{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T18:58:06Z","timestamp":1766516286246,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":251,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713798","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:35:25Z","timestamp":1745469325000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Systemization of Knowledge (SoK): Goals, Coverage, and Evaluation in Cybersecurity and Privacy Games"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-1672-8292","authenticated-orcid":false,"given":"Yue","family":"Huang","sequence":"first","affiliation":[{"name":"CSIRO's Data61, Melbourne, Victoria, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6933-0145","authenticated-orcid":false,"given":"Marthie","family":"Grobler","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Melbourne, Victoria, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4064-8218","authenticated-orcid":false,"given":"Lauren S.","family":"Ferro","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Melbourne, Victoria, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5802-8642","authenticated-orcid":false,"given":"Georgia","family":"Psaroulis","sequence":"additional","affiliation":[{"name":"Centre for Securing Digital Futures, Edith Cowan University, Perth, Western Australia, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1299-7867","authenticated-orcid":false,"given":"Sanchari","family":"Das","sequence":"additional","affiliation":[{"name":"Ritchie School of Computer Science and Engineering, University of Denver, Denver, Colorado, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8522-8607","authenticated-orcid":false,"given":"Jing","family":"Wei","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Melbourne, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1345-2829","authenticated-orcid":false,"given":"Helge","family":"Janicke","sequence":"additional","affiliation":[{"name":"Cyber Security Cooperative Research Centre, Edith Cowan University, Perth, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2016.61"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11548-7_25"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Fadi Abu-Amara Reem Almansoori Safa Alharbi Marwah Alharbi and Asma Alshehhi. 2021. A novel SETA-based gamification framework to raise cybersecurity awareness. International Journal of Information Technology 13 6 (2021) 2371\u20132380.","DOI":"10.1007\/s41870-021-00760-5"},{"key":"e_1_3_3_2_5_2","volume-title":"8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18)","author":"Abu-Salma Ruba","year":"2018","unstructured":"Ruba Abu-Salma, Elissa\u00a0M Redmiles, Blase Ur, and Miranda Wei. 2018. Exploring user mental models of { End-to-End} encrypted communication tools. In 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18)."},{"key":"e_1_3_3_2_6_2","unstructured":"Moiz\u00a0Uddin Ahmed S Hussain and MMM Bagram. 2017. E-content presentation based on learning styles. University of Engineering and Technology Taxila. Technical Journal 22 1 (2017) 128."},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/EDUCON52537.2022.9766526"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Marfua Alanazi Mark Freeman and Holly Tootell. 2022. Exploring the factors that influence the cybersecurity behaviors of young adults. Computers in Human Behavior 136 (2022) 107376.","DOI":"10.1016\/j.chb.2022.107376"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Jose Alemany Elena Del\u00a0Val and Ana Garcia-Fornes. 2020. Assessing the effectiveness of a gamified social network for applying privacy concepts: an empirical study with teens. IEEE Transactions on Learning Technologies 13 4 (2020) 777\u2013789.","DOI":"10.1109\/TLT.2020.3026584"},{"key":"e_1_3_3_2_10_2","unstructured":"Isslam\u00a0Yousef Alhasan. 2023. Human Factors in Cybersecurity: A Cross-Cultural Study on Trust. Ph.\u00a0D. Dissertation. Purdue University Graduate School."},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Faisal Alotaibi Steven Furnell Ingo Stengel and Maria Papadaki. 