Cyber Suraksha: a card game for smartphone security awareness

Purpose The frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as individuals. One of the countermeasures is to improve the cyber hygiene of the end-users. Serious games or game-based learning has emerged as a prom...

Full description

Saved in:
Bibliographic Details
Published inInformation and computer security Vol. 31; no. 5; pp. 576 - 600
Main Authors Shah, Pintu, Agarwal, Anuja
Format Journal Article
LanguageEnglish
Published Bingley Emerald Publishing Limited 16.11.2023
Emerald Group Publishing Limited
Subjects
Online AccessGet full text
ISSN2056-4961
2056-497X
2056-4961
DOI10.1108/ICS-05-2022-0087

Cover

Abstract Purpose The frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as individuals. One of the countermeasures is to improve the cyber hygiene of the end-users. Serious games or game-based learning has emerged as a promising approach for implementing security education, training and awareness program. In this paper, the researchers propose a tabletop card game called Cyber Suraksha to increase threat awareness and motivate users to adopt recommended security controls for smartphone users. Cyber Suraksha provides an active learning environment for the players. This paper aims to provide the details of the design and evaluation of the game using a between-subjects design. Design/methodology/approach The researchers have used constructive learning theory and the Fogg behaviour model (FBM) to design a tabletop card game called Cyber Suraksha. The researchers evaluated the game using a between-subjects design. The participants' responses in the control and intervention groups were collected using the risk behaviour diagnosis scale. Pearson’s Chi-Square test with a 5% significance level was used to test the hypotheses. Findings The results indicate that the game is enjoyable and fun. Cyber Suraksha game effectively motivates users to adopt the recommended security control for the targeted behaviour. The results indicate that the participants in the intervention group are 2.65 times more likely to adopt recommended behaviour. The findings of this study provide evidence for the effectiveness of hope and fear appeals in improving cybersecurity awareness. Research limitations/implications The generalizability of the study is limited because the sample size is small compared to the total number of smartphone users in India, and only students from computer/IT UG programs in India are used as participants in this study. Practical implications This study uses hope and a fear appeal to design an effective serious game. It also demonstrates using the FBM and constructive learning principles for effective serious game design. Cyber Suraksha is effective for the student group and may be tested with other age groups. Originality/value To the researchers' knowledge, there are no serious games for cybersecurity awareness focusing on the threats faced by smartphone users based on FBM and constructive learning theory. This research used hope along with a fear appeal to motivate smartphone users to adopt recommended security controls.
AbstractList Purpose The frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as individuals. One of the countermeasures is to improve the cyber hygiene of the end-users. Serious games or game-based learning has emerged as a promising approach for implementing security education, training and awareness program. In this paper, the researchers propose a tabletop card game called Cyber Suraksha to increase threat awareness and motivate users to adopt recommended security controls for smartphone users. Cyber Suraksha provides an active learning environment for the players. This paper aims to provide the details of the design and evaluation of the game using a between-subjects design. Design/methodology/approach The researchers have used constructive learning theory and the Fogg behaviour model (FBM) to design a tabletop card game called Cyber Suraksha. The researchers evaluated the game using a between-subjects design. The participants' responses in the control and intervention groups were collected using the risk behaviour diagnosis scale. Pearson’s Chi-Square test with a 5% significance level was used to test the hypotheses. Findings The results indicate that the game is enjoyable and fun. Cyber Suraksha game effectively motivates users to adopt the recommended security control for the targeted behaviour. The results indicate that the participants in the intervention group are 2.65 times more likely to adopt recommended behaviour. The findings of this study provide evidence for the effectiveness of hope and fear appeals in improving cybersecurity awareness. Research limitations/implications The generalizability of the study is limited because the sample size is small compared to the total number of smartphone users in India, and only students from computer/IT UG programs in India are used as participants in this study. Practical implications This study uses hope and a fear appeal to design an effective serious game. It also demonstrates using the FBM and constructive learning principles for effective serious game design. Cyber Suraksha is effective for the student group and may be tested with other age groups. Originality/value To the researchers' knowledge, there are no serious games for cybersecurity awareness focusing on the threats faced by smartphone users based on FBM and constructive learning theory. This research used hope along with a fear appeal to motivate smartphone users to adopt recommended security controls.
PurposeThe frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as individuals. One of the countermeasures is to improve the cyber hygiene of the end-users. Serious games or game-based learning has emerged as a promising approach for implementing security education, training and awareness program. In this paper, the researchers propose a tabletop card game called Cyber Suraksha to increase threat awareness and motivate users to adopt recommended security controls for smartphone users. Cyber Suraksha provides an active learning environment for the players. This paper aims to provide the details of the design and evaluation of the game using a between-subjects design.Design/methodology/approachThe researchers have used constructive learning theory and the Fogg behaviour model (FBM) to design a tabletop card game called Cyber Suraksha. The researchers evaluated the game using a between-subjects design. The participants' responses in the control and intervention groups were collected using the risk behaviour diagnosis scale. Pearson’s Chi-Square test with a 5% significance level was used to test the hypotheses.FindingsThe results indicate that the game is enjoyable and fun. Cyber Suraksha game effectively motivates users to adopt the recommended security control for the targeted behaviour. The results indicate that the participants in the intervention group are 2.65 times more likely to adopt recommended behaviour. The findings of this study provide evidence for the effectiveness of hope and fear appeals in improving cybersecurity awareness.Research limitations/implicationsThe generalizability of the study is limited because the sample size is small compared to the total number of smartphone users in India, and only students from computer/IT UG programs in India are used as participants in this study.Practical implicationsThis study uses hope and a fear appeal to design an effective serious game. It also demonstrates using the FBM and constructive learning principles for effective serious game design. Cyber Suraksha is effective for the student group and may be tested with other age groups.Originality/valueTo the researchers' knowledge, there are no serious games for cybersecurity awareness focusing on the threats faced by smartphone users based on FBM and constructive learning theory. This research used hope along with a fear appeal to motivate smartphone users to adopt recommended security controls.
