المخاطر السيبرانية للألعاب الإلکترونية القتالية وانعکاسها على التجنيد الإلکتروني للشباب: لعبة بابجي نموذجًا

نوع المستند : المقالة الأصلية

المؤلفون

1 مدرس بقسم الصحافة، کلية الإعلام وتکنولوجيا الاتصال، جامعة جنوب الوادي.

2 مدرس بقسم العلاقات العامة والإعلان، کلية الإعلام وتکنولوجيا الاتصال، جامعة جنوب الوادي.

المستخلص

يتمثل الهدف الرئيس للدراسة في تحليل المخاطر السيبرانية للألعاب الإلکترونية القتالية سيمولوجيًا وانعکاسها على التجنيد الإلکتروني للشباب، بالاعتماد على منهج التحليل السيمولوجي؛ لتوصيف وتحليل المخاطر السيبرانية للألعاب الإلکترونية سيمولوجيًا، ومعرفة الدلالات السيمولوجية وانعکاسها على التجنيد الإلکتروني للشباب، فضلاً عن منهج دراسة الحالة بالتطبيق على لعبة بابجي، باستخدام مجموعات النقاش البؤرية على عدد (50) مفردة من الشباب من عمر (18- 35 سنة) من مستخدمي لعبة بابجي بصورة منتظمة؛ لمعرفة مدى إلمامهم بالمخاطر السيبرانية للعبة، وتوصلت نتائج الدراسة إلى وجود بعض الثغرات السيبرانية في الألعاب الإلکترونية القتالية وفقًا لنظرية اللعبة للأمن السيبراني، والتي تستغلها بعض المنظمات الإرهابية المتطرفة في استقطاب الشباب وتجنيدهم، ومحاولة التأثير عليهم وإقناعهم بمناهجهم ومبادئهم، ومن ثم الانضمام إلى صفوفهم.

