Text this: Identification of Unintentional Perpetrator Attack Vectors using Simulation Game: A Case Study