ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment
arXiv SecurityArchived Apr 17, 2026✓ Full text saved
arXiv:2604.14996v1 Announce Type: new Abstract: The incidence of cybersecurity attacks utilizing social engineering techniques has increased. Such attacks exploit the fact that in every secure system, there is at least one individual with the means to access sensitive information. Since it is easier to deceive a person than it is to bypass the defense mechanisms in place, these types of attacks have gained popularity. This situation is exacerbated by the fact that people are more likely to take
Full text archived locally
✦ AI Summary· Claude Sonnet
Computer Science > Cryptography and Security
[Submitted on 16 Apr 2026]
ConGISATA: A Framework for Continuous Gamified Information Security Awareness Training and Assessment
Ofir Cohen, Ron Bitton, Asaf Shabtai, Rami Puzis
The incidence of cybersecurity attacks utilizing social engineering techniques has increased. Such attacks exploit the fact that in every secure system, there is at least one individual with the means to access sensitive information. Since it is easier to deceive a person than it is to bypass the defense mechanisms in place, these types of attacks have gained popularity. This situation is exacerbated by the fact that people are more likely to take risks in their passive form, i.e., risks that arise due to the failure to perform an action. Passive risk has been identified as a significant threat to cybersecurity. To address these threats, there is a need to strengthen individuals' information security awareness (ISA). Therefore, we developed ConGISATA - a continuous gamified ISA training and assessment framework based on embedded mobile sensors; a taxonomy for evaluating mobile users' security awareness served as the basis for the sensors' design. ConGISATA's continuous and gradual training process enables users to learn from their real-life mistakes and adapt their behavior accordingly. ConGISATA aims to transform passive risk situations (as perceived by an individual) into active risk situations, as people tend to underestimate the potential impact of passive risks. Our evaluation of the proposed framework demonstrates its ability to improve individuals' ISA, as assessed by the sensors and in simulations of common attack vectors.
Comments: Accepted to the 28th European Symposium on Research in Computer Security (ESORICS 2023), published in Springer LNCS proceedings. Distinguished Paper Award. 21 pages, 6 figures
Subjects: Cryptography and Security (cs.CR)
Cite as: arXiv:2604.14996 [cs.CR]
(or arXiv:2604.14996v1 [cs.CR] for this version)
https://doi.org/10.48550/arXiv.2604.14996
Focus to learn more
Related DOI:
https://doi.org/10.1007/978-3-031-51479-1_22
Focus to learn more
Submission history
From: Ofir Cohen [view email]
[v1] Thu, 16 Apr 2026 13:22:21 UTC (1,216 KB)
Access Paper:
HTML (experimental)
view license
Current browse context:
cs.CR
< prev | next >
new | recent | 2026-04
Change to browse by:
cs
References & Citations
NASA ADS
Google Scholar
Semantic Scholar
Export BibTeX Citation
Bookmark
Bibliographic Tools
Bibliographic and Citation Tools
Bibliographic Explorer Toggle
Bibliographic Explorer (What is the Explorer?)
Connected Papers Toggle
Connected Papers (What is Connected Papers?)
Litmaps Toggle
Litmaps (What is Litmaps?)
scite.ai Toggle
scite Smart Citations (What are Smart Citations?)
Code, Data, Media
Demos
Related Papers
About arXivLabs
Which authors of this paper are endorsers? | Disable MathJax (What is MathJax?)