{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T08:42:56Z","timestamp":1774946576765,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,3]],"date-time":"2020-07-03T00:00:00Z","timestamp":1593734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National science foundation","award":["CNS1704087"],"award-info":[{"award-number":["CNS1704087"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,3]]},"DOI":"10.1145\/3357236.3395522","type":"proceedings-article","created":{"date-parts":[[2020,7,5]],"date-time":"2020-07-05T19:29:16Z","timestamp":1593977356000},"page":"1737-1749","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Hacked Time"],"prefix":"10.1145","author":[{"given":"Tianying","family":"Chen","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Margot","family":"Stewart","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Zhiyu","family":"Bai","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Eileen","family":"Chen","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Laura","family":"Dabbish","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Jessica","family":"Hammer","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"660","article-title":"A Review of Using Gaming Technology for Cyber-Security Awareness","volume":"6","author":"Alotaibi Faisal","year":"2016","unstructured":"Faisal Alotaibi , Steven Furnell , Ingo Stengel , and Maria Papadaki . 2016 . A Review of Using Gaming Technology for Cyber-Security Awareness . International Journal for Information Security Research (IJISR) 6 , 2 (2016), 660 -- 666 . Hacked Time: Design and Evaluation of a Self-Efficacy Based Cybersecurity Game DIS '20, July 6-10, 2020, Eindhoven, Netherlands Faisal Alotaibi, Steven Furnell, Ingo Stengel, and Maria Papadaki. 2016. A Review of Using Gaming Technology for Cyber-Security Awareness. International Journal for Information Security Research (IJISR) 6, 2 (2016), 660--666. Hacked Time: Design and Evaluation of a Self-Efficacy Based Cybersecurity Game DIS '20, July 6-10, 2020, Eindhoven, Netherlands","journal-title":"International Journal for Information Security Research (IJISR)"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11590361_14"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1177\/1046878117703749"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/VIS.2008.26"},{"key":"e_1_3_2_1_5_1","volume-title":"Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672","author":"Bada Maria","year":"2019","unstructured":"Maria Bada , Angela M Sasse , and Jason RC Nurse . 2019. Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672 ( 2019 ). Maria Bada, Angela M Sasse, and Jason RC Nurse. 2019. Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672 (2019)."},{"key":"e_1_3_2_1_6_1","volume-title":"Self-efficacy: toward a unifying theory of behavioral change. Psychological review 84, 2","author":"Bandura Albert","year":"1977","unstructured":"Albert Bandura . 1977. Self-efficacy: toward a unifying theory of behavioral change. Psychological review 84, 2 ( 1977 ), 191. Albert Bandura. 1977. Self-efficacy: toward a unifying theory of behavioral change. Psychological review 84, 2 (1977), 191."},{"key":"e_1_3_2_1_7_1","volume-title":"Perceived self-efficacy in the exercise of control over AIDS infection. Evaluation and program planning 13, 1","author":"Bandura Albert","year":"1990","unstructured":"Albert Bandura . 1990. Perceived self-efficacy in the exercise of control over AIDS infection. Evaluation and program planning 13, 1 ( 1990 ), 9--17. Albert Bandura. 1990. Perceived self-efficacy in the exercise of control over AIDS infection. Evaluation and program planning 13, 1 (1990), 9--17."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2019.000-1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/08839510590910200"},{"key":"e_1_3_2_1_10_1","volume-title":"Behavior Change Research and Theory","author":"Briggs Pamela","unstructured":"Pamela Briggs , Debbie Jeske , and Lynne Coventry . 