pith. machine review for the scientific record. sign in

arxiv: 1806.11060 · v1 · submitted 2018-06-28 · 💻 cs.HC

Recognition: unknown

Malicious User Experience Design Research for Cybersecurity

Authors on Pith no claims yet
classification 💻 cs.HC
keywords usermaliciousresearchdesignexperiencecybersecuritysuccessfuladdictive
0
0 comments X
read the original abstract

This paper explores the factors and theory behind the user-centered research that is necessary to create a successful game-like prototype, and user experience, for malicious users in a cybersecurity context. We explore what is known about successful addictive design in the fields of video games and gambling to understand the allure of breaking into a system, and the joy of thwarting the security to reach a goal or a reward of data. Based on the malicious user research, game user research, and using the GameFlow framework, we propose a novel malicious user experience design approach

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. SIMPLIFI -- Study of Interstellar Magnetic Polarization: a Legacy Investigation of Filaments. I. Magnetically-Guided Accretion onto the DR21 Ridge

    astro-ph.GA 2026-05 conditional novelty 6.0

    Magnetic fields remain aligned with projected gravity throughout the DR21 ridge and sub-filaments, indicating guided accretion at rates that can build the ridge in about one million years.