UPSI Digital Repository (UDRep)
Start | FAQ | About
Menu Icon

QR Code Link :

Type :Final Year Project
Subject :QA Mathematics
Main Author :Ho, Jia Fu
Title :The design and graphic user interface of Mr Hack: information & data security digital games
Hits :24
Place of Production :Tanjong Malim
Publisher :Fakulti Seni, Komputeran dan Industri Kreatif
Year of Publication :2022
Corporate Name :Perpustakaan Tuanku Bainun
PDF Guest :Click to view PDF file
PDF Full Text :You have no permission to view this item.

Abstract : Perpustakaan Tuanku Bainun
The importance of cyber security is still little known by the public in Malaysian society. At the same time, Malaysian society is unaware that cyber security brings misfortune when cyber hackers attack. Mr Hack is a digital game developed to increase cyber security awareness among the Malaysian community. This Mr Hack game is a 3D digital strategy and open-world game with a cyber security concept. This digital game is developed for windows computer platforms and targets players from children aged ten and up to adults. In this digital game, the player, as the main character, Mr Hack, will face several situations where the player will become a cyber hacker to intrude on someone's information or personal data to achieve the goal. Each of these situations will display the actual situation in our lives: how to store essential laptop keywords evenly, random disclosure of personal data in public places, and so on. Players must find keywords from around the area to enter the computer information system. At the same time, players understand that cyber security crises are always happening around us. According to Mr Hack's main character design concept, Mr Hack is a mysterious person. The following is the idea of the characters' colours, costumes, and accessories to fulfil the characteristics of the hacker. From the playtesting results, Mr Hack meets all the tested usability elements. Most players think this game's best part is the storyline and character design set. There felt quite attractive and new to them. Players need to solve the task by memories the password and finding the data leak in the game world. Also, players agree that the game should contain more learning knowledge about cybersecurity. The game help players easy to learn the knowledge while playing the game. However, the game still needs to improve the efficiency element, like making the camera oof view more smoothly and the walking speed of the main character. Otherwise, Mr Hack's game could be a promoting tool for cybersecurity awareness programmes or campaigns.

References

Abdul Karim, L. A. (2021, May 23). Malaysia siap siaga hadapi ancaman siber. Berita Harian. https://www.bharian.com.my/berita/nasional/2021/05/819815/malaysia-siap-siaga-hadapi-ancaman-siber 

Adnan Bin Pitchan, M. (2018). KESEDARAN DAN AMALAN KESELAMATAN SIBER DALAM KALANGAN PENGGUNA INTERNET MALAYSIA. http://psasir.upm.edu.my/id/eprint/68481/1/FBMK%202018%2016%20IR.pdf 

AHAD, MOHD AZIS NGAH, & ROHANIZA IDRIS. (2014, October 6). Pengguna perlu ada kesedaran keselamatan siber. Berita Harian Online. https://www.bharian.com.my/taxonomy/term/61/2014/10/9931/pengguna-perlu-ada-kesedaran-keselamatan-siber 

Ariosoft. (2019). What is the game development life cycle? Ariosoft.Com. https://ariosoft.com/what-is-the-game-development-life-cycle/ 

B. V. D. Putten, & A. Kamphuis. (2007). Efficiency and Effectiveness of Game AI. https://www.semanticscholar.org/paper/Efficiency-and-Effectiveness-of-Game-AI-Putten-Kamphuis/b83493ff74633ce4197b9b065017e1104572a82d 

Bastien, J. M. C. (2010). Usability testing: a review of some methodological and technical aspects of the method. International Journal of Medical Informatics, 79(4), e18-e23. https://doi.org/10.1016/j.ijmedinf.2008.12.004 

Bernama. (2021, June 10). Kesedaran keselamatan siber rakyat Malaysia masih rendah - Zahidi. Astro Awani. https://www.astroawani.com/berita-malaysia/kesedaran-keselamatan-siber-rakyat-malaysia-masih-rendah-zahidi-302555 

Buxton, D., & U'ren, A. (2021). Experian & CyberSecurity Malaysia: Growth in Digital Transactions Increases Risk of Identity Theft. 

grendelgames.com. (2022, January 21). What are serious games? Grendelgames.Com. https://grendelgames.com/what-are-serious-games/ 

Hayani, N., & Rahim, A. (2017). ASSESSMENT OF CYBERSECURITY AWARENESS PROGRAM ON PERSONAL DATA PROTECTION AMONG YOUNGSTERS IN MALAYSIA. http://studentsrepo.um.edu.my/id/eprint/11825 

Jack Koziol, & Cassie Bottorff. (2021, October 27). Cybersecurity Awareness: What It Is And How To Start. Forbes Advisor. https://www.forbes.com/advisor/business/what-is-cybersecurity-awareness/ 

Joel B. Cohen, & Charles S. Areni. (1991). Affect and consumer behavior. Handbook of Consumer Behavior. https://ro.uow.edu.au/gsbpapers/464/ 

