{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T21:54:31Z","timestamp":1743026071858,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030587024"},{"type":"electronic","value":"9783030587031"}],"license":[{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,9]],"date-time":"2020-09-09T00:00:00Z","timestamp":1599609600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-58703-1_4","type":"book-chapter","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T06:02:47Z","timestamp":1599544967000},"page":"61-77","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Gaming DevSecOps - A Serious Game Pilot Study"],"prefix":"10.1007","author":[{"given":"James S.","family":"Okolica","sequence":"first","affiliation":[]},{"given":"Alan C.","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Gilbert L.","family":"Peterson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,9]]},"reference":[{"key":"4_CR1","volume-title":"Serious Games","author":"C Abt","year":"1975","unstructured":"Abt, C.: Serious Games. Viking Compass, New York (1975)"},{"issue":"2","key":"4_CR2","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1111\/bjet.12113","volume":"46","author":"S Arnab","year":"2015","unstructured":"Arnab, S., Lim, T., Carvalho, M.B., Bellotti, F., De Freitas, S., Louchart, S., Suttie, N., Berta, R., De Gloria, A.: Mapping learning and game mechanics for serious games analysis. Br. J. Educ. Technol. 46(2), 391\u2013411 (2015)","journal-title":"Br. J. Educ. Technol."},{"issue":"1","key":"4_CR3","doi-asserted-by":"crossref","first-page":"7","DOI":"10.7557\/23.6111","volume":"4","author":"JS Breuer","year":"2010","unstructured":"Breuer, J.S., Bente, G.: Why so serious? on the relation of serious games and learning. Eludamos. J. Comput. Game Cult. 4(1), 7\u201324 (2010)","journal-title":"Eludamos. J. Comput. Game Cult."},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Denning, T., Lerner, A., Shostack, A., Kohno, T.: Control-alt-hack: the design and evaluation of a card game for computer security awareness and education. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp. 915\u2013928. ACM (2013)","DOI":"10.1145\/2508859.2516753"},{"issue":"1","key":"4_CR5","doi-asserted-by":"publisher","first-page":"1127","DOI":"10.1016\/j.compedu.2010.12.010","volume":"57","author":"A Echeverr\u00eda","year":"2011","unstructured":"Echeverr\u00eda, A., Garc\u00eda-Campo, C., Nussbaum, M., Gil, F., Villalta, M., Am\u00e9stica, M., Echeverr\u00eda, S.: A framework for the design and integration of collaborative classroom games. Comput. Educ. 57(1), 1127\u20131136 (2011)","journal-title":"Comput. Educ."},{"issue":"5","key":"4_CR6","first-page":"37","volume":"81","author":"M Farber","year":"2016","unstructured":"Farber, M.: Gamify your classroom. Educ. Digest 81(5), 37 (2016)","journal-title":"Educ. Digest"},{"issue":"3","key":"4_CR7","doi-asserted-by":"publisher","first-page":"116","DOI":"10.3233\/ICG-190111","volume":"41","author":"E Fokides","year":"2019","unstructured":"Fokides, E., Atsikpasi, P., Kaimara, P., Deliyannis, I.: Let players evaluate serious games, design and validation of the serious games evaluation scale. ICGA J. 41(3), 116\u2013137 (2019)","journal-title":"ICGA J."},{"key":"4_CR8","doi-asserted-by":"publisher","DOI":"10.3726\/978-1-4539-1162-4","volume-title":"Good Video Games + Good Learning","author":"JP Gee","year":"2007","unstructured":"Gee, J.P.: Good Video Games + Good Learning. Peter Lang, New York (2007)"},{"key":"4_CR9","unstructured":"Gondree, M., Peterson, Z.N.: Valuing security by getting [d0x3d!]: experiences with a network security board game. In: Presented as part of the 6th workshop on cyber security experimentation and test (2013)"},{"key":"4_CR10","volume-title":"24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them","author":"M Howard","year":"2010","unstructured":"Howard, M., LeBlanc, D., Viega, J.: 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them, 1st edn. McGraw-Hill Inc, New York (2010)","edition":"1"},{"key":"4_CR11","unstructured":"Hunicke, R., LeBlanc, M., Zubek, R.: MDA: a formal approach to game design and game research. In: Proceedings of the AAAI Workshop on Challenges in Game AI, vol.