{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:26:07Z","timestamp":1759332367616,"version":"3.38.0"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T00:00:00Z","timestamp":1696809600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T00:00:00Z","timestamp":1696809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput High Educ"],"published-print":{"date-parts":[[2025,3]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>In recent years, gamification has seen a rise in usage for cyber-security training, with some of the most used elements being story and narrative. Yet there seems to be a lack of research on story-based gamification as well as how this type of gamification affects a training\u2019s effectiveness. The goal of this study was to test the effectiveness of story-driven gamification in the prevention of USB-based attacks among students. To do this a story-driven gamified training was designed and deployed among students. It was found that story-elements were perceived to have a positive impact on the effectiveness of gamification. Testing the game showed that adding elements such as a guide and introducing characters caused the game to be more engaging and participants to learn more. Even to the extent that it was stated to be better than other gamification attempts lacking a focus on narrative. Because this research focuses on just story-elements and not other often used gamification elements such as rewards and leaderboards, it creates a clear image of how they should be used. It aids the design of a gamified training by showing what questions need to be answered to make story-elements work as effectively as possible towards the goal of the training. This also provides a foothold for future frameworks that could be made in regard to the usage of story-elements in gamification and education. During the research, there were also some questions raised that could be researched further such as a difference in results between participants with different study backgrounds.\n<\/jats:p>","DOI":"10.1007\/s12528-023-09392-z","type":"journal-article","created":{"date-parts":[[2023,10,9]],"date-time":"2023-10-09T08:59:07Z","timestamp":1696841947000},"page":"248-272","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A story-driven gamified education on USB-based attack"],"prefix":"10.1007","volume":"37","author":[{"given":"Vasco","family":"Rikkers","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0802-4280","authenticated-orcid":false,"given":"Dipti Kapoor","family":"Sarmah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,9]]},"reference":[{"key":"9392_CR1","unstructured":"ACM\/SIGSAC. (2021). Acm css 2021. Retrieved 04-11-2022, from https:\/\/www.sigsac.org\/ccs\/CCS2021\/"},{"key":"9392_CR2","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1177\/1046878117703749","volume":"48","author":"MB Armstrong","year":"2017","unstructured":"Armstrong, M. B., & Landers, R. N. (2017). An evaluation of gamified training: Using narrative to improve reactions and learning. Simulation & Gaming, 48, 513\u2013538. https:\/\/doi.org\/10.1177\/1046878117703749","journal-title":"Simulation & Gaming"},{"key":"9392_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.edurev.2020.100322","author":"S Bai","year":"2020","unstructured":"Bai, S., Hew, K. F., & Huang, B. (2020). Does gamification improve student learning outcome? Evidence from a meta-analysis and synthesis of qualitative data in educational contexts. Educational Research Review. https:\/\/doi.org\/10.1016\/j.edurev.2020.100322","journal-title":"Educational Research Review"},{"key":"9392_CR4","doi-asserted-by":"publisher","unstructured":"Camingue, J., Melcer, E. F., & Carstensdottir, E. (2020). A (visual) novel route to learning: A taxonomy of teaching strategies in visual novels. In International conference on the foundations of digital games. ACM. https:\/\/doi.org\/10.1145\/3402942.3403004","DOI":"10.1145\/3402942.3403004"},{"key":"9392_CR5","doi-asserted-by":"publisher","unstructured":"Chaskos, E., Diakoumakos, J., Kolokotronis, N., & Lepouras, G. (2022). Gamification