{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:26:19Z","timestamp":1743009979831,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030721312"},{"type":"electronic","value":"9783030721329"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-72132-9_6","type":"book-chapter","created":{"date-parts":[[2021,3,26]],"date-time":"2021-03-26T15:02:51Z","timestamp":1616770971000},"page":"61-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Through a Mirror Darkly \u2013 On the Obscurity of Teaching Goals in Game-Based Learning in IT Security"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1081-3668","authenticated-orcid":false,"given":"Klemens","family":"K\u00f6hler","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0250-8521","authenticated-orcid":false,"given":"Ren\u00e9","family":"R\u00f6pke","sequence":"additional","affiliation":[]},{"given":"Martin R.","family":"Wolf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,27]]},"reference":[{"volume-title":"The Matrix Games Handbook - Professional Applications from Education to Analysis and Wargaming","year":"2018","key":"6_CR1","unstructured":"Curry, J., Engle, C., Perla, P. (eds.): The Matrix Games Handbook - Professional Applications from Education to Analysis and Wargaming. The History of Wargaming Project, Wroclav (2018)"},{"key":"6_CR2","unstructured":"Curry, J., Price, T.: Dark guest - training games for cyber warfare - wargaming internet based attacks. In: History of Wargaming, 2nd edn., vol. 1 (2013)"},{"key":"6_CR3","volume-title":"The Art of Intelligence - Simulations, Exercises and Games","year":"2014","unstructured":"Lahneman, W.J., Arcos, R. (eds.): The Art of Intelligence - Simulations, Exercises and Games, 1st edn. Rowman & Littlefield, New York (2014)","edition":"1"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Roepke, R., Schroeder, U.: The problem with teaching defence against the dark arts - a review of game-based learning applications and serious games for cyber security education. In: Proceedings of the 11th International Conference on Computer Supported Education, vol. 1. SciTePress (2019)","DOI":"10.5220\/0007706100580066"},{"key":"6_CR5","unstructured":"Bartels, E., Hollingshed, D.: Can your Game Multi-task? Presented at the Military Operations and Research Society 81.1 Virtual Symposium, Washington D.C., June 2013. https:\/\/paxsims.wordpress.com\/2013\/06\/14\/virtual-mors-bartels-on-can-your-game-multi-task\/. Accessed 16 May 2019"},{"key":"6_CR6","unstructured":"Butler, M.J.: The holy trinity? Connecting learning objectives, assessment, and debriefing in IR simulations. Presented at the International Studies Association Annual Conference, Atlanta, March 2016"},{"key":"6_CR7","doi-asserted-by":"crossref","first-page":"421","DOI":"10.7551\/mitpress\/10329.003.0044","volume-title":"Zones of Control - Perspectives on Wargaming","author":"P Sabin","year":"2016","unstructured":"Sabin, P.: Wargames as an academic instrument. In: Harrigan, P., Kirschenbaum, M.G. (eds.) Zones of Control - Perspectives on Wargaming, 1st edn., pp. 421\u2013438. The MIT Press, London (2016)","edition":"1"},{"key":"6_CR8","unstructured":"Bartels, E.: Games as structured comparisons: a discussion of methods. Presented at the ISA\u2019s 59th Annual Convention, San Francisco, April 2018"},{"issue":"16","key":"6_CR9","first-page":"163","volume":"800","author":"P Toth","year":"2014","unstructured":"Toth, P., Klein, P.: A role-based model for federal information technology\/cybersecurity training. NIST Spec. Publ. 800(16), 163 (2014)","journal-title":"NIST Spec. Publ."},{"key":"6_CR10","unstructured":"Shostack, A.: Elevation of privilege: drawing developers into threat modeling. Presented at the 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education, San Diego, 18 August 2014"},{"key":"6_CR11","unstructured":"K\u00f6nig, J.A., Wolf, M.R.: A new definition of competence developing games - and a framework to assess them. Presented at the ACHI 2016: The Ninth International Conference on Advances in Computer-Human Interactions (2016)"},{"key":"6_CR12","unstructured":"Olano, M., et al.: SecurityEmpire: development and evaluation of a digital game to promote cybersecurity education. Presented at the 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education, San Diego, August 2014"},{"issue":"4","key":"6_CR13","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1207\/s15430421tip4104_2","volume":"41","author":"DR Krathwohl","year":"2002","unstructured":"Krathwohl, D.R.: A revision of bloom\u2019s taxonomy - an overview. Theory Pract. 41(4), 212\u2013218 (2002)","journal-title":"Theory Pract."},{"key":"6_CR14","unstructured":"van Niekerk, J., van Solms, R.: Bloom\u2019s Taxonomy for Information Security Education. ISSA (2008)"},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1126\/science.1199644","volume":"331","author":"J-B Michel","year":"2010","unstructured":"Michel, J.-B., et al.: Quantitative analysis of culture using millions of digitized books. Science 331, 176\u2013182 (2010)","journal-title":"Science"},{"key":"6_CR16","unstructured":"Risi, S.: Google Ngrams: From Relative Frequencies to Absolute Counts (2016). https:\/\/stanford.edu\/~risi\/tutorials\/absolute_ngram_counts.html. Accessed 30 Mar 2019"},{"key":"6_CR17","unstructured":"Smith, V.L., Wilson, B.J.: Humanomics - moral sentiments and the wealth of nations for the twenty-first century. In: Cambridge Studies in Economics, Choice, and Society, vol. 13. Cambridge University Press, Cambridge (2019)"}],"container-title":["Lecture Notes in Computer Science","Simulation Gaming Through Times and Disciplines"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-72132-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T03:01:11Z","timestamp":1698116471000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-72132-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030721312","9783030721329"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-72132-9_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"27 March 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISAGA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Simulation and Gaming Association Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Warsaw","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Poland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"50","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isaga2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.isaga2019.com\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}