2017. Behavior change interventions for cybersecurity . In Behavior Change Research and Theory . Elsevier , 115--136. Pamela Briggs, Debbie Jeske, and Lynne Coventry. 2017. Behavior change interventions for cybersecurity. In Behavior Change Research and Theory. Elsevier, 115--136."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312935"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2967934.2968103"},{"key":"e_1_3_2_1_13_1","volume-title":"A systematic literature review of empirical evidence on computer games and serious games.computers & education 59, 2","author":"Connolly Thomas M","year":"2012","unstructured":"Thomas M Connolly , Elizabeth A Boyle , Ewan MacArthur , Thomas Hainey , and James M Boyle . 2012. A systematic literature review of empirical evidence on computer games and serious games.computers & education 59, 2 ( 2012 ), 661--686. Thomas M Connolly, Elizabeth A Boyle, Ewan MacArthur, Thomas Hainey, and James M Boyle. 2012. A systematic literature review of empirical evidence on computer games and serious games.computers & education 59, 2 (2012), 661--686."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1184\/R1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2015.07.006"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. SOUPS","volume":"14","author":"Das Sauvik","year":"2014","unstructured":"Sauvik Das , Tiffany Hyun-Jin Kim , Laura A Dabbish , and Jason I Hong . 2014 . The effect of social influence on security sensitivity . In Proc. SOUPS , Vol. 14 . Sauvik Das, Tiffany Hyun-Jin Kim, Laura A Dabbish, and Jason I Hong. 2014. The effect of social influence on security sensitivity. In Proc. SOUPS, Vol. 14."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660271"},{"key":"e_1_3_2_1_18_1","volume-title":"Self-efficacy: the third factor besides attitude and subjective norm as a predictor of behavioural intentions. Health education research 3, 3","author":"de Vries Hein","year":"1988","unstructured":"Hein de Vries , Margo Dijkstra , and Piet Kuhlman . 1988. Self-efficacy: the third factor besides attitude and subjective norm as a predictor of behavioural intentions. Health education research 3, 3 ( 1988 ), 273--282. Hein de Vries, Margo Dijkstra, and Piet Kuhlman. 1988. Self-efficacy: the third factor besides attitude and subjective norm as a predictor of behavioural intentions. Health education research 3, 3 (1988), 273--282."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.joep.2011.10.009"},{"key":"e_1_3_2_1_20_1","volume-title":"Twelfth symposium on usable privacy and security (SOUPS","author":"Fagan Michael","year":"2016","unstructured":"Michael Fagan and Mohammad Maifi Hasan Khan . 2016 . Why do they do what they do?: A study of what motivates users to (not) follow computer security advice . In Twelfth symposium on usable privacy and security (SOUPS 2016). 59--75. Michael Fagan and Mohammad Maifi Hasan Khan. 2016. Why do they do what they do?: A study of what motivates users to (not) follow computer security advice. In Twelfth symposium on usable privacy and security (SOUPS 2016). 59--75."},{"key":"e_1_3_2_1_21_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Faklaris Cori","year":"2019","unstructured":"Cori Faklaris , Laura A Dabbish , and Jason I Hong . 2019 . A Self-Report Measure of End-User Security Attitudes (SA-6) . In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019). Cori Faklaris, Laura A Dabbish, and Jason I Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Tracy Fullerton. 2014. Game design workshop: a playcentric approach to creating innovative games. AK Peters\/CRC Press.  Tracy Fullerton. 2014. Game design workshop: a playcentric approach to creating innovative games. AK Peters\/CRC Press.","DOI":"10.1201\/b16671"},{"key":"e_1_3_2_1_23_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Haney Julie M","year":"2018","unstructured":"Julie M Haney and Wayne G Lutters . 2018 . \" It's Scary... It's Confusing... It's Dull\": How Cybersecurity Advocates Overcome Negative Perceptions of Security . In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 411--425. Julie M Haney and Wayne G Lutters. 