UPSI Digital Repository (UDRep)
|
![]() |
|
|
Abstract : Perpustakaan Tuanku Bainun |
The importance of cyber security is still little known by the public in Malaysian society. At the same time, Malaysian society is unaware that cyber security brings misfortune when cyber hackers attack. Mr Hack is a digital game developed to increase cyber security awareness among the Malaysian community. This Mr Hack game is a 3D digital strategy and open-world game with a cyber security concept. This digital game is developed for windows computer platforms and targets players from children aged ten and up to adults. In this digital game, the player, as the main character, Mr Hack, will face several situations where the player will become a cyber hacker to intrude on someone's information or personal data to achieve the goal. Each of these situations will display the actual situation in our lives: how to store essential laptop keywords evenly, random disclosure of personal data in public places, and so on. Players must find keywords from around the area to enter the computer information system. At the same time, players understand that cyber security crises are always happening around us. According to Mr Hack's main character design concept, Mr Hack is a mysterious person. The following is the idea of the characters' colours, costumes, and accessories to fulfil the characteristics of the hacker. From the playtesting results, Mr Hack meets all the tested usability elements. Most players think this game's best part is the storyline and character design set. There felt quite attractive and new to them. Players need to solve the task by memories the password and finding the data leak in the game world. Also, players agree that the game should contain more learning knowledge about cybersecurity. The game help players easy to learn the knowledge while playing the game. However, the game still needs to improve the efficiency element, like making the camera oof view more smoothly and the walking speed of the main character. Otherwise, Mr Hack's game could be a promoting tool for cybersecurity awareness programmes or campaigns. |
References |
Abdul Karim, L. A. (2021, May 23). Malaysia siap siaga hadapi ancaman siber. Berita Harian. https://www.bharian.com.my/berita/nasional/2021/05/819815/malaysia-siap-siaga-hadapi-ancaman-siber Adnan Bin Pitchan, M. (2018). KESEDARAN DAN AMALAN KESELAMATAN SIBER DALAM KALANGAN PENGGUNA INTERNET MALAYSIA. http://psasir.upm.edu.my/id/eprint/68481/1/FBMK%202018%2016%20IR.pdf AHAD, MOHD AZIS NGAH, & ROHANIZA IDRIS. (2014, October 6). Pengguna perlu ada kesedaran keselamatan siber. Berita Harian Online. https://www.bharian.com.my/taxonomy/term/61/2014/10/9931/pengguna-perlu-ada-kesedaran-keselamatan-siber Ariosoft. (2019). What is the game development life cycle? Ariosoft.Com. https://ariosoft.com/what-is-the-game-development-life-cycle/ B. V. D. Putten, & A. Kamphuis. (2007). Efficiency and Effectiveness of Game AI. https://www.semanticscholar.org/paper/Efficiency-and-Effectiveness-of-Game-AI-Putten-Kamphuis/b83493ff74633ce4197b9b065017e1104572a82d Bastien, J. M. C. (2010). Usability testing: a review of some methodological and technical aspects of the method. International Journal of Medical Informatics, 79(4), e18-e23. https://doi.org/10.1016/j.ijmedinf.2008.12.004 Bernama. (2021, June 10). Kesedaran keselamatan siber rakyat Malaysia masih rendah - Zahidi. Astro Awani. https://www.astroawani.com/berita-malaysia/kesedaran-keselamatan-siber-rakyat-malaysia-masih-rendah-zahidi-302555 Buxton, D., & U'ren, A. (2021). Experian & CyberSecurity Malaysia: Growth in Digital Transactions Increases Risk of Identity Theft. grendelgames.com. (2022, January 21). What are serious games? Grendelgames.Com. https://grendelgames.com/what-are-serious-games/ Hayani, N., & Rahim, A. (2017). ASSESSMENT OF CYBERSECURITY AWARENESS PROGRAM ON PERSONAL DATA PROTECTION AMONG YOUNGSTERS IN MALAYSIA. http://studentsrepo.um.edu.my/id/eprint/11825 Jack Koziol, & Cassie Bottorff. (2021, October 27). Cybersecurity Awareness: What It Is And How To Start. Forbes Advisor. https://www.forbes.com/advisor/business/what-is-cybersecurity-awareness/ Joel B. Cohen, & Charles