Abstract
Mobile phones have evolved from feature phones to smartphones with comparable power as modern desktops. On the other hand, security and privacy have taken a toll and, users are having a hard time keeping up with this evolution. Over the years, popular smartphone operating systems have constantly been working to improve privacy and security features. Yet, there is always a weak link in this chain – Humans. Research has shown that smartphone users are unaware of safe smartphone security practices and users lack the motivation to follow these practices. Persuasive games have been targeted towards cybersecurity issues concerning desktop, however, games for smartphone security are sparse. We designed and developed a 2D persuasive game to improve users’ smartphone security behaviour informed by the Protection Motivation Theory. We conducted a 2 × 2 between mixed-method study (survey and interview), where we compared our game with a common smartphone security educational material published by the National Security Agency. Users found the game to be nostalgic and humorous and had the opportunity to reflect about their decision. They were able to remember and use the knowledge from the game when confronted by security issues in their daily life.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Koyuncu, M., Pusatli, T.: Security awareness level of smartphone users: an exploratory case study. Mob. Inf. Syst. 2019 (2019). https://doi.org/10.1155/2019/2786913
Renaud, K.: 60 smartphone owners need security advice. how can we ensure they get it ? In: CONF-IRM 2016 Proceedings (2016)
Calderwood, F., Popova, I.: Smartphone cyber security awareness in developing countries: a case of Thailand. In: Zitouni, R., Agueh, M. (eds.) AFRICATEK 2018. LNICSSITE, vol. 260, pp. 79–86. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-05198-3_7
Breitinger, F., Tully-Doyle, R., Hassenfeldt, C.: A survey on smartphone user’s security choices, awareness and education. Comput. Secur. 88 (2020). https://doi.org/10.1016/j.cose.2019.101647
Zhang, X.J., Li, Z., Deng, H.: Information security behaviors of smartphone users in China: an empirical analysis. Electron. Libr. 35, 1177–1190 (2017). https://doi.org/10.1108/EL-09-2016-0183
Shah, P., Agarwal, A.: Cybersecurity behaviour of smartphone users in India: an empirical analysis. Inf. Comput. Secur. 28, 293–318 (2020). https://doi.org/10.1108/ICS-04-2019-0041
Nowrin, S., Bawden, D.: Information security behaviour of smartphone users: an empirical study on the students of university of Dhaka. Bangladesh. Inf. Learn. Sci. 119, 444–455 (2018). https://doi.org/10.1108/ILS-04-2018-0029
Google: Permissions on Android|Android Developers. https://developer.android.com/guide/topics/permissions/overview. Accessed 5 Nov 2021
Permissions updates in Android 11|Android Developers. https://developer.android.com/about/versions/11/privacy/permissions. Accessed 2 Jan 2021
Android 12 Privacy & Security. https://www.android.com/android-12/#a12-safe. Accessed 5 Nov 2021
Behavior changes: all apps|Android12|Android Developers. https://developer.android.com/about/versions/12/behavior-changes-all#mic-camera-toggles. Accessed 5 Nov 2021
Bitton, R., Finkelshtein, A., Sidi, L., Puzis, R., Rokach, L., Shabtai, A.: Taxonomy of mobile users’ security awareness. Comput. Secur. 73, 266–293 (2018). https://doi.org/10.1016/j.cose.2017.10.015
Bitton, R., Boymgold, K., Puzis, R., Shabtai, A.: Evaluating the information security awareness of smartphone users. In: Conference on Human Factors in Computing Systems - Proceedings (2020). pp. 1–13 (2020). https://doi.org/10.1145/3313831.3376385
Google: App permissions best practices | Android Developers. https://developer.android.com/training/permissions/usage-notes. Accessed 29 Nov 2020
Balebako, R., Marsh, A., Lin, J., Hong, J., Faith Cranor, L.: The privacy and security behaviors of smartphone App Dev. (2014). https://doi.org/10.14722/usec.2014.23006
Barrera, D., Kayacik, H.G., Van Oorschot, P.C., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to Android. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 73–84 (2010). https://doi.org/10.1145/1866307.1866317
Ndulue, C., Oyebode, O., Orji, R.: PHISHER CRUSH: a mobile persuasive game for promoting online security. In: Gram-Hansen S., Jonasen T., Midden C. (eds.) PERSUASIVE 2020. LNCS 12064, pp. 223–233. Springer Cham (2020). https://doi.org/10.1007/978-3-030-45712-9_17
Gokul, C.J., Pandit, S., Vaddepalli, S., Tupsamudre, H., Banahatti, V., Lodha, S.: Phishy - a serious game to train enterprise users on phishing awareness. In: CHI PLAY 2018 - Proceedings of the 2018 Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts. pp. 169–181 (2018). https://doi.org/10.1145/3270316.3273042