2018. \" It's Scary... It's Confusing... It's Dull\": How Cybersecurity Advocates Overcome Negative Perceptions of Security. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 411--425."},{"key":"e_1_3_2_1_24_1","volume-title":"Attentive Turkers: MTurk participants perform better on online attention checks than do subject pool participants. Behavior research methods 48, 1","author":"Hauser David J","year":"2016","unstructured":"David J Hauser and Norbert Schwarz . 2016 . Attentive Turkers: MTurk participants perform better on online attention checks than do subject pool participants. Behavior research methods 48, 1 (2016), 400--407. David J Hauser and Norbert Schwarz. 2016. Attentive Turkers: MTurk participants perform better on online attention checks than do subject pool participants. Behavior research methods 48, 1 (2016), 400--407."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.17083\/ijsg.v3i1.107"},{"key":"e_1_3_2_1_26_1","volume-title":"Eleventh Symposium On Usable Privacy and Security ({SOUPS}","author":"Ion Iulia","year":"2015","unstructured":"Iulia Ion , Rob Reeder , and Sunny Consolvo . 2015 . \"... no one can hack my mind\": Comparing Expert and Non-Expert Security Practices . In Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015). 327--346. Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. \"... no one can hack my mind\": Comparing Expert and Non-Expert Security Practices. In Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015). 327--346."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753637"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12226"},{"key":"e_1_3_2_1_29_1","volume-title":"Applying psychological theories to promote long-term maintenance of health behaviors. American journal of lifestyle medicine 10, 6","author":"Joseph Rodney P","year":"2016","unstructured":"Rodney P Joseph , Casey L Daniel , Herpreet Thind , Tanya J Benitez , and Dori Pekmezi . 2016. Applying psychological theories to promote long-term maintenance of health behaviors. American journal of lifestyle medicine 10, 6 ( 2016 ), 356--368. Rodney P Joseph, Casey L Daniel, Herpreet Thind, Tanya J Benitez, and Dori Pekmezi. 2016. Applying psychological theories to promote long-term maintenance of health behaviors. American journal of lifestyle medicine 10, 6 (2016), 356--368."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/IMSAA.2008.4753929"},{"key":"e_1_3_2_1_31_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS)","volume":"4","author":"Kang Ruogu","year":"2014","unstructured":"Ruogu Kang , Stephanie Brown , Laura Dabbish , and Sara Kiesler . 2014 . Privacy attitudes of Mechanical Turk workers and the US public . In Symposium on Usable Privacy and Security (SOUPS) , Vol. 4 . 1. Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy attitudes of Mechanical Turk workers and the US public. In Symposium on Usable Privacy and Security (SOUPS), Vol. 4. 1."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064663.3064721"},{"key":"e_1_3_2_1_33_1","volume-title":"Design and analysis: A researcher's handbook","author":"Keppel Geoffrey","unstructured":"Geoffrey Keppel . 1991. Design and analysis: A researcher's handbook . Prentice Hall, Inc. Geoffrey Keppel. 1991. Design and analysis: A researcher's handbook. Prentice Hall, Inc."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11423-006-0637-3"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69132-7_56"},{"key":"e_1_3_2_1_36_1","volume-title":"What is the sense of agency and why does it matter? Frontiers in psychology 7","author":"Moore James W","year":"2016","unstructured":"James W Moore . 2016. What is the sense of agency and why does it matter? Frontiers in psychology 7 ( 2016 ), 1272. James W Moore. 2016. What is the sense of agency and why does it matter? Frontiers in psychology 7 (2016), 1272."},{"key":"e_1_3_2_1_37_1","volume-title":"Games: Agency as Art.","author":"Nguyen C Thi","year":"2018","unstructured":"C Thi Nguyen . 