{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T06:46:30Z","timestamp":1750661190606,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T00:00:00Z","timestamp":1574294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,21]]},"DOI":"10.1145\/3364510.3364519","type":"proceedings-article","created":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T13:35:33Z","timestamp":1575898533000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["IoT-Poly"],"prefix":"10.1145","author":[{"given":"Tan","family":"Omiya","sequence":"first","affiliation":[{"name":"Graduate School of Science and Technology, Nara Institute of Science and Technology, Ikoma, Nara, Japan"}]},{"given":"Doudou","family":"Fall","sequence":"additional","affiliation":[{"name":"Graduate School of Science and Technology, Nara Institute of Science and Technology, Ikoma, Nara, Japan"}]},{"given":"Youki","family":"Kadobayashi","sequence":"additional","affiliation":[{"name":"Graduate School of Science and Technology, Nara Institute of Science and Technology, Ikoma, Nara, Japan"}]}],"member":"320","published-online":{"date-parts":[[2019,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Federal Emergency Management Agency. [n. d.]. Homeland Security Exercise and Evaluation Program. https:\/\/preptoolkit.fema.gov\/documents\/1269813\/1269861\/HSEEP_Revision_Apr13_Final.pdf. (Accessed on 11\/14\/2018).  Federal Emergency Management Agency. [n. d.]. Homeland Security Exercise and Evaluation Program. https:\/\/preptoolkit.fema.gov\/documents\/1269813\/1269861\/HSEEP_Revision_Apr13_Final.pdf. (Accessed on 11\/14\/2018)."},{"key":"e_1_3_2_1_2_1","unstructured":"Japan Network Security Association. [n. d.]. Security Body of Knowledge. https:\/\/www.jnsa.org\/result\/2017\/skillmap\/. (Accessed on 12\/08\/2018).  Japan Network Security Association. [n. d.]. Security Body of Knowledge. https:\/\/www.jnsa.org\/result\/2017\/skillmap\/. (Accessed on 12\/08\/2018)."},{"volume-title":"Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions","author":"Bodungen Clint","key":"e_1_3_2_1_3_1","unstructured":"Clint Bodungen , Bryan Singer , Aaron Shbeeb , Kyle Wilhoit , and Stephen Hilt . 2016. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions . McGraw-Hill Education . Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, and Stephen Hilt. 2016. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions. McGraw-Hill Education."},{"key":"e_1_3_2_1_4_1","unstructured":"SoftBank C&S. [n. d.]. 2017 Global Information Security Workforce Study. https:\/\/japan.zdnet.com\/paper\/30001014\/30002470\/. (Accessed on 04\/18\/2018).  SoftBank C&S. [n. d.]. 2017 Global Information Security Workforce Study. https:\/\/japan.zdnet.com\/paper\/30001014\/30002470\/. (Accessed on 04\/18\/2018)."},{"key":"e_1_3_2_1_5_1","unstructured":"ENISA. [n. d.]. Baseline Security Recommendations for IoT. https:\/\/www.enisa.europa.eu\/publications\/baseline-security-recommendations-for-iot\/at_download\/fullReport. (Accessed on 04\/20\/2018).  ENISA. [n. d.]. Baseline Security Recommendations for IoT. https:\/\/www.enisa.europa.eu\/publications\/baseline-security-recommendations-for-iot\/at_download\/fullReport. (Accessed on 04\/20\/2018)."},{"key":"e_1_3_2_1_6_1","unstructured":"enPIT Security. [n. d.]. SecCap. https:\/\/www.seccap.jp\/gs\/index.html. (Accessed on 04\/21\/2018).  enPIT Security. [n. d.]. SecCap. https:\/\/www.seccap.jp\/gs\/index.html. (Accessed on 04\/21\/2018)."