mechanisms in cyber range and cyber security training environments. In Handbook of research on gamification dynamics and user experience design (pp. 363\u2013383). IGI Global. https:\/\/doi.org\/10.4018\/978-1-6684-4291-3.ch017","DOI":"10.4018\/978-1-6684-4291-3.ch017"},{"key":"9392_CR6","unstructured":"Chothia, T., Holdcroft, S., Radu, A. I., & Thomas, R. J. (2017). Jail, hero or drug lord? Turning a cyber security course into an 11 week choose your own adventure story. In 2017 USENIX workshop on advances in security education (ASE 17). USENIX Association, Vancouver, BC. Retrieved 04-11-2022, from https:\/\/www.usenix.org\/conference\/ase17\/workshop-program\/presentation\/chothia"},{"key":"9392_CR7","unstructured":"Cimpanu, C. (2022). Fbi: Fin7 hackers target us companies with badusb devices to install ransomware. Retrieved 04-11-2022, from https:\/\/therecord.media\/fbi-fin7-hackers-target-us-companies-with-badusb-devices-to-install-ransomware\/"},{"key":"9392_CR8","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1177\/1046878120933312","volume":"51","author":"M Coenraad","year":"2020","unstructured":"Coenraad, M., Pellicone, A., Ketelhut, D. J., Cukier, M., Plane, J., & Weintrop, D. (2020). Experiencing cybersecurity one game at a time: A systematic review of cybersecurity digital games. Simulation & Gaming, 51, 586\u2013611. https:\/\/doi.org\/10.1177\/1046878120933312","journal-title":"Simulation & Gaming"},{"key":"9392_CR9","unstructured":"eLearning, I. (2019). Usb baiting: Don\u2019t take the bait: Inspired elearning resources. Retrieved 04-11-2022, from https:\/\/inspiredelearning.com\/resource\/usb-baiting-dont-take-bait\/"},{"key":"9392_CR10","unstructured":"Elsevier. Scopus preview-scopus-welcome to scopus. Retrieved 04-11-2022, from https:\/\/www.scopus.com\/"},{"key":"9392_CR11","unstructured":"FBI. (2022). Welcome to fbi.gov. Retrieved 04-11-2022, from https:\/\/www.fbi.gov\/"},{"key":"9392_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2019.103671","volume":"143","author":"C Ferguson","year":"2020","unstructured":"Ferguson, C., van den Broek, E. L., & van Oostendorp, H. (2020). On the role of interaction mode and story structure in virtual reality serious games. Computers & Education, 143, 103671. https:\/\/doi.org\/10.1016\/j.compedu.2019.103671","journal-title":"Computers & Education"},{"key":"9392_CR13","unstructured":"Foundation, I. F. T. (2022). Twine is an open-source tool for telling interactive, nonlinear stories. Retrieved 04-11-2022, from http:\/\/twinery.org\/"},{"key":"9392_CR14","doi-asserted-by":"publisher","unstructured":"Guthrie, W. F. (2020). Nist\/sematech e-handbook of statistical methods (nist handbook 151). https:\/\/www.itl.nist.gov\/div898\/handbook\/. https:\/\/doi.org\/10.18434\/M32189.","DOI":"10.18434\/M32189"},{"key":"9392_CR15","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/s11257-019-09223-w","volume":"29","author":"J H\u00f6gberg","year":"2019","unstructured":"H\u00f6gberg, J., Hamari, J., & W\u00e4stlund, E. (2019). Gameful experience questionnaire (GAMEFULQUEST): An instrument for measuring the perceived gamefulness of system use. User Modeling and User-Adapted Interaction, 29, 619\u2013660. https:\/\/doi.org\/10.1007\/s11257-019-09223-w","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"9392_CR16","doi-asserted-by":"publisher","DOI":"10.3390\/educsci11010022","author":"M Kalogiannakis","year":"2021","unstructured":"Kalogiannakis, M., Papadakis, S., & Zourmpakis, A. I. (2021). Gamification in science education. A systematic review of the literature. Education Sciences. https:\/\/doi.org\/10.3390\/educsci11010022","journal-title":"Education Sciences"},{"key":"9392_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jecp.2019.104725","volume":"189","author":"H Kartalkanat","year":"2020","unstructured":"Kartalkanat, H., & G\u00f6ksun, T. (2020). The effects of observing different gestures during storytelling on the recall of path and event information in 5-year-olds and adults. Journal of Experimental Child Psychology, 189, 