{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T16:47:07Z","timestamp":1776271627560,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,3,3]],"date-time":"2021-03-03T00:00:00Z","timestamp":1614729600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,3,3]]},"DOI":"10.1145\/3408877.3432544","type":"proceedings-article","created":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T18:45:38Z","timestamp":1614969938000},"page":"1135-1141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["To Gamify or Not?"],"prefix":"10.1145","author":[{"given":"Mac","family":"Malone","sequence":"first","affiliation":[{"name":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]},{"given":"Yicheng","family":"Wang","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]},{"given":"Kedrian","family":"James","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]},{"given":"Murray","family":"Anderegg","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]},{"given":"Jan","family":"Werner","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]},{"given":"Fabian","family":"Monrose","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,3,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.edurev.2020.100322"},{"key":"e_1_3_2_1_2_1","unstructured":"James S. Beri Kenneth E. Berlinn Mary E. Blackmon Lynda S. Jackson James Petrie and Randy A. Leipa. [n.d.]. Measuring Student Growth: A Practical Guide to Educator Evaluation.  James S. Beri Kenneth E. Berlinn Mary E. Blackmon Lynda S. Jackson James Petrie and Randy A. Leipa. [n.d.]. Measuring Student Growth: A Practical Guide to Educator Evaluation."},{"key":"e_1_3_2_1_3_1","unstructured":"Martin Carlisle Michael Chiaramonte and David Caswell. 2015. Using CTFs for an Undergraduate Cyber Education. In Summit on Gaming Games and Gamification in Security Education.  Martin Carlisle Michael Chiaramonte and David Caswell. 2015. Using CTFs for an Undergraduate Cyber Education. In Summit on Gaming Games and Gamification in Security Education."},{"key":"e_1_3_2_1_4_1","volume-title":"Conference for the Study of Innovation and Learning Technologies.","author":"Codish David","year":"2014","unstructured":"David Codish and Ravid Gilad . 2014 . Personality Based Gamification -- Educational Gamification for Extroverts and Introverts . In Conference for the Study of Innovation and Learning Technologies. David Codish and Ravid Gilad. 2014. Personality Based Gamification -- Educational Gamification for Extroverts and Introverts. In Conference for the Study of Innovation and Learning Technologies."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2012.03.004"},{"key":"e_1_3_2_1_6_1","unstructured":"Adrian Dabrowski Markus Kammerstetter Eduard Thamm Edgar Weippl and Wolfgang Kastner. 2015. Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education. In Summit on Gaming Games and Gamification in Security Education.  Adrian Dabrowski Markus Kammerstetter Eduard Thamm Edgar Weippl and Wolfgang Kastner. 2015. Leveraging Competitive Gamification for Sustainable Fun and Profit in Security Education. In Summit on Gaming Games and Gamification in Security Education."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1186\/s41239-017-0042-5"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.3102\/0034654308321210"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2012.12.020"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1037\/ccp0000260"},{"key":"e_1_3_2_1_11_1","volume-title":"International Conference on System Sciences. 3025--3034","author":"Hamari J.","unstructured":"J. Hamari , J. Koivisto , and H. Sarsa . 2014. Does Gamification Work? -- A Literature Review of Empirical Studies on Gamification . In International Conference on System Sciences. 3025--3034 . J. Hamari, J. Koivisto, and H. Sarsa. 2014. Does Gamification Work? -- A Literature Review of Empirical Studies on Gamification. In International Conference on System Sciences. 3025--3034."},{"key":"e_1_3_2_1_12_1","volume-title":"DiGRA International Conference: Think Design Play.","author":"Hao Wang","year":"2011","unstructured":"Wang Hao and Sun Chuen-Tsai . 2011 . Game reward systems: Gaming experiences and social meanings . In DiGRA International Conference: Think Design Play. Wang Hao and Sun Chuen-Tsai. 2011. Game reward systems: Gaming experiences and social meanings. In DiGRA International Conference: Think Design Play."},{"key":"e_1_3_2_1_13_1","volume-title":"Annual Workshop on Network and Systems Support for Games. 1--6.","author":"Jordan C.","unstructured":"C. Jordan , M. Knapp , D. Mitchell , M. Claypool , and K. Fisler . 