},{"key":"e_1_3_2_1_7_1","unstructured":"Center for Cyber Safety and Education. [n. d.]. 2017 Global Information Security Workforce Study. https:\/\/iamcybersafe.org\/wp-content\/uploads\/2017\/06\/europe-gisws-report.pdf. (Accessed on 12\/25\/2018).  Center for Cyber Safety and Education. [n. d.]. 2017 Global Information Security Workforce Study. https:\/\/iamcybersafe.org\/wp-content\/uploads\/2017\/06\/europe-gisws-report.pdf. (Accessed on 12\/25\/2018)."},{"key":"e_1_3_2_1_8_1","volume-title":"EGameFlow: A scale to measure learners' enjoyment of e-learning games. Computers & Education 52, 1 (1","author":"Fu F.","year":"2009","unstructured":"F. Fu , R. Su , and S Yu. 2009. EGameFlow: A scale to measure learners' enjoyment of e-learning games. Computers & Education 52, 1 (1 2009 ), 101--112. F. Fu, R. Su, and S Yu. 2009. EGameFlow: A scale to measure learners' enjoyment of e-learning games. Computers & Education 52, 1 (1 2009), 101--112."},{"key":"e_1_3_2_1_9_1","unstructured":"GitHub. [n. d.]. IoT-Poly. https:\/\/github.com\/nabetan\/IoT-Poly. (Accessed on 03\/14\/2019).  GitHub. [n. d.]. IoT-Poly. https:\/\/github.com\/nabetan\/IoT-Poly. (Accessed on 03\/14\/2019)."},{"key":"e_1_3_2_1_10_1","volume-title":"Taking educational games seriously: using the RETAIN model to design endogenous fantasy into standalone educational games. Education Tech Research Dev 56 (12","author":"Gunter A. G.","year":"2008","unstructured":"A. G. Gunter , F. R. Kenny , and H. E Vick . 2008. Taking educational games seriously: using the RETAIN model to design endogenous fantasy into standalone educational games. Education Tech Research Dev 56 (12 2008 ), 511--537. A. G. Gunter, F. R. Kenny, and H. E Vick. 2008. Taking educational games seriously: using the RETAIN model to design endogenous fantasy into standalone educational games. Education Tech Research Dev 56 (12 2008), 511--537."},{"key":"e_1_3_2_1_11_1","unstructured":"Trend Micro Incorporated. [n. d.]. Incident response board game. http:\/\/www.trendmicro.co.jp\/jp\/security-intelligence\/learning\/index.html. (Accessed on 08\/14\/2017).  Trend Micro Incorporated. [n. d.]. Incident response board game. http:\/\/www.trendmicro.co.jp\/jp\/security-intelligence\/learning\/index.html. (Accessed on 08\/14\/2017)."},{"key":"e_1_3_2_1_12_1","unstructured":"Japan Information-technology Promotion Agency. [n. d.]. https:\/\/www.ipa.go.jp\/icscoe\/program\/core_human_resource\/index.html. (Accessed on 04\/21\/2018).  Japan Information-technology Promotion Agency. [n. d.]. https:\/\/www.ipa.go.jp\/icscoe\/program\/core_human_resource\/index.html. (Accessed on 04\/21\/2018)."},{"key":"e_1_3_2_1_13_1","unstructured":"Japan Information-technology Promotion Agency. [n. d.]. https:\/\/www.ipa.go.jp\/security\/vuln\/documents\/vuln_TCPIP.pdf. (Accessed on 03\/16\/2019).  Japan Information-technology Promotion Agency. [n. d.]. https:\/\/www.ipa.go.jp\/security\/vuln\/documents\/vuln_TCPIP.pdf. (Accessed on 03\/16\/2019)."},{"key":"e_1_3_2_1_14_1","unstructured":"Japan Information-technology Promotion Agency. [n. d.]. 10 major threat. https:\/\/www.ipa.go.jp\/files\/000065376.pdf. (Accessed on 04\/18\/2018).  Japan Information-technology Promotion Agency. [n. d.]. 10 major threat. https:\/\/www.ipa.go.jp\/files\/000065376.pdf. (Accessed on 04\/18\/2018)."},{"key":"e_1_3_2_1_15_1","volume-title":"Evaluation of Game-Based Learning in Cybersecurity Education for High School Students. Journal of Education and Learning (EduLearn) 12 (02","author":"Jin Ge","year":"2018","unstructured":"Ge Jin , Manghui Tu , Tae-Hoon Kim , Justin Heffron , and Jonathan White . 