Browse > Article
http://dx.doi.org/10.22937/IJCSNS.2021.21.7.29

Videogames in Cybersecurity: Philosophical and Psychological Review of Possible Impact  

Bogdan, Levyk (Regional Scientific and Educational Center "Holodomor, Holocaust, International Dialogue" Lviv Polytechnic National University)
Maletska, Mariia (Department of Philosophy, Faculty of History and Philosophy, Borys Grinchenko Kyiv University)
Khrypko, Svitlana (Department of Philosophy, Faculty of History and Philosophy, Borys Grinchenko Kyiv University)
Leonid, Kryvyzyuk (Department of Military Intelligence, Analysis and Prognosis of Socio-Political Processes, Hetman Petro Sahaidachnyi National Army Academy)
Olga, Dobrodum (Department of Culturology and Philosophical Anthropology of the National Pedagogical Dragomanov)
Pasko, Katerina (Department of Psychology Educational-Scientific Institute of Pedagogy and Psychology of Sumy State Pedagogical University)
Publication Information
International Journal of Computer Science & Network Security / v.21, no.7, 2021 , pp. 249-256 More about this Journal
Abstract
An issue of security and threat is urgent as well as it concerns everyone: a person, community, state, etc. Today, the question of cybersecurity has become especially relevant due to general digitalization and the spread of the cyberculture. In terms of it, the growing popularity of videogames can be observed. Their impact on society differs significantly, therefore, it needs thorough consideration. The purpose of the article is to disclose the role of videogames in cybersecurity. To achieve the stated purpose, such methods as analysis, synthesis, systematization and practical involvement of videogames have been used. As a result, three levels of possible threat of videogames has been distinguished: videogames as a possibly dangerous software, as a tool of propaganda and spread of stereotypes, as a space for the creation of virtual communities. In conclusion, it is stated that videogames can be not only a threat, but also a tool for strengthening the cybersecurity.
Keywords
Security; cybersecurity; videogame; digital psychology; videogame philosophy;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Malyk, Ya.: Economic Security of Ukraine: Internal and External Factors. Lviv, 202 p. (2002) (in Ukrainian)
2 Aarseth, E.: Playing Research: Methodological approaches to game analysis. In Proceedings of Digital Arts and Culture Conference (Melbourne, May 2003) (2003). DOI: 10.7238/a.v0i7.763   DOI
3 Renaud, K., Zimmermann, V., Schurmann, T., Bohm, C.: Exploring cybersecurity-related emotions and finding that they are challenging to measure. Palgrave Communications, 8, (1), pp. 1-17 (2021).
4 Spinoza, B.: The Collected Works in 2 Volumes, V.2 Moscow: Thought, 311 p. (1957). (in Russian)
5 Zhu, L.: The psychology behind video games during COVID19 pandemic: A case study of Animal Crossing: New Horizons. Human Behavior & Emerging Technologies, 3, pp. 157-159 (2021) DOI: https://doi.org/10.1002/hbe2.221   DOI
6 Frasca, G.: Ludology Meets Narratology: Similitude and differences between (video)games and narrative (1999). Retrieved from: https://ludology.typepad.com/weblog/articles/ludology.htm
7 Salen, K., Zimmerman, E.: Rules of Play: Game Design Fundamentals. Cambridge MA: MIT Press Visual Communication (2003).
8 Bardzell, J., Jakobsson, M., Bardzell, S., Pace, T., Odom, W., Houssian, A.: Virtual worlds and fraud: Approaching cybersecurity in Massively Multiplayer Online Games. Paper presented at 3rd Digital Games Research Association International Conference: "Situated Play", DiGRA 2007, pp. 742-751. Tokyo, Japan. (2007).
9 Kuchta, B., Romaniuk, A.: The Bases of Political Science. Part 1: From the History of Political Thought from the Ancient Time to Nowadays, pp. 26-27. Lviv: Kalvaria (1997) (in Ukrainian).
10 Al-Azawi, R., Al-Faliti, F., Al-Blushi, M.: Educational gamification vs. game-based learning: Comparative study. International Journal of Innovation, Management and Technology, 7(4), pp. 131-136 (2016). https://doi.org/10.18178/ijimt.2016.7.4.659   DOI
