of use cases and data and can even be extended to pro-
vide deeper IT knowledge than the current work.
ACKNOWLEDGEMENTS
This research work has been funded by the German
Federal Ministry of Education and Research and the
Hessian Ministry of Higher Education, Research, Sci-
ence and the Arts within their joint support of the
National Research Center for Applied Cybersecurity
ATHENE.
REFERENCES
Abawajy, J. (2014). User preference of cyber security
awareness delivery methods. Behaviour & Informa-
tion Technology, 33(3):237–248.
Alotaibi, F., Furnell, S., Stengel, I., and Papadaki, M.
(2016). A review of using gaming technology
for cyber-security awareness. Int. J. Inf. Secur.
Res.(IJISR), 6(2):660–666.
Arendt, D., Best, D., Burtner, R., and Paul, C. L. (2016).
Cyberpetri at cdx 2016: Real-time network situation
awareness. In 2016 IEEE Symposium on Visualization
for Cyber Security (VizSec), pages 1–4. IEEE.
Arendt, D. L., Burtner, R., Best, D. M., Bos, N. D., Gersh,
J. R., Piatko, C. D., and Paul, C. L. (2015). Ocelot:
user-centered design of a decision support visualiza-
tion for network quarantine. In 2015 IEEE Symposium
on Visualization for Cyber Security (VizSec), pages 1–
8. IEEE.
Bada, M., Sasse, A. M., and Nurse, J. R. (2019). Cyber
security awareness campaigns: Why do they fail to
change behaviour? arXiv preprint arXiv:1901.02672.
Barbosa, N. M., Zhang, Z., and Wang, Y. (2020). Do pri-
vacy and security matter to everyone? quantifying
and clustering user-centric considerations about smart
home device adoption. In Sixteenth Symposium on
Usable Privacy and Security ({SOUPS} 2020), pages
417–435.
Berengueres, J., Alsuwairi, F., Zaki, N., and Ng, T. (2013).
Gamification of a recycle bin with emoticons. In 2013
8th ACM/IEEE International Conference on Human-
Robot Interaction (HRI), pages 83–84. IEEE.
Bradley, N., Alvarez, M., Kuhn, J., and McMillen, D.
(2015). Ibm 2015 cyber security intelligence index.
Busse, K., Sch
¨
afer, J., and Smith, M. (2019). Replication:
no one can hack my mind revisiting a study on ex-
pert and non-expert security practices and advice. In
Fifteenth Symposium on Usable Privacy and Security
({SOUPS} 2019).
Card, S., Mackinlay, J., and Shneiderman, B. (2009). Infor-
mation visualization. Human-computer interaction:
Design issues, solutions, and applications, 181.
CIGI-Ipsos (2019). 2019 cigi-ipsos global survey on in-
ternet security and trust. https://www.cigionline.org/
internet-survey-2019. Accessed: 2021-02-25.
CJ, G., Pandit, S., Vaddepalli, S., Tupsamudre, H., Ba-
nahatti, V., and Lodha, S. (2018). Phishy-a seri-
ous game to train enterprise users on phishing aware-
ness. In Proceedings of the 2018 annual symposium
on computer-human interaction in play companion ex-
tended abstracts, pages 169–181.
Cobb, C., Surbatovich, M., Kawakami, A., Sharif, M.,
Bauer, L., Das, A., and Jia, L. (2020). How risky
are real users’{IFTTT} applets? In Sixteenth Sym-
posium on Usable Privacy and Security ({SOUPS}
2020), pages 505–529.
Denning, T., Lerner, A., Shostack, A., and Kohno, T.
(2013). Control-alt-hack: the design and evaluation
of a card game for computer security awareness and
education. In Proceedings of the 2013 ACM SIGSAC
conference on Computer & communications security,
pages 915–928.
Deterding, S., Dixon, D., Khaled, R., and Nacke, L. (2011).
From game design elements to gamefulness: defin-
ing” gamification”. In Proceedings of the 15th inter-
national academic MindTrek conference: Envisioning
future media environments, pages 9–15.
D
¨
orner, R., G
¨
obel, S., Effelsberg, W., and Wiemeyer, J.
(2016). Serious Games. Springer.
Dutz, T., Hardy, S., Kn
¨
oll, M., G
¨
obel, S., and Steinmetz,
R. (2014). User interfaces of mobile exergames. In
International Conference on Human-Computer Inter-
action, pages 244–255. Springer.
Feamster, N. (2010). Outsourcing home network security.
In Proceedings of the 2010 ACM SIGCOMM work-
shop on Home networks, pages 37–42.
Furman, S., Theofanos, M. F., Choong, Y.-Y., and Stanton,
B. (2011). Basing cybersecurity training on user per-
ceptions. IEEE Security & Privacy, 10(2):40–49.
Furnell, S. M., Bryant, P., and Phippen, A. D. (2007). As-
sessing the security perceptions of personal internet
users. Computers & Security, 26(5):410–417.
Ghafir, I., Prenosil, V., Svoboda, J., and Hammoudeh, M.
(2016). A survey on network security monitoring sys-
tems. In 2016 IEEE 4th International Conference on
Future Internet of Things and Cloud Workshops (Fi-
CloudW), pages 77–82. IEEE.
Giannakas, F., Kambourakis, G., and Gritzalis, S. (2015).
Cyberaware: A mobile game-based app for cyber-
security education and awareness. In 2015 Interna-
tional Conference on Interactive Mobile Communica-
tion Technologies and Learning (IMCL), pages 54–58.
IEEE.
Goble, D. J., Cone, B. L., and Fling, B. W. (2014). Using the
wii fit as a tool for balance assessment and neuroreha-
bilitation: the first half decade of “wii-search”. Jour-
nal of neuroengineering and rehabilitation, 11(1):1–
9.
Guerra, J. L., Veas, E., and Catania, C. A. (2019). A study
on labeling network hostile behavior with intelligent
interactive tools. In 2019 IEEE Symposium on Visual-
ization for Cyber Security (VizSec), pages 1–10. IEEE.
Hassenzahl, M. (2010). Experience design: Technology for
all the right reasons. Synthesis lectures on human-
centered informatics, 3(1):1–95.
Hassenzahl, M., Burmester, M., and Koller, F.
(2003). Attrakdiff: Ein fragebogen zur messung
NetVisGame: Mobile Gamified Information Visualization of Home Network Traffic Data
137