2018. Evaluation of Game-Based Learning in Cybersecurity Education for High School Students. Journal of Education and Learning (EduLearn) 12 (02 2018 ), 150. https:\/\/doi.org\/10.11591\/edulearn.v12i1.7736 10.11591\/edulearn.v12i1.7736 Ge Jin, Manghui Tu, Tae-Hoon Kim, Justin Heffron, and Jonathan White. 2018. Evaluation of Game-Based Learning in Cybersecurity Education for High School Students. Journal of Education and Learning (EduLearn) 12 (02 2018), 150. https:\/\/doi.org\/10.11591\/edulearn.v12i1.7736"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159591"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"John M. Keller. 2010. Motivational Design for Learning and Performance: The ARCS Model Approach. Kitaoji.  John M. Keller. 2010. Motivational Design for Learning and Performance: The ARCS Model Approach. Kitaoji.","DOI":"10.1007\/978-1-4419-1250-3"},{"key":"e_1_3_2_1_18_1","unstructured":"MITRE. [n. d.]. CAPEC\u2122 A Community Resource for Identifying and Understanding Attacks. https:\/\/capec.mitre.org\/. (Accessed on 09\/19\/2017).  MITRE. [n. d.]. CAPEC\u2122 A Community Resource for Identifying and Understanding Attacks. https:\/\/capec.mitre.org\/. (Accessed on 09\/19\/2017)."},{"key":"e_1_3_2_1_19_1","volume-title":"Eliciting Persona Characteristics for Risk Based Decision Making. In 32nd British Computer Society Human Computer Interaction Conference.","author":"M'Manga Andrew","year":"2018","unstructured":"Andrew M'Manga , Shamal Faily , John Mcalaney , Chris Williams , Youki Kadobayashi , and Daisuke Miyamoto . 2018 . Eliciting Persona Characteristics for Risk Based Decision Making. In 32nd British Computer Society Human Computer Interaction Conference. Andrew M'Manga, Shamal Faily, John Mcalaney, Chris Williams, Youki Kadobayashi, and Daisuke Miyamoto. 2018. Eliciting Persona Characteristics for Risk Based Decision Making. In 32nd British Computer Society Human Computer Interaction Conference."},{"key":"e_1_3_2_1_20_1","unstructured":"MOTEX. [n. d.]. 2017 Global Information Security Workforce Study. https:\/\/www.motex.co.jp\/nomore\/report\/5385\/. (Accessed on 10\/31\/2018).  MOTEX. [n. d.]. 2017 Global Information Security Workforce Study. https:\/\/www.motex.co.jp\/nomore\/report\/5385\/. (Accessed on 10\/31\/2018)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3323771.3323792"},{"key":"e_1_3_2_1_22_1","unstructured":"2018 USENIX Workshop on Advances in Security Education. [n. d.]. Gitbased CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competitions. https:\/\/www.usenix.org\/sites\/default\/files\/conference\/protected-files\/ase18_slides_wi.pdf. (Accessed on 03\/11\/2019).  2018 USENIX Workshop on Advances in Security Education. [n. d.]. Gitbased CTF: A Simple and Effective Approach to Organizing In-Course Attack-and-Defense Security Competitions. https:\/\/www.usenix.org\/sites\/default\/files\/conference\/protected-files\/ase18_slides_wi.pdf. (Accessed on 03\/11\/2019)."},{"key":"e_1_3_2_1_23_1","unstructured":"OWASP. [n. d.]. IoT Attack Surface Areas Project. https:\/\/www.owasp.org\/index. php\/OWASP_Internet_of_Things_Project#tab=IoT_Attack_Surface_Areas. (Accessed on 10\/17\/2018).  OWASP. [n. d.]. IoT Attack Surface Areas Project. https:\/\/www.owasp.org\/index. php\/OWASP_Internet_of_Things_Project#tab=IoT_Attack_Surface_Areas. (Accessed on 10\/17\/2018)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEET.2017.11"},{"key":"e_1_3_2_1_25_1","unstructured":"Homeland Security. [n. d.]