A proposed AI-enhanced serious game for cybersecurity ethics training

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

Abstract

In the current information age, cybersecurity is essential for handling and protecting data in an ethical manner. Implementing appropriate cybersecurity policies and practices that will encourage people to exercise good ethical behaviour is therefore essential. Video games are a promising medium for allowing individuals to explore their behaviours in an ethically safe way. Our project will draw together a novel combination of theories and technologies from cybersecurity, moral psychology, artificially intelligent agent societies, knowledge-based systems, and serious game design to create and validate its ethical simulation. By using AI to implement societies of intelligent ethical agents in a serious video game, we will create a simulation environment with scope for deep and complex ethical engagement. Following the principles of moral psychology, this simulation will be used to design a sophisticated ethical training tool in a cybersecurity context.
Original languageEnglish
Title of host publicationProceedings of the 9th Conference of the Australian Institute of Computer Ethics (AiCE 2020)
Subtitle of host publicationComputer Ethics in the New Normal
PublisherAustralasian Institute of Computer Ethics (AiCE)
Pages1-9
Number of pages9
ISBN (Electronic)9780646831077
Publication statusPublished - 2020
EventConference of the Australasian Institute of Computer Ethics (9th : 2020) - Virtual, Australia
Duration: 28 Nov 202010 Dec 2020

Conference

ConferenceConference of the Australasian Institute of Computer Ethics (9th : 2020)
Abbreviated titleAiCE 2020
CountryAustralia
Period28/11/2010/12/20

Keywords

  • Intelligent ethical agents
  • Cyberethics training game
  • AORTA
  • Ripple Down Rules
  • Cybersecurity ethics
  • Serious games
  • AI ethics

Fingerprint

Dive into the research topics of 'A proposed AI-enhanced serious game for cybersecurity ethics training'. Together they form a unique fingerprint.

Cite this