NetGuardians: Lightweight Serious Game for Cybersecurity Education
Main Article Content
Abstract
This paper presents NetGuardians, an interactive narrative-driven serious game designed to support cybersecurity awareness among high school students. As cybersecurity threats continue to increase, particularly affecting young learners, there is a growing need for engaging educational approaches that can introduce essential digital security concepts in an accessible manner. NetGuardians focuses on three fundamental topics: recognizing phishing attacks, promoting strong password practices, and understanding the risks associated with public Wi-Fi usage. The game was developed using the Game Development Life Cycle (GDLC) methodology and integrates storytelling, interactive quizzes, and real-life case scenarios. In addition, a comparative analysis was conducted with existing cybersecurity educational games, including Riskio, CyberHero, and CSRAG, to examine differences in content focus, engagement strategies, and academic design approaches. To explore students' learning experiences, qualitative data were collected through interviews with 25 high school students. The interview questions, based on concepts from serious games and game-based learning literature, focused on perceived learning, engagement, cybersecurity awareness, and digital decision-making. The qualitative findings suggest that participants reported increased cybersecurity awareness, especially regarding phishing and password security, and found the narrative and interactive elements helpful in understanding the material. However, due to the qualitative nature of the study and the lack of empirical learning measurements, the educational impact remains inconclusive. The study concludes that NetGuardians shows potential as a narrative-based tool for cybersecurity education, but further development and quantitative evaluation are needed to confirm its effectiveness.
Article Details

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal the right of first publication. The work is simultaneously licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits others to copy, distribute, remix, adapt, and build upon the work, even commercially, provided proper attribution is given to the original authors and the journal as the source of first publication.
- Authors may enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., posting to institutional repositories, inclusion in books), with an acknowledgment of its initial publication in this journal.
- Authors are encouraged to post their work online (e.g., in institutional repositories, personal websites, or preprint servers) prior to and during the submission process. This practice can foster productive exchanges and may lead to earlier and increased citation of the published work.
User Rights:
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: Creative Commons Attribution 4.0 International License.
References
[1] C. Scherb, L. B. Heitz, F. Grimberg, H. Grieder, and M. Maurer, “A Cyber Attack Simulation for Teaching Cybersecurity,” 2023, pp. 129–116. doi: 10.29007/dkdw.
[2] I. Diana, I. A. Ismail, and M. Zairul, “Cybersecurity Issues among High School Students: A Thematic Review,” International Journal of Academic Research in Business and Social Sciences, vol. 13, no. 14, Aug. 2023, doi: 10.6007/ijarbss/v13-i14/18336.
[3] A. W. Fazil, M. Hakimi, S. Sajid, M. M. Quchi, and K. Q. Khaliqyar, “Enhancing Internet Safety and Cybersecurity Awareness among Secondary and High School Students in Afghanistan: A Case Study of Badakhshan Province,” American Journal of Education and Technology, vol. 2, no. 4, pp. 50–61, Nov. 2023, doi: 10.54536/ajet.v2i4.2248.
[4] B. J. Blažič and A. J. Blažič, “Cybersecurity Skills among European High-School Students: A New Approach in the Design of Sustainable Educational Development in Cybersecurity,” Sustainability (Switzerland), vol. 14, no. 8, Apr. 2022, doi: 10.3390/su14084763.
[5] A. Yasin, L. Liu, T. Li, R. Fatima, and W. Jianmin, “Improving software security awareness using a serious game,” IET Software, vol. 13, no. 2, pp. 159–169, Apr. 2019, doi: 10.1049/iet-sen.2018.5095.
[6] S. Hart, A. Margheri, F. Paci, and V. Sassone, “Riskio: A Serious Game for Cyber Security Awareness and Education,” Comput Secur, vol. 95, Aug. 2020, doi: 10.1016/j.cose.2020.101827.
[7] R. Hodhod, H. Hardage, S. Abbas, and E. A. Aldakheel, “CyberHero: An Adaptive Serious Game to Promote Cybersecurity Awareness,” Electronics (Switzerland), vol. 12, no. 17, Sep. 2023, doi: 10.3390/electronics12173544.
[8] K. Sookhanaphibarn and W. Choensawat, “Educational Games for Cybersecurity Awareness,” in 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE), IEEE, Oct. 2020, pp. 424–428. doi: 10.1109/GCCE50665.2020.9291723.