\u00a04, p. 1722 (2004)"},{"issue":"3","key":"4_CR12","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2005.64","volume":"3","author":"CE Irvine","year":"2005","unstructured":"Irvine, C.E., Thompson, M.F., Allen, K.: Cyberciege: gaming for information assurance. IEEE Secur. Priv. 3(3), 61\u201364 (2005)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR13","volume-title":"Games Without Frontiers: Theories and Methods for Game Studies and Design","author":"A J\u00e4rvinen","year":"2008","unstructured":"J\u00e4rvinen, A.: Games Without Frontiers: Theories and Methods for Game Studies and Design. Tampere University Press, Tampere (2008)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Jordan, C., Knapp, M., Mitchell, D., Claypool, M., Fisler, K.: Countermeasures: a game for teaching computer security. In: 2011 10th Annual Workshop on Network and Systems Support for Games, pp. 1\u20136. IEEE (2011)","DOI":"10.1109\/NetGames.2011.6080983"},{"issue":"4","key":"4_CR15","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1207\/s15430421tip4104_2","volume":"41","author":"DR Krathwohl","year":"2002","unstructured":"Krathwohl, D.R.: A revision of bloom\u2019s taxonomy: an overview. Theory into practice 41(4), 212\u2013218 (2002)","journal-title":"Theory into practice"},{"key":"4_CR16","unstructured":"Lehmann, T.: Race for the galaxy (2019). http:\/\/riograndegames.com\/games.html?id=240 . Accessed Dec 2019"},{"key":"4_CR17","unstructured":"Long, D.T., Mulch, C.M.: Interactive wargaming cyberwar: 2025. Technical report, Naval Postgraduate School Monterey United States (2017)"},{"issue":"2","key":"4_CR18","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MSECP.2004.1281254","volume":"2","author":"G McGraw","year":"2004","unstructured":"McGraw, G.: Software security. IEEE Secur. Priv. 2(2), 80\u201383 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"4_CR19","unstructured":"Michael, D.R., Chen, S.L.: Serious games: Games that educate, train, and inform. Muska & Lipman\/Premier-Trade (2005)"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Myrbakken, H., Colomo-Palacios, R.: Devsecops: a multivocal literature review. In: International Conference on Software Process Improvement and Capability Determination, pp. 17\u201329. Springer (2017)","DOI":"10.1007\/978-3-319-67383-7_2"},{"key":"4_CR21","unstructured":"Okolica, J.S., Lin, A.C., Peterson, G.L.: Devsecops (2020). https:\/\/boardgamegeek.com\/boardgame\/307111\/devsecops"},{"key":"4_CR22","doi-asserted-by":"publisher","unstructured":"Pendleton, A., Okolica, J.: Creating Serious Games with the Game Design Matrix, pp. 530\u2013539. Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-34350-7_51","DOI":"10.1007\/978-3-030-34350-7_51"},{"key":"4_CR23","unstructured":"Shostack, A.: Elevation of privilege: Drawing developers into threat modeling. In: 2014 $$\\{$$USENIX$$\\}$$ Summit on Gaming, Games, and Gamification in Security Education (3GSE 14) (2014)"},{"key":"4_CR24","unstructured":"Sicart, M.: Defining game mechanics. Game Studies 8(2), n (2008)"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Walk, W., G\u00f6rlich, D., Barrett, M.: Design, dynamics, experience (DDE): an advancement of the MDA framework for game design. In: Game Dynamics, pp. 27\u201345. Springer (2017)","DOI":"10.1007\/978-3-319-53088-8_3"}],"container-title":["Advances in Intelligent Systems and Computing","National Cyber Summit (NCS) Research Track 2020"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58703-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,17]],"date-time":"2022-11-17T08:02:11Z","timestamp":1668672131000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-58703-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,9]]},"ISBN":["9783030587024","9783030587031"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58703-1_4","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,9,9]]},"assertion":[{"value":"9 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"National Cyber Summit","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Huntsville, AL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ncs2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.nationalcybersummit.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}