2016. A review of using gaming technology for cyber-security awareness. International Journal forInformation Security Research(IJISR) 6 2 (2016) 660\u2013666.","DOI":"10.20533\/ijisr.2042.4639.2016.0076"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Faisal Alotaibi Steven Furnell Ingo Stengel and Maria Papadaki. 2018. Design and evaluation of mobile games for enhancing cyber security awareness. J Intern Technol Secur Trans 6 (2018) 569\u2013578.","DOI":"10.20533\/jitst.2046.3723.2018.0070"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Hamed Alqahtani and Manolya Kavakli-Thorne. 2020. Design and evaluation of an augmented reality game for cybersecurity awareness (CybAR). Information 11 2 (2020) 121.","DOI":"10.3390\/info11020121"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300412"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"Sylvester Arnab Theodore Lim Maira\u00a0B Carvalho Francesco Bellotti Sara De\u00a0Freitas Sandy Louchart Neil Suttie Riccardo Berta and Alessandro De\u00a0Gloria. 2015. Mapping learning and game mechanics for serious games analysis. British Journal of Educational Technology 46 2 (2015) 391\u2013411.","DOI":"10.1111\/bjet.12113"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3397481.3450647"},{"key":"e_1_3_3_2_17_2","first-page":"25","volume-title":"Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia","author":"Assal Hala","year":"2015","unstructured":"Hala Assal, Stephanie Hurtado, Ahsan Imran, and Sonia Chiasson. 2015. What\u2019s the deal with privacy apps? A comprehensive exploration of user perception and usability. In Proceedings of the 14th International Conference on Mobile and Ubiquitous Multimedia. 25\u201336."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-0041-8_29"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.18260\/3-2-370-31521"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892406"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Sharmistha Bagchi-Sen H\u00a0Raghav Rao Shambhu\u00a0J Upadhyaya and Sangmi Chai. 2010. Women in cybersecurity: A study of career advancement. IT professional 12 1 (2010) 24\u201331.","DOI":"10.1109\/MITP.2010.39"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65736-9_2"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376800"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Tyler Balon and Ibrahim Baggili. 2023. Cybercompetitions: A survey of competitions tools and systems to support cybersecurity education. Education and Information Technologies 28 9 (2023) 11759\u201311791.","DOI":"10.1007\/s10639-022-11451-4"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581107"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-9223-6.ch007"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376518"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Zisis Batzos Theocharis Saoulidis Dimitrios Margounakis Eleftherios Fountoukidis Elisavet Grigoriou Achilleas Moukoulis Antonios Sarigiannidis Athanasios Liatifis Paris-Alexandros Karypidis Stamatia Bibi et\u00a0al. 2023. Gamification and serious games for cybersecurity awareness and first responders training: An overview. Authorea Preprints (2023).","DOI":"10.36227\/techrxiv.22650952"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","unstructured":"Katrin Becker. 2021. What\u2019s the difference between gamification serious games educational games and game-based learning. Academia Letters 209 2 (2021).","DOI":"10.20935\/AL209"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2016.39"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Najmeh Behnamnia Amirrudin Kamsin and Maizatul Akmar\u00a0Binti Ismail. 2020. The landscape of research on the use of digital game-based learning apps to nurture creativity among young children: A review. Thinking Skills and Creativity 37 (2020) 100666.","DOI":"10.1016\/j.tsc.2020.100666"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITHET56107.2022.10031716"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"crossref","unstructured":"Ajay Karthic B\u00a0Gopinath Bharathi Abhinav Singh Conrad\u00a0S Tucker and Harriet\u00a0B Nembhard. 