{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T14:23:28Z","timestamp":1771856608949,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031333378","type":"print"},{"value":"9783031333385","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-33338-5_12","type":"book-chapter","created":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T16:02:49Z","timestamp":1695312169000},"page":"265-290","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Designing a Serious Game for Cybersecurity Education"],"prefix":"10.1007","author":[{"given":"Gabriele","family":"Costa","sequence":"first","affiliation":[]},{"given":"Marina","family":"Ribaudo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,6]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Ahmad, A., Zeshan, F., Khan, M.S., Marriam, R., Ali, A., Samreen, A.: The impact of gamification on learning outcomes of computer science majors. ACM Trans. Comput. Educ. 20(2) (2020)","DOI":"10.1145\/3383456"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Beltr\u00e1n, M., Calvo, M., Gonz\u00e1lez, S.: Experiences using capture the flag competitions to introduce gamification in undergraduate computer security labs. In: 2018 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 574\u2013579. IEEE, Piscataway (2018)","DOI":"10.1109\/CSCI46756.2018.00116"},{"key":"12_CR3","unstructured":"CD Projekt Red. Cyberpunk 2077. PlayStation 4, PlayStation 5, Xbox One, Xbox Series X\/S, Microsoft Windows, Stadia (2020)"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Costa, G., Lualdi, M., Ribaudo, M., Valenza, A.: A NERD DOGMA: introducing CTF to non-expert audience. In: Proceedings of the 21st Annual Conference on Information Technology Education, SIGITE \u201920, pp. 413\u2013418. Association for Computing Machinery, New York (2020)","DOI":"10.1145\/3368308.3415405"},{"key":"12_CR5","unstructured":"Dabrowski, A., Kammerstetter, M., Thamm, E., Weippl, E., Kastner, W.: Leveraging competitive gamification for sustainable fun and profit in security education. In: 2015 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 15), Washington, DC. USENIX Association, Berkeley (2015)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Demetrio, L., Lagorio, G., Ribaudo, M., Russo, E., Valenza, A.: ZenHackAdemy: Ethical Hacking @ DIBRIS. In: Proceedings of the 11th International Conference on Computer Supported Education, CSEDU 2019, Heraklion, Crete, May 2\u20134, 2019, vol. 1, pp. 405\u2013413. SciTePress, Set\u00fabal (2019)","DOI":"10.5220\/0007747104050413"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Jin, G., Tu, M., Kim, T.-H., Heffron, J., White, J.: Game based cybersecurity training for high school students. In: Proceedings of the 49th ACM Technical Symposium on Computer Science Education, SIGCSE \u201918, pp. 68\u201373. Association for Computing Machinery, New York (2018)","DOI":"10.1145\/3159450.3159591"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Le Compte, A., Elizondo, D., Watson, T.: A renewed approach to serious games for cyber security. In: 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace, pp. 203\u2013216. NATO CCD COE Publications, Tallinn (2015)","DOI":"10.1109\/CYCON.2015.7158478"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Lehrfeld, M., Guest, P.: Building an ethical hacking site for learning and student engagement. In: SoutheastCon 2016, pp. 1\u20136. IEEE, Piscataway (2016)","DOI":"10.1109\/SECON.2016.7506746"},{"key":"12_CR10","unstructured":"Loreti, M., Spalazzi, L. (Eds.) Proceedings of the Fourth Italian Conference on Cyber Security, Ancona, February 4th to 7th, 2020, vol. 2597. CEUR Workshop Proceedings. CEUR-WS.org (2020)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"McDaniel, L., Talvi, E., Hay, B.: Capture the flag as cyber security introduction. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), pp. 5479\u20135486 (2016)","DOI":"10.1109\/HICSS.2016.677"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Mello-Stark, S., VanValkenburg, M.A., Hao, E.: Thinking Outside the Box: Using Escape Room Games to Increase Interest in Cyber Security, pp. 39\u201353. Springer International Publishing, Berlin (2020)","DOI":"10.1007\/978-3-030-50244-7_3"},{"key":"12_CR13","unstructured":"Montreal, U.: Watch dogs. Microsoft Windows, PlayStation 3, PlayStation 4, Xbox 360, Xbox One, Wii U (2014)"},{"key":"12_CR14","unstructured":"Morelock, J.R., Peterson, Z.: Authenticity, ethicality, and motivation: a formal evaluation of a 10-week computer security alternate reality game for CS undergraduates. In: 2018 USENIX Workshop on Advances in Security Education (ASE 18), Baltimore. USENIX Association, Berkeley (2018)"},{"key":"12_CR15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-031-17926-6_3","volume-title":"Trust, Privacy and Security in Digital Business","author":"T Papaioannou","year":"2022","unstructured":"Papaioannou, T., Tsohou, A., Bounias, G., Karagiannis, S.: A constructive approach for raising information privacy competences: the case of escape room games. In: Katsikas, S., Furnell, S. (Eds.) Trust, Privacy and Security in Digital Business, pp. 33\u201349. Springer International Publishing, Berlin (2022)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Pappas, G., Peratikou, P., Siegel, J., Politopoulos, K., Christodoulides, C., Stavrou, S.: Cyber escape room: an educational 3d escape room game within a cyber range training realm. In: INTED2020 Proceedings, 14th International Technology, Education and Development Conference, pp. 2621\u20132627. IATED, 2\u20134 March (2020)","DOI":"10.21125\/inted.2020.0788"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"\u0160v\u00e1bensk\u00fd, V., Vykopal, J., \u010celeda, P.: What are cybersecurity education papers about? A systematic literature review of SIGCSE and ITiCSE conferences. In: Proceedings of the 51st ACM Technical Symposium on Computer Science Education, SIGCSE \u201920, pp. 2\u20138. Association for Computing Machinery, New York (2020)","DOI":"10.1145\/3328778.3366816"},{"issue":"1","key":"12_CR18","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/2568195.2568213","volume":"5","author":"DH Tobey","year":"2014","unstructured":"Tobey, D.H., Pusey, P., Burley, D.L.: Engaging learners in cybersecurity careers: lessons from the launch of the National Cyber League. ACM Inroads 5(1), 53\u201356 (2014)","journal-title":"ACM Inroads"},{"key":"12_CR19","unstructured":"Trobbiani, M.: Hacknet. Microsoft Windows, macOS, Linux, PlayStation 4, Xbox One, Nintendo Switch, iOS, Android (2015)"},{"issue":"1","key":"12_CR20","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MSP.2011.21","volume":"9","author":"G Vigna","year":"2011","unstructured":"Vigna, G.: The 2010 international capture the flag competition. IEEE Sec. Privacy 9(1), 12\u201314 (2011)","journal-title":"IEEE Sec. Privacy"}],"container-title":["Software Engineering for Games in Serious Contexts"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-33338-5_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T16:07:44Z","timestamp":1695312464000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-33338-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031333378","9783031333385"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-33338-5_12","relation":{},"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"6 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}