{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:19:05Z","timestamp":1740100745245,"version":"3.37.3"},"reference-count":49,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,5,1]],"date-time":"2022-05-01T00:00:00Z","timestamp":1651363200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1109\/icse-seet55299.2022.9794181","type":"proceedings-article","created":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T21:14:05Z","timestamp":1655154845000},"page":"217-222","source":"Crossref","is-referenced-by-count":0,"title":["Putting Security on the Table: The Digitalisation of Security Tabletop Games and its Challenging Aftertaste"],"prefix":"10.1109","author":[{"given":"Marco","family":"Gutfleisch","sequence":"first","affiliation":[{"name":"Ruhr University Bochum,Bochum,North Rhine-Westphalia,Germany"}]},{"given":"Markus","family":"Schops","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum,Bochum,North Rhine-Westphalia,Germany"}]},{"given":"Sibel","family":"Sayin","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum,Bochum,North Rhine-Westphalia,Germany"}]},{"given":"Frederic","family":"Wende","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum,Bochum,North Rhine-Westphalia,Germany"}]},{"given":"Martina Angela","family":"Sasse","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum,Bochum,North Rhine-Westphalia,Germany"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Elevation of privilege: Drawing developers into threat modeling","author":"shostack","year":"2014","journal-title":"2014 USE-NIX Summit on Gaming Games and Gamification in Security Education (3GSE 14)"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"ref33","first-page":"2489","article-title":"Can Security Become a Routine? A Study of Organizational Change in an Agile Software Development Group","author":"poller","year":"0"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEET.2017.18"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.58.3.472"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1093\/elt\/ccy059"},{"journal-title":"Backdoors and Breaches","year":"2019","key":"ref37"},{"key":"ref36","article-title":"Build it break it: Measuring and comparing development security","author":"ruef","year":"2015","journal-title":"8th Workshop on Cyber Security Experimentation and Test (CSET 15)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978382"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.008"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.4135\/9781446288719"},{"key":"ref27","first-page":"1","article-title":"Didaktische konzeption von serious games: Zur verkn&#x00FC;pfung von spiel-und lernangeboten","author":"kerres","year":"2009","journal-title":"MedienP&#x00E4;dagiogik Zeitschrift f&#x00FC;r Theorie und Praxis der Medienbildung"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1177\/1073191118793208"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ece.2017.10.002"},{"journal-title":"Serious Games","year":"1987","key":"ref1"},{"journal-title":"Snake and ladder","year":"2014","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2008.07.004"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287471"},{"key":"ref24","article-title":"Serious Games als Instrument in der F&#x00FC;hrungskr&#x00E4;f-teentwicklung","volume":"29","author":"helm","year":"2009","journal-title":"Handbuch E-Learning"},{"year":"2012","author":"gondree","key":"ref23"},{"key":"ref26","article-title":"The game experience questionnaire","volume":"46","author":"ijsselsteijn","year":"2013","journal-title":"Eindhoven Technische Universiteit Eindhoven"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1177\/1096250618814239"},{"key":"ref10","first-page":"1","article-title":"Challenge based learning in cybersecurity education","author":"cheung","year":"2011","journal-title":"Proceedings of the International Conference on Security and Management (SAM)"},{"key":"ref11","first-page":"1","article-title":"Effectiveness of cybersecurity competitions","author":"cheung","year":"2012","journal-title":"Proceedings of the International Conference on Security and Management (SAM) The Steering Committee of The World Congress in Computer Science Computer &#x2026;"},{"journal-title":"Tabletop Security Games & Cards","year":"2014","author":"shostack","key":"ref40"},{"key":"ref12","article-title":"Jail, hero or drug lord? turning a cyber security course into an 11 week choose your own adventure story","author":"chothia","year":"2017","journal-title":"2017 USENIX Workshop on Advances in Security Education (ASE 17)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1177\/1046878120933312"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1111\/ojoa.12084"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3389\/fped.2019.00013"},{"key":"ref16","article-title":"Leveraging competitive gamification for sustainable fun and profit in security education","author":"dabrowski","year":"2015","journal-title":"2015 USENIX Summit on Gaming Games and Gamification in Security Education (3GSE&#x2018;15)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516753"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmathb.2016.07.003"},{"journal-title":"OWASP Cornucopia","year":"2012","key":"ref19"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"65","DOI":"10.4018\/ijgbl.2011040105","article-title":"Collaborative strategic board games as a site for distributed computational thinking","volume":"1","author":"lee","year":"2011","journal-title":"International Journal of Game-Based Learning (IJGBL)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1177\/1098300717753833"},{"journal-title":"Dungeons and Data","year":"2018","author":"bressers","key":"ref6"},{"key":"ref5","article-title":"King of the hill: A novel cybersecurity competition for teaching penetration testing","author":"bock","year":"2018","journal-title":"2018 USENIX Workshop on Advances in Security Education (ASE 18)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312935"},{"key":"ref7","article-title":"PicoCTF: A game-based computer security competition for high school students","author":"chapman","year":"2014","journal-title":"2014 USE-NIX Summit on Gaming Games and Gamification in Security Education (3GSE 14)"},{"key":"ref49","first-page":"39","article-title":"A Systematic Review of Multi-media Tools for Cybersecurity Awareness and Education","volume":"54","author":"zhang-kennedy","year":"2021","journal-title":"ACM Comput Surv"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395522"},{"key":"ref46","first-page":"1","article-title":"What. hack: engaging anti-phishing training through a role-playing phishing simulation game","author":"wen","year":"2019","journal-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems"},{"journal-title":"The agile App Security Game","year":"2018","author":"weir","key":"ref45"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.58"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1177\/2059513117690012"},{"journal-title":"Pivots and Payloads","year":"2018","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON.2015.7095992"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376754"},{"journal-title":"VASSAL","year":"2021","key":"ref43"}],"event":{"name":"2022 IEEE\/ACM 44th International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET)","start":{"date-parts":[[2022,5,22]]},"location":"Pittsburgh, PA, USA","end":{"date-parts":[[2022,5,24]]}},"container-title":["2022 IEEE\/ACM 44th International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9793836\/9794144\/09794181.pdf?arnumber=9794181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T20:12:40Z","timestamp":1656965560000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9794181\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5]]},"references-count":49,"URL":"https:\/\/doi.org\/10.1109\/icse-seet55299.2022.9794181","relation":{},"subject":[],"published":{"date-parts":[[2022,5]]}}}