2016. Knowledge discovery of game design features by mining user-generated feedback. Computers in Human Behavior 60 (2016) 361\u2013371.","DOI":"10.1016\/j.chb.2016.02.076"},{"key":"e_1_3_3_2_34_2","unstructured":"Ubisoft Bordeaux. 2023. Assassin\u2019s Creed: Mirage. Game[PlayStation 4 PlayStation 5 Windows Xbox One Xbox Series X\/S iOS iPadOS]."},{"key":"e_1_3_3_2_35_2","unstructured":"Raluca Budiu. October 22 2017. You Are Not the User: The False-Consensus Effect. https:\/\/www.nngroup.com\/articles\/false-consensus\/"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Daniel Burgos Christof Van\u00a0Nimwegen Herre Van\u00a0Oostendorp and Rob Koper. 2007. Game-based learning and the role of feedback. A case study. International Journal of Advanced Technology in Learning (2007).","DOI":"10.2316\/Journal.208.2007.4.208-0918"},{"key":"e_1_3_3_2_37_2","volume-title":"IS-EUD Workshops","author":"Calvano Miriana","year":"2023","unstructured":"Miriana Calvano, Federica Caruso, Antonio Curci, Antonio Piccinno, Veronica Rossano, et\u00a0al. 2023. A rapid review on serious games for cybersecurity education: Are \"serious\" and gaming aspects well balanced?. In IS-EUD Workshops."},{"key":"e_1_3_3_2_38_2","volume-title":"Proceedings of the 16th IFAC World Congress.","author":"Carew Peter\u00a0J","year":"2005","unstructured":"Peter\u00a0J Carew and Larry Stapleton. 2005. Privacy, patients and healthcare workers. In Proceedings of the 16th IFAC World Congress. Elsevier Prague."},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642017"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395522"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642041"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3270316.3273042"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"crossref","unstructured":"Merijke Coenraad Anthony Pellicone Diane\u00a0Jass Ketelhut Michel Cukier Jan Plane and David Weintrop. 2020. Experiencing cybersecurity one game at a time: A systematic review of cybersecurity digital games. Simulation & Gaming 51 5 (2020) 586\u2013611.","DOI":"10.1177\/1046878120933312"},{"key":"e_1_3_3_2_44_2","volume-title":"ASEE-SE Regional Conference, Starkville, MS","author":"Dampier David","year":"2012","unstructured":"David Dampier, Kimberly Kelly, and Kendra Carr. 2012. Increasing participation of women in cyber security. In ASEE-SE Regional Conference, Starkville, MS."},{"key":"e_1_3_3_2_45_2","unstructured":"Davidson and Associates. 1983. Math Blaster! Game[Apple II Atari 8-bit Commodore 64 IBM PC]. Bibliographic details are for the original release of Math Blaster!."},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60585-2_17"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00037"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516753"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/2181037.2181040"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445039"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581170"},{"key":"e_1_3_3_2_52_2","unstructured":"Bla\u017eenka Divjak and Damir Tomi\u0107. 2011. The impact of game-based learning on the achievement of learning goals and motivation for learning mathematics-literature review. Journal of information and organizational sciences 35 1 (2011) 15\u201330."},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174136"},{"key":"e_1_3_3_2_54_2","unstructured":"Naughty Dog. 2014. The Last of Us. Game[PlayStation 3 PlayStation 4]. Bibliographic details are for the year of first release."},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.5220\/0011682200003405"},{"key":"e_1_3_3_2_56_2","unstructured":"Jennifer Dudley-Nicholson. 2023. Criminals target government with record cyber attacks. Retrieved Sep 10 2024 from https:\/\/www.themandarin.com.au\/235644-criminals-target-government-with-record-cyber-attacks\/"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"crossref","unstructured":"Prakriti Dumaru Ankit Shrestha Rizu Paudel Cassity Haverkamp Maryellen\u00a0Brunson McClain and Mahdi\u00a0Nasrullah Al-Ameen. 