{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:34:17Z","timestamp":1757543657369,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030846138"},{"type":"electronic","value":"9783030846145"}],"license":[{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,8,9]],"date-time":"2021-08-09T00:00:00Z","timestamp":1628467200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-84614-5_6","type":"book-chapter","created":{"date-parts":[[2021,8,8]],"date-time":"2021-08-08T20:02:23Z","timestamp":1628452943000},"page":"60-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Design of a Virtual Cybersecurity Escape Room"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1015-5861","authenticated-orcid":false,"given":"Tania","family":"Williams","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8657-8732","authenticated-orcid":false,"given":"Omar","family":"El-Gayar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,9]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139173469","volume-title":"Learning How to Learn","author":"JD Novak","year":"1984","unstructured":"Novak, J.D., Gowin, D.B., Bob, G.D.: Learning How to Learn. Cambridge University Press, Cambridge (1984)"},{"issue":"2","key":"6_CR2","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1049\/iet-sen.2019.0028","volume":"14","author":"H Mar\u00edn-Vega","year":"2020","unstructured":"Mar\u00edn-Vega, H., Alor-Hern\u00e1ndez, G., Colombo-Mendoza, L.O., S\u00e1nchez-Ram\u00edrez, C., Garc\u00eda-Alcaraz, J.L., Avelar-Sosa, L.: Zeus a tool for generating rule-based serious games with gamification techniques. IET Softw. 14(2), 88\u201397 (2020). https:\/\/doi.org\/10.1049\/iet-sen.2019.0028","journal-title":"IET Softw."},{"key":"6_CR3","doi-asserted-by":"publisher","unstructured":"L\u00f3pez-Belmonte, J., Segura-Robles, A., Fuentes-Cabrera, A., Parra-Gonz\u00e1lez, M.E.: Evaluating activation and absence of negative effect: gamification and escape rooms for learning. Int. J. Environ. Res. Public Health 17(7), Article no. 7 (2020). https:\/\/doi.org\/10.3390\/ijerph17072224.","DOI":"10.3390\/ijerph17072224"},{"key":"6_CR4","doi-asserted-by":"publisher","unstructured":"Cornel, C.J., Rowe, D.C., Cornel, C.M.: Starships and cybersecurity: teaching security concepts through immersive gaming experiences. In: Proceedings of the 18th Annual Conference on Information Technology Education, New York, NY, USA, September 2017, pp. 27\u201332 (2017). https:\/\/doi.org\/10.1145\/3125659.3125696","DOI":"10.1145\/3125659.3125696"},{"key":"6_CR5","doi-asserted-by":"publisher","unstructured":"Hale, M.L., Gamble, R.F., Gamble, P.: CyberPhishing: a game-based platform for phishing awareness testing. In: 2015 48th Hawaii International Conference on System Sciences, January 2015, pp. 5260\u20135269 (2015). https:\/\/doi.org\/10.1109\/HICSS.2015.670","DOI":"10.1109\/HICSS.2015.670"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"145777","DOI":"10.1109\/ACCESS.2019.2945289","volume":"7","author":"R Ross","year":"2019","unstructured":"Ross, R.: Design of an open-source decoder for educational escape rooms. IEEE Access 7, 145777\u2013145783 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2945289","journal-title":"IEEE Access"},{"key":"6_CR7","doi-asserted-by":"publisher","unstructured":"Jin, G., Tu, M., Kim, T.-H., Heffron, J., White, J.: Game based cybersecurity training for high school students. In: Proceedings of the 49th ACM Technical Symposium on Computer Science Education, New York, NY, USA, February 2018, pp. 68\u201373 (2018). https:\/\/doi.org\/10.1145\/3159450.3159591","DOI":"10.1145\/3159450.3159591"},{"key":"6_CR8","unstructured":"Streiff, J., Justice, C., Camp, J.: Escaping to Cybersecurity Education: Using Manipulative Challenges to Engage and Educate - ProQuest, October 2019. http:\/\/dx.doi.org.elib.uah.edu\/10.34190\/GBL.19.183"},{"key":"6_CR9","unstructured":"Nicholson, S.: The State of Escape: Escape Room Design and Facilities, p. 