{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:35Z","timestamp":1750220855182,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T00:00:00Z","timestamp":1574294400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,21]]},"DOI":"10.1145\/3364510.3366163","type":"proceedings-article","created":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T13:35:33Z","timestamp":1575898533000},"page":"1-2","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Evaluating Cybersecurity-Related Competences through Serious Games"],"prefix":"10.1145","author":[{"given":"Sten","family":"M\u00e4ses","sequence":"first","affiliation":[{"name":"Tallinn University of Technology, Tallinn, Estonia"}]}],"member":"320","published-online":{"date-parts":[[2019,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/861"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.08.002"},{"key":"e_1_3_2_1_3_1","unstructured":"Tom Chothia and Chris Novakovic. 2015. An offline capture the flag-style virtual machine and an assessment of its value for cybersecurity education. In 2015 {USENIX} Summit on Gaming Games and Gamification in Security Education (3GSE 15)  Tom Chothia and Chris Novakovic. 2015. An offline capture the flag-style virtual machine and an assessment of its value for cybersecurity education. In 2015 {USENIX} Summit on Gaming Games and Gamification in Security Education (3GSE 15)"},{"key":"e_1_3_2_1_4_1","unstructured":"Yu-kai Chou. 2015. Actionable gamification: beyond points badges and leaderboards. Octalysis Group United States.  Yu-kai Chou. 2015. Actionable gamification: beyond points badges and leaderboards. Octalysis Group United States."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Jessica Dawson and Robert Thomson. 2018. The future cybersecurity workforce: Going beyond technical skills for successful cyber performance. Frontiers in psychology 9 (2018).  Jessica Dawson and Robert Thomson. 2018. The future cybersecurity workforce: Going beyond technical skills for successful cyber performance. Frontiers in psychology 9 (2018).","DOI":"10.3389\/fpsyg.2018.00744"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Timothy J Ellis and Yair Levy. 2009. Towards a Guide for Novice Researchers on Research Methodology: Review and Proposed Methods. Issues in Informing Science & Information Technology 6 (2009).  Timothy J Ellis and Yair Levy. 2009. Towards a Guide for Novice Researchers on Research Methodology: Review and Proposed Methods. Issues in Informing Science & Information Technology 6 (2009).","DOI":"10.28945\/1062"},{"key":"e_1_3_2_1_7_1","unstructured":"Margus Ernits Kaie Maennel Sten M\u00e4ses Olaf Maennel and Toomas Lepik. [n.d.]. From Simple Scoring Towards a Meaningful Interpretation of Learning in Cybersecurity Exercises. ([n. d.]). UNPUBLISHED.  Margus Ernits Kaie Maennel Sten M\u00e4ses Olaf Maennel and Toomas Lepik. [n.d.]. From Simple Scoring Towards a Meaningful Interpretation of Learning in Cybersecurity Exercises. ([n. d.]). UNPUBLISHED."},{"key":"e_1_3_2_1_8_1","first-page":"3025","article-title":"Does Gamification Work?-A Literature Review of Empirical Studies on Gamification","volume":"14","author":"Hamari Juho","year":"2014","journal-title":"HICSS"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795423"},{"volume-title":"Cyber Hygiene: The Big Picture. In Nordic Conference on Secure IT Systems. Springer, 218--226","year":"2018","author":"Maennel Kaie","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70290-2_8"},{"key":"e_1_3_2_1_12_1","unstructured":"Sten M\u00e4ses Heleri Aitsam and Liina Randmann. [n.d.]. A Method for adding cyberethical behaviour measurements to computer science homework assignments. ([n. d.]). UNPUBLISHED.  Sten M\u00e4ses Heleri Aitsam and Liina Randmann. [n.d.]. A Method for adding cyberethical behaviour measurements to computer science homework assignments. ([n. d.]). UNPUBLISHED."},{"volume-title":"ECGBL 2017 11th European Conference on Game-Based Learning","author":"M\u00e4ses Sten","key":"e_1_3_2_1_13_1"},{"volume-title":"ECRM 2019 18th European Conference on Research Methodology for Business and Management Studies","author":"M\u00e4ses Sten","key":"e_1_3_2_1_14_1"},{"volume-title":"Stenmap: Framework for Evaluating Cybersecurity-Related Skills Based on Computer Simulations. In Learning and Collaboration Technologies. Learning and Teaching","year":"2018","author":"M\u00e4ses Sten","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","unstructured":"Jelena Mirkovic and Peter AH Peterson. 2014. Class capture-the-flag exercises. In 2014 {USENIX} Summit on Gaming Games and Gamification in Security Education (3GSE 14).  Jelena Mirkovic and Peter AH Peterson. 2014. Class capture-the-flag exercises. In 2014 {USENIX} Summit on Gaming Games and Gamification in Security Education (3GSE 14)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.73"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.2005.00714.x"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Nicolaj Siggelkow. 2007. Persuasion with case studies. Academy of management journal 50 1 (2007) 20--24.  Nicolaj Siggelkow. 2007. Persuasion with case studies. Academy of management journal 50 1 (2007) 20--24.","DOI":"10.5465\/amj.2007.24160882"},{"key":"e_1_3_2_1_20_1","unstructured":"Mike Smith. 2005. Testing people at work: competencies in psychometric testing. BPS Blackwell Malden MA.  Mike Smith. 2005. Testing people at work: competencies in psychometric testing. BPS Blackwell Malden MA."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2839509.2844646"},{"key":"e_1_3_2_1_22_1","unstructured":"Joseph Werther Michael Zhivich Tim Leek and Nickolai Zeldovich. 2011. Experiences in cyber security education: The MIT Lincoln laboratory capture-the-flag exercise.. In CSET.  Joseph Werther Michael Zhivich Tim Leek and Nickolai Zeldovich. 2011. Experiences in cyber security education: The MIT Lincoln laboratory capture-the-flag exercise.. In CSET."}],"event":{"name":"Koli Calling '19: 19th Koli Calling International Conference on Computing Education Research","sponsor":["University of Helsinki","Univ. Eastern Finland University of Eastern Finland","The University of Adelaide, Australia","SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Koli Finland","acronym":"Koli Calling '19"},"container-title":["Proceedings of the 19th Koli Calling International Conference on Computing Education Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3364510.3366163","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3364510.3366163","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:23Z","timestamp":1750202603000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3364510.3366163"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,21]]},"references-count":22,"alternative-id":["10.1145\/3364510.3366163","10.1145\/3364510"],"URL":"https:\/\/doi.org\/10.1145\/3364510.3366163","relation":{},"subject":[],"published":{"date-parts":[[2019,11,21]]},"assertion":[{"value":"2019-11-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}