Gamification has emerged as a transformative e-business strategy, introducing innovative methods to engage customers and drive sales. This article explores the integration of game design principles into business contexts, termed "gamification," a subject of increasing interest among both scholars and industry professionals. The discussion systematically addresses key themes, like the role of gamification in marketing strategies, enhancing website functionality, and its application within the financial sector, including e-banking, drawing insights from academic and industry perspectives. By conducting a systematic literature review of 48 academic articles published between 2015 and 2024, this study examines the use of personalized, gamification-based strategies to mitigate cyber threats in the financial domain. The review highlights the growing digitization of financial services and the corresponding rise in sophisticated cyber threats, including traditional attacks and advanced persistent threats (APTs). This article critically assesses the evolving landscape of cyber threats specific to the financial industry, identifying trends, challenges, and innovative solutions to strengthen cybersecurity practices. Of particular interest is the application of AI-enhanced gamification strategies to reinforce cybersecurity protocols, particularly in the face of novel threats in gaming platforms. Furthermore, the review evaluates techniques grounded in user behavior, motivation, and readiness to enhance cybersecurity. The article also offers a comprehensive taxonomy of financial services, categorizing cyber threats into game-based (., phishing, malware, APTs) and non-game-based (., social engineering, compliance issues) threats. AI-driven measures for prevention and detection emphasize regular security assessments, user training, and system monitoring with incident response plans. This research provides valuable insights into the intersection of gamification and cybersecurity, offering a forward-looking perspective for both academic researchers and industry professionals.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11888878PMC
http://dx.doi.org/10.7717/peerj-cs.2598DOI Listing

Publication Analysis

Top Keywords

cyber threats
16
personalized gamification-based
8
industry professionals
8
financial services
8
threats
7
financial
6
cybersecurity
5
unveiling personalized
4
gamification-based cybersecurity
4
cybersecurity risks
4

Similar Publications

Gamification has emerged as a transformative e-business strategy, introducing innovative methods to engage customers and drive sales. This article explores the integration of game design principles into business contexts, termed "gamification," a subject of increasing interest among both scholars and industry professionals. The discussion systematically addresses key themes, like the role of gamification in marketing strategies, enhancing website functionality, and its application within the financial sector, including e-banking, drawing insights from academic and industry perspectives.

View Article and Find Full Text PDF

In an era of increasing sophistication and frequency of cyber threats, securing Internet of Things (IoT) networks has become a paramount concern. IoT networks, with their diverse and interconnected devices, face unique security challenges that traditional methods often fail to address effectively. To tackle these challenges, an Intrusion Detection System (IDS) is specifically designed for IoT environments.

View Article and Find Full Text PDF

Cyber-attacks on healthcare entities and leaks of personal identifiable information (PII) are a growing threat. However, it is now possible to learn sensitive characteristics of an individual without PII, by combining advances in artificial intelligence, analytics, and online repositories. We discuss privacy threats and privacy engineering solutions, emphasizing the selection of privacy enhancing technologies for various healthcare cases.

View Article and Find Full Text PDF

This study addresses the control challenges of distributed prescribed-time maneuvers for underactuated unmanned surface vessels (USVs) operating in affine formation under adverse conditions, including ocean disturbances, unmodeled dynamics, and denial-of-service (DoS) attacks. The research develops a control scheme that enables USVs to perform complex maneuvers such as translation, shearing, rotation, and scaling, despite intermittent communication failures due to periodic DoS attacks. The approach integrates a distributed prescribed-time observer (DPTO) for each vessel to monitor local time-varying desired states, coupled with an adaptive prescribed-time local tracking control (APTLTC) strategy that drives the USV to track the desired states.

View Article and Find Full Text PDF

Adolescents are at risk of cyber dating abuse (CDA) as many turn online to find meaningful connections. This study examined lifetime CDA experiences of sexual and gender minority (SGM) feminine adolescents during romantic/ sexual interactions with someone they first met online, as well as the implications for psychological wellbeing. In 2022, a diverse group of SGM feminine adolescents (N=310, Mage=16.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!