{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T04:23:59Z","timestamp":1773548639879,"version":"3.50.1"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031056369","type":"print"},{"value":"9783031056376","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-05637-6_33","type":"book-chapter","created":{"date-parts":[[2022,6,15]],"date-time":"2022-06-15T23:07:02Z","timestamp":1655334422000},"page":"508-529","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["AWATO: A Serious Game to\u00a0Improve Cybersecurity Awareness"],"prefix":"10.1007","author":[{"given":"Lauren S.","family":"Ferro","sequence":"first","affiliation":[]},{"given":"Andrea","family":"Marrella","sequence":"additional","affiliation":[]},{"given":"Tiziana","family":"Catarci","sequence":"additional","affiliation":[]},{"given":"Francesco","family":"Sapio","sequence":"additional","affiliation":[]},{"given":"Adriano","family":"Parenti","sequence":"additional","affiliation":[]},{"given":"Matteo","family":"De Santis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,16]]},"reference":[{"key":"33_CR1","unstructured":"2020 data breach investigations report: official\u2014verison enterprise solutions. https:\/\/enterprise.verizon.com\/resources\/reports\/dbir\/. Accessed 20 Oct 2020"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Alberts, C.J., Behrens, S.G., Pethia, R.D., Wilson, W.R.: Operationally critical threat, asset, and vulnerability evaluation (OCTAVE) framework, version 1.0. Technical report, Carnegie-Mellon University Pittsburgh PA Software Engineering Institute (1999)","DOI":"10.21236\/ADA367718"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Baslyman, M., Chiasson, S.: \u201cSmells phishy?\u201d: an educational game about online phishing scams. In: 2016 APWG Symposium on Electronic Crime Research (eCrime), pp. 1\u201311. IEEE (2016)","DOI":"10.1109\/ECRIME.2016.7487946"},{"key":"33_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-319-11851-2_14","volume-title":"Security and Trust Management","author":"G Canova","year":"2014","unstructured":"Canova, G., Volkamer, M., Bergmann, C., Borza, R.: NoPhish: an anti-phishing education app. In: Mauw, S., Jensen, C.D. (eds.) STM 2014. LNCS, vol. 8743, pp. 188\u2013192. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11851-2_14"},{"key":"33_CR5","unstructured":"Chen, X., Liu, Y., Yi, J.: A security evaluation framework based on stride model for software in networks. Int. J. Adv. Comput. Technol. 4(13), 269\u2013278 (2012). July"},{"key":"33_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2018.03.050","volume":"106","author":"KL Chiew","year":"2018","unstructured":"Chiew, K.L., Yong, K.S.C., Tan, C.L.: A survey of phishing attacks: their types, vectors and technical approaches. Expert Syst. Appl. 106, 1\u201320 (2018)","journal-title":"Expert Syst. Appl."},{"key":"33_CR7","unstructured":"Gokul, G.J., Pandit, S., Vaddepalli, S., Tupsamudre, H., Banahatti, V., Lodha, S.: Phishy-a serious game to train enterprise users on phishing awareness. In: Proceedings of the 2018 Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts, pp. 169\u2013181 (2018)"},{"issue":"8","key":"33_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3469886","volume":"54","author":"G Desolda","year":"2021","unstructured":"Desolda, G., Ferro, L.S., Marrella, A., Catarci, T., Costabile, M.F.: Human factors in phishing attacks: a systematic literature review. ACM Comput. Surv. (CSUR) 54(8), 1\u201335 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"33_CR9","unstructured":"Dupont, G.: The dirty dozen errors in maintenance. In: The 11th Symposium on Human Factors in Maintenance and Inspection: Human Error in Aviation Maintenance (1997)"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Egelman, S., Peer, E.: The myth of the average user: improving privacy and security systems through individualization. In: Proceedings of the 2015 New Security Paradigms Workshop, pp. 16\u201328 (2015)","DOI":"10.1145\/2841113.2841115"},{"key":"33_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-030-77392-2_10","volume-title":"HCI for Cybersecurity, Privacy and Trust","author":"LS Ferro","year":"2021","unstructured":"Ferro, L.S., Marrella, A., Catarci, T.: A human factor approach to threat modeling. In: Moallem, A. (ed.) HCII 2021. LNCS, vol. 12788, pp. 139\u2013157. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77392-2_10"},{"key":"33_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-030-50309-3_9","volume-title":"HCI for Cybersecurity, Privacy and Trust","author":"LS Ferro","year":"2020","unstructured":"Ferro, L.S., Sapio, F.: Another week at the office (AWATO) \u2013 an interactive serious game for threat modeling human factors. In: Moallem, A. (ed.) HCII 2020. LNCS, vol. 12210, pp. 123\u2013142. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-50309-3_9"},{"issue":"3","key":"33_CR13","doi-asserted-by":"publisher","first-page":"502","DOI":"10.1109\/TLT.2020.3008607","volume":"13","author":"K Graham","year":"2020","unstructured":"Graham, K., et al.: Cyberspace odyssey: a competitive team-oriented serious game in computer networking. IEEE Trans. Learn. Technol. 13(3), 502\u2013515 (2020)","journal-title":"IEEE Trans. Learn. Technol."},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Hale, M.L., Gamble, R.F., Gamble, P.: CyberPhishing: a game-based platform for phishing awareness testing. In: 2015 48th Hawaii International Conference on System Sciences, pp. 5260\u20135269. IEEE (2015)","DOI":"10.1109\/HICSS.2015.670"},{"issue":"4","key":"33_CR15","first-page":"1607","volume":"26","author":"S Hussain","year":"2014","unstructured":"Hussain, S., Kamal, A., Ahmad, S., Rasool, G., Iqbal, S.: Threat modelling methodologies: a survey. Sci. Int. (Lahore) 26(4), 1607\u20131609 (2014)","journal-title":"Sci. Int. (Lahore)"},{"issue":"3","key":"33_CR16","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2005.64","volume":"3","author":"CE Irvine","year":"2005","unstructured":"Irvine, C.E., Thompson, M.F., Allen, K.: CyberCIEGE: gaming for information assurance. IEEE Secur. Priv. 3(3), 61\u201364 (2005)","journal-title":"IEEE Secur. Priv."},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Jordan, C., Knapp, M., Mitchell, D., Claypool, M., Fisler, K.: Countermeasures: a game for teaching computer security. In: 2011 10th Annual Workshop on Network and Systems Support for Games, pp. 1\u20136. IEEE (2011)","DOI":"10.1109\/NetGames.2011.6080983"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Khan, R., McLaughlin, K., Laverty, D., Sezer, S.: Stride-based threat modeling for cyber-physical systems. In: 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe), pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ISGTEurope.2017.8260283"},{"key":"33_CR19","doi-asserted-by":"publisher","unstructured":"Kumaraguru, P., et al.: School of phish: a real-world evaluation of anti-phishing training. In: 5th Symposium on Usable Privacy and Security (SOUPS 2009). ACM (2009). https:\/\/doi.org\/10.1145\/1572532.1572536","DOI":"10.1145\/1572532.1572536"},{"issue":"1","key":"33_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40163-014-0009-y","volume":"3","author":"EEH Lastdrager","year":"2014","unstructured":"Lastdrager, E.E.H.: Achieving a consensual definition of phishing based on a systematic review of the literature. Crime Sci. 3(1), 1\u201310 (2014). https:\/\/doi.org\/10.1186\/s40163-014-0009-y","journal-title":"Crime Sci."},{"key":"33_CR21","unstructured":"LeBlanc, D., Howard, M.: Writing Secure Code. Pearson Education (2002)"},{"issue":"2","key":"33_CR22","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1002\/spe.2111","volume":"43","author":"A Marback","year":"2013","unstructured":"Marback, A., Do, H., He, K., Kondamarri, S., Xu, D.: A threat model-based approach to security testing. Softw. Pract. Exp. 43(2), 241\u2013258 (2013)","journal-title":"Softw. Pract. Exp."