Wen, Z.A., Lin, Z., Chen, R., Andersen, E.: What.Hack: engaging anti-phishing training through a role-playing phishing simulation game. In: Proceedings of the Conference on Human Factors in Computing Systems, pp. 1–12 (2019). https://doi.org/10.1145/3290605.3300338
Weanquoi, P., Johnson, J., Zhang, J.: Using a game to teach about phishing. In: SIGITE 2017 - Proceedings of the 18th Annual Conference on Information Technology Education, vol. 75 (2017). https://doi.org/10.1145/3125659.3125669
Raptis, G.E., Katsini, C.: Beter, funner, stronger: A gameful approach to nudge people into making less predictable graphical password choices. In: Conference on Human Factors in Computing Systems - Proceedings. p. 17. ACM, New York(2021). https://doi.org/10.1145/3411764.3445658
Chen, T., Dabbish, L., Hammer, J.: Self-efficacy-based game design to encourage security behavior online. In: Conference on Human Factors in Computing Systems – Proceedings, pp. 1–6. Association for Computing Machinery, New York (2019). https://doi.org/10.1145/3290607.3312935
Scholefield, S., Shepherd, L.A.: Gamification techniques for raising cyber security awareness. In: Moallem, A. (ed.) HCII 2019. LNCS, vol. 11594, pp. 191–203. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-22351-9_13
Yerby, J.: Development of serious games for teaching digital forensics. Issues Inf. Syst. 13, 112–122 (2014)
Thomps, M., Irvine, C.: Active learning with the CyberCIEGE video game. In: 4th Workshop on Cyber Security Experimentation and Test, CSET 2011, pp. 1–8 (2011)
Zargham, N., Bahrini, M., Volkmar, G., Sohr, K., Wenig, D., Malaka, R.: What could go wrong? Raising mobile privacy and security awareness through a decision-making game. In: CHI Play 2019 - Extended Abstracts of the 2020 Annual Symposium on Computer-Human Interaction in Play, pp. 805–812 (2019). https://doi.org/10.1145/3341215.3356273
Bahrini, M., Meissner, M., Malaka, R., Wenig, N., Sohr, K.: HappyPerMi: presenting critical data flows in mobile application to raise user security awareness. In: Proceedings of the Conference on Human Factors in Computing Systems (2019). https://doi.org/10.1145/3290607.3312914
Bahrini, M., Volkmar, G., Schmutte, J., Wenig, N., Sohr, K., Malaka, R.: Make my phone secure! Using gamification for mobile security settings. ACM's International Conference Proceeding Series, pp. 299–308 (2019). https://doi.org/10.1145/3340764.3340775
Ganesh, A., Ndulue, C., Orji, R.: The design and development of mobile game to promote secure smartphone behaviour. In: CEUR Workshop Proceedings, pp. 73–87 (2021)
Ganesh, A., Ndulue, C., Orji, R.: PERMARUN- a persuasive game to improve user awareness and self-efficacy towards secure smartphone behaviour. In: Proceedings of the Conference on Human Factors in Computing Systems (2021). https://doi.org/10.1145/3411763.3451781
Maddux, J.E., Rogers, R.W.: Protection motivation and self-efficacy: a revised theory of fear appeals and attitude change. J. Exp. Soc. Psychol. 19, 469–479 (1983). https://doi.org/10.1016/0022-1031(83)90023-9
NSA Mobile Device Best Practices (2020). https://doi.org/10.4324/9780429269110-11
Oinas-Kukkonen, H., Harjumaa, M.: Persuasive systems design: key issues, process model, and system features. Commun. Assoc. Inf. Syst. 24, 485–500 (2009). https://doi.org/10.17705/1cais.02428
Khalifa, A., De Mesentier Silva, F., Togelius, J.: Level design patterns in 2D games. In: IEEE Conference on Computational Intelligence and Games CIG. 2019-August (2019). https://doi.org/10.1109/CIG.2019.8847953
Fogg, B.J.: Creating persuasive technologies: an eight-step design process. ACM International Conference Proceeding Series 350 (2009). https://doi.org/10.1145/1541948.1542005
Proto.IO: Proto.io - Prototypes that feel real. https://proto.io/. Accessed 04 Apr 2020
Draw Freely|Inkscape. https://inkscape.org/. Accessed 6 Nov 2021
Unity: Unity Real-Time Development Platform|3D, 2D VR & AR Engine. https://unity.com/. Accessed 4 Apr 2021
The official home of Super MarioTM – Home. https://mario.nintendo.com/. Accessed 11 Jan 2021
Mega Man – Wikipedia. https://en.wikipedia.org/wiki/Mega_Man. Accessed 6 Nov 2021
Dangerous Dave – Wikipedia. https://en.wikipedia.org/wiki/Dangerous_Dave. Accessed 6 Nov 2021
Claw (video game) – Wikipedia. https://en.wikipedia.org/wiki/Claw_(video_game). Accessed 6 Nov 2021
Huang, H.Y., Tuncay, G.S., Demetriou, S., Gunter, C.A., Banerjee, R., Bashir, M.: Smartphone security behavioral scale: a new psychometric measurement for smartphone security (2020)
Rogers W.R.: Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation. Soc. Psychophysiol. A Sourceb. 153–177 (1983)
