메뉴 건너뛰기




Volumn , Issue , 2011, Pages 485-489

Design a mobile game for home computer users to prevent from "phishing attacks"

Author keywords

Avoidance behaviour; Game design; Phishing threats; Security awareness; Security breaches

Indexed keywords

COMPUTER CRIME;

EID: 80052568937     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/i-society18435.2011.5978543     Document Type: Conference Paper
Times cited : (40)

References (30)
  • 1
    • 15344341499 scopus 로고    scopus 로고
    • Educational game models: Conceptualization and evaluation
    • A. Amory and R. Seagram, "Educational Game Models: Conceptualization and Evaluation", South African Journal of Higher Education, vol. 17 (2), pp. 206-217, 2003.
    • (2003) South African Journal of Higher Education , vol.17 , Issue.2 , pp. 206-217
    • Amory, A.1    Seagram, R.2
  • 2
    • 0010057718 scopus 로고    scopus 로고
    • Semantic attacks, the third wave of network attacks
    • October 2000, Retrieved from. (Accessed date: 02 April 2011.)
    • B. Schneier, "Semantic Attacks, The Third Wave of Network Attacks", Crypto-Gram Newsletter, October 2000, Retrieved from http://www.schneier.com/crypto-gram-0010.html. (Accessed date: 02 April 2011.)
    • Crypto-Gram Newsletter
    • Schneier, B.1
  • 3
    • 80053545071 scopus 로고    scopus 로고
    • A socio-behavioral study of home computer users' intention to practice security
    • Bangkok, Thailand
    • B. Y. Ng and M. A. Rahim, "A Socio-Behavioral Study of Home Computer Users' Intention to Practice Security", The Ninth Pacific Asia Conference on Information Systems, Bangkok, Thailand, 2005.
    • (2005) The Ninth Pacific Asia Conference on Information Systems
    • Ng, B.Y.1    Rahim, M.A.2
  • 5
    • 77955115473 scopus 로고    scopus 로고
    • Practicing safe computing: Message framing, self-view, and home computer user security behaviour intentions
    • Milwaukee, WI
    • C. L. Anderson and R. Agarwal, "Practicing Safe Computing: Message Framing, Self-View, and Home Computer User Security Behaviour Intentions", International Conference on Information Systems, Milwaukee, WI, pp. 1543-1561, 2006.
    • (2006) International Conference on Information Systems , pp. 1543-1561
    • Anderson, C.L.1    Agarwal, R.2
  • 6
    • 33748968091 scopus 로고    scopus 로고
    • (Accessed date: 04 April 2011.)
    • CNN. com, "A convicted hacker debunks some myths", 2005, http://www.cnn.com/2005/TECH/internet/10/07/kevin.mitnick.cnna/index.html. (Accessed date: 04 April 2011.)
    • (2005) A Convicted Hacker Debunks Some Myths
  • 8
    • 84876745500 scopus 로고    scopus 로고
    • Social learning through gaming
    • Vienna, Austria
    • E. M. Raybourn and A. Waern, "Social Learning Through Gaming", Proceedings of CHI 2004, Vienna, Austria, pp. 1733-1734,2004
    • (2004) Proceedings of CHI 2004 , pp. 1733-1734
    • Raybourn, E.M.1    Waern, A.2
  • 9
    • 60649084770 scopus 로고    scopus 로고
    • Avoidance of information technology threats: A theoretical perspective
    • H. Liang and Y. Xue, "Avoidance of Information Technology Threats: A Theoretical Perspective", MIS Quarterly, vol. 33 (1), pp. 71-90, 2009.
    • (2009) MIS Quarterly , vol.33 , Issue.1 , pp. 71-90
    • Liang, H.1    Xue, Y.2
  • 10
    • 77955121478 scopus 로고    scopus 로고
    • Understanding security behaviours in personal computer usage: A threat avoidance perspective
    • July
    • H. Liang and Y. Xue, "Understanding Security Behaviours in Personal Computer Usage: A Threat Avoidance Perspective", Journal of the Association for Information Systems, vol. 11 (7), pp. 394-413, July 2010.