},{"key":"33_CR23","unstructured":"Misra, G., Arachchilage, N.A.G., Berkovsky, S.: Phish phinder: a game design approach to enhance user confidence in mitigating phishing attacks. arXiv preprint arXiv:1710.06064 (2017)"},{"key":"33_CR24","doi-asserted-by":"crossref","unstructured":"Nmachi, W.P., Win, T., et al.: Mitigating phishing attack in organisations: a literature review. In: CS & IT Conference Proceedings, vol. 11. CS & IT Conference Proceedings (2021)","DOI":"10.5121\/csit.2021.110105"},{"key":"33_CR25","unstructured":"Ruffy, F., Hommel, W., von Eye, F.: A STRIDE-based security architecture for software-defined networking. In: ICN 2016, p. 107 (2016)"},{"key":"33_CR26","unstructured":"Saitta, P., Larcom, B., Eddington, M.: Trike v1 methodology document. Draft (2005, work in progress)"},{"key":"33_CR27","doi-asserted-by":"publisher","unstructured":"Salkind, N.J.: Encyclopedia of Research Design, vol. 1. SAGE, Newbury Park (2010). https:\/\/doi.org\/10.4135\/9781412961288","DOI":"10.4135\/9781412961288"},{"key":"33_CR28","doi-asserted-by":"publisher","unstructured":"Sheng, S., et al.: Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In: 3rd Symposium on Usable privacy and security - SOUPS 2007, pp. 88\u201399. ACM (2007). https:\/\/doi.org\/10.1145\/1280680.1280692","DOI":"10.1145\/1280680.1280692"},{"key":"33_CR29","volume-title":"Threat Modeling: Designing for Security","author":"A Shostack","year":"2014","unstructured":"Shostack, A.: Threat Modeling: Designing for Security. Wiley, Hoboken (2014)"},{"key":"33_CR30","unstructured":"Sosonkin, M.: Octave: operationally critical threat, asset and vulnerability evaluation. Polytechnic University, April 2005"},{"key":"33_CR31","doi-asserted-by":"crossref","unstructured":"Tioh, J.N., Mina, M., Jacobson, D.W.: Cyber security training a survey of serious games in cyber security. In: 2017 IEEE Frontiers in Education Conference (FIE), pp. 1\u20135. IEEE (2017)","DOI":"10.1109\/FIE.2017.8190712"},{"issue":"4","key":"33_CR32","first-page":"1","volume":"2","author":"DP Twitchell","year":"2007","unstructured":"Twitchell, D.P.: SecurityCom: a multi-player game for researching and teaching information security teams. J. Digit. Forensics Secur. Law 2(4), 1 (2007)","journal-title":"J. Digit. Forensics Secur. Law"},{"key":"33_CR33","doi-asserted-by":"crossref","unstructured":"Twitchell, D.P., Wiers, K., Adkins, M., Burgoon, J.K., Nunamaker, J.F.: StrikeCom: a multi-player online strategy game for researching and teaching group dynamics. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences, pp. 45b\u201345b. IEEE (2005)","DOI":"10.1109\/HICSS.2005.566"},{"key":"33_CR34","doi-asserted-by":"crossref","unstructured":"UcedaVelez, T., Morana, M.M.: Risk Centric Threat Modeling. Wiley Online Library (2015)","DOI":"10.1002\/9781118988374"},{"key":"33_CR35","doi-asserted-by":"crossref","unstructured":"Veneruso, S., Ferro, L.S., Marrella, A., Mecella, M., Catarci, T.: A game-based learning experience for improving cybersecurity awareness. In: ITASEC, pp. 235\u2013242 (2020)","DOI":"10.1145\/3399715.3399860"},{"key":"33_CR36","doi-asserted-by":"crossref","unstructured":"Veneruso, S.V., Ferro, L.S., Marrella, A., Mecella, M., Catarci, T.: CyberVR: an interactive learning experience in virtual reality for cybersecurity related issues. In: Proceedings of the International Conference on Advanced Visual Interfaces, pp. 1\u20138 (2020)","DOI":"10.1145\/3399715.3399860"},{"issue":"2","key":"33_CR37","first-page":"2","volume":"2018","author":"P Weanquoi","year":"2018","unstructured":"Weanquoi, P., Johnson, J., Zhang, J.: Using a game to improve phishing awareness. J. Cybersecur. Educ. Res. Pract. 2018(2), 2 (2018)","journal-title":"J. Cybersecur. Educ. Res. Pract."}],"container-title":["Lecture Notes in Computer Science","HCI in Games"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-05637-6_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T00:39:09Z","timestamp":1727397549000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-05637-6_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031056369","9783031056376"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-05637-6_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"16 June 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2022.hci.international\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}