. Strategic Principles for Securing the Internet of Things. https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/Strategic_Principles_for_Securing_the_Internet_of_Things-2016-1115-FINAL....pdf. (Accessed on 03\/11\/2019).  Homeland Security. [n. d.]. Strategic Principles for Securing the Internet of Things. https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/Strategic_Principles_for_Securing_the_Internet_of_Things-2016-1115-FINAL....pdf. (Accessed on 03\/11\/2019)."},{"volume-title":"threat modeling designing for security","author":"Shostack Adam","key":"e_1_3_2_1_26_1","unstructured":"Adam Shostack . 2014. threat modeling designing for security . WILEY. Adam Shostack. 2014. threat modeling designing for security. WILEY."},{"key":"e_1_3_2_1_27_1","unstructured":"Katsuaki Suzuki. 2010. Training Design Manual: Instructional Design for Human Resource Development. Kitaoji.  Katsuaki Suzuki. 2010. Training Design Manual: Instructional Design for Human Resource Development. Kitaoji."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3197091.3197123"},{"key":"e_1_3_2_1_29_1","unstructured":"Educational Technology. [n. d.]. ADDIE Model: Instructional Design. https:\/\/educationaltechnology.net\/the-addie-model-instructional-design\/. (Accessed on 03\/24\/2019).  Educational Technology. [n. d.]. ADDIE Model: Instructional Design. https:\/\/educationaltechnology.net\/the-addie-model-instructional-design\/. (Accessed on 03\/24\/2019)."},{"key":"e_1_3_2_1_30_1","volume-title":"Educational Design Research for the Development of a Collectible Card Game for Cybersecurity Learning. Journal of Formative Design in Learning","author":"Thomas Michael K","year":"2019","unstructured":"Michael K Thomas , Andria Shyjka , Skip Kumm , and Rigel Gjomemo . 2019. Educational Design Research for the Development of a Collectible Card Game for Cybersecurity Learning. Journal of Formative Design in Learning ( 2019 ), 1--12. Michael K Thomas, Andria Shyjka, Skip Kumm, and Rigel Gjomemo. 2019. Educational Design Research for the Development of a Collectible Card Game for Cybersecurity Learning. Journal of Formative Design in Learning (2019), 1--12."}],"event":{"name":"Koli Calling '19: 19th Koli Calling International Conference on Computing Education Research","sponsor":["University of Helsinki","Univ. Eastern Finland University of Eastern Finland","The University of Adelaide, Australia","SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Koli Finland","acronym":"Koli Calling '19"},"container-title":["Proceedings of the 19th Koli Calling International Conference on Computing Education Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3364510.3364519","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3364510.3364519","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:30Z","timestamp":1750202610000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3364510.3364519"}},"subtitle":["An IoT Security Game Practice Tool for Learners Motivation and Skills Acquisition"],"short-title":[],"issued":{"date-parts":[[2019,11,21]]},"references-count":30,"alternative-id":["10.1145\/3364510.3364519","10.1145\/3364510"],"URL":"https:\/\/doi.org\/10.1145\/3364510.3364519","relation":{},"subject":[],"published":{"date-parts":[[2019,11,21]]},"assertion":[{"value":"2019-11-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}