    • (2010) Journal of the Association for Information Systems , vol.11 , Issue.7 , pp. 394-413
    • Liang, H.1    Xue, Y.2
  • 11
    • 80052602840 scopus 로고    scopus 로고
    • Practicing safe computing: Message freaming, self-view and home computer user security behaviour intentions
    • Retrieved from. (Accessed date: 15 March 2011)
    • H. Susan, A. Catherine and A. Ritu, "Practicing Safe Computing: Message Freaming, Self-View and Home Computer User Security Behaviour Intentions", ICIS 2006 Proceedings, pp. 93, 2006, Retrieved from http://aisel.aisnet.org/icis2006/93. (Accessed date: 15 March 2011.)
    • (2006) ICIS 2006 Proceedings , pp. 93
    • Susan, H.1    Catherine, A.2    Ritu, A.3
  • 12
    • 84869780575 scopus 로고    scopus 로고
    • A protection motivation theory approach to home wireless security
    • Las Vegas, NY
    • I. Woon, G. W. Tan and R. Low, "A Protection Motivation Theory Approach to Home Wireless Security", International Conference on Information Systems, Las Vegas, NY., pp. 367-380, 2005.
    • (2005) International Conference on Information Systems , pp. 367-380
    • Woon, I.1    Tan, G.W.2    Low, R.3
  • 16
    • 2642549662 scopus 로고    scopus 로고
    • Computer security and risky computing practices: A rational choice perspective
    • K. Aytes and C. Terry, "Computer Security and Risky Computing Practices: A Rational Choice Perspective", Journal of Organizational and End User Computing, vol. 16 (2), pp. 22-40, 2004.
    • (2004) Journal of Organizational and End User Computing , vol.16 , Issue.2 , pp. 22-40
    • Aytes, K.1    Terry, C.2
  • 19
    • 77749232599 scopus 로고    scopus 로고
    • Digital game-based learning revolution
    • New York
    • M. Prensky, "Digital Game-Based Learning Revolution", Digital GameBased Learning, New York, 2001.
    • (2001) Digital GameBased Learning
    • Prensky, M.1
  • 20
    • 51349158689 scopus 로고    scopus 로고
    • Security lapses and the omission of information security measures: A threat control model and empirical test
    • M. Workman, W. H. Bommer and D. Straub, "Security Lapses and the Omission of Information Security Measures: A Threat Control Model and Empirical Test", Computers in Human Behaviour, vol. 24 (6), pp. 2799-2816,2008.
    • (2008) Computers in Human Behaviour , vol.24 , Issue.6 , pp. 2799-2816
    • Workman, M.1    Bommer, W.H.2    Straub, D.3
  • 21
    • 80052566865 scopus 로고    scopus 로고
    • Do security toolbars actually prevent phishing attacks?
    • M. Wu, R. Miller, and S. Garfinkel, "Do Security Toolbars Actually Prevent Phishing Attacks?", Posters SOUPS, 2005.
    • (2005) Posters SOUPS
    • Wu, M.1    Miller, R.2    Garfinkel, S.3
  • 24
    • 80052591385 scopus 로고    scopus 로고
    • September 2006, Retrieved from. (Accessed date: 27 March 2011)
    • R. Richmond, "Hackers set up attacks on home PCs, Financial Firms: study", September 2006, Retrieved from http://www.marketwatch. com/News/Story/Story.aspx?dist=new sfinder&siteid=google&guid= %7B92615073-95B6-452EA3B9 569BEACF91E8%7D&keyword=. (Accessed date: 27 March 2011. )
    • Hackers Set Up Attacks on Home PCs, Financial Firms: Study
    • Richmond, R.1
  • 30
    • 48849091034 scopus 로고    scopus 로고
    • Mobile entertainment: Playability heuristics for mobile games
    • X. Korhonen and X. Koivisto, "Mobile Entertainment: Playability Heuristics for Mobile Games", Proceedings of Mobile HCI, 2006.
    • (2006) Proceedings of Mobile HCI
    • Korhonen, X.1    Koivisto, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.