2018 . Games: Agency as Art. (2018). C Thi Nguyen. 2018. Games: Agency as Art. (2018)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978307"},{"key":"e_1_3_2_1_39_1","unstructured":"Pew research center. 2017. Password management and mobile security. https:\/\/www.pewinternet.org\/2017\/01\/26\/2-password-management-andmobile-security\/  Pew research center. 2017. Password management and mobile security. https:\/\/www.pewinternet.org\/2017\/01\/26\/2-password-management-andmobile-security\/"},{"key":"e_1_3_2_1_40_1","volume-title":"Self-efficacy in information security: Its influence on end users' information security practice behavior.computers & Security 28, 8","author":"Rhee Hyeun-Suk","year":"2009","unstructured":"Hyeun-Suk Rhee , Cheongtag Kim , and Young U Ryu . 2009. Self-efficacy in information security: Its influence on end users' information security practice behavior.computers & Security 28, 8 ( 2009 ), 816--826. Hyeun-Suk Rhee, Cheongtag Kim, and Young U Ryu. 2009. Self-efficacy in information security: Its influence on end users' information security practice behavior.computers & Security 28, 8 (2009), 816--826."},{"key":"e_1_3_2_1_41_1","volume-title":"A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1","author":"Rogers Ronald W","year":"1975","unstructured":"Ronald W Rogers . 1975. A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1 ( 1975 ), 93--114. Ronald W Rogers. 1975. A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1 (1975), 93--114."},{"key":"e_1_3_2_1_42_1","volume-title":"Self-efficacy and academic motivation. Educational psychologist 26, 3--4","author":"Schunk Dale H","year":"1991","unstructured":"Dale H Schunk . 1991. Self-efficacy and academic motivation. Educational psychologist 26, 3--4 ( 1991 ), 207--231. Dale H Schunk. 1991. Self-efficacy and academic motivation. Educational psychologist 26, 3--4 (1991), 207--231."},{"key":"e_1_3_2_1_43_1","volume-title":"10 cyber security facts and statistics for","author":"Norton","year":"2018","unstructured":"Norton security. 2018. 10 cyber security facts and statistics for 2018 . Norton security. 2018. 10 cyber security facts and statistics for 2018."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064663.3064732"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_2_1_46_1","volume-title":"Saleem Alhabash, Robert LaRose, and Nora J Rifon.","author":"Shillair Ruth","year":"2015","unstructured":"Ruth Shillair , Shelia R Cotten , Hsin-Yi Sandy Tsai , Saleem Alhabash, Robert LaRose, and Nora J Rifon. 2015 . Online safety begins with you and me: Convincing Internet users to protect themselves.computers in Human Behavior 48 (2015), 199--207. Ruth Shillair, Shelia R Cotten, Hsin-Yi Sandy Tsai, Saleem Alhabash, Robert LaRose, and Nora J Rifon. 2015. Online safety begins with you and me: Convincing Internet users to protect themselves.computers in Human Behavior 48 (2015), 199--207."},{"key":"e_1_3_2_1_47_1","unstructured":"Ben Shneiderman. 2010. Designing the user interface: strategies for effective human computer interaction. Pearson Education India.  Ben Shneiderman. 2010. Designing the user interface: strategies for effective human computer interaction. Pearson Education India."},{"key":"e_1_3_2_1_48_1","volume-title":"Marshall H Becker, and Irwin M Rosenstock.","author":"Strecher Victor J","year":"1986","unstructured":"Victor J Strecher , Brenda McEvoy DeVellis , Marshall H Becker, and Irwin M Rosenstock. 1986 . The role of self-efficacy in achieving health behavior change. Health education quarterly 13, 1 (1986), 73--92. Victor J Strecher, Brenda McEvoy DeVellis, Marshall H Becker, and Irwin M Rosenstock. 1986. The role of self-efficacy in achieving health behavior change. Health education quarterly 13, 1 (1986), 73--92."},{"key":"e_1_3_2_1_49_1","volume-title":"Sunny SJ Lin, and Shian-Shyong Tseng","author":"Chih-Yuan Sun Jerry","year":"2016","unstructured":"Jerry Chih-Yuan Sun , Shih-Jou Yu , Sunny SJ Lin, and Shian-Shyong Tseng . 