{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T08:36:16Z","timestamp":1770971776087,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1109\/fie.2015.7344164","type":"proceedings-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T22:17:58Z","timestamp":1449613078000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["Digital defenders: Computer security literacy via game-based learning"],"prefix":"10.1109","author":[{"given":"Jin-Ning","family":"Tioh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mani","family":"Mina","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","author":"gee","year":"2003","journal-title":"What Video Games Have to Teach Us About Learning and Literacy Palgrave Macmillan New York"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog0504_2"},{"key":"ref12","first-page":"49","article-title":"Video games in education","volume":"2","author":"squire","year":"2003","journal-title":"International Journal of Intelligent Simulations and Gaming"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2005.11.007"},{"key":"ref14","article-title":"Game-Based Learning: What it is, Why it Works, and Where it's Going","author":"trybus","year":"0"},{"key":"ref15","article-title":"Education for energy efficiency through an educational game","author":"leonardo","year":"2013","journal-title":"Frontiers in Education Conference 2013 IEEE"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1201\/b13707"},{"key":"ref3","article-title":"Russian Hackers Read Obama's Unclassified Emails, Officials Say","author":"schimidt","year":"2015"},{"key":"ref6","article-title":"Digital natives, digital immigrants","author":"prensky","year":"2013","journal-title":"Cross Currents Cultures Communities Technologies"},{"key":"ref5","article-title":"You Have to Hack This Massively Multiplayer Game to Beat It","author":"greenberg","year":"2015"},{"key":"ref8","article-title":"US gamer population: 170 million &#x2013; NPD","author":"thorsen","year":"2009"},{"key":"ref7","author":"prensky","year":"2001","journal-title":"Digital Game-Based Learning"},{"key":"ref2","article-title":"Target Breach: Phishing Attack Implicated","author":"schwartz","year":"2014"},{"key":"ref1","article-title":"Recent Malaysian ATM Attacks Underscore Criticality of Continuous Monitoring","author":"bussiere","year":"2014"},{"key":"ref9","article-title":"Valve to Showcase SteamVR Hardware, Steam Machines, & More at GDC 2015","author":"smith","year":"2015"}],"event":{"name":"2015 IEEE Frontiers in Education Conference (FIE)","location":"Camino Real El Paso, El Paso, TX, USA","start":{"date-parts":[[2015,10,21]]},"end":{"date-parts":[[2015,10,24]]}},"container-title":["2015 IEEE Frontiers in Education Conference (FIE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7344010\/7344011\/07344164.pdf?arnumber=7344164","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T01:06:46Z","timestamp":1490404006000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7344164\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/fie.2015.7344164","relation":{},"subject":[],"published":{"date-parts":[[2015,10]]}}}