11 Rousseau, J-J.: The Social Contract. Moscow: Thought, 171 p. (1969). (in Russian)
12 Bryant, R.: What kind of space is cyberspace? Minerva - An Internet Journal of Philosophy, 5 (1) (2001).
13 Pontiroli, S.: The Cake is a Lie! Uncovering The Secret World of Malware-Like Cheats in Video Games. In VB2019, London, 2-4 October, 2019 (2019). Retrieved from: https://www.virusbulletin.com/uploads/pdf/magazine/2019/VB2019-Pontiroli.pdf
14 Formosa, P., Ryan, M., Staines, D.: Papers, Please and the systemic approach to engaging ethical expertise in videogames. Ethics and Information Technology. 18 (3), pp. 211-225 (2016).   DOI
15 Bergonse, R.: Fifty Years on, What Exactly is a Videogame? An Essentialistic Definitional Approach. The Computer Games Journal, 6, 10, pp. 239-255 (2017). DOI: 10.1007/s40869-017-0045-4   DOI
16 Caillois, R.: Man, Play, and Games. University of Illinois Press (2001).
17 Horban, O., Martych, R., Maletska, M.: Phenomenon of Videogame Culture in Modern Society. Studia Warminskie, 56, pp. 123-135 (2019). https://doi.org/10.31648/sw.4314   DOI
18 Konzack, L.: Computer Game Criticism: A Method for Computer Game Analysis. In Computer Games and Digital Cultures Conference Proceedings, pp. 89-100. Tampere University Press, June, 2002 (2002).
19 Hemenover S.H., Bowman, N.D.: Video games, emotion, and emotion regulation: expanding the scope. Annals of the International Communication Association, 42:2, pp. 125-143 (2018). DOI: 10.1080/23808985.2018.1442239   DOI
20 Jarvis, L., Robinson, N. War, time, and military videogames: heterogeneities and critical potential, Critical Military Studies, 7:2, 192-211, DOI: 10.1080/23337486.2019.1573014   DOI
21 Nick Robinson (2019) Military Videogames, The RUSI Journal, 164:4, 10-21, DOI: 10.1080/03071847.2019.1659607   DOI
22 Dziundziuk, V. B. Virtual Communities: a Potential Threat to National Security. State building (2011). (in Ukrainian)
23 Aleksandrova, O., Khrypko, S.: Solitude as a Problem of Human's Mature Choice. Beytulhikme. An International of Philosophy, 10(3), p. 771-785 (2020). https://doi.org/10.18491/beytulhikme.1582   DOI
24 Tardini, S., Cantoni, L.: Development of IT and Virtual Communities. In Encyclopedia of Multimedia Technology and Networking, Edited by M. Pagani. Hershey-New York: Information Science Reference, p. 349-355 (2009).
25 Croft, J.: "It's just a game": Ethical reasoning within virtual worlds. GoodWork Project Report Series, 73 (2011). URL: https://static1.squarespace.com/static/5c5b569c01232cccdc227b9c/t/5e8de2e3ce118367c46962cb/1586356963462/73-Its-Just-a-Game.pdf
26 Djaouti, D., Alvarez, J., Jessel, J-P.: A gameplay definition through videogame classification. International Journal of Computer Games Technology. Vol. 2008. (2008).
27 Andiloro, A.: Uncovering propaganda in war videogames. Two year's Master's Thesis, Programming, Department of Informatics and Media, Uppsala Universitet (2017).
28 Astafeva, O. N.: Synergetic approach to the study of sociocultural processes: opportunities and limits. Moscow: RAGS, 316 pp. (2002). (in Russian)
29 McCauley, B., Nguyen, Truc Ha Thanh, McDonald, M.: Wearing S. Digital gaming culture in Vietnam: an exploratory study. Leisure Studies, 39:3. pp. 372-386 (2020). DOI: 10.1080/02614367.2020.1731842   DOI
30 Kroeze, C., Olivier, M. S.: Gamifying authentication. Information Security for South Africa, 2012, pp. 1-8 (2012). doi: 10.1109/ISSA.2012.6320439.   DOI
31 Moon, T., Abegaz, T., Payne, B., Salimi, A.: MalAware Defensive: A Game to Train Users to Combat Malware. Journal of Cybersecurity Education, Research and Practice, Vol. 2020: No. 1, Article 2. (2020)
32 Determann, L., Guttenberg, K. T.: On War and Peace in Cyberspace - Security, Privacy, Jurisdiction. 41 Hastings Const. L.Q. 875 (2014).
33 Lippmann, W.: Public opinion. Harcourt, Brace (1922).
34 Khrypko, S. Iatsenko, G.: Philosophy of a Name: Ukrainian Context. Beytulhikme An International Journal of Philosophy, 9 (2), p. 437-451 (2019).   DOI
35 Craigen, D., Diakun-Thibault, N., & Purse, R.: Defining Cybersecurity. Technology Innovation Management Review, 4(10), pp. 13-21 (2014). http://doi.org/10.22215/timreview/835   DOI