Role-playing game for studying user behaviors in security: A case study on email secrecy

6Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Understanding the capabilities of adversaries (e.g., how much the adversary knows about a target) is important for building strong security defenses. Computing an adversary's knowledge about a target requires new modeling techniques and experimental methods. Our work describes a quantitative analysis technique for modeling an adversary's knowledge about private information at workplace. Our technical enabler is a new emulation environment for conducting user experiments on attack behaviors. We develop a role-playing cyber game for our evaluation, where the participants take on the adversary role to launch ID theft attacks by answering challenge questions about a target. We measure an adversary's knowledge based on how well he or she answers the authentication questions about a target. We present our empirical modeling results based on the data collected from a total of 36 users.

Cite

CITATION STYLE

APA

Xu, K., Yao, D., Perez-Quinones, M. A., Link, C., & Scott Geller, E. (2015). Role-playing game for studying user behaviors in security: A case study on email secrecy. In CollaborateCom 2014 - Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (pp. 18–26). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.4108/icst.collaboratecom.2014.257242

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free