104725. https:\/\/doi.org\/10.1016\/j.jecp.2019.104725","journal-title":"Journal of Experimental Child Psychology"},{"key":"9392_CR18","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/bf02820690","volume":"67","author":"M Lakshman","year":"2000","unstructured":"Lakshman, M., Sinha, L., Biswas, M., Charles, M., & Arora, N. K. (2000). Quantitative vs qualitative research methods. The Indian Journal of Pediatrics, 67, 369\u2013377. https:\/\/doi.org\/10.1007\/bf02820690","journal-title":"The Indian Journal of Pediatrics"},{"key":"9392_CR19","unstructured":"LaMorte, W. W. (2017). Wilcoxon signed rank test. Retrieved 04-11-2022, from https:\/\/sphweb.bumc.bu.edu\/otlt\/mph-modules\/bs\/bs704_nonparametric\/BS704_Nonparametric6.html"},{"key":"9392_CR20","unstructured":"LaMorte, W. W. (2021). One sample t-test. Retrievrd 04-11-2022, from https:\/\/sphweb.bumc.bu.edu\/otlt\/MPH-Modules\/PH717-QuantCore\/PH717-Module7-T-tests\/PH717-Module7-T-tests4.html"},{"key":"9392_CR21","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.1016\/b978-0-12-813995-0.00048-0","volume-title":"The handbook of personality dynamics and processes","author":"M Luhmann","year":"2021","unstructured":"Luhmann, M., Krasko, J., & Terwiel, S. (2021). Subjective well-being as a dynamic construct. In J. F. Rauthmann (Ed.), The handbook of personality dynamics and processes (pp. 1231\u20131249). Amsterdam: Elsevier. https:\/\/doi.org\/10.1016\/b978-0-12-813995-0.00048-0"},{"key":"9392_CR22","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1007\/s10639-021-10642-9","volume":"27","author":"Z Luo","year":"2021","unstructured":"Luo, Z. (2021). Gamification for educational purposes: What are the factors contributing to varied effectiveness? Education and Information Technologies, 27, 891\u2013915. https:\/\/doi.org\/10.1007\/s10639-021-10642-9","journal-title":"Education and Information Technologies"},{"key":"9392_CR23","unstructured":"Mangiafico, S. One-sample Wilcoxon signed-rank test. Retrieved 04-11-2022, from https:\/\/rcompanion.org\/handbook\/F_02.html"},{"key":"9392_CR24","doi-asserted-by":"publisher","DOI":"10.3390\/su13042247","author":"A Manzano-Le\u00f3n","year":"2021","unstructured":"Manzano-Le\u00f3n, A., Camacho-Lazarraga, P., Guerrero, M. A., Guerrero-Puerta, L., Aguilar-Parra, J. M., Trigueros, R., & Alias, A. (2021). Between level up and game over: A systematic literature review of gamification in education. Sustainability. https:\/\/doi.org\/10.3390\/su13042247","journal-title":"Sustainability"},{"key":"9392_CR25","unstructured":"Meer, A.v.d. (2019). Structures of choice in narratives in gamification and games. Retrieved 04-11-2022, from https:\/\/uxdesign.cc\/structures-of-choice-in-narratives-in-gamification-and-games-16da920a0b9a"},{"key":"9392_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2019.103730","volume":"145","author":"C Melo","year":"2020","unstructured":"Melo, C., Madariaga, L., Nussbaum, M., Heller, R., Bennett, S., Tsai, C. C., & van Braak, J. (2020). Editorial: Educational technology and addictions. Computers & Education, 145, 103730. https:\/\/doi.org\/10.1016\/j.compedu.2019.103730","journal-title":"Computers & Education"},{"key":"9392_CR27","doi-asserted-by":"publisher","unstructured":"Mueller, T., Zimmer, E., & de Nittis, L. (2019). Using context and provenance to defend against USB-borne attacks. In Proceedings of the 14th international conference on availability, reliability and security. ACM. https:\/\/doi.org\/10.1145\/3339252.3339268","DOI":"10.1145\/3339252.3339268"},{"key":"9392_CR28","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1080\/19345747.2020.1772423","volume":"13","author":"Z Neal","year":"2020","unstructured":"Neal, Z., Neal, J. W., & Piteo, A. (2020). Call me maybe: Using incentives and follow-ups to increase principals\u2019 survey response rates. Journal of Research on Educational Effectiveness, 13, 784\u2013793. https:\/\/doi.org\/10.1080\/19345747.2020.1772423","journal-title":"Journal of Research on Educational Effectiveness"},{"key":"9392_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-10208-5_1","volume-title":"Gamification