Gamification has emerged as a transformative e-business strategy, introducing innovative methods to engage customers and drive sales. This article explores the integration of game design principles into business contexts, termed "gamification," a subject of increasing interest among both scholars and industry professionals. The discussion systematically addresses key themes, like the role of gamification in marketing strategies, enhancing website functionality, and its application within the financial sector, including e-banking, drawing insights from academic and industry perspectives. By conducting a systematic literature review of 48 academic articles published between 2015 and 2024, this study examines the use of personalized, gamification-based strategies to mitigate cyber threats in the financial domain. The review highlights the growing digitization of financial services and the corresponding rise in sophisticated cyber threats, including traditional attacks and advanced persistent threats (APTs). This article critically assesses the evolving landscape of cyber threats specific to the financial industry, identifying trends, challenges, and innovative solutions to strengthen cybersecurity practices. Of particular interest is the application of AI-enhanced gamification strategies to reinforce cybersecurity protocols, particularly in the face of novel threats in gaming platforms. Furthermore, the review evaluates techniques grounded in user behavior, motivation, and readiness to enhance cybersecurity. The article also offers a comprehensive taxonomy of financial services, categorizing cyber threats into game-based (., phishing, malware, APTs) and non-game-based (., social engineering, compliance issues) threats. AI-driven measures for prevention and detection emphasize regular security assessments, user training, and system monitoring with incident response plans. This research provides valuable insights into the intersection of gamification and cybersecurity, offering a forward-looking perspective for both academic researchers and industry professionals.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11888878 | PMC |
http://dx.doi.org/10.7717/peerj-cs.2598 | DOI Listing |
PeerJ Comput Sci
February 2025
School of Systems and Technology, University of Management and Technology, Lahore, Pakistan.
Gamification has emerged as a transformative e-business strategy, introducing innovative methods to engage customers and drive sales. This article explores the integration of game design principles into business contexts, termed "gamification," a subject of increasing interest among both scholars and industry professionals. The discussion systematically addresses key themes, like the role of gamification in marketing strategies, enhancing website functionality, and its application within the financial sector, including e-banking, drawing insights from academic and industry perspectives.
View Article and Find Full Text PDFSci Rep
March 2025
School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, India.
In an era of increasing sophistication and frequency of cyber threats, securing Internet of Things (IoT) networks has become a paramount concern. IoT networks, with their diverse and interconnected devices, face unique security challenges that traditional methods often fail to address effectively. To tackle these challenges, an Intrusion Detection System (IDS) is specifically designed for IoT environments.
View Article and Find Full Text PDFNPJ Digit Med
March 2025
University of California Berkeley, School of Information Science, Berkeley, CA, USA.
Cyber-attacks on healthcare entities and leaks of personal identifiable information (PII) are a growing threat. However, it is now possible to learn sensitive characteristics of an individual without PII, by combining advances in artificial intelligence, analytics, and online repositories. We discuss privacy threats and privacy engineering solutions, emphasizing the selection of privacy enhancing technologies for various healthcare cases.
View Article and Find Full Text PDFISA Trans
February 2025
College of Intelligent Systems Science and Engineering, Harbin Engineering University, Harbin 150001, China. Electronic address:
This study addresses the control challenges of distributed prescribed-time maneuvers for underactuated unmanned surface vessels (USVs) operating in affine formation under adverse conditions, including ocean disturbances, unmodeled dynamics, and denial-of-service (DoS) attacks. The research develops a control scheme that enables USVs to perform complex maneuvers such as translation, shearing, rotation, and scaling, despite intermittent communication failures due to periodic DoS attacks. The approach integrates a distributed prescribed-time observer (DPTO) for each vessel to monitor local time-varying desired states, coupled with an adaptive prescribed-time local tracking control (APTLTC) strategy that drives the USV to track the desired states.
View Article and Find Full Text PDFPsychol Sex
August 2024
Institute for Sexual and Gender Minority Health and Wellbeing, Northwestern University, Chicago, IL, USA.
Adolescents are at risk of cyber dating abuse (CDA) as many turn online to find meaningful connections. This study examined lifetime CDA experiences of sexual and gender minority (SGM) feminine adolescents during romantic/ sexual interactions with someone they first met online, as well as the implications for psychological wellbeing. In 2022, a diverse group of SGM feminine adolescents (N=310, Mage=16.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!