Game Based Cyber Security Training: are Serious Games suitable for cyber security training?

Maurice Hendrix, A. Al-Sherbaz, Victoria Bloom

Research output: Contribution to journalArticle

1353 Downloads (Pure)

Abstract

Security research and training is attracting a lot of investment and interest from governments and the private sector. Most efforts have focused on physical security, while cyber security or digital security has been given less importance. With recent high-profile attacks it has become clear that training in cyber security is needed. Serious Games have the capability to be effective tools for public engagement and behavioural change and role play games, are already used by security professionals. Thus cyber security seems especially well-suited to Serious Games. This paper investigates whether games can be effective cyber security training tools. The study is conducted by means of a structured literature review supplemented with a general web search. While there are early positive indications there is not yet enough evidence to draw any definite conclusions. There is a clear gap in target audience with almost all products and studies targeting the general public and very little attention given to IT professionals and managers. The products and studies also mostly work over a short period, while it is known that short-term interventions are not particularly effective at affecting behavioural change.
Original languageEnglish
JournalInternational Journal of Serious Games
Volume3
Issue number1
DOIs
Publication statusPublished - 2016

Bibliographical note

The International Journal of Serious Games(IJSG) by Serious Games Society is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Keywords

  • Games
  • Serious Games
  • Cyber Security
  • Training
  • Online Safety

Fingerprint Dive into the research topics of 'Game Based Cyber Security Training: are Serious Games suitable for cyber security training?'. Together they form a unique fingerprint.

  • Cite this