Author Agarwal, Anuja
Shah, Pintu
Author_xml – sequence: 1
  givenname: Pintu
  surname: Shah
  fullname: Shah, Pintu
  email: pintu.shah@nmims.edu
– sequence: 2
  givenname: Anuja
  surname: Agarwal
  fullname: Agarwal, Anuja
  email: anuja.agarwal@nmims.edu
BookMark eNp9kU1LAzEQhoNUsNbePQY8r53J7mYTwYMsfhQKHqrgLSTZxG5td2uyRfrv3VIRFPE0c5hnXuaZUzJo2sYRco5wiQhiMi3nCeQJA8YSAFEckSGDnCeZLF4G3z3HEzKOcQkAKJGnHIfkutwZF-h8G_RbXOgrqqnVoaKveu2obwONax26zaLPo9HZbai7HdUfOrjGxXhGjr1eRTf-qiPyfHf7VD4ks8f7aXkzS2yK2CUZZpkWJme54NabPlkWmGfGQpVhxY2xQjL0LuWGsSrz0gvrrK-cSNF4U6QjcnHYuwnt-9bFTi3bbWj6SMWEkFJCgdBP8cOUDW2MwXll6053ddt0QdcrhaD2tlRvS0Gu9rbU3lYPwi9wE-r-7t1_yOSAuLULelX9Rfx4SfoJBnN7iw
CitedBy_id crossref_primary_10_22139_jobs_1623655
crossref_primary_10_3390_g15040028
crossref_primary_10_1016_j_compeleceng_2025_110097
crossref_primary_10_3390_info15080505
Cites_doi 10.1177/1046878120933312
10.1007/BF02297354
10.1080/10410236.2017.1422847
10.1109/MSP.2010.58
10.1016/j.ijhcs.2018.10.004
10.1016/j.tsc.2020.100637
10.1108/EL-09-2016-0183
10.2307/25750691
10.1016/B978-0-12-802690-8.00004-9
10.1093/iwc/iwt009
10.14689/ejer.2016.63.17
10.1016/j.cose.2020.101827
10.25300/MISQ/2015/39.4.5
10.1109/ACCESS.2018.2827358
10.1049/iet-sen.2018.5095
10.1016/S1361-3723(21)00082-8
10.26634/jsch.9.4.2704
10.1016/j.chb.2014.05.046
10.3390/info11020121
10.1016/j.cose.2018.01.016
10.1145/3341215.3356273
10.1016/j.im.2015.03.002
10.1016/j.infsof.2017.12.002
10.1037/a0039729
10.1007/s11528-019-00446-7
10.1007/s10676-020-09560-0
ContentType Journal Article
Copyright Emerald Publishing Limited
Emerald Publishing Limited.
Copyright_xml – notice: Emerald Publishing Limited
– notice: Emerald Publishing Limited.
DBID AAYXX
CITATION
0-V
0U~
1-H
7SC
7WY
7WZ
7XB
8AO
8FD
8FE
8FG
8FI
ABUWG
AFKRA
ALSLI
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
CCPQU
CNYFK
DWQXO
E3H
F2A
FYUFA
F~G
GNUQQ
HCIFZ
JQ2
K6~
K7-
L.-
L.0
L7M
L~C
L~D
M0C
M0N
M0O
M0T
M1O
P5Z
P62
PHGZM
PHGZT
PJZUB
PKEHL
PPXIY
PQBIZ
PQEST
PQGLB
PQQKQ
PQUKI
PRQQA
PYYUZ
Q9U
DOI 10.1108/ICS-05-2022-0087
DatabaseName CrossRef
ProQuest Social Sciences Premium Collection【Remote access available】
Global News & ABI/Inform Professional
Trade PRO
Computer and Information Systems Abstracts
ABI/INFORM Collection (via ProQuest)
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Hospital Premium Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Social Science Premium Collection
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest
Business Premium Collection
Technology Collection (via ProQuest SciTech Premium Collection)
Criminology Collection
ProQuest One
Library & Information Science Collection
ProQuest Central
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
Health Research Premium Collection
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
ABI/INFORM Professional Standard
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Criminal Justice Database (ProQuest)
Healthcare Administration Database
Library Science Database (ProQuest)
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Business
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest One Social Sciences
ABI/INFORM Collection China
ProQuest Central Basic
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Library and Information Science Abstracts (LISA)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
SciTech Premium Collection
Trade PRO
ABI/INFORM Complete
Global News & ABI/Inform Professional
ProQuest One Applied & Life Sciences
Health Research Premium Collection
Health & Medical Research Collection
Library & Information Science Collection
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
Business Premium Collection
Social Science Premium Collection
ABI/INFORM Global
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
ProQuest Technology Collection
ProQuest Business Collection
Criminology Collection
ProQuest Social Sciences Premium Collection
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ABI/INFORM Global (Corporate)
ProQuest One Business
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Pharma Collection
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Library Science
ProQuest Health & Medical Research Collection
ProQuest Criminal Justice
ABI/INFORM Professional Standard
ProQuest Central Korea
Advanced Technologies Database with Aerospace
ProQuest Computing
ProQuest One Social Sciences
ProQuest Central Basic
ProQuest Health Management
ABI/INFORM China
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
DatabaseTitleList
Computer Science Database
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Education
Library & Information Science
Business
EISSN 2056-497X
2056-4961
EndPage 600
ExternalDocumentID 10_1108_ICS_05_2022_0087
10.1108/ICS-05-2022-0087
GroupedDBID .WU
3FY
5VS
7WY
9F-
AADTA
AAGBP
AAMCF
AAUDR
ABIJV
ABSDC
ACGFS
ADBBV
ADOMW
AEUCW
AJEBP
ALMA_UNASSIGNED_HOLDINGS
ALSLI
ARAPS
ASMFL
ASPJK
AUCOK
BENPR
EBS
ECCUG
FNNZZ
GEA
GEI
GMX
GQ.