in education and business","author":"S Nicholson","year":"2014","unstructured":"Nicholson, S. (2014). A RECIPE for meaningful gamification. In T. Reiners & L. C. Wood (Eds.), Gamification in education and business (pp. 1\u201320). Berlin: Springer. https:\/\/doi.org\/10.1007\/978-3-319-10208-5_1"},{"key":"9392_CR30","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/j.cose.2017.08.002","volume":"70","author":"N Nissim","year":"2017","unstructured":"Nissim, N., Yahalom, R., & Elovici, Y. (2017). Usb-based attacks. Computers & Security, 70, 675\u2013688. https:\/\/doi.org\/10.1016\/j.cose.2017.08.002","journal-title":"Computers & Security"},{"key":"9392_CR31","doi-asserted-by":"publisher","unstructured":"O\u2019Donovan, S., Gain, J., & Marais, P. (2013). A case study in the gamification of a university-level games development course. In Proceedings of the South African Institute for computer scientists and information technologists conference on\u2014SAICSIT \u201913. ACM Press. https:\/\/doi.org\/10.1145\/2513456.2513469","DOI":"10.1145\/2513456.2513469"},{"key":"9392_CR32","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1016\/j.chb.2015.05.051","volume":"52","author":"NR Prestopnik","year":"2015","unstructured":"Prestopnik, N. R., & Tang, J. (2015). Points, stories, worlds, and diegesis: Comparing player experiences in two citizen science games. Computers in Human Behavior, 52, 492\u2013506. https:\/\/doi.org\/10.1016\/j.chb.2015.05.051","journal-title":"Computers in Human Behavior"},{"key":"9392_CR33","unstructured":"Proofpoint. (2022). State of the Phish. Technical Report, Egress."},{"key":"9392_CR34","doi-asserted-by":"publisher","first-page":"97718","DOI":"10.1109\/ACCESS.2020.2996361","volume":"8","author":"S Ros","year":"2020","unstructured":"Ros, S., Gonz\u00e1lez, S., Robles, A., Tobarra, L., Caminero, A., & Cano, J. (2020). Analyzing students\u2019 self-perception of success and learning effectiveness using gamification in an online cybersecurity course. IEEE Access, 8, 97718\u201397728. https:\/\/doi.org\/10.1109\/ACCESS.2020.2996361","journal-title":"IEEE Access"},{"key":"9392_CR35","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10648-019-09498-w","volume":"32","author":"M Sailer","year":"2019","unstructured":"Sailer, M., & Homner, L. (2019). The gamification of learning. Educational Psychology Review, 32, 77\u2013112. https:\/\/doi.org\/10.1007\/s10648-019-09498-w","journal-title":"Educational Psychology Review"},{"key":"9392_CR36","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s10758-020-09487-x","volume":"27","author":"AN Saleem","year":"2022","unstructured":"Saleem, A. N., Noori, N. M., & Ozdamli, F. (2022). Gamification applications in e-learning: A literature review. Technology, Knowledge and Learning, 27, 139\u2013159. https:\/\/doi.org\/10.1007\/s10758-020-09487-x","journal-title":"Technology, Knowledge and Learning"},{"key":"9392_CR37","doi-asserted-by":"publisher","first-page":"907","DOI":"10.1007\/s11257-021-09300-z","volume":"31","author":"ACG Santos","year":"2021","unstructured":"Santos, A. C. G., Oliveira, W., Hamari, J., Rodrigues, L., Toda, A. M., Palomino, P. T., & Isotani, S. (2021). The relationship between user types and gamification designs. User Modeling and User-Adapted Interaction, 31, 907\u2013940. https:\/\/doi.org\/10.1007\/s11257-021-09300-z","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"9392_CR38","unstructured":"Scholar, G. (2022). Conference top publications ratings. Retrieved 04-11-2022, from https:\/\/scholar.google.nl\/citations?view_op=top_venues &hl=en &vq=eng_computersecuritycryptography"},{"key":"9392_CR39","doi-asserted-by":"publisher","first-page":"939","DOI":"10.3390\/su14020939","volume":"14","author":"D Singh","year":"2022","unstructured":"Singh, D., Biswal, A. K., Samanta, D., Singh, D., & Lee, H. N. (2022). Juice jacking: Security issues and improvements in USB technology. Sustainability, 14, 939. https:\/\/doi.org\/10.3390\/su14020939","journal-title":"Sustainability"},{"key":"9392_CR40","doi-asserted-by":"publisher","first-page":"em2078","DOI":"10.29333\/ejmste\/11590","volume":"18","author":"EV