2024. \u201d\u2026 I have my dad sister brother and mom\u2019s password\u201d: unveiling users\u2019 mental models of security and privacy-preserving tools. Information & Computer Security 32 3 (2024) 282\u2013303.","DOI":"10.1108\/ICS-04-2023-0047"},{"key":"e_1_3_3_2_58_2","first-page":"101","volume-title":"Advanced Information Systems Engineering: 28th International Conference, CAiSE 2016, Ljubljana, Slovenia, June 13-17, 2016. Proceedings 28","author":"Ebbers Frank","year":"2016","unstructured":"Frank Ebbers and Philipp Brune. 2016. The authentication game-secure user authentication by Gamification?. In Advanced Information Systems Engineering: 28th International Conference, CAiSE 2016, Ljubljana, Slovenia, June 13-17, 2016. Proceedings 28. Springer, 101\u2013115."},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"crossref","unstructured":"Martin Ebner and Andreas Holzinger. 2007. Successful implementation of user-centered game based learning in higher education: An example from civil engineering. Computers & education 49 3 (2007) 873\u2013890.","DOI":"10.1016\/j.compedu.2005.11.026"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3593663.3593665"},{"key":"e_1_3_3_2_61_2","unstructured":"Fabio Natalucci Mahvash S. Qureshi Felix Suntheim 2024. Rising cyber threats pose serious concerns for financial stability. https:\/\/www.imf.org\/en\/Blogs\/Articles\/2024\/04\/09\/rising-cyber-threats-pose-serious-concerns-for-financial-stability."},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"crossref","unstructured":"Rubia Fatima Affan Yasin Lin Liu Jianmin Wang Wasif Afzal and Awaid Yasin. 2019. Sharing information online rationally: An observation of user privacy concerns and awareness using serious game. Journal of Information Security and Applications 48 (2019) 102351.","DOI":"10.1016\/j.jisa.2019.06.007"},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312846"},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"crossref","unstructured":"Sylvain Frey Awais Rashid Pauline Anthonysamy Maria Pinto-Albuquerque and Syed\u00a0Asad Naqvi. 2017. The good the bad and the ugly: a study of security decisions in a cyber-physical systems game. IEEE Transactions on Software Engineering 45 5 (2017) 521\u2013536.","DOI":"10.1109\/TSE.2017.2782813"},{"key":"e_1_3_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40779-6_14"},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/DEST.2008.4635145"},{"key":"e_1_3_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.26503\/dl.v2019i1.1102"},{"key":"e_1_3_3_2_68_2","first-page":"385","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)","author":"Gallagher Kevin","year":"2017","unstructured":"Kevin Gallagher, Sameer Patil, and Nasir Memon. 2017. New Me: Understanding Expert and { Non-Expert} Perceptions and Usage of the Tor Anonymity Network. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). 385\u2013398."},{"key":"e_1_3_3_2_69_2","unstructured":"Epic Games. 2017. Fortnite. Game [Android iOS macOS Nintendo Switch PlayStation 4 PlayStation 5 Windows Xbox One Xbox Series X\/S]. Bibliographic details are for the year of first release."},{"key":"e_1_3_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451781"},{"key":"e_1_3_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98438-0_7"},{"key":"e_1_3_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581038"},{"key":"e_1_3_3_2_73_2","doi-asserted-by":"crossref","unstructured":"Devottam Gaurav Yash Kaushik Santhoshi Supraja Manav Yadav MP Gupta and Manmohan Chaturvedi. 2022. Empirical study of adaptive serious games in enhancing learning outcome. International Journal of Serious Games 9 2 (2022) 27\u201342.","DOI":"10.17083\/ijsg.v9i2.486"},{"key":"e_1_3_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-5198-0.ch001"},{"key":"e_1_3_3_2_75_2","doi-asserted-by":"crossref","unstructured":"Filippos Giannakas Georgios Kambourakis Andreas Papasalouros and Stefanos Gritzalis. 2018. A critical review of 13 years of mobile game-based learning. Educational Technology Research and Development 66 (2018) 341\u2013384.","DOI":"10.1007\/s11423-017-9552-z"},{"key":"e_1_3_3_2_76_2","doi-asserted-by":"crossref","unstructured":"Filippos Giannakas Andreas Papasalouros Georgios Kambourakis and Stefanos Gritzalis. 