GROUPED_ABI_INFORM_COMPLETE
HCIFZ
K6~
KBGRL
M0O
M1O
M42
SCAQC
SDURG
SLOBJ
TEM
TGG
TMF
TMI
TMT
Z11
Z12
Z21
ZYZAG
0-V
8AO
8FE
8FG
8FI
8FW
AAKOT
AAXBI
AAYXX
ABJNI
ABUWG
ABXQL
ABYQI
ACTSA
ACZKX
ADQHX
ADWNT
AFKRA
AFNTC
AFZLO
AGTVX
AHMHQ
AILOG
ALIPV
AODMV
AQUVI
ARALO
AZQEC
BEZIV
BGLVJ
BGRYB
BPHCQ
BVXVI
CCPQU
CITATION
CNYFK
DWQXO
FYUFA
GNUQQ
H13
K6V
K7-
M0C
M0T
P62
PHGZM
PHGZT
PJZUB
PPXIY
PQBIZ
PQGLB
PQQKQ
PROAC
PRQQA
UKHRP
.DC
0U~
1-H
29I
4.4
5GY
70U
77K
7SC
7XB
8FD
8R4
8R5
9E0
AAPSD
ABEAN
ACGFO
AEBZA
AEDOK
AEMMR
AETHF
AFNZV
AIAFM
AJFKA
APPLU
ATGMP
CS3
DU5
E3H
F2A
GEB
GEC
GMM
GMN
J1Y
JI-
JL0
JQ2
L.-
L.0
L7M
L~C
L~D
M0N
P2P
PKEHL
PQEST
PQUKI
Q2X
Q3A
Q9U
RWL
TAE
TDQ
TET
TMD
TMK
TMX
Z22
ID FETCH-LOGICAL-c311t-4144a8b52586cfb63697154bc0d41d6bbc8921fe36b22d4f9f8cecfde831bfb73
IEDL.DBID GEI
ISSN 2056-4961
IngestDate Fri Jul 25 23:06:55 EDT 2025
Thu Jul 31 00:52:52 EDT 2025
Thu Apr 24 23:01:46 EDT 2025
Tue Jan 16 21:21:13 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 5
Keywords Smartphone user
Fogg behaviour model
Cybersecurity awareness
Serious games
Game-based learning
Constructive learning theory
Language English
License Licensed re-use rights only
https://www.emerald.com/insight/site-policies
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c311t-4144a8b52586cfb63697154bc0d41d6bbc8921fe36b22d4f9f8cecfde831bfb73
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2889990710
PQPubID 31135
PageCount 25
ParticipantIDs crossref_citationtrail_10_1108_ICS_05_2022_0087
emerald_primary_10_1108_ICS-05-2022-0087
proquest_journals_2889990710
crossref_primary_10_1108_ICS_05_2022_0087
PublicationCentury 2000
PublicationDate 2023-11-16
PublicationDateYYYYMMDD 2023-11-16
PublicationDate_xml – month: 11
  year: 2023
  text: 2023-11-16
  day: 16
PublicationDecade 2020
PublicationPlace Bingley
PublicationPlace_xml – name: Bingley
PublicationTitle Information and computer security
PublicationYear 2023
Publisher Emerald Publishing Limited
Emerald Group Publishing Limited
Publisher_xml – name: Emerald Publishing Limited
– name: Emerald Group Publishing Limited
References (key2023111515010221100_ref005) 2016; 6
(key2023111515010221100_ref008) 2019
key2023111515010221100_ref051
key2023111515010221100_ref050
(key2023111515010221100_ref070) 2011; 6
key2023111515010221100_ref053
(key2023111515010221100_ref083) 2018; 6
(key2023111515010221100_ref0102) 2017
(key2023111515010221100_ref090) 2011
(key2023111515010221100_ref073) 2019; 34
(key2023111515010221100_ref012) 2019
(key2023111515010221100_ref015) 2016
(key2023111515010221100_ref047) 2016; 3
(key2023111515010221100_ref080) 2019
(key2023111515010221100_ref099) 2009
(key2023111515010221100_ref095) 2019
(key2023111515010221100_ref032) 2013
(key2023111515010221100_ref060) 2021
key2023111515010221100_ref048
(key2023111515010221100_ref098) 2018; 95
key2023111515010221100_ref041
(key2023111515010221100_ref055) 2019; 123
(key2023111515010221100_ref058) 2021
(key2023111515010221100_ref011) 2016; 16
(key2023111515010221100_ref069) 2014
(key2023111515010221100_ref079) 2019
(key2023111515010221100_ref006) 2017
(key2023111515010221100_ref052) 2013
(key2023111515010221100_ref062) 2013
key2023111515010221100_ref035
key2023111515010221100_ref034
key2023111515010221100_ref037
key2023111515010221100_ref030
(key2023111515010221100_ref028) 2020; 51
(key2023111515010221100_ref07200) 1985
key2023111515010221100_ref039
(key2023111515010221100_ref097) 2021
(key2023111515010221100_ref045) 2019
key2023111515010221100_ref023
(key2023111515010221100_ref085) 2020
key2023111515010221100_ref020
(key2023111515010221100_ref019) 2015; 39
(key2023111515010221100_ref057) 2014
key2023111515010221100_ref021
(key2023111515010221100_ref029) 2015
(key2023111515010221100_ref0103) 2018
key2023111515010221100_ref027
(key2023111515010221100_ref061) 2020; 64
(key2023111515010221100_ref022) 2014; 9
(key2023111515010221100_ref064) 2019
key2023111515010221100_ref092
(key2023111515010221100_ref031) 2013
(key2023111515010221100_ref081) 2019
(key2023111515010221100_ref084) 2020; 28
(key2023111515010221100_ref001) 2014; 33
(key2023111515010221100_ref059) 2022; 14
(key2023111515010221100_ref007) 2020; 11
key2023111515010221100_ref016
(key2023111515010221100_ref0105) 2019; 13
(key2023111515010221100_ref033) 2021; 23
(key2023111515010221100_ref063) 1993; 41
key2023111515010221100_ref082
(key2023111515010221100_ref018) 2017; 20
(key2023111515010221100_ref0101) 2017; 35
(key2023111515010221100_ref096) 2010; 8
(key2023111515010221100_ref004) 2017
(key2023111515010221100_ref078) 2020; 36
key2023111515010221100_ref086
key2023111515010221100_ref088
(key2023111515010221100_ref024) 2019
key2023111515010221100_ref009
(key2023111515010221100_ref044) 2015
(key2023111515010221100_ref067) 2019
(key2023111515010221100_ref036) 2019
