{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T04:23:59Z","timestamp":1773548639625,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T00:00:00Z","timestamp":1692921600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,25]]},"DOI":"10.1109\/icsecs58457.2023.10256329","type":"proceedings-article","created":{"date-parts":[[2023,9,26]],"date-time":"2023-09-26T17:36:02Z","timestamp":1695749762000},"page":"330-335","source":"Crossref","is-referenced-by-count":4,"title":["Implementation of Serious Games for Data Privacy and Protection Awareness in Cybersecurity"],"prefix":"10.1109","author":[{"given":"Siti Normaziah","family":"Ihsan","sequence":"first","affiliation":[{"name":"Universiti Malaysia Pahang,Faculty of Computing,Pahang,Malaysia"}]},{"given":"Tuty Asmawaty","family":"Abd Kadir","sequence":"additional","affiliation":[{"name":"Universiti Malaysia Pahang,Faculty of Computing,Pahang,Malaysia"}]},{"given":"Nurul Ishafira","family":"Ismail","sequence":"additional","affiliation":[{"name":"Universiti Malaysia Pahang,Faculty of Computing,Pahang,Malaysia"}]},{"given":"Kerk Zhi","family":"Yuan","sequence":"additional","affiliation":[{"name":"Teleperformance Malaysia,Selangor,Malaysia"}]},{"given":"Yeow Song","family":"Jie","sequence":"additional","affiliation":[{"name":"Sim IT Sdn Bhd,Johor,Malaysia"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63464-3_41"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.23919\/CISTI52073.2021.9476310"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81111-2_8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16290-9_40"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-8156-9.ch013"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06394-7_60"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3505270.3558328"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12113"},{"key":"ref2","article-title":"A case study of the capital one data breach","author":"novaes neto","year":"2020","journal-title":"Stuart E and Moraes G de Paula Anchises and Malara Borges Natasha A Case Study of the Capital One Data Breach (January 1 2020)"},{"key":"ref1","article-title":"Cybersecurity incident handling: a case study of the equifax data breach","volume":"19","author":"wang","year":"2018","journal-title":"Issues in Information Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1166\/asl.2018.12932"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SCCC51225.2020.9281253"},{"key":"ref19","article-title":"The lm-gm framework for serious games analysis","author":"lim","year":"2015","journal-title":"Pittsburgh University of Pittsburgh Pers"},{"key":"ref18","first-page":"21","article-title":"A conceptual frame-work for serious games","author":"yusoff","year":"0","journal-title":"2009 Ninth IEEE International Conference on Advanced Learning Technologies"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2018.5095"},{"key":"ref7","first-page":"194","article-title":"Enhancing cybersecurity skills by creating serious games","author":"\u0161v\u00e1bensk\u00fd","year":"0","journal-title":"Proceedings of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education"},{"key":"ref9","author":"alhashmi","year":"2021","journal-title":"Taxonomy of cyber-security awareness delivery methods A countermeasure for phishing threats"},{"key":"ref4","first-page":"1","article-title":"General data protection regulation","volume":"25","author":"regulation","year":"2018","journal-title":"InTouch"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-6655-7_3"},{"key":"ref6","first-page":"39","article-title":"The antitrust case against facebook: A monopolist's journey towards pervasive surveillance in spite of consumers' preference for privacy","volume":"16","author":"srinivasan","year":"2019","journal-title":"Berkeley Bus LJ"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3275571"}],"event":{"name":"2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)","location":"Penang, Malaysia","start":{"date-parts":[[2023,8,25]]},"end":{"date-parts":[[2023,8,27]]}},"container-title":["2023 IEEE 8th International Conference On Software Engineering and Computer Systems (ICSECS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10256260\/10256269\/10256329.pdf?arnumber=10256329","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T17:51:51Z","timestamp":1697478711000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10256329\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,25]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/icsecs58457.2023.10256329","relation":{},"subject":[],"published":{"date-parts":[[2023,8,25]]}}}