{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T16:38:55Z","timestamp":1775839135844,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,10,6]]},"DOI":"10.1145\/3450329.3476859","type":"proceedings-article","created":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T04:10:16Z","timestamp":1631765416000},"page":"29-34","source":"Crossref","is-referenced-by-count":10,"title":["An Online Gamified Learning Platform for Teaching Cybersecurity and More"],"prefix":"10.1145","author":[{"given":"Mac","family":"Malone","sequence":"first","affiliation":[{"name":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]},{"given":"Yicheng","family":"Wang","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]},{"given":"Fabian","family":"Monrose","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,10,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Khe Foon Hew, and Biyun Huang","author":"Bai Shurui","year":"2020"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11935-5_22"},{"key":"e_1_3_2_1_3_1","unstructured":"Martin Carlisle Michael Chiaramonte and David Caswell. 2015. Using CTFs for an Undergraduate Cyber Education. In USENIX Summit on Gaming Games and Gamification in Security Education .  Martin Carlisle Michael Chiaramonte and David Caswell. 2015. Using CTFs for an Undergraduate Cyber Education. In USENIX Summit on Gaming Games and Gamification in Security Education ."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.108"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1096-7516(01)00038-0"},{"key":"e_1_3_2_1_6_1","unstructured":"Robert M Gagne and Leslie J Briggs. 1974. Principles of instructional design .  Robert M Gagne and Leslie J Briggs. 1974. Principles of instructional design ."},{"key":"e_1_3_2_1_7_1","volume-title":"Principles of instructional design","author":"Gagne Robert M","edition":"5"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.377"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2018.10.046"},{"key":"e_1_3_2_1_10_1","volume-title":"ACM Technical Symposium on Computer Science Education. 1135--1141","author":"Malone Mac","year":"2021"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568195.2568212"},{"key":"e_1_3_2_1_12_1","volume-title":"International Conference on Virtual Learning","volume":"1","author":"Muntean Cristina Ioana","year":"2011"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2008.4720454"},{"key":"e_1_3_2_1_14_1","volume-title":"Emerging Issues in the Practice of University Learning and Teaching","volume":"1","author":"O'Neill Geraldine","year":"2005"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 2nd Annual Microsoft Academic Days on Game Development in Computer Science Education . 90--94","author":"Parberry Ian","year":"2007"},{"key":"e_1_3_2_1_16_1","unstructured":"Giovanni Vigna Kevin Borgolte Jacopo Corbetta Adam Doup\u00e9 Yanick Fratantonio Luca Invernizzi Dhilung Kirat and Yan Shoshitaishvili. 2014. Ten Years of iCTF: The Good The Bad and The Ugly. In USENIX Summit on Gaming Games and Gamification in Security Education .  Giovanni Vigna Kevin Borgolte Jacopo Corbetta Adam Doup\u00e9 Yanick Fratantonio Luca Invernizzi Dhilung Kirat and Yan Shoshitaishvili. 2014. Ten Years of iCTF: The Good The Bad and The Ugly. In USENIX Summit on Gaming Games and Gamification in Security Education ."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(19)30052-1"},{"key":"e_1_3_2_1_18_1","volume-title":"Player-Centered AI for Automatic Game Personalization: Open Problems. In International Conference on the Foundations of Digital Games. Article 6, bibinfonumpages8 pages.","author":"Zhu Jichen","year":"2020"}],"event":{"name":"SIGITE '21: The 22nd Annual Conference on Information Technology Education","location":"SnowBird UT USA","acronym":"SIGITE '21","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"]},"container-title":["Proceedings of the 22st Annual Conference on Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450329.3476859","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3450329.3476859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:38Z","timestamp":1750191458000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450329.3476859"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":18,"alternative-id":["10.1145\/3450329.3476859","10.1145\/3450329"],"URL":"https:\/\/doi.org\/10.1145\/3450329.3476859","relation":{},"subject":[],"published":{"date-parts":[[2021,10,6]]}}}