(key2023111515010221100_ref02200) 2019
(key2023111515010221100_ref089) 2011
(key2023111515010221100_ref026) 2017
(key2023111515010221100_ref010) 2014; 38
(key2023111515010221100_ref066) 2018
(key2023111515010221100_ref087) 2015; 141
(key2023111515010221100_ref0100) 2019
key2023111515010221100_ref0104
key2023111515010221100_ref074
key2023111515010221100_ref077
key2023111515010221100_ref076
(key2023111515010221100_ref043) 2013
(key2023111515010221100_ref017) 2021; 22
(key2023111515010221100_ref003) 2017
(key2023111515010221100_ref093) 2018
(key2023111515010221100_ref013) 2019
(key2023111515010221100_ref094) 2018; 2018
(key2023111515010221100_ref002) 2018
(key2023111515010221100_ref025) 2017
(key2023111515010221100_ref065) 2016
(key2023111515010221100_ref071) 2014
key2023111515010221100_ref068
(key2023111515010221100_ref040) 2018; 75
(key2023111515010221100_ref042) 2017; 8
(key2023111515010221100_ref056) 2010; 34
(key2023111515010221100_ref049) 2019
(key2023111515010221100_ref054) 2018; 26
(key2023111515010221100_ref014) 2016
(key2023111515010221100_ref091) 2015; 52
(key2023111515010221100_ref075) 2013; 25
(key2023111515010221100_ref038) 2009
(key2023111515010221100_ref046) 2020; 95
(key2023111515010221100_ref072) 2018; 34
References_xml – start-page: 228
  year: 2016
  ident: key2023111515010221100_ref014
  article-title: Persuasive technology for improving information security awareness and behavior: literature review
– volume: 51
  start-page: 586
  issue: 5
  year: 2020
  ident: key2023111515010221100_ref028
  article-title: Experiencing cybersecurity one game at a time: a systematic review of cybersecurity digital games
  publication-title: Simulation and Gaming
  doi: 10.1177/1046878120933312
– volume: 20
  issue: 1
  year: 2017
  ident: key2023111515010221100_ref018
  article-title: Subconscious responses to fear-appeal health warnings: an exploratory study of cigarette packaging
  publication-title: South African Journal of Economic and Management Sciences
– ident: key2023111515010221100_ref034
– start-page: 1
  year: 2019
  ident: key2023111515010221100_ref095
  article-title: What hack: engaging anti-phishing training through a role-playing phishing simulation game
– volume: 41
  start-page: 4
  issue: 3
  year: 1993
  ident: key2023111515010221100_ref063
  article-title: Constructivist values for instructional systems design: five principles toward a new mindset
  publication-title: Educational Technology Research and Development
  doi: 10.1007/BF02297354
– ident: key2023111515010221100_ref037
– volume: 33
  start-page: 236
  issue: 3
  year: 2014
  ident: key2023111515010221100_ref001
  article-title: User preference of cyber security awareness delivery methods
  publication-title: Behaviour and Information Technology
– ident: key2023111515010221100_ref086
– ident: key2023111515010221100_ref092
– volume: 34
  start-page: 463
  issue: 4
  year: 2019
  ident: key2023111515010221100_ref073
  article-title: Uplifting fear appeals: considering the role of hope in Fear-Based persuasive messages
  publication-title: Health Communication
  doi: 10.1080/10410236.2017.1422847
– start-page: 206
  volume-title: 25th International Computer Science and Engineering Conference (ICSEC)
  year: 2018
  ident: key2023111515010221100_ref093
  article-title: POMEGA: Security game for building security awareness
– volume: 8
  start-page: 14
  issue: 3
  year: 2010
  ident: key2023111515010221100_ref096
  article-title: Protection poker: the new software security “game
  publication-title: IEEE Security and Privacy Magazine
  doi: 10.1109/MSP.2010.58
– volume: 123
  start-page: 40
  year: 2019
  ident: key2023111515010221100_ref055
  article-title: The design and evaluation of a theory-based intervention to promote security behaviour against phishing
  publication-title: International Journal of Human-Computer Studies
  doi: 10.1016/j.ijhcs.2018.10.004
– ident: key2023111515010221100_ref068
– volume: 36
  start-page: 100637
  year: 2020
  ident: key2023111515010221100_ref078
  article-title: Theoretical foundations of design thinking – a constructivism learning approach to design thinking
  publication-title: Thinking Skills and Creativity
  doi: 10.1016/j.tsc.2020.100637
– volume: 35
  start-page: 1177
  issue: 6
  year: 2017
  ident: key2023111515010221100_ref0101
  article-title: Information security behaviours of smartphone users in China: an empirical analysis
  publication-title: The Electronic Library
  doi: 10.1108/EL-09-2016-0183
– volume: 34
  start-page: 549
  issue: 3
  year: 2010
  ident: key2023111515010221100_ref056
  article-title: Fear appeals and information security behaviors: an empirical study
  publication-title: MIS Quarterly
  doi: 10.2307/25750691
