{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:42:00Z","timestamp":1762522920698,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031629174"},{"type":"electronic","value":"9783031629181"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-62918-1_9","type":"book-chapter","created":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T23:02:58Z","timestamp":1718060578000},"page":"129-145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Digital Detectives: A Serious Point-and-Click Game for\u00a0Digital Forensics"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5065-713X","authenticated-orcid":false,"given":"Sabrina","family":"Friedl","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7458-9928","authenticated-orcid":false,"given":"Tobias","family":"Reittinger","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1338-9003","authenticated-orcid":false,"given":"G\u00fcnther","family":"Pernul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,11]]},"reference":[{"key":"9_CR1","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.future.2022.05.026","volume":"136","author":"S Ahmad","year":"2022","unstructured":"Ahmad, S., Umirzakova, S., Jamil, F., Whangbo, T.K.: Internet-of-things-enabled serious games: a comprehensive survey. Future Gener. Comput. Syst. 136, 67\u201383 (2022)","journal-title":"Future Gener. Comput. Syst."},{"key":"9_CR2","unstructured":"AvatarMaker: Avatar maker (2024). https:\/\/avatarmaker.com\/male\/. Accessed 07 Mar 2024"},{"key":"9_CR3","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-319-99734-6_2","volume-title":"Information Security Education \u2013 Towards a Cybersecure Society","author":"FF Blauw","year":"2018","unstructured":"Blauw, F.F., Leung, W.S.: ForenCity: a playground for\u00a0self-motivated learning in computer forensics. In: Drevin, L., Theocharidou, M. (eds.) WISE 2018. IAICT, vol. 531, pp. 15\u201327. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99734-6_2"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Bla\u017ei\u010d, A.J., Cigoj, P., Bla\u017ei\u010d, B.J.: Serious game design for digital forensics training. In: 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC), pp. 211\u2013215. IEEE (2016)","DOI":"10.1109\/DIPDMWC.2016.7529391"},{"key":"9_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09506-6","volume-title":"Instructional Design: The ADDIE Approach","author":"RM Branch","year":"2009","unstructured":"Branch, R.M.: Instructional Design: The ADDIE Approach, vol. 722. Springer, New York (2009). https:\/\/doi.org\/10.1007\/978-0-387-09506-6"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Casey, E.: What does \u201cforensically sound\u201d really mean? vol.\u00a04, pp. 49\u201350. Elsevier (2007)","DOI":"10.1016\/j.diin.2007.05.001"},{"key":"9_CR7","unstructured":"Csikszentmihalyi, M.: Flow: The Psychology of Optimal Experience, vol.\u00a01990. Harper & Row New York (1990)"},{"key":"9_CR8","doi-asserted-by":"publisher","DOI":"10.4324\/9780367803032","volume-title":"Introduction to Forensic Sciences","author":"WG Eckert","year":"1996","unstructured":"Eckert, W.G.: Introduction to Forensic Sciences. CRC Press, Boca Raton (1996)"},{"key":"9_CR9","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-030-59291-2_9","volume-title":"Information Security Education. Information Security in Action","author":"L Englbrecht","year":"2020","unstructured":"Englbrecht, L., Pernul, G.: A serious game-based peer-instruction digital forensics workshop. In: Drevin, L., Von Solms, S., Theocharidou, M. (eds.) WISE 2020. IAICT, vol. 579, pp. 127\u2013141. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59291-2_9"},{"key":"9_CR10","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-031-08172-9_6","volume-title":"IFIP World Conference on Information Security Education","author":"S Friedl","year":"2022","unstructured":"Friedl, S., Glas, M., Englbrecht, L., B\u00f6hm, F., Pernul, G.: Forcyrange: an educational IoT cyber range for live digital forensics. In: Drevin, L., Miloslavskaya, N., Leung, W.S., von Solms, S. (eds.) WISE 2022. IFIP Advances in Information and Communication Technology, vol. 650, pp. 77\u201391. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-08172-9_6"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Glas, M., Vielberth, M., Reittinger, T., B\u00f6hm, F., Pernul, G.: Improving cybersecurity skill development through visual programming. Emerald Publishing Limited (2023)","DOI":"10.1108\/ICS-11-2022-0170"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Hassenfeldt, C., Jacques, J., Baggili, I.: Exploring the learning efficacy of digital forensics concepts and bagging & tagging of digital devices in immersive virtual reality, vol.\u00a033, p. 301011. Elsevier (2020)","DOI":"10.1016\/j.fsidi.2020.301011"},{"key":"9_CR13","unstructured":"ISACA: ISACA report - state of cybersecurity - part 1 (2021). https:\/\/www.isaca.org\/resources\/infographics\/state-of-cybersecurity-2021-infographic. Accessed 07 Mar 2024"},{"key":"9_CR14","unstructured":"ISC2: Cybersecurity workforce study (2022). https:\/\/www.isc2.org\/research. Accessed 06 Mar 2024"},{"key":"9_CR15","unstructured":"JAWA: JAWA games (2011). https:\/\/jawa.games\/. Accessed 07 Mar 2024"},{"key":"9_CR16","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-030-59291-2_13","volume-title":"Information Security Education. Information Security in Action","author":"WS Leung","year":"2020","unstructured":"Leung, W.S.: Encouraging equivocal forensic analysis through the use of red herrings. In: Drevin, L., Von Solms, S., Theocharidou, M. (eds.) WISE 2020. IAICT, vol. 579, pp. 184\u2013197. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-59291-2_13"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"McDaniel, L., Talvi, E., Hay, B.: Capture the flag as cyber security introduction. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), pp. 5479\u20135486. IEEE (2016)","DOI":"10.1109\/HICSS.2016.677"},{"key":"9_CR18","unstructured":"McGriff, S.J.: Instructional systems, vol.\u00a09. ERIC (2000)"},{"key":"9_CR19","unstructured":"McKemmish, R.: What is forensic computing? vol.\u00a0118, pp.\u00a01\u20136. Australian Institute of Criminology (1999)"},{"key":"9_CR20","unstructured":"Meier, S.: Digitale Forensik in Unternehmen. Ph.D. thesis (2017)"},{"key":"9_CR21","unstructured":"Midjourney: Midjourney AI (2024). https:\/\/www.midjourney.com\/home. Accessed 07 Mar 2024"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Molenda, M.: In search of the elusive addie model, vol.\u00a042, pp. 34\u201337. Wiley (2003)","DOI":"10.1002\/pfi.4930420508"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Mostafa, M., Faragallah, O.S.: Development of serious games for teaching information security courses, vol.\u00a07, pp. 169293\u2013169305. IEEE (2019)","DOI":"10.1109\/ACCESS.2019.2955639"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Nordhaug, \u00d8., Imran, A.S., Alawawdeh, A.M., Kowalski, S.J.: The forensic challenger. In: 2014 International Conference on Web and Open Access to Learning (ICWOAL), pp.\u00a01\u20136. IEEE (2014)","DOI":"10.1109\/ICWOAL.2014.7009231"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Pan, Y., Mishra, S., Schwartz, D.: Gamifying course modules for entry level students. In: Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, pp. 435\u2013440. ACM (2017)","DOI":"10.1145\/3017680.3017709"},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Pan, Y., Mishra, S., Yuan, B., Stackpole, B., Schwartz, D.: Game-based forensics course for first year students. In: Proceedings of the 13th Annual Conference on Information Technology Education, pp. 13\u201318. ACM (2012)","DOI":"10.1145\/2380552.2380558"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Pan, Y., Schwartz, D., Mishra, S.: Gamified digital forensics course modules for undergraduates. In: 2015 IEEE Integrated STEM Education Conference, pp. 100\u2013105. IEEE (2015)","DOI":"10.1109\/ISECon.2015.7119899"},{"key":"9_CR28","unstructured":"pixabay: User dream protocol on pixabay (2024). https:\/\/pixabay.com\/de\/users\/dream-protocol-9556087\/. Accessed 07 Mar 2024"},{"key":"9_CR29","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-319-98935-8_5","volume-title":"Cyber-Physical Systems Security","author":"EM Raybourn","year":"2018","unstructured":"Raybourn, E.M., Kunz, M., Fritz, D., Urias, V.: A zero-entry cyber range environment for future learning ecosystems. In: Ko\u00e7, \u00c7.K. (ed.) Cyber-Physical Systems Security, pp. 93\u2013109. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98935-8_5"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Stoyanova, M., Nikoloudakis, Y., Panagiotakis, S., Pallis, E., Markakis, E.K.: A survey on the internet of things (IoT) forensics: challenges, approaches, and open issues, vol.\u00a022, pp. 1191\u20131221. IEEE (2020)","DOI":"10.1109\/COMST.2019.2962586"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Torrente, J., Marchiori, E.J., Moreno-Ger, P., Fern\u00e1ndez-Manj\u00f3n, B., Vallejo-Pinto, J.\u00c1., Ortega-Moral, M.: Evaluation of three accessible interfaces for educational point-and-click computer games, vol.\u00a045, pp. 267\u2013284. Australian Computer Society (2013)","DOI":"10.1145\/2384916.2384985"},{"key":"9_CR32","unstructured":"Yerby, J., Hollifield, S., Kwak, M., Floyd, K.: Development of serious games for teaching digital forensics, vol.\u00a015. IACIS (2014)"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Zawoad, S., Hasan, R.: Faiot: towards building a forensics aware eco system for the internet of things. In: 2015 IEEE International Conference on Services Computing, pp. 279\u2013284. IEEE (2015)","DOI":"10.1109\/SCC.2015.46"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security Education - Challenges in the Digital Age"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-62918-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T23:05:59Z","timestamp":1718060759000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-62918-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031629174","9783031629181"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-62918-1_9","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"11 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP World Conference on Information Security Education","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Edinburgh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise-ifip2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifiptc11.org\/wg118-wise","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}