Jose Rodrigues. (2021, May 28). Data Deep Dive: Open-World Games. Newzoo.Com. https://newzoo.com/insights/articles/data-deep-dive-open-world-games-gta-v-minecraft-horizon-valheim-roblox/ 

kaspersky.com. (2022). What is Cyber Security? https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security 

Lee, S., & Choeh, J. Y. (2016). The determinants of helpfulness of online reviews. Behaviour & Information Technology, 35(10), 853-863. https://doi.org/10.1080/0144929X.2016.1173099 

Mahmoud, M. S., & Xia, Y. (2021). Structural and performance patterns. In Discrete Networked Dynamic Systems (pp. 49-90). Elsevier. https://doi.org/10.1016/B978-0-12-823698-7.00010-2 

malaymail.com. (2021, June 2). Minister: 4,615 cybersecurity incidents reported in Malaysia from Jan-May. Malaymail.Com. https://www.malaymail.com/news/malaysia/2021/06/02/minister-4615-cybersecurity-incidents-reported-in-malaysia-from-jan-may/1979083 

Maricarmen Teran. (2018). Five usability factors that make products usable. 

Min, W., Mott, B., Rowe, J., Liu, B., & Lester, J. (2016). Player Goal Recognition in Open-World Digital Games with Long Short-Term Memory Networks. https://doi.org/10.5555/3060832.3060983 

MORGAN, G. A., & HARMON, R. J. (2001). Data Collection Techniques. Journal of the American Academy of Child & Adolescent Psychiatry, 40(8), 973-976. https://doi.org/10.1097/00004583-200108000-00020 

myMetro. (2019, August 13). Jangan sampai hati anda "digodam." Hmetro.Com.My. https://www.hmetro.com.my/mutakhir/2019/08/485621/jangan-sampai-hati-anda-digodam 

Nazrul, M., Abidin, Z., Norman, M. H., & Noor, N. M. (2021). Keberkesanan Penggunaan Realiti Maya Dalam Kurikulum Pendidikan Malaysia (The Effectiveness of the Use of Virtual Reality in the Malaysian Education Curriculum) (Vol. 3, Issue 1). https://myjms.mohe.gov.my/index.php/jdpd/article/view/13012 

PlamzDooM. (2021, October 13). Non-linear level design where the player is able to freely traverse the game world and choose where and when to visit certain areas in the game. Giantbomb.Com. https://www.giantbomb.com/open-world/3015-207/ 

Rahim, N. H. A., Hamid, S., & Kiah, M. L. M. (2019). Enhancement of cybersecurity awareness program on personal data protection among youngsters in Malaysia: An assessment. Malaysian Journal of Computer Science, 32(3), 221-245. https://doi.org/10.22452/mjcs.vol32no3.4 

Ramadan, R., & Widyani, Y. (2013). Game development life cycle guidelines. 2013 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2013, 95-100. https://doi.org/10.1109/ICACSIS.2013.6761558 

Steve Morgan. (2020, November 13). Cybercrime To Cost The World $10.5 Trillion Annually By 2025. Cybercrime Magazine. https://cybersecurityventures.com/cybercrime-damage-costs-10-trillion-by-2025/ 

sumi.uxp.ie. (1994). What is SUMI? https://sumi.uxp.ie/about/whatis.html 

Tangkui, R. bin, & Keong, T. C. (2020). Kesan Pembelajaran Berasaskan Permainan Digital Minecraft Terhadap Pencapaian Murid Tahun Lima dalam Pecahan. Malaysian Journal of Social Sciences and Humanities (MJSSH), 5(9), 98-113. https://doi.org/10.47405/mjssh.v5i9.476 

techopedia.com. (n.d.). What Does Playtesting Mean? Techopedia.Com. Retrieved June 20, 2022, from https://www.techopedia.com/definition/27197/playtesting 

Tovi Grossman, George Fitzmaurice, & Ramtin Attar. (2009). A Survey of Software Learnability: Metrics, Methodologies and Guidelines. ACM Press. 

Unisys. (2017, July 26). Malaysian Public's Concern About Cyber Security Issues Escalates - Unisys Security IndexTM Finds. Www.Unisys.Com.My. https://www.unisys.com/news-release/my-malaysian-public-concern-about-cyber-security-issues-escalates/ 

Zhai Yun, T. (2022, January 24). E-wallet: Cybersecurity: How much cash would you keep in your e-wallet? The Edge Malaysia. https://www.theedgemarkets.com/article/ewallet-cybersecurity-how-much-cash-would-you-keep-your-ewallet 

  

 

 

 


This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials.
You may use the digitized material for private study, scholarship, or research.

Back to previous page

Installed and configured by Bahagian Automasi, Perpustakaan Tuanku Bainun, Universiti Pendidikan Sultan Idris
If you have enquiries, kindly contact us at pustakasys@upsi.edu.my or 016-3630263. Office hours only.