{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T04:24:00Z","timestamp":1773548640663,"version":"3.50.1"},"reference-count":113,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,30]],"date-time":"2023-10-30T00:00:00Z","timestamp":1698624000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,30]]},"DOI":"10.1109\/besc59560.2023.10386988","type":"proceedings-article","created":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T18:21:56Z","timestamp":1705515716000},"page":"1-9","source":"Crossref","is-referenced-by-count":11,"title":["Fostering Cybersecurity Awareness and Skills Development Through Digital Game-Based Learning"],"prefix":"10.1109","author":[{"given":"Andriani","family":"Piki","sequence":"first","affiliation":[{"name":"University of Central Lancashire Cyprus,School of Sciences,Larnaca,Cyprus"}]},{"given":"Eliana","family":"Stavrou","sequence":"additional","affiliation":[{"name":"Open University of Cyprus,Faculty of Pure and Applied Sciences,Nicosia,Cyprus"}]},{"given":"Andria","family":"Procopiou","sequence":"additional","affiliation":[{"name":"University of Central Lancashire Cyprus,School of Sciences,Larnaca,Cyprus"}]},{"given":"Anthimos","family":"Demosthenous","sequence":"additional","affiliation":[{"name":"University of Central Lancashire Cyprus,School of Sciences,Larnaca,Cyprus"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4324\/9781003340362-13"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.7208\/chicago\/9780226112114.001.0001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1037\/11494-000"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4324\/9781315009698"},{"key":"ref5","first-page":"5","article-title":"Fun, play and games: What makes games engaging","author":"Prensky","year":"2001","journal-title":"Digital game-based learning"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2753\/RPO1061-040505036"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35927-9_9"},{"key":"ref8","volume-title":"Innovating Pedagogy 2017: Open University Innovation Report 6","author":"Ferguson","year":"2017"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2013.02.010"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/educsci13080813"},{"key":"ref11","first-page":"21","article-title":"The ecology of games: connecting youth, games, and learning","volume-title":"The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning","author":"Gee","year":"2008"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4324\/9780203891650-15"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/950566.950596"},{"key":"ref14","article-title":"Digital game-based learning in secondary education","volume-title":"PhD thesis","author":"Huizenga","year":"2017"},{"issue":"2","key":"ref15","first-page":"249","article-title":"The Place of Game-Based Learning in an Age of Austerity","volume":"10","author":"Whitton","year":"2012","journal-title":"Electronic Journal of eLearning"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v15i21.24381"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/00461520.2015.1122533"},{"issue":"3","key":"ref18","article-title":"Digital Game-Based Learning Supports Student Motivation, Cognitive Success, and Performance Outcomes","volume":"17","author":"Woo","year":"2014","journal-title":"Journal of Educational Technology and Society"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.21125\/inted.2020.1734"},{"key":"ref20","article-title":"The Role of Gamification in the Facilitation of Student Engagement: An Exploratory Industrial Psychology Application","volume-title":"PhD thesis","author":"Adams","year":"2019"},{"key":"ref21","article-title":"Towards Adaptive Gamification: A Synthesis of Current Developments","volume-title":"Twenty-Fifth European Conference on Information Systems (ECIS)","author":"B\u00f6ckle"},{"key":"ref22","first-page":"73","article-title":"Mitigating the challenges of mobile games-based learning through gamified lesson paths","volume-title":"World Conference on Mobile and Contextual Learning","author":"Piki"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.21125\/edulearn.2020.1555"},{"key":"ref24","article-title":"Unpacking Digital Game-Based Learning: The complexities of developing and using educational games","volume-title":"PhD thesis","author":"Berg Marklund","year":"2015"},{"key":"ref25","article-title":"The top 10 cybersecurity games your employees need to play","author":"Singapore","year":"2022","journal-title":"Potato Pirates"},{"key":"ref26","article-title":"A serious game for simulating cyberattacks to teach cybersecurity","author":"Scherb","year":"2023"},{"key":"ref27","article-title":"Which cyber attacks most commonly target small businesses?","volume-title":"Cisco Umbrella","author":"Howard","year":"2021"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-48057-7_28"},{"key":"ref29","article-title":"ENISA threat landscape 2020: Cyber attacks becoming more sophisticated, targeted, widespread and undetected","volume-title":"European Union Agency for cybersecurity (ENISA)","year":"2020"},{"key":"ref30","article-title":"The future of Jobs Report 2023","volume-title":"World Economic Forum"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38530-8_8"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CYCON.2015.7158478"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-10-2020-0173"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3277570.3277580"},{"issue":"7","key":"ref35","first-page":"73","article-title":"Back to Basics: Towards Building Societal Resilience Against a Cyber Pandemic","author":"Stavrou","year":"2020","journal-title":"Journal on Systemics, Cybernetics and Informatics (JSCI)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2996361"},{"key":"ref37","article-title":"The Gamification of Learning and Instruction: Game-Based Methods and Strategies for Training and Education","volume-title":"Business Book Summary","author":"Kapp","year":"2012"},{"key":"ref38","article-title":"Gamification in education: What, how, why bother","volume":"15","author":"Lee","year":"2011","journal-title":"Academic exchange quarterly"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/9788.001.0001"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1177\/07356331231180951"},{"key":"ref41","volume-title":"Gamification by design: Implementing game mechanics in web and mobile apps","author":"Zicherman","year":"2011"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15191-0_18"},{"key":"ref43","volume-title":"For the win: How game thinking can revolutionize your business","author":"Werbach","year":"2012"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/VS-GAMES.2013.6624226"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.7557\/23.6111"},{"issue":"5","key":"ref46","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MS.2017.3571581","article-title":"Gamification","volume":"34","author":"Basten","year":"2017","journal-title":"IEEE