{"id":"https://openalex.org/W4415870527","doi":"https://doi.org/10.1145/3757232.3757249","title":"Who Wants to Be Cybersecure? Expert Evaluation of a Culturally Adaptive Gamified Cybersecurity Awareness App","display_name":"Who Wants to Be Cybersecure? Expert Evaluation of a Culturally Adaptive Gamified Cybersecurity Awareness App","publication_year":2025,"publication_date":"2025-11-04","ids":{"openalex":"https://openalex.org/W4415870527","doi":"https://doi.org/10.1145/3757232.3757249"},"language":null,"primary_location":{"id":"doi:10.1145/3757232.3757249","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3757232.3757249","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3757232.3757249","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th Biennial African Human Computer Interaction Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3757232.3757249","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064968773","display_name":"Victor Yisa","orcid":"https://orcid.org/0000-0001-6606-7660"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Victor Legbo Yisa","raw_affiliation_strings":["Dalhousie University, Halifax, NS, Canada"],"raw_orcid":"https://orcid.org/0000-0001-6606-7660","affiliations":[{"raw_affiliation_string":"Dalhousie University, Halifax, NS, Canada","institution_ids":["https://openalex.org/I129902397"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034768623","display_name":"Rita Orji","orcid":"https://orcid.org/0000-0001-6152-8034"},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rita Orji","raw_affiliation_strings":["Dalhousie University, Halifax, NS, Canada"],"raw_orcid":"https://orcid.org/0000-0001-6152-8034","affiliations":[{"raw_affiliation_string":"Dalhousie University, Halifax, NS, Canada","institution_ids":["https://openalex.org/I129902397"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5064968773"],"corresponding_institution_ids":["https://openalex.org/I129902397"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.44805024,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"243","last_page":"255"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.5701000094413757,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.5701000094413757,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.07599999755620956,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10731","display_name":"Educational Games and Gamification","score":0.022299999371170998,"subfield":{"id":"https://openalex.org/subfields/3204","display_name":"Developmental and Educational Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/credibility","display_name":"Credibility","score":0.6219000220298767},{"id":"https://openalex.org/keywords/relevance","display_name":"Relevance (law)","score":0.4115000069141388},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.3346000015735626},{"id":"https://openalex.org/keywords/cultural-diversity","display_name":"Cultural diversity","score":0.33180001378059387},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.3190000057220459},{"id":"https://openalex.org/keywords/subject-matter-expert","display_name":"Subject-matter expert","score":0.31709998846054077}],"concepts":[{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.6219000220298767},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4251999855041504},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4230000078678131},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41769999265670776},{"id":"https://openalex.org/C158154518","wikidata":"https://www.wikidata.org/wiki/Q7310970","display_name":"Relevance (law)","level":2,"score":0.4115000069141388},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.3346000015735626},{"id":"https://openalex.org/C125209646","wikidata":"https://www.wikidata.org/wiki/Q1338878","display_name":"Cultural diversity","level":2,"score":0.33180001378059387},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.3190000057220459},{"id":"https://openalex.org/C105002631","wikidata":"https://www.wikidata.org/wiki/Q4833645","display_name":"Subject-matter expert","level":3,"score":0.31709998846054077},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.31679999828338623},{"id":"https://openalex.org/C60671577","wikidata":"https://www.wikidata.org/wiki/Q210272","display_name":"Cultural heritage","level":2,"score":0.30309998989105225},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.2865999937057495},{"id":"https://openalex.org/C207267971","wikidata":"https://www.wikidata.org/wiki/Q120208","display_name":"Emerging technologies","level":2,"score":0.28130000829696655},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.26750001311302185},{"id":"https://openalex.org/C145804949","wikidata":"https://www.wikidata.org/wiki/Q478123","display_name":"Situation awareness","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C17632256","wikidata":"https://www.wikidata.org/wiki/Q1076968","display_name":"Digital media","level":2,"score":0.26109999418258667},{"id":"https://openalex.org/C2988145974","wikidata":"https://www.wikidata.org/wiki/Q620615","display_name":"Mobile