2016 . The mediating effect of anti-phishing self-efficacy between college students' internet self-efficacy and anti-phishing behavior and gender difference.computers in Human Behavior 59 (2016), 249--257. Jerry Chih-Yuan Sun, Shih-Jou Yu, Sunny SJ Lin, and Shian-Shyong Tseng. 2016. The mediating effect of anti-phishing self-efficacy between college students' internet self-efficacy and anti-phishing behavior and gender difference.computers in Human Behavior 59 (2016), 249--257."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10603-014-9273-1"},{"key":"e_1_3_2_1_51_1","unstructured":"Karen Tanenbaum and Joshua Tanenbaum. 2009.commitment to meaning: a reframing of agency in games. (2009).  Karen Tanenbaum and Joshua Tanenbaum. 2009.commitment to meaning: a reframing of agency in games. (2009)."},{"key":"e_1_3_2_1_52_1","volume-title":"Tanya Jane McGill, and Xuequn Wang","author":"Thompson Nik","year":"2017","unstructured":"Nik Thompson , Tanya Jane McGill, and Xuequn Wang . 2017 . \"Security begins at home\": Determinants of home computer and mobile device security behavior. computers & security 70 (2017), 376--391. Nik Thompson, Tanya Jane McGill, and Xuequn Wang. 2017. \"Security begins at home\": Determinants of home computer and mobile device security behavior. computers & security 70 (2017), 376--391."},{"key":"e_1_3_2_1_53_1","volume-title":"Tandem Transformational Game Design: A Game Design Process Case Study. DIS '20","author":"To Alexandra","year":"2020","unstructured":"Alexandra To , Elaine Fath , Eda Zhang , Safinah Ali , Catherine Kildunne , Anny Fan , Jessica Hammer , and Geoff Kaufman . [n.d.]. Tandem Transformational Game Design: A Game Design Process Case Study. DIS '20 , July 6-10, 2020 , Eindhoven, Netherlands Chen et al. Alexandra To, Elaine Fath, Eda Zhang, Safinah Ali, Catherine Kildunne, Anny Fan, Jessica Hammer, and Geoff Kaufman. [n.d.]. Tandem Transformational Game Design: A Game Design Process Case Study. DIS '20, July 6-10, 2020, Eindhoven, Netherlands Chen et al."},{"key":"e_1_3_2_1_54_1","volume-title":"Understanding online safety behaviors: A protection motivation theory perspective.computers & Security 59","author":"Tsai Sandy","year":"2016","unstructured":"Hsin-yi Sandy Tsai , Mengtian Jiang , Saleem Alhabash , Robert LaRose , Nora J Rifon , and Shelia R Cotten . 2016. Understanding online safety behaviors: A protection motivation theory perspective.computers & Security 59 ( 2016 ), 138-- 150. Hsin-yi Sandy Tsai, Mengtian Jiang, Saleem Alhabash, Robert LaRose, Nora J Rifon, and Shelia R Cotten. 2016. Understanding online safety behaviors: A protection motivation theory perspective.computers & Security 59 (2016), 138-- 150."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1080\/108107396127988"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0031311"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2282338.2282351"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1080\/17538157.2016.1200053"}],"event":{"name":"DIS '20: Designing Interactive Systems Conference 2020","location":"Eindhoven Netherlands","acronym":"DIS '20","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2020 ACM Designing Interactive Systems Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357236.3395522","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357236.3395522","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3357236.3395522","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:26Z","timestamp":1750200086000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3357236.3395522"}},"subtitle":["Design and Evaluation of a Self-Efficacy Based Cybersecurity Game"],"short-title":[],"issued":{"date-parts":[[2020,7,3]]},"references-count":58,"alternative-id":["10.1145\/3357236.3395522","10.1145\/3357236"],"URL":"https:\/\/doi.org\/10.1145\/3357236.3395522","relation":{},"subject":[],"published":{"date-parts":[[2020,7,3]]},"assertion":[{"value":"2020-07-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}