Cyber risks of electronic combat games and their reflection on electronic recruitment of youth" PUBG game as a model"

Document Type : Original Article

Authors

1 Lecturer, Department of Journalism, College of Media and Communication Technology, South Valley University

2 Lecturer, Department of Public Relations, College of Media and Communication Technology, South Valley University.

Abstract

The main objective of the study is to analyse the cyber risks of cyber combat electronic games and their impact on the electronic recruitment of youth. Based on the methodology of seismological analysis to characterize and analyse the cyber risks of cyber games and the knowledge of the semiological implications of cyber games for youth. The methodology of the case study is based on PUBG, using focus groups on 50 young people aged 18 to 35 years who regularly use PUBG to determine their knowledge the results of the study found that there are some cyber gaps in combat electronic games according to the game's cybersecurity theory, which is used by extremist terrorist organizations to attract, recruit and attempt to influence youth to persuade them of their methods and principles and then join their ranks.

Keywords

Main Subjects


 
- Orellano, Robert A (2017) Predators and cyberbullying in online games , Ma thesis, Utica College , p1.
- Linda Schlegel (2020) Jumanji Extremism? How games and gamification could facilitate radicalization processes, journal for Deradicalization, no.23, p 18.
- René Glas, et al, 2019, The Playful Citizen: Civic Engagement in a Mediatized Culture, Amsterdam University Press, p 148.
- Impellizeri, Kevin Donald. (2020) The Multiplayer Game: User Identity and the Meaning of Home Video Games in the United States, 1972–1994, Ph.D thesis, University of Delaware., p 372-373.
- D. A. Akinwum , et al , (2017) A Review Of Game Theory Approach to Cyber Security Risk Management , Nigerian Journal of Technology (NIJOTECH(  , vol. 36, no. 4, p 1272.
- Estikhdam al'intrnt fi 'aghrad 'iirhabia (2013), maktab al'umam almutahidat almaenii bialmukhadirat waljarimat fiynaa, al'umam almutahidati:
- David Barnard-Wills, Debi Ashenden (2012) Securing Virtual Space: Cyber War, Cyber Terror, and Risk, Space and Culture, vol.15, no.2, P112.
- Alexis Le Compte, Tim Watson, David Elizondo (2015) A Renewed Approach to Serious Games for Cyber Security , In the Proceedings of the 7th International Conference on Cyber Conflict: Architectures in Cyberspace , P 212 .
- Jemin, Justin Lee, et al (2020) A Multi-Component Analysis of CPTED in the Cyberspace Domain, International and interdisciplinary journal of science and technology, Vol.20 , Issue .14.
-  Merijke Coenraad1, et al (2020) Experiencing Cybersecurity One Game at a Time: A Systematic Review of Cybersecurity Digital Games, Simulation & Gaming, Vol. 51, no .5,
P 598.
- Rana Salameh, (2019) The Relationship between Engagement Levels and Players’ Intended Behaviors in Game-Based Training for Cybersecurity, Ph.D thesis , Southern Illinois University .
- Ray, Katherine., Blomberg, Thomas. and Pesta, George. "Cyber Security and Cyber Criminology: Toward Integration" Paper presented at the annual meeting of the American Society of Criminology - 74th Annual Meeting, Atlanta Marriott Marquis, Atlanta, GA, Nov 13,2018 <http://citation.allacademic.com/meta/p1408426_index.html>
-  Impellizeri, Kevin Donald. (2020) Op.  Cit, pp 1-416.
- Roden, Judah A, (2019) Video Game Industry Analysis: History, Growth, and Architecture , MA thesis, Lamar University, The Faculty of the College of Graduate Studies. 
-  Schandler, Matthew Jared (2019) Pixels and Profits: Competitive Dynamics, Technological Enthusiasm, and Home Video Games, 1972-1992, Ph.D thesis, Lehigh University .
-Bouchareb, H., Ghoul, F. (2019) 'Athar al'aleab al'iiliktruniat eabr alwasayit aljadidat ealaa salukiaat alshabab aljzayry: dirasatan mashiatan lieayinat min alshabab almustakhdm bimadinat milyanat, mudhakirat takhruj linayl shahadat majstayr fi eulum al'iielam walaitisali, jamieat aljayalili biwanaeamat khamis mulyanat, kuliyat aleulum al'iinsaniat waleulum alaijtimaeia.
- de Souza, Lucas Lopes Ferreira; of Freitas, Ana Augusta Ferreira.,( 2017) Consumer behavior of electronic games' players: a study on the intentions to play and to pay, São Paulo , PublisherEmerald Group Publishing Limited .
- Przybylski, Andrew KWeinstein, Netta.( 2016) How we see electronic games ,
United States,  PeerJ, San Diego.
- Karine da Silva Miras de AraújoFabrício Olivetti de França,( 2016) An electronic-game framework for evaluating coevolutionary algorithms , United States, Ithaca ,Cornell University Library arXiv.org .
