{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T19:40:08Z","timestamp":1748806808440,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031942624","type":"print"},{"value":"9783031942631","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-94263-1_17","type":"book-chapter","created":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T19:14:20Z","timestamp":1748805260000},"page":"289-306","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bring Your Own Bug: Enabling User-Generated Content in\u00a0Serious Games for\u00a0Industrial Cybersecurity and\u00a0AppSec Education"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1867-1542","authenticated-orcid":false,"given":"Andrei-Cristian","family":"Iosif","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4286-3184","authenticated-orcid":false,"given":"Ulrike","family":"Lechner","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2725-7629","authenticated-orcid":false,"given":"Maria","family":"Pinto-Albuquerque","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,2]]},"reference":[{"key":"17_CR1","volume-title":"Software Security Engineering: A Guide for Project Managers","author":"JH Allen","year":"2008","unstructured":"Allen, J.H., Barnum, S., Ellison, R.J., McGraw, G., Mead, N.R.: Software Security Engineering: A Guide for Project Managers. Addison-Wesley, Boston (2008)"},{"key":"17_CR2","doi-asserted-by":"publisher","unstructured":"Bosu, A., Carver, J.C.: Impact of peer code review on peer impression formation: a survey. In: 2013 ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement, pp. 133\u2013142. IEEE (2013). https:\/\/doi.org\/10.1109\/esem.2013.23","DOI":"10.1109\/esem.2013.23"},{"key":"17_CR3","unstructured":"Burch, N.: The four stages for learning any new skill. Gordon Training International, CA (1970)"},{"key":"17_CR4","doi-asserted-by":"publisher","unstructured":"Dorner, M., Mendez, D., Wnuk, K., Zabardast, E., Czerwonka, J.: The upper bound of information diffusion in code review. Empirical Softw. Eng. 30(1) (2024). https:\/\/doi.org\/10.1007\/s10664-024-10442-y","DOI":"10.1007\/s10664-024-10442-y"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"D\u00f6rner, R., G\u00f6bel, S., Effelsberg, W., Wiemeyer, J.: Serious Games: Foundations. Springer International Publishing (September, Concepts and Practice (2016)","DOI":"10.1007\/978-3-319-40612-1"},{"key":"17_CR6","unstructured":"Regulation 2024\/2847 of the European Parliament and of the Council of 23 October 2024 on horizontal cybersecurity requirements for products with digital elements (Cyber Resilience Act). bit.ly\/eu-cra (2024). Accessed 18 Dec 2024"},{"key":"17_CR7","doi-asserted-by":"publisher","unstructured":"Faber, M.J.: Open Innovation Ansatz von Reichwald\/Piller, pp. 45\u201365. Gabler, Wiesbaden (2009). https:\/\/doi.org\/10.1007\/978-3-8349-8027-4_4","DOI":"10.1007\/978-3-8349-8027-4_4"},{"key":"17_CR8","doi-asserted-by":"publisher","unstructured":"Hendrix, M., Al-Sherbaz, A., Bloom, V.: Game based cyber security training: are serious games suitable for cyber security training? Int. J. Serious Games 3(1) (2016). https:\/\/doi.org\/10.17083\/ijsg.v3i1.107","DOI":"10.17083\/ijsg.v3i1.107"},{"key":"17_CR9","doi-asserted-by":"publisher","unstructured":"von Hippel, E.: Democratizing Innovation. The MIT Press, Cambridge (2005). https:\/\/doi.org\/10.7551\/mitpress\/2333.001.0001","DOI":"10.7551\/mitpress\/2333.001.0001"},{"key":"17_CR10","unstructured":"Iosif, A.C., Espinha\u00a0Gasiba, T., Lechner, U., Albuquerque, M.P.: Raising awareness in the industry on secure code review practices. In: 8th International Conference on Cyber-Technologies and Cyber-Systems, pp. 62\u201368. IARIA (2023)"},{"key":"17_CR11","doi-asserted-by":"publisher","unstructured":"Iosif, A.C., Lechner, U., Pinto-Albuquerque, M., Espinha\u00a0Gasiba, T.: Code review for cybersecurity in the industry: insights from gameplay analytics. In: Santos, A.L., Pinto-Albuquerque, M. (eds.) 5th International Computer Programming Education Conference (ICPEC 2024). Open Access Series in Informatics (OASIcs), vol.\u00a0122, pp. 14:1\u201314:11. Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany (2024). https:\/\/doi.org\/10.4230\/OASIcs.ICPEC.2024.14","DOI":"10.4230\/OASIcs.ICPEC.2024.14"},{"key":"17_CR12","unstructured":"Iosif, A.C., Lechner, U., Pinto-Albuquerque, M., Espinha\u00a0Gasiba, T.: Cybersecurity awareness training for industrial software developers via a serious game for code review. In: Wirtschaftsinformatik 2024 Proceedings. No.\u00a060 in 19 (2024). https:\/\/aisel.aisnet.org\/wi2024\/60"},{"key":"17_CR13","doi-asserted-by":"publisher","unstructured":"Iosif, A.C., Lechner, U., Pinto-Albuquerque, M., Gasiba, T.E.: Serious game for industrial cybersecurity: experiential learning through code review. In: 36th International Conference on Software Engineering Education and Training (CSEE &T), pp. 1\u20136. IEEE (2024). https:\/\/doi.org\/10.1109\/cseet62301.2024.10663058","DOI":"10.1109\/cseet62301.2024.10663058"},{"key":"17_CR14","doi-asserted-by":"publisher","unstructured":"Leong, C., Pan, S., Ractham, P., Kaewkitipong, L.: ICT-enabled community empowerment in crisis response: social media in thailand flooding 2011. J. Assoc. Inf. Syst. 16(3), 174\u2013212 (2015). https:\/\/doi.org\/10.17705\/1jais.00390","DOI":"10.17705\/1jais.00390"},{"key":"17_CR15","unstructured":"Lukyanenko, R., Parsons, J., Wiersma, Y., Sieber, R., Maddah, M.: Participatory design for user-generated content: understanding the challenges and moving forward. Scandinavian J. Inf. Syst. 28(1) (2016)"},{"key":"17_CR16","doi-asserted-by":"publisher","unstructured":"Lukyanenko, R., Parsons, J., Wiersma, Y., Wachinger, G., Huber, B., Meldt, R.: Representing crowd knowledge: guidelines for conceptual modeling of user-generated content. J. Assoc. Inf. Syst. 18(4), 297\u2013339 (2017). https:\/\/doi.org\/10.17705\/1jais.00456","DOI":"10.17705\/1jais.00456"},{"issue":"4","key":"17_CR17","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1287\/isre.2014.0537","volume":"25","author":"R Lukyanenko","year":"2014","unstructured":"Lukyanenko, R., Parsons, J., Wiersma, Y.F.: The IQ of the crowd: understanding and improving information quality in structured user-generated content. Inf. Syst. Res. 25(4), 669\u2013689 (2014). https:\/\/doi.org\/10.1287\/isre.2014.0537","journal-title":"Inf. Syst. Res."},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"McGraw, G.: Software Security: Building Security In. Addison-Wesley Professional, Boston, MA (2006)","DOI":"10.1109\/ISSRE.2006.43"},{"issue":"10","key":"17_CR19","doi-asserted-by":"publisher","first-page":"1256","DOI":"10.1177\/1464884916673557","volume":"18","author":"TK Naab","year":"2016","unstructured":"Naab, T.K., Sehl, A.: Studies of user-generated content: a systematic review. Journalism 18(10), 1256\u20131273 (2016). https:\/\/doi.org\/10.1177\/1464884916673557","journal-title":"Journalism"},{"key":"17_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103585","volume":"136","author":"J Pr\u00fcmmer","year":"2024","unstructured":"Pr\u00fcmmer, J., van Steen, T., van den Berg, B.: A systematic review of current cybersecurity training methods. Comput. Secur. 136, 103585 (2024). https:\/\/doi.org\/10.1016\/j.cose.2023.103585","journal-title":"Comput. Secur."},{"key":"17_CR21","doi-asserted-by":"publisher","unstructured":"Roepke, R., Schroeder, U.: The problem with teaching defence against the dark arts: a review of game-based learning applications and serious games for cyber security education. In: Proceedings of the 11th International Conference on Computer Supported Education. SCITEPRESS - Science and Technology Publications (2019). https:\/\/doi.org\/10.5220\/0007706100580066","DOI":"10.5220\/0007706100580066"},{"issue":"5","key":"17_CR22","doi-asserted-by":"publisher","first-page":"981","DOI":"10.1037\/a0022676","volume":"96","author":"SE Seibert","year":"2011","unstructured":"Seibert, S.E., Wang, G., Courtright, S.H.: Antecedents and consequences of psychological and team empowerment in organizations: a meta-analytic review. J. Appl. Psychol. 96(5), 981\u20131003 (2011). https:\/\/doi.org\/10.1037\/a0022676","journal-title":"J. Appl. Psychol."},{"key":"17_CR23","doi-asserted-by":"publisher","unstructured":"Siami\u00a0Namin, A., Aguirre-Mu\u00f1oz, Z., Jones, K.: Teaching cyber security through competition an experience report about a participatory training workshop. In: 7th Annual International Conference on Computer Science Education: Innovation & Technology (CSEIT 2016). CSEIT, Global Science & Technology Forum (GSTF) (2016). https:\/\/doi.org\/10.5176\/2251-2195_cseit16.39","DOI":"10.5176\/2251-2195_cseit16.39"},{"key":"17_CR24","doi-asserted-by":"publisher","unstructured":"Sina, S., Rosenfeld, A., Kraus, S.: Generating content for scenario-based serious-games using crowdsourcing. In: Proceedings of the AAAI Conference on Artificial Intelligence, vol. 28, no. 1 (2014). https:\/\/doi.org\/10.1609\/aaai.v28i1.8790","DOI":"10.1609\/aaai.v28i1.8790"},{"issue":"8","key":"17_CR25","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1016\/j.infsof.2014.02.005","volume":"56","author":"B Tessem","year":"2014","unstructured":"Tessem, B.: Individual empowerment of agile and non-agile software developers in small teams. Inf. Softw. Technol. 56(8), 873\u2013889 (2014). https:\/\/doi.org\/10.1016\/j.infsof.2014.02.005","journal-title":"Inf. Softw. Technol."},{"key":"17_CR26","doi-asserted-by":"publisher","unstructured":"Weir, C., Rashid, A., Noble, J.: Challenging software developers: dialectic as a foundation for security assurance techniques. J. Cybersecur. 6(1) (2020). https:\/\/doi.org\/10.1093\/cybsec\/tyaa007","DOI":"10.1093\/cybsec\/tyaa007"},{"key":"17_CR27","doi-asserted-by":"publisher","unstructured":"\u0160v\u00e1bensk\u00fd, V., Vykopal, J., Cermak, M., La\u0161tovi\u010dka, M.: Enhancing cybersecurity skills by creating serious games. In: Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education. ITiCSE 2018, ACM (2018). https:\/\/doi.org\/10.1145\/3197091.3197123","DOI":"10.1145\/3197091.3197123"}],"container-title":["Communications in Computer and Information Science","Innovations for Community Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94263-1_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T19:14:24Z","timestamp":1748805264000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94263-1_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031942624","9783031942631"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94263-1_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"I4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovations for Community Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"i4cs2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.i4cs-conference.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}