– start-page: 35
  volume-title: SIW ’14: Proceedings of the 2014 ACM Workshop on Security Information Workers
  year: 2014
  ident: key2023111515010221100_ref057
  article-title: Designing interventions to persuade software developers to adopt security tools
– start-page: 115
  volume-title: Behavior Change Research and Theory
  year: 2017
  ident: key2023111515010221100_ref0102
  article-title: Behavior change interventions for cybersecurity: psychological and technological perspectives
  doi: 10.1016/B978-0-12-802690-8.00004-9
– start-page: 49
  volume-title: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)
  year: 2017
  ident: key2023111515010221100_ref003
  article-title: …Better to use a lock screen than to worry about saving a few seconds of time’: effect of fear appeal in the context of smartphone locking behavior
– volume: 22
  issue: 2
  year: 2021
  ident: key2023111515010221100_ref017
  article-title: The dynamic interplay of hope vs fear appeals in a referendum context
  publication-title: Journal of Political Marketing
– start-page: 247
  volume-title: Joint International Conference on Serious Games 2021
  year: 2021
  ident: key2023111515010221100_ref060
  article-title: Development and validation of serious games for teaching cybersecurity
– volume-title: 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion)
  year: 2019
  ident: key2023111515010221100_ref067
  article-title: A data-driven security game to facilitate information security education
– volume-title: International Conference on Communication Systems Computing and IT Applications, (CSCITA 2020)
  year: 2020
  ident: key2023111515010221100_ref085
  article-title: Cybersecurity behaviour of smartphone users through the lens of Fogg behaviour model
– year: 2011
  ident: key2023111515010221100_ref089
  article-title: Active learning with the cyberciege video game
– ident: key2023111515010221100_ref039
– volume: 14
  issue: 4
  year: 2022
  ident: key2023111515010221100_ref059
  article-title: Evaluation of contextual and game-based training for phishing detection
  publication-title: Future Internet
– volume-title: Workshop on Usable Security (USEC) 2019
  year: 2019
  ident: key2023111515010221100_ref079
  article-title: Security when it is welcome: exploring device purchase as an opportune moment for security behavior change
– volume: 25
  start-page: 278
  issue: 4
  year: 2013
  ident: key2023111515010221100_ref075
  article-title: GEQ (game engagement/experience questionnaire): a review of two papers
  publication-title: Interacting with Computers
  doi: 10.1093/iwc/iwt009
– ident: key2023111515010221100_ref023
– volume-title: USENIX Adancements in Security Education Workshop (USENIX ASE'17)
  year: 2017
  ident: key2023111515010221100_ref026
  article-title: Jail, hero or drug lord? Turning a cyber security course into an 11 Week choose your own adventure story
– start-page: 533
  volume-title: SimTPM: User-Centric TPM for Mobile Devices. 28th USENIX Security Symposium
  year: 2019
  ident: key2023111515010221100_ref024
– start-page: 103
  year: 2018
  ident: key2023111515010221100_ref002
  article-title: PERSUADED: fighting social engineering attacks with a serious game
– volume-title: The Game Experience Questionnaire
  year: 2013
  ident: key2023111515010221100_ref052
– ident: key2023111515010221100_ref048
– start-page: 42
  year: 2019
  ident: key2023111515010221100_ref080
  article-title: Cyber security fear appeals: unexpectedly complicated
– volume-title: In Quest of Information Security in Higher Education Institutions
  year: 2019
  ident: key2023111515010221100_ref036
– volume: 16
  start-page: 293
  issue: 63
  year: 2016
  ident: key2023111515010221100_ref011
  article-title: Determination of teacher characteristics that support constructivist learning environments
  publication-title: Eurasian Journal of Educational Research
  doi: 10.14689/ejer.2016.63.17
– start-page: 927
  volume-title: CHI’14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  year: 2014
  ident: key2023111515010221100_ref069
  article-title: A systematic review of quantitative studies on the enjoyment of digital entertainment games
– volume: 95
  year: 2020
  ident: key2023111515010221100_ref046
  article-title: Riskio: a serious game for cyber security awareness and education
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2020.101827
– volume-title: 6th Workshop on Cyber Security Experimentation and Test
  year: 2013
  ident: key2023111515010221100_ref043
  article-title: Valuing security by getting [d0x3d!]: experiences with a network security board game
– year: 2019
  ident: key2023111515010221100_ref012
  article-title: Cyber security awareness campaigns: why do they fail to change behaviour?
