSE. (2014)

    Google Scholar 

  • Cochin, C., et al.:, McAfee Labs Threats Report. (2014)

    Google Scholar 

  • Denning, T., et al.: Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM (2013)

    Google Scholar 

  • Deterding, S., et al.: From game design elements to gamefulness: defining gamification. In: Proceedings of the 15th international academic MindTrek conference: Envisioning future media environments. ACM (2011)

    Google Scholar 

  • Dodge, R.C., Ferguson, A.J.: Using phishing for user email security awareness. In: IFIP International Information Security Conference. Springer (2006)

    Google Scholar 

  • Dodge Jr., R.C., Carver, C., Ferguson, A.J.: Phishing for user security awareness. Comput. Secur. 26(1), 73–80 (2007)

    Article  Google Scholar 

  • Downs, J.S., Holbrook, M., Cranor, L.F.: Behavioral response to phishing risk. In: Proceedings of the anti-phishing working groups 2nd annual eCrime researchers summit. ACM (2007)

    Google Scholar 

  • Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. In: Proceedings of the 16th international conference on World Wide Web, pp. 649–656. ACM, Banff (2007)

    Chapter  Google Scholar 

  • Forte, D.: Application delivery: pros and cons both virtual and real. Netw. Secur. 2009(12), 18–20 (2009)

    Article  Google Scholar 

  • Gee, J.P.: What video games have to teach us about learning and literacy. Computers in Entertainment (CIE). 1(1), 20–20 (2003)

    Article  MathSciNet  Google Scholar 

  • Greenberg, A.: Phishing costs average organization $3.7 million per year. SC Media: Online (2016)

    Google Scholar 

  • Heinze, A., Fletcher, G., Rashid, T., Cruz, A.: Digital and Social Media Marketing: a Results-Driven Approach. Routledge (2016)

    Book  Google Scholar 

  • Herzberg, A.: Why Johnny can't surf (safely)? Attacks and defenses for web users. Comput. Secur. 28(1–2), 63–71 (2009)

    Article  Google Scholar 

  • Hong, J.: The state of phishing attacks. Commun. ACM. 55(1), 74–81 (2012)

    Article  Google Scholar 

  • Kumaraguru, P., et al.: Protecting people from phishing: the design and evaluation of an embedded training email system. In: Proceedings of the SIGCHI conference on Human factors in computing systems. ACM (2007)

    Google Scholar 

  • Lin, C., et al.: Efficient spear-phishing threat detection using hypervisor monitor. In: 2015 International Carnahan Conference on Security Technology (ICCST). (2015)

    Google Scholar 

  • Quinn, C.N.: Engaging learning: Designing e-learning simulation games. Wiley (2005)

    Google Scholar 

  • Rittle-Johnson, B., Koedinger, K.R.: Comparing Instructional Strategies for Integrating Conceptual and Procedural Knowledge. (2002)

    Google Scholar 

  • Robila, S.A., Ragucci, J.W.: Don't be a phish: steps in user education. SIGCSE Bull. 38(3), 237–241 (2006)

    Article  Google Scholar 

  • Sheng, S., et al.: Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish. (2007. p. 88–99

    Google Scholar 

  • Sullins, L.L.: Phishing for a solutions: Domestic and international approaches to decreasing online identity theft. Emory Int. Law Rev. 20, 397–433 (2006)

    Google Scholar 

  • Swapan, P.: Phishing counter measures and their effectiveness – literature review. Inf. Manag. Comput. Secur. 20(5), 382–420 (2012)

    Article  Google Scholar 

  • Thompson, S.T.C.: Helping the hacker? Library information. Security Soc. Eng. 25(4), 222–225 (2006)

    Google Scholar 

  • Tseng, S.-S., et al.: Automatic content generation for anti-phishing education game. In: Electrical and Control Engineering (ICECE), 2011 International Conference. IEEE (2011)

    Google Scholar 

  • Yohannis, A.R., Prabowo, Y.D., Waworuntu, A.: Defining Gamification: From lexical meaning and process viewpoint towards a gameful reality. In: Information Technology Systems and Innovation (ICITSI), 2014 International Conference. IEEE (2014)

    Google Scholar 

  • Yue, C., Wang, H.: BogusBiter: A transparent protection against phishing attacks. ACM Transactions on Internet Technology (TOIT). 10(2), 6 (2010)

    Article  Google Scholar 

  • Zhang, Y., et al.: Phinding phish: Evaluating anti-phishing tools. In: Proceedings of the 14th annual network and distributed system security symposium (NDSS 2007). Citeseer (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hoshang Kolivand .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Al-Hamar, Y., Kolivand, H., Al-Hamar, A. (2021). Anti-Phishing Attacks in Gamification. In: Lee, N. (eds) Encyclopedia of Computer Graphics and Games. Springer, Cham. https://doi.org/10.1007/978-3-319-08234-9_383-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08234-9_383-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08234-9

  • Online ISBN: 978-3-319-08234-9

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics