Recognition: unknown
Malicious User Experience Design Research for Cybersecurity
read the original abstract
This paper explores the factors and theory behind the user-centered research that is necessary to create a successful game-like prototype, and user experience, for malicious users in a cybersecurity context. We explore what is known about successful addictive design in the fields of video games and gambling to understand the allure of breaking into a system, and the joy of thwarting the security to reach a goal or a reward of data. Based on the malicious user research, game user research, and using the GameFlow framework, we propose a novel malicious user experience design approach
This paper has not been read by Pith yet.
Forward citations
Cited by 1 Pith paper
-
SIMPLIFI -- Study of Interstellar Magnetic Polarization: a Legacy Investigation of Filaments. I. Magnetically-Guided Accretion onto the DR21 Ridge
Magnetic fields remain aligned with projected gravity throughout the DR21 ridge and sub-filaments, indicating guided accretion at rates that can build the ridge in about one million years.
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.