– start-page: 2336
  volume-title: SAC ’19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing
  year: 2019
  ident: key2023111515010221100_ref064
  article-title: Developing a mental model for use in the context of computer security
– start-page: 109
  year: 2014
  ident: key2023111515010221100_ref071
  article-title: A study of smartphone usage and barriers among the elderly
– volume: 39
  start-page: 837
  issue: 4
  year: 2015
  ident: key2023111515010221100_ref019
  article-title: What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors
  publication-title: MIS Quarterly
  doi: 10.25300/MISQ/2015/39.4.5
– ident: key2023111515010221100_ref020
– ident: key2023111515010221100_ref076
– ident: key2023111515010221100_ref053
– start-page: 446
  year: 2017
  ident: key2023111515010221100_ref004
  article-title: Security awareness training: a review
– volume: 6
  start-page: 22578
  year: 2018
  ident: key2023111515010221100_ref083
  article-title: Usability evaluation of the smartphone user interface in supporting elderly users from experts’ perspective
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2018.2827358
– ident: key2023111515010221100_ref030
– year: 2021
  ident: key2023111515010221100_ref058
  article-title: Evaluation strategies for cybersecurity training methods: a literature review
– volume: 13
  start-page: 159
  issue: 2
  year: 2019
  ident: key2023111515010221100_ref0105
  article-title: Improving software security awareness using a serious game
  publication-title: IET Software
  doi: 10.1049/iet-sen.2018.5095
– volume-title: 27th European Conference on Information Systems (ECIS)
  year: 2019
  ident: key2023111515010221100_ref008
  article-title: Toward sustainable behaviour change: an approach for cyber security education training and awareness
– ident: key2023111515010221100_ref021
– ident: key2023111515010221100_ref082
– ident: key2023111515010221100_ref051
  doi: 10.1016/S1361-3723(21)00082-8
– volume: 28
  issue: 2
  year: 2020
  ident: key2023111515010221100_ref084
  article-title: Cybersecurity behaviour of smartphone users in India: an empirical analysis
  publication-title: Information and Computer Security
– start-page: 21
  year: 2009
  ident: key2023111515010221100_ref099
  article-title: A conceptual framework for serious games
– ident: key2023111515010221100_ref0104
– start-page: 58
  volume-title: Norsk Informasjonssikkerhetskonferanse (NISK)
  year: 2015
  ident: key2023111515010221100_ref044
  article-title: Play2Prepare: a board game supporting it security preparedness exercises for industrial control organizations
– start-page: 299
  year: 2019
  ident: key2023111515010221100_ref013
  article-title: Make my phone secure!: using gamification for mobile security settings
– ident: key2023111515010221100_ref050
– year: 2019
  ident: key2023111515010221100_ref02200
  article-title: Transformational security awareness: what neuroscientists, storytellers, and marketers can
– volume: 9
  start-page: 1
  issue: 4
  year: 2014
  ident: key2023111515010221100_ref022
  article-title: Constructivist learning environments and defining the online learning community
  publication-title: I-Manager's Journal on School Educational Technology
  doi: 10.26634/jsch.9.4.2704
– start-page: 915
  volume-title: Conference on Computer and Communications Security
  year: 2013
  ident: key2023111515010221100_ref032
  article-title: Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education
– volume: 3
  issue: 1
  year: 2016
  ident: key2023111515010221100_ref047
  article-title: Game based cyber security training: are serious games suitable for cyber security training?
  publication-title: International Journal of Serious Games
– volume-title: 46th HI International Conference on System Sciences
  year: 2013
  ident: key2023111515010221100_ref062
  article-title: Employees' information security awareness and behavior: a literature review
– volume: 34
  issue: 4
  year: 2018
  ident: key2023111515010221100_ref072
  article-title: Uplifting fear appeals: considering the role of hope in fear-based persuasive messages
  publication-title: Health Communication
– start-page: 129
  year: 2017
  ident: key2023111515010221100_ref006
  article-title: Enhancing cyber security awareness with mobile games
– ident: key2023111515010221100_ref009
– start-page: 1
  volume-title: Persuasive′09: Proceedings of the 4th International Conference on Persuasive Technology
  year: 2009
  ident: key2023111515010221100_ref038
  article-title: A behavior model for persuasive design
– volume: 38
  start-page: 304
  year: 2014
  ident: key2023111515010221100_ref010
  article-title: Security awareness of computer users: a phishing threat avoidance perspective
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2014.05.046
– volume: 11
  issue: 2
  year: 2020
  ident: key2023111515010221100_ref007
  article-title: Design and evaluation of an augmented reality game for cybersecurity awareness (CybAR)
  publication-title: Information
  doi: 10.3390/info11020121
– volume-title: Cyber Wargaming: Finding, Designing, and Playing Wargames for Cyber Security Education
  year: 2019
  ident: key2023111515010221100_ref045
– ident: key2023111515010221100_ref074
– volume: 6
  issue: 2
  year: 2016
  ident: key2023111515010221100_ref005
  article-title: A review of using gaming technology for Cyber-Security awareness
  publication-title: International Journal for Information Security Research
– start-page: 114
  volume-title: 18th International Information Security Conference, ISSA 2019
  year: 2019
  ident: key2023111515010221100_ref049
  article-title: A descriptive review and classification of organizational information security awareness research