-  Andrade Xavier,  et al. (2015) Prevalence of headache in adolescents and association with use of computer and videogames , Public Health And Safety , Vol. 20 , Issue .11.
- Boileau, Jason (2010 ) TangiPlay: Prototyping tangible electronic games , MA thesis, Simon Fraser University (Canada) , the School of Interactive Arts and Technology.
- Ding, Chen Zhao (丁肇辰) (2008) , Research on Spatial Design Patterns of Electronic Games , PhD thesis , Tsinghua University .
- Ahmed Al-Rawi (2018) Video games, terrorism, and ISIS’s Jihad 3.0, Terrorism and Political ViolenceVol. 30, - Issue 4 , PP 740-760.
- Richard Apau , 2018 , Youth and Violent Extremism Online: Countering Terrorists Exploitation and Use of the Internet , African Journal on Terrorism , vol.7, no.1, pp.16-23.
-Alttahir, A. (2017) Estikhdam mawaqie altawasul alaijtimaeii fi eamaliat altajnid al'iirhabi: qara'atan fi alaliati, almadmuni, wasubul alwiqayat, majalat al'ustadh albahith lildirasat alqanuniat walsiyasiati, 3(2), 455- 471.
 - Piotr Gałka , Artur Strzeleck (2021) How Randomness Afects Player Ability to Predict the Chance to Win at PlayerUnknown’s Battlegrounds) PUBG), The Computer Games Journal , pp1-18.
- Melhart, DavidGravina, DanieleYannakakis, Georgios N , (2020) Moment-to-moment Engagement Prediction through the Eyes of the Observer: PUBG Streaming on Twitch,United States, Ithaca, Cornell University Library, arXiv.org.
-  Mamun, Mohammed A ,et al .(2020) PUBGrelated suicides during the COVID19 pandemic: Three cases from Pakistan, United States, Hoboken ,
John Wiley & Sons, Inc, available at : https://0811jdxy4-1104-y-https-search-proquest-com.mplbci.ekb.eg/docview/2464306820/fulltextPDF/1AB5F8D7EF9C4675PQ/1?accountid=178282.
-  Rokad, Brij , et al (2019) Survival of the Fittest in Player Unknown Battle Ground ,
United States, Ithaca Cornell University Library, arXiv.org , Computer Science; Statistics .
- Wen Tian , et al (2019) Honeypot game‐theoretical model for defending against APT attacks with limited resources in cyber‐physical systems,  Etri Journal , vol . 41, no. 5, p 587.
- Farhat Anwar , et al , (2020), A Comprehensive Insight into Game Theory in relevance to Cyber Security , Indonesian Journal of Electrical Engineering and Informatics (IJEEI) , Vol. 8, No. 1, p 194 .
- V.M. Bier & S. Tas, 2012, Game theory in infrastructure security, WIT Transactions on State of the Art in Science and Engineering, vol 54, p 101-102.
- Xiannuan Liang , Yang Xiao, (2013) Game Theory for Network Security ,   IEEE Communications Surveys & Tutorials , vol. 15, no. 1, p 473.
- Mohammed Hossein Manshae , et al , (2013) Game Theory Meets Network Security and Privacy, ACM Computing Surveys, vol. 45, no. 3,  p3.
- Sajjan Shiva , et al ,(  2010 ) Final Technical Report :  Game Theoretic Approaches to Protect Cyberspace Article , Department of Computer Science , University of Memphis Memphis, TN, USA , P19.
- Patrick Maille, Peter Reichl, Bruno Tuffin, Performance Models and Risk Management in Communications Systems, Springer, New York, NY, Springer Optimization and Its, p 34-35.
- Tao Zhang , et al , (2020) Modeling and Design of Secure Internet of Things , The Institute of Electrical and Electronics Engineers, Inc., available at : Modeling and Design of Secure Internet of Things | Wiley Online Books
- Cuong.Do , et al (2017) Game Theory for Cyber Security and Privacy , ACM Computing Surveys, Vol. 50, No. 2, p 2.
- Sankardas Roy , et al , ( 2010 ) A Survey of Game Theory as Applied to Network Security , Conference Paper , Department of Computer Science University of Memphis Memphis, TN, USA , p 1.
- Azhar Iqbal , et al ,(2019) Game theoretical modelling of network/cyber security, available at : 1901.08426.pdf (arxiv.org)
- Sajjan Shiva, Sankardas Roy , Dipankar Dasgupta, 2010, Game Theory for Cyber Security , available at  (PDF) Game theory for cyber security (researchgate.net)
-Barakat, W. (2002) alsymywlwjya biqara'at rulan bart, majalat jamieat dimashq, 2(18), 63.
- Good, J. and Robertson, J. (2006). Learning and motivational affordances in narrative-based game authoring, In the Proceedings of the 4th International Conference for Narrative and Interactive Learning Environments (NILE), Edinburgh, pp. 37-51.
-  Azhar Iqbal , et al ,(2019) , Op.  Cit, P 3.
-  Scott Gerwehr, Sara A. Daly (2006) Al-Qaida: terrorist Selection and recruitment, California, Santa Monica, Rand Corporation, p 79.
-Bertima, S. (2017) Al'aleab al'iiliktruniat waleunf almdrsy: dirasat maydaniat ealaa eayinat min talamidh mtwst alshahid (bladiat almirarat wilayat alwady), risalat majstir, jamieat muhamad khadir- bisakrati, kuliyat Aloulom al'iinsaniat walaijtimaeiati, qism Aloulom alaijtimaeiat, 181.