[9] T. Tan, H. Sama, T. Wibowo, G. Wijaya, and O. E. Aboagye, “Kesadaran Keamanan Siber pada Kalangan Mahasiswa Universitas di Kota Batam Cybersecurity Awareness among University Students in Batam City,” Jurnal Teknologi dan Informasi (JATI), vol. 14, 2024, doi: 10.34010/jati.v14i2.
[10] H. N. Chua, J. S. Teh, and A. Herbland, “Identifying the Effect of Data Breach Publicity on Information Security Awareness Using Hierarchical Regression,” IEEE Access, vol. 9, pp. 121759–121770, 2021, doi: 10.1109/ACCESS.2021.3107426.
[11] M. Al-Tajer and R. A. Ikuesan, “Cyber Security Threat Awareness Framework for High School Students in Qatar,” Jul. 2022, [Online]. Available: http://arxiv.org/abs/2207.00820
[12] K. M. Rajasekharaiah, C. S. Dule, and E. Sudarshan, “Cyber Security Challenges and its Emerging Trends on Latest Technologies,” IOP Conf Ser Mater Sci Eng, vol. 981, no. 2, p. 022062, Dec. 2020, doi: 10.1088/1757-899X/981/2/022062.
[13] D. A. Perkasa and B. Setiawan, “Measuring Information Security Awareness Level of High School Students,” MALCOM: Indonesian Journal of Machine Learning and Computer Science, vol. 4, no. 4, pp. 1301–1308, Jul. 2024, doi: 10.57152/malcom.v4i4.1461.
[14] J. U. Dapitan, J. M. M. Butchayo, J. L. R. Palma, M. A. Arevalo, A. B. Alvarico, and J. F. Cuevas Jr, “Measuring the Level of Cybersecurity Awareness among Senior High School Students,” Mediterranean Journal of Basic and Applied Sciences, vol. 08, no. 02, pp. 208–217, 2024, doi: 10.46382/MJBAS.2024.8216.
[15] C. Hygeia S. Toso, A. J. A. Jumalon, J. A. R. Magadan, A. B. Alvarico, and J. F. Cuevas Jr, “Cybercrime Awareness Among Senior High School Students,” Mediterranean Journal of Basic and Applied Sciences, vol. 07, no. 02, pp. 160–176, 2023, doi: 10.46382/MJBAS.2023.7218.
[16] J. J Meadows and S. Sambasivam, “Mandatory Gamified Security Awareness Training Impacts on Texas Public Middle School Students: A Qualitative Study,” Issues in Informing Science and Information Technology, vol. 20, pp. 067–094, 2023, doi: 10.28945/5129.
[17] Y. Ceng Giap, M. Prawira Gunawan, D. Erickwitopo, J. Allexandro Kebaowolo, J. Valentino Salim, and M. Dandi Cahyadi, “Peningkatan Literasi Digital Melalui Edukasi Keamanan Siber di Kalangan Siswa Sekolah Menengah,” Jurnal Igakerta, vol. 1, no. 3, pp. 6–10, Sep. 2024, doi: 10.70234/7xv09h64.
[18] B. Alkhazi, M. Alshaikh, S. Alkhezi, and H. Labbaci, “Assessment of the Impact of Information Security Awareness Training Methods on Knowledge, Attitude, and Behavior,” IEEE Access, vol. 10, pp. 132132–132143, 2022, doi: 10.1109/ACCESS.2022.3230286.
[19] T. Wu, K. Y. Tien, W. C. Hsu, and F. H. Wen, “Assessing the effects of gamification on enhancing information security awareness knowledge,” Applied Sciences (Switzerland), vol. 11, no. 19, Oct. 2021, doi: 10.3390/app11199266.
[20] P. Caserman et al., “Quality criteria for serious games: Serious part, game part, and balance,” JMIR Serious Games, vol. 8, no. 3, Jul. 2020, doi: 10.2196/19037.
[21] R. M. Rahimabad and M. H. Rezvani, “Identifying Factors Affecting the Immersion and Concentration of Players in Serious Games,” in Proceedings of the 2nd International Serious Games Symposium, ISGS 2020, Institute of Electrical and Electronics Engineers Inc., Dec. 2020, pp. 61–67. doi: 10.1109/ISGS51981.2020.9375239.
[22] A. Gazis and E. Katsiri, “Serious Games in Digital Gaming: A Comprehensive Review of Applications, Game Engines and Advancements,” WSEAS Transactions on Computer Research, vol. 11, pp. 10–22, 2023, doi: 10.37394/232018.2023.11.2.