– volume: 6
  issue: 1
  year: 2011
  ident: key2023111515010221100_ref070
  article-title: The behaviour change wheel: a new method for characterising and designing behaviour change interventions
  publication-title: Implementation Science
– volume: 75
  start-page: 1
  year: 2018
  ident: key2023111515010221100_ref040
  article-title: Enhancing security behaviour by supporting the user
  publication-title: Computers and Security
  doi: 10.1016/j.cose.2018.01.016
– start-page: 20
  volume-title: Joint International Conference on Serious Games
  year: 2021
  ident: key2023111515010221100_ref097
  article-title: Comparison of serious games with established strategy games in the context of knowledge transfer
– start-page: 805
  volume-title: CHI PLAY’19 Extended Abstracts: Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts
  year: 2019
  ident: key2023111515010221100_ref0100
  article-title: What could go wrong?: raising mobile privacy and security awareness through a decision-making game
  doi: 10.1145/3341215.3356273
– ident: key2023111515010221100_ref088
– ident: key2023111515010221100_ref016
– start-page: 175
  year: 2018
  ident: key2023111515010221100_ref066
  article-title: Cyber-detective – a game for cyber crime prevention
– volume: 52
  start-page: 506
  issue: 4
  year: 2015
  ident: key2023111515010221100_ref091
  article-title: Learning to cope with information security risks regarding mobile device loss or theft: an empirical examination
  publication-title: Information and Management
  doi: 10.1016/j.im.2015.03.002
– start-page: 1
  year: 2016
  ident: key2023111515010221100_ref065
  article-title: A comprehensive taxonomy for serious games
  publication-title: Journal of Educational Computing Research
– start-page: 915
  volume-title: Proceedings of the 2013 ACM SIGSAC conference on Computer and communications security
  year: 2013
  ident: key2023111515010221100_ref031
  article-title: Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education
– start-page: 16
  year: 2016
  ident: key2023111515010221100_ref015
  article-title: A serious game for eliciting social engineering security requirements
– volume-title: The Sage Encyclopedia of Educational Research, Measurement, and Evaluation
  year: 2018
  ident: key2023111515010221100_ref0103
– ident: key2023111515010221100_ref027
– volume-title: 2017 USENIX Workshop on Advances in Security Education
  year: 2017
  ident: key2023111515010221100_ref025
  article-title: Jail, hero or drug lord? Turning a cyber security course into an 11 week choose your own adventure story
– volume: 95
  start-page: 179
  year: 2018
  ident: key2023111515010221100_ref098
  article-title: Design and preliminary evaluation of a cyber security requirements education game (SREG)
  publication-title: Information and Software Technology
  doi: 10.1016/j.infsof.2017.12.002
– ident: key2023111515010221100_ref077
– start-page: 203
  volume-title: 7th International Conference on Cyber Conflict: Architectures in Cyberspace
  year: 2015
  ident: key2023111515010221100_ref029
  article-title: A renewed approach to serious games for cyber security
– volume: 26
  issue: 3
  year: 2018
  ident: key2023111515010221100_ref054
  article-title: Persuading end users to act cautiously online: a fear appeals study on phishing
  publication-title: Information and Computer Security
– volume: 141
  start-page: 1178
  issue: 6
  year: 2015
  ident: key2023111515010221100_ref087
  article-title: Appealing to fear: a meta-analysis of fear appeal effectiveness and theories
  publication-title: Psychological Bulletin
  doi: 10.1037/a0039729
– ident: key2023111515010221100_ref035
– volume: 64
  start-page: 319
  issue: 2
  year: 2020
  ident: key2023111515010221100_ref061
  article-title: Serious games and gamification in the corporate training environment: a literature review
  publication-title: TechTrends
  doi: 10.1007/s11528-019-00446-7
– ident: key2023111515010221100_ref041
– volume: 2018
  start-page: 2
  issue: 2
  year: 2018
  ident: key2023111515010221100_ref094
  article-title: Using a game to improve phishing awareness
  publication-title: Journal of Cybersecurity Education, Research and Practice
– year: 2011
  ident: key2023111515010221100_ref090
  article-title: Active learning with the CyberCIEGE video game
– volume: 8
  start-page: 193
  issue: 2
  year: 2017
  ident: key2023111515010221100_ref042
  article-title: A framework for an effective information security awareness program in healthcare
  publication-title: International Journal of Advanced Computer Science and Applications
– volume: 23
  start-page: 265
  issue: 3
  year: 2021
  ident: key2023111515010221100_ref033
  article-title: Scoping the ethical principles of cybersecurity fear appeals
  publication-title: Ethics and Information Technology
  doi: 10.1007/s10676-020-09560-0
– start-page: 58
  volume-title: 11th International Conference on Computer Supported Education (CSEDU 2019)
  year: 2019
  ident: key2023111515010221100_ref081
  article-title: The problem with teaching defence against the dark arts: a review of game-based learning applications and serious games for cyber security education
– start-page: 263
  year: 1985
  ident: key2023111515010221100_ref07200
  article-title: Methods of coping with social desirability bias: a review
  publication-title: European Journal of Social Psychology
SSID ssj0001916361
ssj0004345
Score 2.374427
Snippet Purpose The frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as...
PurposeThe frequency and sophistication of cybercrimes are increasing. These cybercrimes are impacting government and private organizations as well as...