S. Areni. (1991). Affect and consumer behavior. Handbook of Consumer Behavior. https://ro.uow.edu.au/gsbpapers/464/ Jose Rodrigues. (2021, May 28). Data Deep Dive: Open-World Games. Newzoo.Com. https://newzoo.com/insights/articles/data-deep-dive-open-world-games-gta-v-minecraft-horizon-valheim-roblox/ kaspersky.com. (2022). What is Cyber Security? https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security Lee, S., & Choeh, J. Y. (2016). The determinants of helpfulness of online reviews. Behaviour & Information Technology, 35(10), 853-863. https://doi.org/10.1080/0144929X.2016.1173099 Mahmoud, M. S., & Xia, Y. (2021). Structural and performance patterns. In Discrete Networked Dynamic Systems (pp. 49-90). Elsevier. https://doi.org/10.1016/B978-0-12-823698-7.00010-2 malaymail.com. (2021, June 2). Minister: 4,615 cybersecurity incidents reported in Malaysia from Jan-May. Malaymail.Com. https://www.malaymail.com/news/malaysia/2021/06/02/minister-4615-cybersecurity-incidents-reported-in-malaysia-from-jan-may/1979083 Maricarmen Teran. (2018). Five usability factors that make products usable. Min, W., Mott, B., Rowe, J., Liu, B., & Lester, J. (2016). Player Goal Recognition in Open-World Digital Games with Long Short-Term Memory Networks. https://doi.org/10.5555/3060832.3060983 MORGAN, G. A., & HARMON, R. J. (2001). Data Collection Techniques. Journal of the American Academy of Child & Adolescent Psychiatry, 40(8), 973-976. https://doi.org/10.1097/00004583-200108000-00020 myMetro. (2019, August 13). Jangan sampai hati anda "digodam." Hmetro.Com.My. https://www.hmetro.com.my/mutakhir/2019/08/485621/jangan-sampai-hati-anda-digodam Nazrul, M., Abidin, Z., Norman, M. H., & Noor, N. M. (2021). Keberkesanan Penggunaan Realiti Maya Dalam Kurikulum Pendidikan Malaysia (The Effectiveness of the Use of Virtual Reality in the Malaysian Education Curriculum) (Vol. 3, Issue 1). https://myjms.mohe.gov.my/index.php/jdpd/article/view/13012 PlamzDooM. (2021, October 13). Non-linear level design where the player is able to freely traverse the game world and choose where and when to visit certain areas in the game. Giantbomb.Com. https://www.giantbomb.com/open-world/3015-207/ Rahim, N. H. A., Hamid, S., & Kiah, M. L. M. (2019). Enhancement of cybersecurity awareness program on personal data protection among youngsters in Malaysia: An assessment. Malaysian Journal of Computer Science, 32(3), 221-245. https://doi.org/10.22452/mjcs.vol32no3.4 Ramadan, R., & Widyani, Y. (2013). Game development life cycle guidelines. 2013 International Conference on Advanced Computer Science and Information Systems, ICACSIS 2013, 95-100. https://doi.org/10.1109/ICACSIS.2013.6761558 Steve Morgan. (2020, November 13). Cybercrime To Cost The World $10.5 Trillion Annually By 2025. Cybercrime Magazine. https://cybersecurityventures.com/cybercrime-damage-costs-10-trillion-by-2025/ sumi.uxp.ie. (1994). What is SUMI? https://sumi.uxp.ie/about/whatis.html Tangkui, R. bin, & Keong, T. C. (2020). Kesan Pembelajaran Berasaskan Permainan Digital Minecraft Terhadap Pencapaian Murid Tahun Lima dalam Pecahan. Malaysian Journal of Social Sciences and Humanities (MJSSH), 5(9), 98-113. https://doi.org/10.47405/mjssh.v5i9.476 techopedia.com. (n.d.). What Does Playtesting Mean? Techopedia.Com. Retrieved June 20, 2022, from https://www.techopedia.com/definition/27197/playtesting Tovi Grossman, George Fitzmaurice, & Ramtin Attar. (2009). A Survey of Software Learnability: Metrics, Methodologies and Guidelines. ACM Press. Unisys. (2017, July 26). Malaysian Public's Concern About Cyber Security Issues Escalates - Unisys Security IndexTM Finds. Www.Unisys.Com.My. https://www.unisys.com/news-release/my-malaysian-public-concern-about-cyber-security-issues-escalates/ Zhai Yun, T. (2022, January 24). E-wallet: Cybersecurity: How much cash would you keep in your e-wallet? The Edge Malaysia. https://www.theedgemarkets.com/article/ewallet-cybersecurity-how-much-cash-would-you-keep-your-ewallet
|
This material may be protected under Copyright Act which governs the making of photocopies or reproductions of copyrighted materials. You may use the digitized material for private study, scholarship, or research. |