Skip to main content

All Work and No Play – Game-Based vs. Text-Based Learning in IT-Security

  • Conference paper
  • First Online:
Smart Education and e-Learning - Smart Pedagogy (SEEL-22 2022)

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 305))

Included in the following conference series:

  • 628 Accesses

Abstract

Game-based learning is a popular tool in IT-security. We study the effects of game-based learning in the context of phishing-emails in comparison with text-based learning by asking participants to classify previously unseen emails after completing their learning exercise. We correlated participants scores with their professional background of learners. Our results indicate that professional background is an important indicator of the success of game-based learning and suggest that learners with a technical background might benefit from text-based learning to a larger degree than from game-based learning.

This work has been developed within the project ‘BAK Game’ which is funded by the German Federal Ministry for Economic Affairs and Climate Action.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Recall that participants could choose to give a description of their field or area as free text, if none of the given options seemed suitable. This is why some answers were no listed as options in the above description of the questionnaire.

References

  1. Alkhalil, Z., Hewage, C., Nawaf, L., Khan, I.: Phishing attacks: a recent comprehensive study and a new anatomy. Front. Comput. Sci. 3, 563060 (2021). https://doi.org/10.3389/fcomp.2021.563060

  2. Alami, D., Dalpiaz, F.: A gamified tutorial for learning about security requirements engineering. In: EEE 25th International Requirements Engineering Conference (2017)

    Google Scholar 

  3. Canova, G., Volkamer, M., Bergmann, C., Borza, R.: NoPhish: an anti-phishing education app. In: Mauw, S., Jensen, C.D. (eds.) STM 2014. LNCS, vol. 8743, pp. 188–192. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11851-2_14

    Chapter  Google Scholar 

  4. Reinheimer, B., et al.: An investigation of phishing awareness and education over time: when and how to best remind users. In: Symposium on Usable Privacy and Security (2020)

    Google Scholar 

  5. Canova, G., Volkamer, M., Bergmann, C., Reinheimer, B.: NoPhish app evaluation: lab and retention study. In: NDSS Workshop on Usable Security (2015)

    Google Scholar 

  6. Karumbaiah, S., et al.: Phishing training: a preliminary look at the effects of different types of training. In: Proceedings of the 11th Pre-ICIS Workshop on Information Security and Privacy (2016)

    Google Scholar 

  7. Scholefield, S., Shepherd, L.A.: Gamification techniques for raising cyber security awareness. In: Moallem, A. (ed.) HCII 2019. LNCS, vol. 11594, pp. 191–203. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-22351-9_13

    Chapter  Google Scholar 

  8. Stockhardt, S., et al.: Teaching phishing-security: which way is best? In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IAICT, vol. 471, pp. 135–149. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33630-5_10

    Chapter  Google Scholar 

  9. Perrault, E.K.: Using an interactive online quiz to recalibrate college students’ attitudes and behavioral intentions about phishing. J. Educ. Comput. Res. 55(8), 1154–1167 (2018)

    Article  Google Scholar 

  10. Schreuders, Z.C., Butterfield, E.: Gamification for teaching and learning computer security in higher education. In: 2016 USENIX Workshop on Advances in Security Education (ASE 2016) (2016)

    Google Scholar 

  11. Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E.: Protecting people from phishing: the design and evaluation of an embedded training email system. In: CHI, pp. 905–914. ACM (2007)

    Google Scholar 

  12. Landers, R.N., Callan, R.C.: Casual social games as serious games: the psychology of gamification in undergraduate education and employee training. In: Ma, M., Oikonomou, A., Jain, L.C. (eds.) Serious games and edutainment applications, pp. 399–423. Springer, London (2011). https://doi.org/10.1007/978-1-4471-2161-9_20

    Chapter  Google Scholar 

  13. Alsharnouby, M., Alaca, F., Chiasson, S.: Why phishing still works: user strategies for combating phishing attacks. Int. J. Hum. Comput. Stud. 82, 69–82 (2015)

    Article  Google Scholar 

  14. Wanner, T., Wanner, T., Etzold V.: Effects on girls’ emotions during gamification tasks with male priming in STEM subjects via eye tracking. In: Smart Education and e-Learning 2020, pp. pp.67–78, June 2020

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tamara Wanner .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gelderie, M., Wanner, T. (2022). All Work and No Play – Game-Based vs. Text-Based Learning in IT-Security. In: Uskov, V.L., Howlett, R.J., Jain, L.C. (eds) Smart Education and e-Learning - Smart Pedagogy. SEEL-22 2022. Smart Innovation, Systems and Technologies, vol 305. Springer, Singapore. https://doi.org/10.1007/978-981-19-3112-3_16

Download citation

Publish with us

Policies and ethics