Interview Study:
Security Challenges in Video Game Development
Why do security vulnerabilities sneak into video games in the first place?
... and what can we do?

βŒ› Current status #

βœ”οΈ We reached saturation of participants

βœ”οΈ We finished all interviews

βœ”οΈ We finished our interview analysis

⏭️ What comes next? #

Thank you all for joining our research project! Your participation has been crucial, and we’re grateful for your help. We’ve gathered enough participants, finished all interviews, as well as finished analyzing them.

We are excited about the insights we have gained and believe they will be of great benefit to the industry and game developers worldwide. We plan to submit our study to a scientific conference later this year. This will give you an idea of what will happen: We submit our work, it gets reviewed, and sometimes we have to make changes. We have no control over the selection process and ultimately have to deal with the feedback from the conferences. Only when the conference approves our submission is the scientific paper officially published.

As promised, we’ll share a preview of the scientific paper with you via email as soon as the first final version of our paper is ready. Thanks again for your support and involvement!

πŸŽ“ Research Topic

Our research is focused on examining how the video game industry addresses the multifaceted aspects of computer security and privacy within video games. Simply put, we are interested in the day-to-day challenges and experiences of developers in implementing components that might touch security and their secure coding practices.

The goal of our study is to generate insights that can benefit the entire industry. Based on the findings from our interviews, we plan to develop concrete tools, guidelines, and recommendations that can be shared with the industry at large, with the aim of facilitating and enhancing the adoption of robust security practices in the game development process. We greatly appreciate your assistance in contributing to our research efforts. Thank you for your valuable input.

🀫 Confidentiality

We would like to assure you that we take utmost care to anonymize any confidential information that could be linked to you, your projects, or your company. However, due to the nature of our research, we may need to ask specific questions touching on confidential topics to gather relevant data. Nonetheless, each participant has the discretion to choose what information to disclose or which questions to skip. We do not use trick questions or intentionally confuse participants.

Our final publication documents generally are publicly available, and once the write-up is completed, we will publish our work online. Prior to publication, pre-prints will be shared with all participants, allowing you to review, comment, and request changes to any sections of the study that you feel may disclose confidential information.

We value your participation in our study and are committed to maintaining the confidentiality and privacy of your data!

πŸ‘©β€πŸ”¬ Who we are #

We are a research team from the state-funded CISPA Helmholtz Center for Information Security in Germany. Our group studies the intersection of computer security and privacy with human factors. We are particularly interested in investigating end users, administrators, developers, and designers of computer systems and their interdependencies with computer security and privacy mechanisms.

You can find our publications here.

Researchers

Philip Klostermeyer | Researcher & PhD Candidate (CISPA).
Contact: philip.klostermeyer@cispa.de

Sabrina Amft | Researcher & PhD Candidate (CISPA)
Alexander Krause | Researcher & PhD Candidate (CISPA)
Niklas Busch | Researcher & PhD Candidate (CISPA)
Prof. Dr. Sascha Fahl | Principal Investigator, Tenured Faculty (CISPA) & Full Professor (Leibniz University Hannover)

Institutions

CISPA logo

CISPA Helmholtz Center for Information Security

πŸ› οΈ Software Development #

πŸ”’ On Security #

πŸ“° Selected incidents timeline #