2011. CounterMeasures: A game for teaching computer security . In Annual Workshop on Network and Systems Support for Games. 1--6. C. Jordan, M. Knapp, D. Mitchell, M. Claypool, and K. Fisler. 2011. CounterMeasures: A game for teaching computer security. In Annual Workshop on Network and Systems Support for Games. 1--6."},{"key":"e_1_3_2_1_14_1","unstructured":"Lisa Lachlan-Hache and Marina Castro. 2015. Proficiency or Growth? An Exploration of Two Approaches for Writing Student Learning Targets. American Institutes for Research.  Lisa Lachlan-Hache and Marina Castro. 2015. Proficiency or Growth? An Exploration of Two Approaches for Writing Student Learning Targets. American Institutes for Research."},{"key":"e_1_3_2_1_15_1","volume-title":"Simulation & Gaming","volume":"45","author":"Landers Richard","year":"2015","unstructured":"Richard Landers and Amy Landers . 2015 . An Empirical Test of the Theory of Gamified Learning: The Effect of Leaderboards on Time-on-Task and Academic Performance . Simulation & Gaming , Vol. 45 (Apr 2015). Richard Landers and Amy Landers. 2015. An Empirical Test of the Theory of Gamified Learning: The Effect of Leaderboards on Time-on-Task and Academic Performance. Simulation & Gaming, Vol. 45 (Apr 2015)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300397"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2307\/2298123"},{"key":"e_1_3_2_1_18_1","volume-title":"Toward Curricular Guidelines for Cybersecurity. In ACM Technical Symposium on Computer Science Education. 81--82","author":"McGettrick Andrew","year":"2014","unstructured":"Andrew McGettrick , Lillian N. Cassel , Melissa Dark , Elizabeth K. Hawthorne , and John Impagliazzo . 2014 . Toward Curricular Guidelines for Cybersecurity. In ACM Technical Symposium on Computer Science Education. 81--82 . Andrew McGettrick, Lillian N. Cassel, Melissa Dark, Elizabeth K. Hawthorne, and John Impagliazzo. 2014. Toward Curricular Guidelines for Cybersecurity. In ACM Technical Symposium on Computer Science Education. 81--82."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.57"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-9004.2010.00279.x"},{"key":"e_1_3_2_1_21_1","volume-title":"International Conference on Virtual Learning (Jan","author":"Muntean Cristina","year":"2011","unstructured":"Cristina Muntean . 2011 . Raising engagement in e-learning through gamification . International Conference on Virtual Learning (Jan 2011). Cristina Muntean. 2011. Raising engagement in e-learning through gamification. International Conference on Virtual Learning (Jan 2011)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293881.3295778"},{"key":"e_1_3_2_1_23_1","unstructured":"Mike Rosulek. 2020. The Joy of Cryptography.  Mike Rosulek. 2020. The Joy of Cryptography."},{"key":"e_1_3_2_1_24_1","volume-title":"USENIX Workshop on Advances in Security Education.","author":"Schreuders Z. Cliffe","year":"2018","unstructured":"Z. Cliffe Schreuders , Thomas Shaw , Aim\u00e9e Mac Muireadhaigh , and Paul Staniforth . 2018 . Hackerbot: Attacker Chatbots for Randomised and Interactive Security Labs, Using SecGen and oVirt . In USENIX Workshop on Advances in Security Education. Z. Cliffe Schreuders, Thomas Shaw, Aim\u00e9e Mac Muireadhaigh, and Paul Staniforth. 2018. Hackerbot: Attacker Chatbots for Randomised and Interactive Security Labs, Using SecGen and oVirt. In USENIX Workshop on Advances in Security Education."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1037\/edu0000160"},{"key":"e_1_3_2_1_26_1","volume-title":"Leaderboard Position Psychology: Counterfactual Thinking. In ACM Conference on Human Factors in Computing Systems. 1217--1222","author":"Sun Emily","unstructured":"Emily Sun , Brooke Jones , Stefano Traca , and Maarten W. Bos . 2015 . Leaderboard Position Psychology: Counterfactual Thinking. In ACM Conference on Human Factors in Computing Systems. 1217--1222 . Emily Sun, Brooke Jones, Stefano Traca, and Maarten W. Bos. 2015. Leaderboard Position Psychology: Counterfactual Thinking. In ACM Conference on Human Factors in Computing Systems. 1217--1222."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889186"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.87.2.246"},{"key":"e_1_3_2_1_29_1","unstructured":"Giovanni Vigna Kevin Borgolte Jacopo Corbetta Adam Doup\u00e9 Yanick Fratantonio Luca Invernizzi Dhilung Kirat and Yan Shoshitaishvili. 2014. Ten Years of iCTF: The Good The Bad and The Ugly. In Summit on Gaming Games and Gamification in Security Education.  Giovanni Vigna Kevin Borgolte Jacopo Corbetta Adam Doup\u00e9 Yanick Fratantonio Luca Invernizzi Dhilung Kirat and Yan Shoshitaishvili. 