StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Game to Learn IT Security Crime - Article Example

Cite this document
Summary
This short article describes an interesting way, that was found to be used in security training of staff. It covers creation of a computer game, that was used to teach employees…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.6% of users find it useful
Game to Learn IT Security Crime
Read Text Preview

Extract of sample "Game to Learn IT Security Crime"

Article Summary Laura Rosas and Wil Phelps, IT Security professionals, have developed a game to be used in security training. They were motivated by a need to, “…to address a series of dilemmas staff were having.(McNickle, 2012) The nature of the dilemmas revolved around the overall efficiency and success of security practices in real life security scenarios within healthcare facilities. The program, called, CyberSecure, is designed to use the in-game avatars to simulate and safely test and improve the outcomes of the staff as a whole.

The games covers issues like proper procedures to protect and control access to patient information, keeping passwords secure, and how to secure and encrypt any information in mobile devices. The “players” of the game are given different scenarios and options as to how they think they should proceed. They are scored based on these choices and shown means as to how to improve their scores and practices. This program, ideally, was intended, by the creators, to be implemented in smaller medical practices, although anyone can use them, because these smaller practices , “…don’t have the budget or infrastructure.

” (McNickle, 2012) The game is, also, intended to appeal to the younger, gaming-generation, entering the workforce. However, despite the positive responses to CyberSecure, Chad Boeckmann, president of Security Data Solutions, and Mahmood Sher-Jan, vice president of product development at ID Experts, believe that games, albeit a fine temporary solution, will soon be replaced. Boeckmann feels that interactive video will, likely, become very popular, it is more adaptable and less costly to produce.

Sher-Jan, believes that interactive role playing games will be much more successful as security training simulations. In these scenarios participants will not always be aware it is a game, thus making the results much more realistic. If they know they are playing a game, where there are no real consequences and there is no real sense of urgency, this may alter how seriously they conduct themselves. Ultimately, the article proves that how healthcare staff are trained and tested is changing in some interesting ways.

References McNickle, M. (2012, September 25). Avatar game makes it security training less painful. InformationWeek-Healthcare, 1. Retrieved from http://www.informationweek.com/healthcare/policy/avatar-game-makes-it-security-training-l/240007908 McNickle, M. (2012, September 25). Avatar game makes it security training less painful. InformationWeek-Healthcare, 1. Retrieved from http://www.informationweek.com/healthcare/policy/avatar-game-makes-it-security-training-l/240007908 (McNickle, 2012)

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Game to Learn IT Security Crime Article Example | Topics and Well Written Essays - 250 words”, n.d.)
Game to Learn IT Security Crime Article Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1603889-game-to-learn-it-security-crime
(Game to Learn IT Security Crime Article Example | Topics and Well Written Essays - 250 Words)
Game to Learn IT Security Crime Article Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1603889-game-to-learn-it-security-crime.
“Game to Learn IT Security Crime Article Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1603889-game-to-learn-it-security-crime.
  • Cited: 0 times

CHECK THESE SAMPLES OF Game to Learn IT Security Crime

The Reasons that Lead to Crimes

The paper "The Reasons that Lead to Crimes" suggests that crime to the layman is an act of lawlessness which is unacceptable in society and punishable by law.... It is here that the problem of adequate salaries proofs to be another cause of crime.... Crimes are not committed by only people who are poor or do not have any source of income or employment, but also by some greedy and evil charactered people who hold high offices in our societies If we look once again at the causes of crime, the explanation was given to why lack of good parental guidance was mentioned as one come to light here....
14 Pages (3500 words) Essay

Criminology - Risk & Security Management

AARP analyzed the complaint data from FTC and concluded that complainants who were under 50 years of age were much less likely to be victimized by… Hence, it was important to develop technologies and techniques for the protection of older customers.... (Neal Walters, 2006) In order to deal with this problem, efforts were made to design an effective In the year 2004, APACS, which is the United Kingdom payments association representative of the card issuers, had introduced a new industry standard....
9 Pages (2250 words) Essay

Lessons the World Learned in Regards to Critical Infrastructure Due To Sasser

Do you believe Jaschan's punishment fit his crime?... aschan's punishment did not fit his crime.... How fast were security professionals able to respond to the threat?... How fast were security professionals able to respond to the threat?... security professionals were fast to respond and a free Sasser disinfection tool was posted by Microsoft on May 2.... Most people after the Sasser virus lost trust in the security of Windows Xp....
1 Pages (250 words) Essay

Homeland Security / Digital Crime and Digital Terrorism

The development of internet has opened one more channel for terrorism; digital crime and digital terrorism.... Generally speaking digital crime or digital terrorism is the criminal or terrorist activities performed with the help of computers and internet.... This paper analyses topics such as Why Homeland Security is relevant in the context of digital crime and digital terrorism, How the issue of digital crime and digital terrorism have evolved or been altered over its lifespan?...
7 Pages (1750 words) Research Paper

Research background information about crime prevention policies

Although various Research background information about crime prevention policies Research background information about crime prevention policiesThe previous crime policy in University of Chicago, New York and MinnesotaAccording to research carried out by the University of Chicago, roughly five hundred thousand individuals are murdered all over the world.... Safety and crime prevention policies offered by the UniversitiesThe University of Chicago crime Lab tries to advance our understanding on how best we can reduce violence and crime through assisting the government agencies in evaluating new pilot programs....
2 Pages (500 words) Research Paper

Gang Violence, Educational Initiatives, Local Initiatives

In order to stop crime in Meetings and gatherings with the police department and the community members to talk about and enlighten the community members on the effects of crime.... This program consists series of lessons for the community and students that include skill development to help resist gangs and gang membership, avoid involvement in crime and learn the dangers associated with crime and gangs.... The program is effective in developing positive attitudes towards the police and negative attitudes toward involvement in gangs and crime....
5 Pages (1250 words) Essay

My Impression about Singapore

In this essay, however, I will be discussing my impression on Singapore with regards to security, transportation-related issues and the ability to live peacefully while having value and respect for the culture.... I have a background in transportation and my service in the military has made me develop an appreciation for security.... The cultural and religious diversities in Ghana have had significant effects on the polity of the nation and this has contributed negatively towards the economic development, bringing about security challenges for the nation....
10 Pages (2500 words) Essay

Difficulties in Maintaining Order and Law in Cyber-Space

In the modern world, terrorists are using the internet for recruitment and radicalization posing a great threat to both national and global security.... The paper "Difficulties in Maintaining Order and Law in Cyber-Space" states that globalization has made the life of accessing information easy, but has also increased the rate of crimes in the world....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us