apps","level":2,"score":0.2574000060558319}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3757232.3757249","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3757232.3757249","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3757232.3757249","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th Biennial African Human Computer Interaction Conference","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3757232.3757249","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3757232.3757249","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3757232.3757249","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th Biennial African Human Computer Interaction Conference","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320994","display_name":"Canada Research Chairs","ror":"https://ror.org/0517h6h17"},{"id":"https://openalex.org/F4320321629","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80"},{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4415870527.pdf"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W1982451263","https://openalex.org/W2162598207","https://openalex.org/W2206760540","https://openalex.org/W2285016219","https://openalex.org/W2891267981","https://openalex.org/W2926400328","https://openalex.org/W2976205199","https://openalex.org/W3028100120","https://openalex.org/W3041667794","https://openalex.org/W3080252719","https://openalex.org/W3106111847","https://openalex.org/W3134751382","https://openalex.org/W3160553573","https://openalex.org/W3182138653","https://openalex.org/W4285165377","https://openalex.org/W4285198827","https://openalex.org/W4308201661","https://openalex.org/W4317707883","https://openalex.org/W4327724581","https://openalex.org/W4362682162","https://openalex.org/W4366549776","https://openalex.org/W4384786475","https://openalex.org/W4385843400","https://openalex.org/W4386003898","https://openalex.org/W4386230467","https://openalex.org/W4388532962","https://openalex.org/W4389456560","https://openalex.org/W4390279997","https://openalex.org/W4392432531","https://openalex.org/W4393145215","https://openalex.org/W4396539767","https://openalex.org/W4396642002","https://openalex.org/W4398166398","https://openalex.org/W4400084214","https://openalex.org/W4401529133","https://openalex.org/W4401805389","https://openalex.org/W4402389826","https://openalex.org/W4403755006","https://openalex.org/W6922435752"],"related_works":[],"abstract_inverted_index":{"Cybersecurity":[0],"awareness":[1,27,109],"is":[2],"a":[3,99],"pressing":[4],"issue":[5],"in":[6,149],"Nigeria":[7],"as":[8,36,69,127],"the":[9,24,66,135,170],"rapid":[10],"growth":[11],"of":[12,19,23,93],"digital":[13],"technologies":[14],"has":[15],"outpaced":[16],"public":[17],"knowledge":[18],"online":[20,187],"safety.":[21],"Most":[22],"available":[25],"cybersecurity":[26,108,147,180],"programs":[28],"often":[29,72],"fail":[30],"to":[31,65,96,106,165],"resonate":[32],"with":[33,146],"local":[34],"users":[35],"they":[37,70],"were":[38],"developed":[39],"for":[40,55,175],"WEIRD":[41],"(Western,":[42],"Educated,":[43],"Industrialized,":[44],"Rich,":[45],"Democratic)":[46],"contexts,":[47],"making":[48],"them":[49],"less":[50,53],"enticing":[51],"and":[52,77,84,123,130,139,151,162,186],"efficient":[54],"changing":[56],"people\u2019s":[57],"behavior.":[58],"Additionally,":[59],"most":[60],"existing":[61],"solutions":[62],"are":[63,71],"inaccessible":[64],"general":[67],"public,":[68],"delivered":[73],"through":[74,142],"seminars,":[75],"workshops,":[76],"expert-led":[78],"training,":[79],"which":[80],"have":[81],"limited":[82],"reach":[83],"engagement.":[85,168],"This":[86],"paper":[87],"describes":[88],"an":[89],"evaluation":[90],"by":[91,116],"experts":[92,148,154,171],"\"Who":[94],"Wants":[95],"Be":[97],"Cybersecure\",":[98],"culturally":[100],"adapted":[101],"gamified":[102],"mobile":[103],"application":[104],"designed":[105],"improve":[107],"among":[110],"Nigerians.":[111],"The":[112],"app":[113],"enhances":[114],"engagement":[115],"integrating":[117],"scenario-based":[118],"learning,":[119],"gamification":[120],"(leaderboards,":[121],"competition),":[122],"cultural":[124,140,157],"elements":[125,158],"such":[126],"Afrobeats":[128],"music":[129],"Pidgin":[131],"English.":[132],"We":[133],"assess":[134],"app\u2019s":[136],"usability,":[137],"effectiveness,":[138],"relevance":[141],"qualitative":[143],"expert":[144],"interviews":[145],"industry":[150],"academia.":[152],"Furthermore,":[153],"noted":[155],"that":[156],"would":[159],"increase":[160],"credibility":[161],"acceptance,":[163],"leading":[164],"better":[166],"user":[167],"Nevertheless,":[169],"identified":[172],"some":[173],"areas":[174],"improvement,":[176],"including":[177],"more":[178],"Nigerian-related":[179],"scenarios":[181],"(e.g.,":[182],"SIM":[183],"swap":[184],"fraud":[185],"banking":[188],"scams).":[189]},"counts_by_year":[],"updated_date":"2026-03-11T06:11:40.159057","created_date":"2025-11-04T00:00:00"}