2014. Ten Years of iCTF: The Good The Bad and The Ugly. In Summit on Gaming Games and Gamification in Security Education."},{"key":"e_1_3_2_1_30_1","volume-title":"ACM Conference on Innovation and Technology in Computer Science Education. 194--199","author":"Sv\u00e1bensk\u00fd Valdemar","year":"2018","unstructured":"Valdemar v Sv\u00e1bensk\u00fd , Jan Vykopal , Milan Cermak , and Martin Lavstovivcka . 2018 . Enhancing Cybersecurity Skills by Creating Serious Games . In ACM Conference on Innovation and Technology in Computer Science Education. 194--199 . Valdemar vSv\u00e1bensk\u00fd, Jan Vykopal, Milan Cermak, and Martin Lavstovivcka. 2018. Enhancing Cybersecurity Skills by Creating Serious Games. In ACM Conference on Innovation and Technology in Computer Science Education. 194--199."},{"key":"e_1_3_2_1_31_1","first-page":"1","article-title":"Top 10 Hands-on Cybersecurity Exercises","volume":"29","author":"Weiss Richard","year":"2013","unstructured":"Richard Weiss , Jens Mache , and Erik Nilsen . 2013 . Top 10 Hands-on Cybersecurity Exercises . J. Comput. Sci. Coll. , Vol. 29 , 1 (Oct 2013), 140--147. Richard Weiss, Jens Mache, and Erik Nilsen. 2013. Top 10 Hands-on Cybersecurity Exercises. J. Comput. Sci. Coll., Vol. 29, 1 (Oct 2013), 140--147.","journal-title":"J. Comput. Sci. Coll."},{"key":"e_1_3_2_1_32_1","volume-title":"Teaching Cybersecurity Analysis Skills in the Cloud. In ACM Technical Symposium on Computer Science Education. 332--337","author":"Weiss Richard S.","year":"2015","unstructured":"Richard S. Weiss , Stefan Boesen , James F. Sullivan , Michael E. Locasto , Jens Mache , and Erik Nilsen . 2015 . Teaching Cybersecurity Analysis Skills in the Cloud. In ACM Technical Symposium on Computer Science Education. 332--337 . Richard S. Weiss, Stefan Boesen, James F. Sullivan, Michael E. Locasto, Jens Mache, and Erik Nilsen. 2015. Teaching Cybersecurity Analysis Skills in the Cloud. In ACM Technical Symposium on Computer Science Education. 332--337."},{"key":"e_1_3_2_1_33_1","volume-title":"Enhancing Security Education with Hands-on Laboratory Exercises. In Symposium on Information Assurance.","author":"Wenliang Du","year":"2010","unstructured":"Du Wenliang , Shang Mindgong , and Haizhi Xu . 2010 . Enhancing Security Education with Hands-on Laboratory Exercises. In Symposium on Information Assurance. Du Wenliang, Shang Mindgong, and Haizhi Xu. 2010. Enhancing Security Education with Hands-on Laboratory Exercises. In Symposium on Information Assurance."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2016.03.002"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(19)30052-1"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security. 1216--1229","author":"Yang Weining","unstructured":"Weining Yang , Ninghui Li , Omar Chowdhury , Aiping Xiong , and Robert W. Proctor . 2016. An Empirical Study of Mnemonic Sentence-Based Password Generation Strategies . In Proceedings of the ACM Conference on Computer and Communications Security. 1216--1229 . Weining Yang, Ninghui Li, Omar Chowdhury, Aiping Xiong, and Robert W. Proctor. 2016. An Empirical Study of Mnemonic Sentence-Based Password Generation Strategies. In Proceedings of the ACM Conference on Computer and Communications Security. 1216--1229."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"L. Zhang-Kennedy S. Chiasson and R. Biddle. 2013. Password advice shouldn't be boring: Visualizing password guessing attacks. In APWG eCrime Researchers Summit. 1--11.  L. Zhang-Kennedy S. Chiasson and R. Biddle. 2013. Password advice shouldn't be boring: Visualizing password guessing attacks. In APWG eCrime Researchers Summit. 1--11.","DOI":"10.1109\/eCRS.2013.6805770"}],"event":{"name":"SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education","location":"Virtual Event USA","acronym":"SIGCSE '21","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 52nd ACM Technical Symposium on Computer Science Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3408877.3432544","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3408877.3432544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:26Z","timestamp":1750195466000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3408877.3432544"}},"subtitle":["On Leaderboard Effects, Student Engagement and Learning Outcomes in a Cybersecurity Intervention"],"short-title":[],"issued":{"date-parts":[[2021,3,3]]},"references-count":37,"alternative-id":["10.1145\/3408877.3432544","10.1145\/3408877"],"URL":"https:\/\/doi.org\/10.1145\/3408877.3432544","relation":{},"subject":[],"published":{"date-parts":[[2021,3,3]]},"assertion":[{"value":"2021-03-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}