20"},{"key":"6_CR10","doi-asserted-by":"publisher","unstructured":"Shakeri, H., Singhal, S., Pan, R., Neustaedter, C., Tang, A.: Escaping together: the design and evaluation of a distributed real-life escape room. In: Proceedings of the Annual Symposium on Computer-Human Interaction in Play, New York, NY, USA, October 2017, pp. 115\u2013128 (2017). https:\/\/doi.org\/10.1145\/3116595.3116601","DOI":"10.1145\/3116595.3116601"},{"key":"6_CR11","unstructured":"Cybersecurity Supply and Demand Heat Map. https:\/\/www.cyberseek.org\/heatmap.html. Accessed 27 Oct 2019"},{"issue":"2","key":"6_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSP.2011.181","volume":"10","author":"L Hoffman","year":"2012","unstructured":"Hoffman, L., Burley, D., Toregas, C.: Holistically building the cybersecurity workforce. IEEE Secur. Priv. 10(2), 33\u201339 (2012). https:\/\/doi.org\/10.1109\/MSP.2011.181","journal-title":"IEEE Secur. Priv."},{"key":"6_CR13","doi-asserted-by":"publisher","unstructured":"Eukel, H., Morrell, B.: Ensuring educational escape-room success: the process of designing, piloting, evaluating, redesigning, and re-evaluating educational escape rooms. Simul. Gaming, p. 1046878120953453, August 2020. https:\/\/doi.org\/10.1177\/1046878120953453","DOI":"10.1177\/1046878120953453"},{"key":"6_CR14","doi-asserted-by":"publisher","unstructured":"Pradeep Raj, K.B., Sinha, S., Arvind, R.S., Solanki, D., Lahiri, U.: Design of virtual reality based intelligent storytelling platform with human computer interaction. In: 2018 IEEE\/ACIS 17th International Conference on Computer and Information Science (ICIS), June 2018, pp. 142\u2013147 (2018). https:\/\/doi.org\/10.1109\/ICIS.2018.8466457","DOI":"10.1109\/ICIS.2018.8466457"},{"key":"6_CR15","doi-asserted-by":"publisher","unstructured":"Cotner, S., Smith, K.M., Simpson, L., Burgess, D.S., Cain, J.: 1311. Incorporating an \u2018Escape Room\u2019 game design in infectious diseases instruction. Open Forum Infect. Dis. 5(suppl_1), S401\u2013S401 (2018). https:\/\/doi.org\/10.1093\/ofid\/ofy210.1144","DOI":"10.1093\/ofid\/ofy210.1144"},{"key":"6_CR16","doi-asserted-by":"publisher","unstructured":"Deeb, F.A., Hickey, T.J.: Teaching introductory cryptography using a 3D escape-the-room game. In: 2019 IEEE Frontiers in Education Conference (FIE), October 2019, pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/FIE43999.2019.9028549","DOI":"10.1109\/FIE43999.2019.9028549"},{"key":"6_CR17","doi-asserted-by":"publisher","unstructured":"L\u00f6ffler, E., Schneider, B., Zanwar, T., Asprion, P.M.: CySecEscape 2.0\u2014a virtual escape room to raise cybersecurity awareness. IJSG 8(1), Article no. 1 (2021). https:\/\/doi.org\/10.17083\/ijsg.v8i1.413","DOI":"10.17083\/ijsg.v8i1.413"},{"key":"6_CR18","doi-asserted-by":"publisher","unstructured":"Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. J. Manag. Inf. Syst. 24(3), 45\u201377, Winter2007\/2008 (2007). https:\/\/doi.org\/10.2753\/MIS0742-1222240302","DOI":"10.2753\/MIS0742-1222240302"},{"key":"6_CR19","unstructured":"Hevner, A.R., March, S.T., Park, J., Ram, S.: Design Science in Information Systems Research, p. 32"},{"key":"6_CR20","doi-asserted-by":"publisher","unstructured":"Hay, L., Cash, P., McKilligan, S.: The future of design cognition analysis. Des. Sci. 6 (2020). https:\/\/doi.org\/10.1017\/dsj.2020.20","DOI":"10.1017\/dsj.2020.20"},{"issue":"3","key":"6_CR21","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/S0164-1212(98)10055-9","volume":"44","author":"M-AD Storey","year":"1999","unstructured":"Storey, M.-A.D., Fracchia, F.D., M\u00fcller, H.A.: Cognitive design elements to support the construction of a mental model during software exploration. J. Syst. Softw. 44(3), 171\u2013185 (1999). https:\/\/doi.org\/10.1016\/S0164-1212(98)10055-9","journal-title":"J. Syst. Softw."},{"key":"6_CR22","doi-asserted-by":"publisher","unstructured":"Harteveld, C., Stahl, A., Smith, G., Talgar, C., Sutherland, S.C.: Standing on the shoulders of citizens: exploring gameful collaboration for creating social experiments. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), January 2016, pp. 74\u201383 (2016). https:\/\/doi.org\/10.1109\/HICSS.2016.18","DOI":"10.1109\/HICSS.2016.18"},{"key":"6_CR23","unstructured":"Johnson-Laird, P., Byrne, R.: Mental models: a gentle introduction. Mentalmodelsblog, 02 August 2012. https:\/\/mentalmodelsblog.wordpress.com\/mental-models-a-gentle-introduction\/. Accessed 22 Nov 2020"},{"issue":"4","key":"6_CR24","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0167-9236(94)00041-2","volume":"15","author":"ST March","year":"1995","unstructured":"March, S.T., Smith, G.F.: Design and natural science research on information technology. Decis. Support Syst. 15(4), 251\u2013266 (1995). https:\/\/doi.org\/10.1016\/0167-9236(94)00041-2","journal-title":"Decis. Support Syst."},{"key":"6_CR25","unstructured":"Welcome to Hubs Hubs by Mozilla. https:\/\/hubs.mozilla.com\/docs\/index.html. Accessed 23 Oct 2020"},{"issue":"3","key":"6_CR26","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/j.dss.2012.02.013","volume":"53","author":"AM Douma","year":"2012","unstructured":"Douma, A.M., van Hillegersberg, J., Schuur, P.C.: Design and evaluation of a simulation game to introduce a Multi-Agent system for barge handling in a seaport. Decis. Support Syst. 53(3), 465\u2013472 (2012). https:\/\/doi.org\/10.1016\/j.dss.2012.02.013","journal-title":"Decis. Support Syst."},{"issue":"3","key":"6_CR27","first-page":"90","volume":"21","author":"E Rusman","year":"2018","unstructured":"Rusman, E., Ternier, S., Specht, M.: Early second language learning and adult involvement in a real-world context: design and evaluation of the \u2018elena goes shopping\u2019 mobile game. J. Educ. Technol. Soc. 21(3), 90\u2013103 (2018)","journal-title":"J. Educ. Technol. Soc."},{"issue":"4","key":"6_CR28","doi-asserted-by":"publisher","first-page":"541","DOI":"10.4300\/JGME-5-4-18","volume":"5","author":"GM Sullivan","year":"2013","unstructured":"Sullivan, G.M., Artino, A.R.: Analyzing and interpreting data from likert-type scales. J. Grad. Med. Educ. 5(4), 541\u2013542 (2013). https:\/\/doi.org\/10.4300\/JGME-5-4-18","journal-title":"J. Grad. Med. Educ."},{"key":"6_CR29","doi-asserted-by":"publisher","first-page":"e407395","DOI":"10.1155\/2013\/407395","volume":"2013","author":"C-H Su","year":"2013","unstructured":"Su, C.-H., Chen, K.T.-K., Fan, K.-K.: Rough set theory based fuzzy TOPSIS on serious game design evaluation framework. Math. Probl. Eng. 2013, e407395 (2013). https:\/\/doi.org\/10.1155\/2013\/407395","journal-title":"Math. Probl. Eng."},{"issue":"3","key":"6_CR30","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1007\/s10639-011-9179-3","volume":"18","author":"RM Couceiro","year":"2013","unstructured":"Couceiro, R.M., Papastergiou, M., Kordaki, M., Veloso, A.I.: Design and evaluation of a computer game for the learning of Information and Communication Technologies (ICT) concepts by physical education and sport science students. Educ. Inf. Technol. 18(3), 531\u2013554 (2013). https:\/\/doi.org\/10.1007\/s10639-011-9179-3","journal-title":"Educ. Inf. Technol."}],"container-title":["Lecture Notes in Networks and Systems","National Cyber Summit (NCS) Research Track 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-84614-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,8]],"date-time":"2021-08-08T20:02:37Z","timestamp":1628452957000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-84614-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,9]]},"ISBN":["9783030846138","9783030846145"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-84614-5_6","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,8,9]]},"assertion":[{"value":"9 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"National Cyber Summit","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Huntsville, AL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ncs2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.nationalcybersummit.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}