{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T10:32:48Z","timestamp":1774866768701,"version":"3.50.1"},"reference-count":44,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/fie.2017.8190712","type":"proceedings-article","created":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T22:03:51Z","timestamp":1513289031000},"page":"1-5","source":"Crossref","is-referenced-by-count":28,"title":["Cyber security training a survey of serious games in cyber security"],"prefix":"10.1109","author":[{"given":"Jin-Ning","family":"Tioh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mani","family":"Mina","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Douglas W.","family":"Jacobson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","year":"0","journal-title":"Cyphinx"},{"key":"ref38","year":"0","journal-title":"Cybersecure Contingency Planning"},{"key":"ref33","year":"0","journal-title":"Anti-Phishing Phil"},{"key":"ref32","year":"0","journal-title":"&#x201C;Agent Surefire &#x201D;"},{"key":"ref31","first-page":"125","article-title":"The Effectiveness of Online Gaming as Part of a Security Awareness Program","author":"labuschagne","year":"0","journal-title":"13th European Conference on Cyber Warfare and Security ECCWS-2014 The University of Piraeus Piraeus"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2011.6027538"},{"key":"ref37","year":"0","journal-title":"CyberProtect"},{"key":"ref36","year":"0","journal-title":"Cyber Ciege Educational Video Game"},{"key":"ref35","year":"0","journal-title":"The Carnegie Cyber Academy"},{"key":"ref34","year":"0","journal-title":"Budd e Cybersecurity Education"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/950566.950595"},{"key":"ref40","year":"0","journal-title":"Kids Games"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0364-0213(81)80017-1"},{"key":"ref12","article-title":"Video games in education","volume":"2","author":"squire","year":"0","journal-title":"International Journal of Intelligent Games & Simulation"},{"key":"ref13","year":"0","journal-title":"Serious game classification The online classification of serious games"},{"key":"ref14","author":"arachchilage","year":"0","journal-title":"Security awareness of computer users A game based learning approach &#x201D; Brunel University School of Information Systems Computing and Mathematics"},{"key":"ref15","first-page":"706","volume":"29","author":"arachchilage","year":"0","journal-title":"A game design framework for avoiding phishing attacks &#x201D; Computers in Human Behavior"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1177\/154193121005402311"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.05.046"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.005"},{"key":"ref28","article-title":"SecurityEmpire: Development and Evaluation of a Digital Game to Promote Cybersecurity Education","author":"olano","year":"2014","journal-title":"3GSE"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.297"},{"key":"ref27","article-title":"PicoCTF: A Game-Based Computer Security Competition for High School Students","author":"chapman","year":"2014","journal-title":"2014 USENIX Summit Gaming Games Gamification Secur Educ 3GSE 14"},{"key":"ref3","author":"abt","year":"1971","journal-title":"Serious Games"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1108\/10748120110424816"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2005.1612218"},{"key":"ref5","author":"adams","year":"0","journal-title":"The designer's notebook Sorting out the genre muddle &#x201D; in Gamasutra"},{"key":"ref8","author":"thorsen","year":"0","journal-title":"US gamer population 170 million-NPD &#x201D; in GameSpot"},{"key":"ref7","author":"prensky","year":"2001","journal-title":"Digital Game-Based Learning"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1201\/b13707"},{"key":"ref9","author":"smith","year":"0","journal-title":"Valve to showcase SteamVR hardware steam machines & more at GDC 2015 &#x201D; in AnandTech"},{"key":"ref1","author":"mickleberg","year":"0","journal-title":"US Cybercrime Rising Risks Reduced Readiness"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-33406-8_37"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1281320.1281322"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2008.4635145"},{"key":"ref42","year":"0","journal-title":"NSteens"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2010.5679591"},{"key":"ref41","year":"0","journal-title":"Game of Threats-Cybersecurity Risk Simulation"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.64"},{"key":"ref44","year":"0","journal-title":"Cybersecurity Lab | NOVA Labs I PBS"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-05972-3_6"},{"key":"ref43","year":"0","journal-title":"OnGuardOnline"},{"key":"ref25","first-page":"10","author":"thompson","year":"0","journal-title":"Active Learning with the CyberCIEGE Video Game"}],"event":{"name":"2017 IEEE Frontiers in Education Conference (FIE)","location":"Indianapolis, IN","start":{"date-parts":[[2017,10,18]]},"end":{"date-parts":[[2017,10,21]]}},"container-title":["2017 IEEE Frontiers in Education Conference (FIE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8124740\/8190427\/08190712.pdf?arnumber=8190712","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,22]],"date-time":"2018-01-22T22:42:36Z","timestamp":1516660956000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8190712\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/fie.2017.8190712","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}