The impact of a training program based on designing electronic games using Game Maker to enhance cyber security concepts for middle-school students

Document Type : Original Article

Authors

Faculty of Higher Education, King Abdul Aziz University, Jeddah - Saudi Arabia.

Abstract

The goal of this search is to investigate the impact of designing games to enhance cyber security concepts (email protection, data and information protection, mobile security, and encryption). By using Game Maker as a tool to apply the game design without any programing skills required. This experimental study was based on the quasi-empirical approach. The measuring tools were knowledge test as a pretest and a posttest, and a product evaluation card. The knowledge tests were utilized to assess the students’ cyber security concepts, while a product evaluation card was used to evaluate their game designs. A random sample of 17 middle-school students was selected and tested before the training program. Then these students were divided into four groups to design electronic games for each cyber security concept. The study found that there were significant differences at the level of indication (α-≤0.05) between the means of the students’ grades in the pretest and posttest. Additionally, all the groups achieved the standards of the product evaluation card for designing their Based on these findings, the researcher recommends that learners be encouraged to design and produce games that enhance cyber security concepts and share them through the social media. Accredited training programs on designing and production games are recommended because of their effective impact.

Keywords


Ahmad, N., Mokhtar, U., Fariza Paizi Fauzi, W., Othman, Z., Hakim Yeop, Y., & Huda Sheikh Abdullah, S. (2019). Cyber Security Situational Awareness among Parents. Proceedings of the 2018 Cyber Resilience Conference, CRC 2018.
Auckett, N. (2015). GameMaker Essentials.
Alotaibi, F., Furnell, S., Stengel, I., & Papadaki, M. (2017). A Survey of Cyber-Security Awareness in Saudi Arabia. International Conference for Internet Technology and Secured Transactions.
Denham , A. (2018). Using a digital game as an advance organizer. Educational Technology Research, pp. 66:1-24.
Game, Y. (2019). YoYo Game:make 2D game with Game Maker. Retrieved from https://www.yoyogames.com/
goleman, d., boyatzis, R., & Mckee, A. (2019). Creative thinking in digital game design and development: A case study. Journal of Chemical Information and Modeling, pp. 1689-1699.
Jenson, J., & Droumeva , M. (2016). Exploring Media Literacy and Computational Thinking: A Game Maker Curriculum Study. Electronic Journal of e-Learning, v14 n2 p111-121 2016.
Johnson, C. (2017, may). Learning to Program with Game Maker. Online Submission, International Journal of Computer Science Education in Schools.
Kasurinen , J., & Kettunen , M. (2018, MAY). LEARNING CYBER SECURITY: TEACHING TECHNICALLY CHALLENGING TOPICS WITH GAMES AND VIRTUAL LABORATORIES. International Journal on Information Technologies & Security, pp. 103-114.
Onwubiko, C. (2015). Cyber Security Operations Centre Security Monitoring for protecting Business and supporting Cyber Defense Strategy. nternational Conference on Cyber Situational Awareness, Data Analytics and Assessment, CyberSA, pp. 1-10.
Stavrou, E. (2018). Enhancing Cyber Situational Awareness : A New Perspective of Password Auditing Tools. 2018 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), pp. 1-4.
Stroud, F. (2020). mobile device security. Retrieved from webopedia: https://www.webopedia.com/TERM/M/mobile-device-security.html
techopedia. (2017, February 16). Data Protection. Retrieved from techopedia: https://www.techopedia.com/definition/29406/data-protection
Turner, L. A., Johnson, R. B., & Christensen, L. B. (2014). Research Methods, Design, and Analysis. Pearson Education Limited.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers and Security, pp. 97-102.
Wang, L., & Chen, M. (2010). Learning programming concepts through game design: A PCT perspective. DIGITEL 2010 - The 3rd IEEE International Conference on Digital Game and Intelligent Toy Enhanced Learning, pp. 219-221.
Yasina, A., Liu, L., Li, T., Wang, J., & Zowghi, D. (2018). Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG). Information and Software Technology, pp. 179-200.
Zimmerma, E., Tekinbaş‏, S., & Salen, K. (2004). Rules of Play: Game Design Fundamentals.