{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T06:46:40Z","timestamp":1750661200629,"version":"3.28.0"},"reference-count":44,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1109\/rivf48685.2020.9140730","type":"proceedings-article","created":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T17:32:06Z","timestamp":1594834326000},"page":"1-4","source":"Crossref","is-referenced-by-count":7,"title":["A Design Theory-Based Gamification Approach for Information Security Training"],"prefix":"10.1109","author":[{"given":"Tuan Anh","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Hiep","family":"Pham","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1610252.1610289"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1057\/ejis.2009.6","article-title":"Protection motivation and deterrence: a framework for security policy compliance in organisations","volume":"18","author":"tejaswini","year":"2009","journal-title":"European Journal of Information Systems"},{"journal-title":"Cyber Security Awareness Campaigns Why Do They Fail to Change Behaviour?","year":"2014","author":"bada","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.2308\/isys-51341"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65849-0_13"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1007\/0-387-33406-8_37","article-title":"Cyber security training and awareness through game play","author":"cone","year":"2006","journal-title":"Security and Privacy in Dynamic Environments"},{"journal-title":"Managing An Information Security and Privacy Awareness and Training Program","year":"2011","author":"herold","key":"ref37"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON.2012.6201149"},{"key":"ref35","first-page":"1","author":"labuschagne","year":"2011","journal-title":"Design of cyber security awareness game utilizing a social media framework"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-50"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.708787"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1057\/ejis.2009.10","article-title":"What levels of moral reasoning and values explain adherence to information security rules? An empirical study","volume":"18","author":"liisa","year":"2009","journal-title":"European Journal of Information Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00274"},{"journal-title":"The Importance of Training & Development in the Workplace","year":"2018","author":"frost","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2008.06.011"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.001"},{"journal-title":"Information Security Management Practices in Organisations","year":"2018","author":"alshaikh","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07668-3_23"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1108\/09685220010371394"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1108\/09685229810227649"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/861"},{"journal-title":"Cybersecurity&#x2019;s weakest link humans","year":"2016","author":"vishwanath","key":"ref4"},{"journal-title":"Why You Should Gamify Your Cybersecurity Training","year":"2017","key":"ref27"},{"key":"ref3","first-page":"1907","article-title":"State-of-the-art simulation systems for information security education","author":"pastor","year":"2010","journal-title":"Training and Awareness Madri"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1201\/1086\/43298.9.6.20010102\/30985.4"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1281320.1281322"},{"key":"ref5","first-page":"276","article-title":"The IT security adoption conundrum: An initial step toward validation of applicable measures","author":"warkentin","year":"2007","journal-title":"AMCIS 2007 Proceedings"},{"key":"ref8","first-page":"256","author":"nagarajan","year":"2012","journal-title":"Exploring game design for cybersecurity training"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.2307\/25750704"},{"journal-title":"Cyber Risk People Are Often The Weakest Link In The Security Chain","year":"2016","author":"culp","key":"ref2"},{"journal-title":"Theory-Building and Data Analysis in the Social Sciences","year":"1984","author":"asher","key":"ref9"},{"journal-title":"Gartner Says Worldwide Information Security Spending Will Grow 7 Percent to Reach $86 4 Billion in 2017","year":"2017","author":"moore","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572536"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1059524.1059531"},{"key":"ref21","article-title":"Persuasion as education for computer security","author":"forget","year":"2007","journal-title":"E-Learn World Conference on E-Learning in Corporate Government Healthcare and Higher Education"},{"key":"ref42","article-title":"A design theory for information security awareness","author":"puhakainen","year":"2006","journal-title":"Proc Information Science"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.12.005"},{"key":"ref41","article-title":"Featured talk: Measuring secure behavior: A research commentary","author":"warkentin","year":"2012","journal-title":"Annual symposium on information assurance & secure knowledge management"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.106"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/291469.291479"},{"journal-title":"The Gamification of Learning and Instruction Game-based Methods and Strategies for Training and Education","year":"2012","author":"kapp","key":"ref26"},{"journal-title":"A beginner's guide to action research","year":"2000","author":"dick","key":"ref43"},{"key":"ref25","first-page":"319","article-title":"A constructive approach to information systems security training: an action research experience","author":"heikka","year":"2008","journal-title":"AMCIS 2008 Proceedings"}],"event":{"name":"2020 RIVF International Conference on Computing and Communication Technologies (RIVF)","start":{"date-parts":[[2020,10,14]]},"location":"Ho Chi Minh City, Vietnam","end":{"date-parts":[[2020,10,15]]}},"container-title":["2020 RIVF International Conference on Computing and Communication Technologies (RIVF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9138608\/9140725\/09140730.pdf?arnumber=9140730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T17:55:49Z","timestamp":1656438949000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9140730\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/rivf48685.2020.9140730","relation":{},"subject":[],"published":{"date-parts":[[2020,10]]}}}