SourceID proquest
crossref
emerald
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 576
SubjectTerms Card games
Chi-square test
Computer & video games
Cybercrime
Cybersecurity
Data encryption
Design
Education
Educational software
Fear
Games
Learning theory
Literature reviews
Research methodology
Researchers
Security management
Simulation
Smartphones
Software
Software development
Threats
User behavior
SummonAdditionalLinks – databaseName: ProQuest Technology Collection
  dbid: 8FG
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LS8QwEA66gngRXRVXXclBRA9hN0mTpoKILK4P0IsK3kqeCr63K-K_N1NTF0W8timBmUlmpjPffAht5TaTmQuK5CJwkungiKEiEC4FU057YetC-_mFPLnOzm7ETfrhVqW2yuZOrC9q92zhH3mPqZgZFOAQD15eCbBGQXU1UWhMoxnKoiUBUnx4PMFF8pqkmEUnT7JC0qZM2Ve908El1IAZNLPDWLYfbukXNndyP9dOZ7iA5lO0iA-_1LuIpvxTG802zept4FxO_Rlt1E0QBLyNE8YInuN0eJfQ_uDD-BG-fBvp--pO72GNbTQPfKsfPY7rcfUYzQha1T2uEqsd1u8AFot7LaPr4dHV4IQk8gRiOaVjksVMSSsjmFDSBiO5LPIYLhnbdxl10hirCkaD59Iw5rJQBGW9Dc4rTk0wOV9Brae44yrCIjfMWRg1GGL0ZIPiMW5jurDGqSJm0B3Ua2RX2jRZHAguHso6w-irMkq77IsSpF2CtDto9_uLl6-pGv-s3Unq-GvpDyV20EajrzIdxaqcGM7a_6_X0RxwyQPQkMoN1BqP3nw3Rhxjs1mb1ScOZM9M
  priority: 102
  providerName: ProQuest
Title Cyber Suraksha: a card game for smartphone security awareness
URI https://www.emerald.com/insight/content/doi/10.1108/ICS-05-2022-0087/full/html
https://www.proquest.com/docview/2889990710
Volume 31
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVMCB
  databaseName: Emerald A-Z Current Journals
  customDbUrl:
  eissn: 2056-497X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001916361
  issn: 2056-4961
  databaseCode: GEI
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://www.emerald.com/insight
  providerName: Emerald
– providerCode: PRVMCB
  databaseName: Emerald Management eJournals Collection
  customDbUrl:
  eissn: 2056-497X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001916361
  issn: 2056-4961
  databaseCode: ZYZAG
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://www.emerald.com/insight
  providerName: Emerald
– providerCode: PRVPQU
  databaseName: Library Science Database
  customDbUrl:
  eissn: 2056-497X
  dateEnd: 20240930
  omitProxy: false
  ssIdentifier: ssj0001916361
  issn: 2056-4961
  databaseCode: M1O
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/libraryscience
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 2056-497X
  dateEnd: 20240930
  omitProxy: true
  ssIdentifier: ssj0001916361
  issn: 2056-4961
  databaseCode: BENPR
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Technology Collection
  customDbUrl:
  eissn: 2056-497X
  dateEnd: 20240930
  omitProxy: true
  ssIdentifier: ssj0001916361
  issn: 2056-4961
  databaseCode: 8FG
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/technologycollection1
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1LT9wwEB7xuPRSWtqqy2PlAwd6CLt27MRB6oGuWB4S26otEuUS-RGzCHZBJKuq_PrOZBMqEKpUqZdIiZw4GU_G39gz3wBspU4m0gcdpSrEkTTBR5arEMWJEtqbQrl6o_1klByeyuMzdbYAozYXpg6rnC_H1Hb6clqSk9qjwG20wg-EA1S95mjwjfZxBQWkE7Vaj1ase-Nqcr2Imi51m_rbrrggEoprAlWBs34ks4S3-5bPPOzRPPUkWfePwa5noeEK3LTvPw8-udqZVXbH3T-hdvx_H_gKXjaAle3NNew1LBTTVVhpi0Gwxja8gY-DX5bOZ3fmqhybXWaYQ-1jF2ZSMETGrJygllIkfMHKpmgeMz8pFw2N7Vs4He5_HxxGTW2GyMWcV5FER8xoq4TSiQsWBZuliMas63vJfWKt05ngoYgTK4SXIQvaFS74QsfcBpvG72Bpij2-B6ZSK7wjJsOA4MwFHSMsFCZz1usMHfQO9NqRyF1DXE71M67z2oHp6xzllPdVTnLKSU4d-PBwx-2ctOMvbbeb4Xiu6SPxd2CjHf28-dPLXGj0WDMCamv_0Os6vKC69ZTUyJMNWKruZsUmopvKdmFRDw-6sPxpf_Tla7dWYTye8M947fzH-d7BbzAa9Yk
linkProvider Emerald
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VIkEvqCwgFlrwARAcrN3YseMgVRVaWHbp49JW6s34SSVoKZutqv4pfiOerMOqCPXWa-LE0swXz0zm8QG8qlwpSx8VrUTktDTRU1uISLkUTHkThGsT7Xv7cnJUfjkWxyvwu-uFwbLK7kxsD2r_0-E_8gFTKTKo0SBun_-iyBqF2dWOQmMBi51wdZlCtmZr-jHp9zVj40-HownNrALU8aKY0zKFEEZZwYSSLlrJZV0lP8K6oS8LL611qmZFDFxaxnwZ66hccNEHxQsbbcXTe-_A3ZJzjrP61fjzsg-Tt6TILDkVtKxl0aVFh2owHR1gzplh8TyOgbtmBv_pBV7ag9bIjdfhQfZOyYcFnB7CSjjrwb2uOL6HHM-5HqQHm7nlgbwhuacJr5N8WDyCrdGVDTNycDEz35sT854Y4hIcyTdzGkhaT5rTBFssjQ-kySx6xFxic1ra6zEc3YpYn8DqWdrxKRBRWeYdjjaMyVtzUfHkJzJTO-tVnSL2Pgw62WmXJ5kjocYP3UY0Q6WTtPVQaJS2Rmn34d3fJ84XUzxuWPs2q-N_S68psQ8bnb50_vQbvQTqs5tvv4T7k8O9Xb073d95DmvIY49NjoXcgNX57CJsJm9nbl-0ECPw9bYx_QcG-g0n
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+Suraksha%3A+a+card+game+for+smartphone+security+awareness&rft.jtitle=Information+and+computer+security&rft.au=Shah%2C+Pintu&rft.au=Agarwal%2C+Anuja&rft.date=2023-11-16&rft.issn=2056-4961&rft.eissn=2056-4961&rft.volume=31&rft.issue=5&rft.spage=576&rft.epage=600&rft_id=info:doi/10.1108%2FICS-05-2022-0087&rft.externalDBID=n%2Fa&rft.externalDocID=10_1108_ICS_05_2022_0087
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon