Jonah Bellemans, Dimitri Van Landuyt, Laurens Sion, Lieven Desmet
{"title":"Gamified or Glorified? A systematic review of serious games for security & privacy in the SDLC","authors":"Jonah Bellemans, Dimitri Van Landuyt, Laurens Sion, Lieven Desmet","doi":"10.1016/j.infsof.2025.107850","DOIUrl":null,"url":null,"abstract":"<div><h3>Context:</h3><div>While security and privacy are playing increasingly important roles in the software development process, the skill shortage for security and privacy keeps growing. To address this, academia and industry alike have proposed game-based approaches, to foster involvement of non-expert stakeholders, and to improve collaboration among the various parties involved. However, research has shown that injudicious implementation of gamification can do more harm than good. Basing the game design on an existing, established methodology is crucial to accomplish the intended goals of the game.</div></div><div><h3>Objective:</h3><div>This paper identifies and compares the different serious games in the space of security and privacy engineering. It highlights the differences between games in goals, intent, form, and approach, and pays particular attention to (1) the specific motivations behind the selected gameful design elements, and (2) the scientific evidence of the benefits of these game-based approaches.</div></div><div><h3>Method:</h3><div>We perform a widely-scoped discovery search for relevant serious games to establish a dataset of relevant games. For each of the in total twelve games, we collect and study the different game artifacts, covered CyBOK knowledge domains, materials, research articles, and practitioner testimonials.</div></div><div><h3>Results:</h3><div>Most games target a multi-stakeholder industry practitioner audience, typically with the goal of providing a first introduction to activities such as Requirements Engineering and Threat Modeling. The majority of games have been designed in an ad-hoc manner, rather than being based on design frameworks or methodologies. Scientific evaluations of these games mostly focus on obtaining participant feedback, experiences and opinions, rather than evaluating the actual outcomes of applying the game.</div></div><div><h3>Conclusions:</h3><div>While game-based approaches for security and privacy in the SDLC are showing promise, many of them have not been designed with proven serious game design frameworks or methodologies. Further empirical evidence is required to confirm the effectiveness of these games.</div></div>","PeriodicalId":54983,"journal":{"name":"Information and Software Technology","volume":"188 ","pages":"Article 107850"},"PeriodicalIF":4.3000,"publicationDate":"2025-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information and Software Technology","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0950584925001892","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Context:
While security and privacy are playing increasingly important roles in the software development process, the skill shortage for security and privacy keeps growing. To address this, academia and industry alike have proposed game-based approaches, to foster involvement of non-expert stakeholders, and to improve collaboration among the various parties involved. However, research has shown that injudicious implementation of gamification can do more harm than good. Basing the game design on an existing, established methodology is crucial to accomplish the intended goals of the game.
Objective:
This paper identifies and compares the different serious games in the space of security and privacy engineering. It highlights the differences between games in goals, intent, form, and approach, and pays particular attention to (1) the specific motivations behind the selected gameful design elements, and (2) the scientific evidence of the benefits of these game-based approaches.
Method:
We perform a widely-scoped discovery search for relevant serious games to establish a dataset of relevant games. For each of the in total twelve games, we collect and study the different game artifacts, covered CyBOK knowledge domains, materials, research articles, and practitioner testimonials.
Results:
Most games target a multi-stakeholder industry practitioner audience, typically with the goal of providing a first introduction to activities such as Requirements Engineering and Threat Modeling. The majority of games have been designed in an ad-hoc manner, rather than being based on design frameworks or methodologies. Scientific evaluations of these games mostly focus on obtaining participant feedback, experiences and opinions, rather than evaluating the actual outcomes of applying the game.
Conclusions:
While game-based approaches for security and privacy in the SDLC are showing promise, many of them have not been designed with proven serious game design frameworks or methodologies. Further empirical evidence is required to confirm the effectiveness of these games.
期刊介绍:
Information and Software Technology is the international archival journal focusing on research and experience that contributes to the improvement of software development practices. The journal''s scope includes methods and techniques to better engineer software and manage its development. Articles submitted for review should have a clear component of software engineering or address ways to improve the engineering and management of software development. Areas covered by the journal include:
• Software management, quality and metrics,
• Software processes,
• Software architecture, modelling, specification, design and programming
• Functional and non-functional software requirements
• Software testing and verification & validation
• Empirical studies of all aspects of engineering and managing software development
Short Communications is a new section dedicated to short papers addressing new ideas, controversial opinions, "Negative" results and much more. Read the Guide for authors for more information.
The journal encourages and welcomes submissions of systematic literature studies (reviews and maps) within the scope of the journal. Information and Software Technology is the premiere outlet for systematic literature studies in software engineering.