Chambers, R., Tingey, L., Mullany, B., Parker, S., Lee, A., Barlow, A.: Exploring sexual risk taking among American Indian adolescents through protection motivation theory. AIDS Care 28, 1089–1096 (2016). https://doi.org/10.1080/09540121.2016.1164289
Plotnikoff, R.C., Trinh, L.: Protection motivation theory: is this a worthwhile theory for physical activity promotion? Exerc. Sport Sci. Rev. 38, 91–98 (2010). https://doi.org/10.1097/JES.0b013e3181d49612
Meier, Y., Schäwel, J., Kyewski, E., Krämer, N.C.: Applying protection motivation theory to predict facebook users’ withdrawal and disclosure intentions. In: ACM International Conference Proceeding Series, pp. 21–29 (2020). https://doi.org/10.1145/3400806.3400810
Mwagwabi, F.M.: A Protection Motivation Theory Approach to Improving Compliance with Password Guidelines (2015)
Shih-Chieh Hsu, J., Shih, S.-P.: When does one weight threats more? An integration of regulatory focus theory and protection motivation theory. In: Proceedings of the 10th Pre-ICIS Workshop on Information Security and Privacy, pp. 12–13 (2015)
Giwah, A.D., Wang, L., Levy, Y., Hur, I.: Empirical assessment of mobile device users’ information security behavior towards data breach: leveraging protection motivation theory. J. Intellect. Cap. 21, 215–233 (2019). https://doi.org/10.1108/JIC-03-2019-0063
van Bavel, R., Rodríguez-Priego, N., Vila, J., Briggs, P.: Using protection motivation theory in the design of nudges to improve online security behavior. Int. J. Hum. Comput. Stud. 123, 29–39 (2019). https://doi.org/10.1016/j.ijhcs.2018.11.003
Crossler, R., Bélanger, F.: An extended perspective on individual security behaviors: Protection motivation theory and a unified security practices (USP) instrument. Data Base Adv. Inf. Syst. 45, 51–71 (2014). https://doi.org/10.1145/2691517.2691521
Verkijika, S.F.: Understanding smartphone security behaviors: an extension of the protection motivation theory with anticipated regret. Comput. Secur. 77, 860–870 (2018). https://doi.org/10.1016/j.cose.2018.03.008
Reynolds, J.L.: Measuring intrinsic motivations. In: Handbook of Research on Electronic Survey Measurements, pp. 170–173 (2006). https://doi.org/10.4018/978-1-59140-792-8.ch018
Quantitative Research for new user researchers - How to be a Games User Researcher. https://gamesuserresearch.com/2021/07/19/quantitative-research-for-new-user-researchers/. Accessed 28 Nov 2021
Wulf, T., Bowman, N.D., Velez, J.A., Breuer, J.: Once upon a game: exploring video game nostalgia and its impact on well-being. Psychol. Pop. Media Cult. (2018). https://doi.org/10.1037/ppm0000208
Perrotta, C., Featherstone, G., Aston, H., Houghton, E.: Game-Based Learning: LateSloughst Evidence And Future Directions. National Foundation for Educational Research, Slough (2013)
To, A., Ali, S., Kaufman, G., Hammer, J.: Integrating Curiosity and Uncertainty in Game Design. In: Proceedings of the 1st International Joint Conference of DiGRA-FDG, pp. 1–16 (2016)
Srivastava, E., Maheswarappa, S.S., Sivakumaran, B.: Nostalgic advertising in India: a content analysis of Indian TV advertisements. Asia Pacific J. Mark. Logist. 29, 47–69 (2017). https://doi.org/10.1108/APJML-10-2015-0152
Orji, R., Vassileva, J., Mandryk, R.L.: Modeling the efficacy of persuasive strategies for different gamer types in serious games for health. User Model. User-Adap. Inter. 24(5), 453–498 (2014). https://doi.org/10.1007/s11257-014-9149-8
Orji, R., Mandryk, R.L., Vassileva, J.: Improving the efficacy of games for change using personalization models. ACM Trans. Comput. Interact. 24 (2017). https://doi.org/10.1145/3119929
Cesario, J., Higgins, E.T., Scholer, A.A.: Regulatory fit and persuasion: basic principles and remaining questions. Soc. Personal. Psychol. Compass. 2, 444–463 (2008). https://doi.org/10.1111/j.1751-9004.2007.00055.x
Acknowledgement
This research was undertaken, in part, thanks to funding from the Canada Research Chairs Program. We acknowledge the support of the Natural Sciences and Engineering Research Council of Canada (NSERC) through the Discovery Grant.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this paper
Cite this paper
Ganesh, A., Ndulue, C., Orji, R. (2022). Smartphone Security and Privacy – A Gamified Persuasive Approach with Protection Motivation Theory. In: Baghaei, N., Vassileva, J., Ali, R., Oyibo, K. (eds) Persuasive Technology. PERSUASIVE 2022. Lecture Notes in Computer Science, vol 13213. Springer, Cham. https://doi.org/10.1007/978-3-030-98438-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-98438-0_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-98437-3
Online ISBN: 978-3-030-98438-0
eBook Packages: Computer ScienceComputer Science (R0)