الكلمات الرئيسية

الموضوعات الرئيسية


 
- Orellano, Robert A (2017) Predators and cyberbullying in online games , Ma thesis, Utica College , p1.
- Linda Schlegel (2020) Jumanji Extremism? How games and gamification could facilitate radicalization processes, journal for Deradicalization, no.23, p 18.
- René Glas, et al, 2019, The Playful Citizen: Civic Engagement in a Mediatized Culture, Amsterdam University Press, p 148.
- Impellizeri, Kevin Donald. (2020) The Multiplayer Game: User Identity and the Meaning of Home Video Games in the United States, 1972–1994, Ph.D thesis, University of Delaware., p 372-373.
- D. A. Akinwum , et al , (2017) A Review Of Game Theory Approach to Cyber Security Risk Management , Nigerian Journal of Technology (NIJOTECH(  , vol. 36, no. 4, p 1272.
- Estikhdam al'intrnt fi 'aghrad 'iirhabia (2013), maktab al'umam almutahidat almaenii bialmukhadirat waljarimat fiynaa, al'umam almutahidati:
- David Barnard-Wills, Debi Ashenden (2012) Securing Virtual Space: Cyber War, Cyber Terror, and Risk, Space and Culture, vol.15, no.2, P112.
- Alexis Le Compte, Tim Watson, David Elizondo (2015) A Renewed Approach to Serious Games for Cyber Security , In the Proceedings of the 7th International Conference on Cyber Conflict: Architectures in Cyberspace , P 212 .
- Jemin, Justin Lee, et al (2020) A Multi-Component Analysis of CPTED in the Cyberspace Domain, International and interdisciplinary journal of science and technology, Vol.20 , Issue .14.
-  Merijke Coenraad1, et al (2020) Experiencing Cybersecurity One Game at a Time: A Systematic Review of Cybersecurity Digital Games, Simulation & Gaming, Vol. 51, no .5,
P 598.
- Rana Salameh, (2019) The Relationship between Engagement Levels and Players’ Intended Behaviors in Game-Based Training for Cybersecurity, Ph.D thesis , Southern Illinois University .
- Ray, Katherine., Blomberg, Thomas. and Pesta, George. "Cyber Security and Cyber Criminology: Toward Integration" Paper presented at the annual meeting of the American Society of Criminology - 74th Annual Meeting, Atlanta Marriott Marquis, Atlanta, GA, Nov 13,2018 <http://citation.allacademic.com/meta/p1408426_index.html>
-  Impellizeri, Kevin Donald. (2020) Op.  Cit, pp 1-416.
- Roden, Judah A, (2019) Video Game Industry Analysis: History, Growth, and Architecture , MA thesis, Lamar University, The Faculty of the College of Graduate Studies. 
-  Schandler, Matthew Jared (2019) Pixels and Profits: Competitive Dynamics, Technological Enthusiasm, and Home Video Games, 1972-1992, Ph.D thesis, Lehigh University .
-Bouchareb, H., Ghoul, F. (2019) 'Athar al'aleab al'iiliktruniat eabr alwasayit aljadidat ealaa salukiaat alshabab aljzayry: dirasatan mashiatan lieayinat min alshabab almustakhdm bimadinat milyanat, mudhakirat takhruj linayl shahadat majstayr fi eulum al'iielam walaitisali, jamieat aljayalili biwanaeamat khamis mulyanat, kuliyat aleulum al'iinsaniat waleulum alaijtimaeia.
- de Souza, Lucas Lopes Ferreira; of Freitas, Ana Augusta Ferreira.,( 2017) Consumer behavior of electronic games' players: a study on the intentions to play and to pay, São Paulo , PublisherEmerald Group Publishing Limited .
- Przybylski, Andrew KWeinstein, Netta.( 2016) How we see electronic games ,
United States,  PeerJ, San Diego.
- Karine da Silva Miras de AraújoFabrício Olivetti de França,( 2016) An electronic-game framework for evaluating coevolutionary algorithms , United States, Ithaca ,Cornell University Library arXiv.org .
-  Andrade Xavier,  et al. (2015) Prevalence of headache in adolescents and association with use of computer and videogames , Public Health And Safety , Vol. 20 , Issue .11.
- Boileau, Jason (2010 ) TangiPlay: Prototyping tangible electronic games , MA thesis, Simon Fraser University (Canada) , the School of Interactive Arts and Technology.
- Ding, Chen Zhao (丁肇辰) (2008) , Research on Spatial Design Patterns of Electronic Games , PhD thesis , Tsinghua University .
- Ahmed Al-Rawi (2018) Video games, terrorism, and ISIS’s Jihad 3.0, Terrorism and Political ViolenceVol. 30, - Issue 4 , PP 740-760.
- Richard Apau , 2018 , Youth and Violent Extremism Online: Countering Terrorists Exploitation and Use of the Internet , African Journal on Terrorism , vol.7, no.1, pp.16-23.
-Alttahir, A. (2017) Estikhdam mawaqie altawasul alaijtimaeii fi eamaliat altajnid al'iirhabi: qara'atan fi alaliati, almadmuni, wasubul alwiqayat, majalat al'ustadh albahith lildirasat alqanuniat walsiyasiati, 3(2), 455- 471.
 - Piotr Gałka , Artur Strzeleck (2021) How Randomness Afects Player Ability to Predict the Chance to Win at PlayerUnknown’s Battlegrounds) PUBG), The Computer Games Journal , pp1-18.
- Melhart, DavidGravina, DanieleYannakakis, Georgios N , (2020) Moment-to-moment Engagement Prediction through the Eyes of the Observer: PUBG Streaming on Twitch,United States, Ithaca, Cornell University Library, arXiv.org.
-  Mamun, Mohammed A ,et al .(2020) PUBGrelated suicides during the COVID19 pandemic: Three cases from Pakistan, United States, Hoboken ,
John Wiley & Sons, Inc, available at : https://0811jdxy4-1104-y-https-search-proquest-com.mplbci.ekb.eg/docview/2464306820/fulltextPDF/1AB5F8D7EF9C4675PQ/1?accountid=178282.
-  Rokad, Brij , et al (2019) Survival of the Fittest in Player Unknown Battle Ground ,
United States, Ithaca Cornell University Library, arXiv.org , Computer Science; Statistics .
- Wen Tian , et al (2019) Honeypot game‐theoretical model for defending against APT attacks with limited resources in cyber‐physical systems,  Etri Journal , vol . 41, no. 5, p 587.
- Farhat Anwar , et al , (2020), A Comprehensive Insight into Game Theory in relevance to Cyber Security , Indonesian Journal of Electrical Engineering and Informatics (IJEEI) , Vol. 8, No. 1, p 194 .
- V.M. Bier & S. Tas, 2012, Game theory in infrastructure security, WIT Transactions on State of the Art in Science and Engineering, vol 54, p 101-102.
- Xiannuan Liang , Yang Xiao, (2013) Game Theory for Network Security ,   IEEE Communications Surveys & Tutorials , vol. 15, no. 1, p 473.
- Mohammed Hossein Manshae , et al , (2013) Game Theory Meets Network Security and Privacy, ACM Computing Surveys, vol. 45, no. 3,  p3.
- Sajjan Shiva , et al ,(  2010 ) Final Technical Report :  Game Theoretic Approaches to Protect Cyberspace Article , Department of Computer Science , University of Memphis Memphis, TN, USA , P19.
- Patrick Maille, Peter Reichl, Bruno Tuffin, Performance Models and Risk Management in Communications Systems, Springer, New York, NY, Springer Optimization and Its, p 34-35.
- Tao Zhang , et al , (2020) Modeling and Design of Secure Internet of Things , The Institute of Electrical and Electronics Engineers, Inc., available at : Modeling and Design of Secure Internet of Things | Wiley Online Books
- Cuong.Do , et al (2017) Game Theory for Cyber Security and Privacy , ACM Computing Surveys, Vol. 50, No. 2, p 2.
- Sankardas Roy , et al , ( 2010 ) A Survey of Game Theory as Applied to Network Security , Conference Paper , Department of Computer Science University of Memphis Memphis, TN, USA , p 1.
- Azhar Iqbal , et al ,(2019) Game theoretical modelling of network/cyber security, available at : 1901.08426.pdf (arxiv.org)
- Sajjan Shiva, Sankardas Roy , Dipankar Dasgupta, 2010, Game Theory for Cyber Security , available at  (PDF) Game theory for cyber security (researchgate.net)
-Barakat, W. (2002) alsymywlwjya biqara'at rulan bart, majalat jamieat dimashq, 2(18), 63.
- Good, J. and Robertson, J. (2006). Learning and motivational affordances in narrative-based game authoring, In the Proceedings of the 4th International Conference for Narrative and Interactive Learning Environments (NILE), Edinburgh, pp. 37-51.
-  Azhar Iqbal , et al ,(2019) , Op.  Cit, P 3.
-  Scott Gerwehr, Sara A. Daly (2006) Al-Qaida: terrorist Selection and recruitment, California, Santa Monica, Rand Corporation, p 79.
-Bertima, S. (2017) Al'aleab al'iiliktruniat waleunf almdrsy: dirasat maydaniat ealaa eayinat min talamidh mtwst alshahid (bladiat almirarat wilayat alwady), risalat majstir, jamieat muhamad khadir- bisakrati, kuliyat Aloulom al'iinsaniat walaijtimaeiati, qism Aloulom alaijtimaeiat, 181.