[23] J. Y. Arosquipa Lopez, R. N. Nuñoncca Huaycho, F. I. Yallercco Santos, F. T. Mendoza, and F. H. Rucano Paucar, “The Impact of Serious Games on Learning in Primary Education: A Systematic Literature Review,” International Journal of Learning, Teaching and Educational Research, vol. 22, no. 3, pp. 379–395, Mar. 2023, doi: 10.26803/ijlter.22.3.23.
[24] A. Celestini, “Serious Games in Higher Distance Education,” Canadian Journal of Learning and Technology, vol. 46, no. 3, p. 2020, May 2021, doi: 10.21432/cjlt27965.
[25] S. Greipl, K. Moeller, and M. Ninaus, “Potential and limits of game-based learning,” International Journal of Technology Enhanced Learning, vol. 12, no. 4, p. 363, 2020, doi: 10.1504/IJTEL.2020.110047.
[26] S. N. A. Noh, N. Azan, and H. Mohamed, “Serious Games Requirements for Higher-Order Thinking Skills in Science Education,” International Journal of Advanced Computer Science and Applications, vol. 11, no. 6, 2020, doi: 10.14569/IJACSA.2020.0110627.
[27] A. Fauzan Dianta, A. Kusuma Nurindiyani, and Z. Maisat Eka Darmawan, “Analisis Pengalaman Pengguna Game Visual Novel Asal Usul Kota Surabaya Menggunakan Metode Usability Testing,” Jurnal SAINTEKOM, vol. 13, no. 1, pp. 67–78, Mar. 2023, doi: 10.33020/saintekom.v13i1.386.
[28] M. Rivaldi and N. Aeni, “INCORPORATING VISUAL NOVEL GAMES TO IMPROVE STUDENTS’ LEARNING INTEREST IN ENGLISH,” 2024. doi: https://doi.org/10.26858/jtechlp.v4i1,%20March.71652.
[29] O. Bobarchuk, A. Tolbatov, O. Matviichuk-Yudina, and N. Boltivets, “Technical implementation of a visual novel as a tool for gamification of learning in accordance with cyber hygiene requirements,” 2025.
[30] J. Florensia and A. Suryadibrata, “7-Day Math: A Mobile Visual Novel Game for Mathematics Education,” International Journal of Interactive Mobile Technologies, vol. 17, no. 6, pp. 197–205, 2023, doi: 10.3991/ijim.v17i06.36545.
[31] R. A. Rusmana, A. Asriyanik, and I. R. Setiawan, “Penggunaan Metode Game Development Life Cycle (GDLC) Untuk Memudahkan Belajar Bahasa Inggris Dalam Media Game,” Journal of Information System Research (JOSH), vol. 4, no. 4, pp. 1402–1412, Jul. 2023, doi: 10.47065/josh.v4i4.3578.
[32] R. R. Kurniawan, P. Harliana, and K. -, “Aplikasi Pengenalan Nama Benda dalam Bahasa Jepang dengan Metode GDLC Berbasis Android,” Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA), vol. 4, no. 1, pp. 1–11, Jun. 2022, doi: 10.35447/jikstra.v4i1.457.
[33] R. M. M. Prasetyo, H. Syaputra, W. Cholil, and S. Sauda, “Rancang Dan Bangun Game Edukasi Anak-Anak Berbasis Android Dengan Unity Menggunakan Metode Game Development Life Cycle,” Jurnal Nasional Ilmu Komputer, vol. 2, no. 2, pp. 103–111, Nov. 2021, doi: 10.47747/jurnalnik.v2i2.526.
[34] R. Roedavan, B. Pudjoatmodjo, Y. Siradj, S. Salam, and B. Q. D. Hardianti, “Serious Game Development Model Based on the Game-Based Learning Foundation,” Journal of ICT Research and Applications, vol. 15, no. 3, pp. 291–305, Dec. 2021, doi: 10.5614/ITBJ.ICT.RES.APPL.2021.15.3.6.
[35] Y. Y. P. Siahaan, Y. Widyani, and M. Z. C. Candra, “Applying Scrum in A Game Development Life Cycle For Small Scale Game Project,” International Journal of Information Technology, Research and Applications, vol. 2, no. 4, pp. 24–37, Dec. 2023, doi: 10.59461/ijitra.v2i4.73.
[36] T. Wibowo and E. Hermanto, “DEVELOPMENT OF GLOBAL WARMING THEMED VIDEO GAMES: IMPLEMENTATION OF GAME DEVELOPMENT LIFE CYCLE (GDLC) FRAMEWORK.”