Soboleva","year":"2022","unstructured":"Soboleva, E. V., Zhumakulov, K. K., Umurkulov, K. P., Ibragimov, G. I., Kochneva, L. V., & Timofeeva, M. O. (2022). Developing a personalised learning model based on interactive novels to improve the quality of mathematics education. Eurasia Journal of Mathematics, Science and Technology Education, 18, em2078. https:\/\/doi.org\/10.29333\/ejmste\/11590","journal-title":"Eurasia Journal of Mathematics, Science and Technology Education"},{"key":"9392_CR41","unstructured":"Solutions, L. R. (2022). LexisNexis risk solutions biannual cybercrime report. LexisNexis Risk Solutions: Technical Report."},{"key":"9392_CR42","unstructured":"Talamantes, J. Usb drop attacks: The danger of \u201clost and found\u201d thumb drives. Retrieved 04-11-2022, from https:\/\/www.redteamsecure.com\/blog\/usb-drop-attacks-the-danger-of-lost-and-found-thumb-drives"},{"key":"9392_CR43","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/0010-0285(77)90005-6","volume":"9","author":"PW Thorndyke","year":"1977","unstructured":"Thorndyke, P. W. (1977). Cognitive structures in comprehension and memory of narrative discourse. Cognitive Psychology, 9, 77\u2013110. https:\/\/doi.org\/10.1016\/0010-0285(77)90005-6","journal-title":"Cognitive Psychology"},{"key":"9392_CR44","doi-asserted-by":"publisher","unstructured":"Tischer, M., Durumeric, Z., Foster, S., Duan, S., Mori, A., Bursztein, E., & Bailey, M. (2016). Users really do plug in USB drives they find. In 2016 IEEE symposium on security and privacy (SP). IEEE. https:\/\/doi.org\/10.1109\/sp.2016.26","DOI":"10.1109\/sp.2016.26"},{"key":"9392_CR45","unstructured":"UTwente, (2022). Take the cyber security course and learn whether your data is protected properly. ut launches e-learning courses on new security education platform. Retrieved 04-11-2022, from https:\/\/www.utwente.nl\/en\/service-portal\/services\/lisa\/news-events\/news-events\/news\/2021\/10\/35194\/take-the-cyber-security-course-and-learn-whether-your-data-is-protected-properly#e-learning-programme-inventory-and-exercises"},{"key":"9392_CR46","doi-asserted-by":"publisher","first-page":"103786","DOI":"10.1016\/j.compedu.2019.103786","volume":"147","author":"J Wu","year":"2020","unstructured":"Wu, J., & Chen, D. T. V. (2020). A systematic review of educational digital storytelling. Computers & Education, 147, 103786. https:\/\/doi.org\/10.1016\/j.compedu.2019.103786","journal-title":"Computers & Education"},{"key":"9392_CR47","unstructured":"Zichermann, G., & Cunningham, C. (2011). Gamification by design: Implementing game mechanics in web and mobile apps. O\u2019Reilly Media."},{"key":"9392_CR48","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1080\/08874417.2020.1712269","volume":"62","author":"M Zwilling","year":"2020","unstructured":"Zwilling, M., Klien, G., Lesjak, D., Wiechetek, \u0141, Cetin, F., & Basim, H. N. (2020). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62, 82\u201397. https:\/\/doi.org\/10.1080\/08874417.2020.1712269","journal-title":"Journal of Computer Information Systems"}],"container-title":["Journal of Computing in Higher Education"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12528-023-09392-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12528-023-09392-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12528-023-09392-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,6]],"date-time":"2025-03-06T13:37:56Z","timestamp":1741268276000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12528-023-09392-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,9]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["9392"],"URL":"https:\/\/doi.org\/10.1007\/s12528-023-09392-z","relation":{},"ISSN":["1042-1726","1867-1233"],"issn-type":[{"type":"print","value":"1042-1726"},{"type":"electronic","value":"1867-1233"}],"subject":[],"published":{"date-parts":[[2023,10,9]]},"assertion":[{"value":"22 September 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 October 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}