Softw"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2181037.2181040"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39226-9_12"},{"key":"ref49","article-title":"Tabletop security games + cards","author":"Shostack"},{"key":"ref50","article-title":"History of personal computers","year":"2023"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2008.06.004"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1080\/14703290903525838"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.07.021"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35927-9_6"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2022.07"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.4018\/IJGBL.2016010102"},{"key":"ref57","article-title":"Digital Game Based Learning: An Exploratory Analysis of Perceived Educational Benefits at a Junior High School Level","volume-title":"MSc thesis","author":"Johnson","year":"2019"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.38159\/ehass.20223137"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195304381.001.0001"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1037\/a0029321"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195382716.001.0001"},{"issue":"1","key":"ref62","article-title":"Translating constructivism into instructional design: Potential and limitations","volume":"8","author":"Karagiorgi","year":"2005","journal-title":"Journal of Educational Technology and Society"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.4156\/jdcta.vol7.issue8.26"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/273133.274308"},{"key":"ref65","volume-title":"Innovating Pedagogy 2012: Open University Innovation Report 1","author":"Sharples","year":"2012"},{"key":"ref66","volume-title":"Innovating Pedagogy 2013: Open University Innovation Report 2","author":"Sharples","year":"2013"},{"key":"ref67","volume-title":"Innovating Pedagogy 2014: Open University Innovation Report 3","author":"Sharples","year":"2014"},{"key":"ref68","volume-title":"Innovating Pedagogy 2016: Open University Innovation Report 5","author":"Sharples","year":"2016"},{"key":"ref69","volume-title":"Innovating Pedagogy 2019: Open University Innovation Report 7","author":"Ferguson","year":"2019"},{"key":"ref70","volume-title":"Innovating Pedagogy 2023: Open University Innovation Report 11","author":"Kukulska-Hulme","year":"2023"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.3390\/info12100417"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.12.018"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3424954.3424958"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/861"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102270"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3424954.3424959"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.jjimei.2020.100001"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.17083\/ijsg.v8i3.437"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3487405.3487655"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.5220\/0007706100580066"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.21125\/inted.2020.0788"},{"key":"ref82","article-title":"Targeted Attack: The Game \u2013 Defend your data. Choose wisely. Succeed or fail"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.21236\/ADA547670"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.3390\/info11020121"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102450"},{"key":"ref86","volume-title":"Cybersecurity & Infrastructure Security Agency: Cybersecurity Games","year":"2022"},{"key":"ref87","volume-title":"Play Interland - Be Internet Awesome"},{"key":"ref88","article-title":"How cyber-savvy are you? Cyber security quiz","volume-title":"mediasmarts-9"},{"key":"ref89","volume-title":"Indie game hosting marketplace: Search results for \u2018cybersecurity"},{"key":"ref90","article-title":"Cyber choices (grades 3-5)"},{"key":"ref91","article-title":"EFollowMe"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.33965\/ml2020_202004l010"},{"key":"ref93","article-title":"Interactive Games","volume-title":"Internet Safety","year":"2021"},{"key":"ref94","article-title":"H5P \u2013 create and share rich HTML5 content and applications"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.21125\/iceri.2023.1368"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-3185-5_38"},{"issue":"2","key":"ref97","article-title":"Digital game-based learning: It\u2019s not just the digital natives who are restless","volume":"41","author":"Van Eck","year":"2006","journal-title":"EDUCAUSE review"},{"key":"ref98","article-title":"Affordances and Constraints of Game-Based Learning for Learners with Disabilities: Perspectives from Educators in Bulgaria and Cyprus","volume-title":"Proceedings of the 19th International Scientific Conference eLearning and Software for Education","author":"Lendzhova"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1080\/00220973.2017.1380593"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1037\/a0028089"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1080\/10494820.2021.1931891"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-008-9390-8"},{"issue":"2","key":"ref103","article-title":"Digital Game-Based Learning-Future Of Education? Pranjana","volume":"11","author":"Chaudhary","year":"2008","journal-title":"Pranjana: The Journal of Management Awareness"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-71579-7_3"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.5901\/mjss.2014.v5n20p1214"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/BF00138871"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.17083\/ijsg.v1i2.18"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.46743\/2160-3715\/2008.1574"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.53889\/ijses.v3i1.132"},{"key":"ref110","first-page":"14","article-title":"Improving Cybersecurity Workforce Capacity and Capability","author":"Wright","year":"2016","journal-title":"ISSA Journal"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/3344429.3372507"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.3390\/app11199266"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.3389\/feduc.2021.807277"}],"event":{"name":"2023 10th International Conference on Behavioural and Social Computing (BESC)","location":"Larnaca, Cyprus","start":{"date-parts":[[2023,10,30]]},"end":{"date-parts":[[2023,11,1]]}},"container-title":["2023 10th International Conference on Behavioural and Social Computing (BESC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10385235\/10386086\/10386988.pdf?arnumber=10386988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,19]],"date-time":"2024-01-19T18:12:28Z","timestamp":1705687948000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10386988\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,30]]},"references-count":113,"URL":"https:\/\/doi.org\/10.1109\/besc59560.2023.10386988","relation":{},"subject":[],"published":{"date-parts":[[2023,10,30]]}}}