2019. A comprehensive cybersecurity learning platform for elementary education. Information Security Journal: A Global Perspective 28 3 (2019) 81\u2013106.","DOI":"10.1080\/19393555.2019.1657527"},{"key":"e_1_3_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.5220\/0006128500590070"},{"key":"e_1_3_3_2_78_2","first-page":"156","volume-title":"International Workshop on Information and Operational Technology Security Systems","author":"Goeke Ludger","year":"2019","unstructured":"Ludger Goeke, Alejandro Quintanar, Kristian Beckers, and Sebastian Pape. 2019. PROTECT\u2013an easy configurable serious game to train employees against social engineering attacks. In International Workshop on Information and Operational Technology Security Systems. Springer, 156\u2013171."},{"key":"e_1_3_3_2_79_2","doi-asserted-by":"crossref","unstructured":"Ana\u00a0I Gonz\u00e1lez-Tablas Mar\u00eda\u00a0I Gonz\u00e1lez\u00a0Vasco Ignacio Cascos and \u00c1lvaro Planet\u00a0Palomino. 2020. Shuffle cut and learn: Crypto go a card game for teaching cryptography. Mathematics 8 11 (2020) 1993.","DOI":"10.3390\/math8111993"},{"key":"e_1_3_3_2_80_2","unstructured":"Gorecol. [n. d.]. The Role of Gamification in Enhancing Productivity Through Time Management Applications. Retrieved January 20 2025 from https:\/\/vorecol.com\/blogs\/blog-the-role-of-gamification-in-enhancing-productivity-through-time-management-applications-164296"},{"key":"e_1_3_3_2_81_2","unstructured":"Ingrid Graffer Maria Bartnes and Karin Bernsmed. 2015. Play2prepare: A board game supporting it security preparedness exercises for industrial control organizations. (2015)."},{"key":"e_1_3_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/3481357.3481512"},{"key":"e_1_3_3_2_83_2","doi-asserted-by":"publisher","DOI":"10.1145\/3510456.3514139"},{"key":"e_1_3_3_2_84_2","doi-asserted-by":"crossref","unstructured":"Anderson\u00a0Kevin Gwenhure and Flourensia\u00a0Sapty Rahayu. 2024. Gamification of Cybersecurity Awareness for Non-IT Professionals: A Systematic Literature Review. International Journal of Serious Games 11 1 (2024) 83\u201399.","DOI":"10.17083\/ijsg.v11i1.719"},{"key":"e_1_3_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.377"},{"key":"e_1_3_3_2_86_2","doi-asserted-by":"crossref","unstructured":"Stephen Hart Basel Halak and Vladimiro Sassone. 2022. CIST: a serious game for hardware supply chain. Computers & Security 122 (2022) 102912.","DOI":"10.1016\/j.cose.2022.102912"},{"key":"e_1_3_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/1477973.1477982"},{"key":"e_1_3_3_2_88_2","unstructured":"Winston\u00a0Anthony Hill\u00a0Jr Mesafint Fanuel Xiaohong Yuan Jinghua Zhang and Sajad Sajad. 2020. A survey of serious games for cybersecurity education and training. (2020)."},{"key":"e_1_3_3_2_89_2","doi-asserted-by":"crossref","unstructured":"Rania Hodhod Harlie Hardage Safia Abbas and Eman\u00a0Abdullah Aldakheel. 2023. CyberHero An Adaptive Serious Game to Promote Cybersecurity Awareness. Electronics 12 17 (2023) 3544.","DOI":"10.3390\/electronics12173544"},{"key":"e_1_3_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/REW.2017.47"},{"key":"e_1_3_3_2_91_2","doi-asserted-by":"crossref","unstructured":"Ivan Homoliak Flavio Toffalini Juan Guarnizo Yuval Elovici and Mart\u00edn Ochoa. 2019. Insight into insiders and IT: A survey of insider threat taxonomies analysis modeling and countermeasures. ACM Computing Surveys (CSUR) 52 2 (2019) 1\u201340.","DOI":"10.1145\/3303771"},{"key":"e_1_3_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32523-7_39"},{"key":"e_1_3_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376529"},{"key":"e_1_3_3_2_94_2","first-page":"155","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)","author":"Huang Yue","year":"2022","unstructured":"Yue Huang, Borke Obada-Obieh, and Konstantin Beznosov. 2022. Users\u2019 Perceptions of Chrome Compromised Credential Notification. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). 155\u2013174."},{"key":"e_1_3_3_2_95_2","doi-asserted-by":"crossref","unstructured":"Yue Huang Borke Obada-Obieh Satya Lokam and Konstantin Beznosov. 2022. Users\u2019 Expectations Experiences and Concerns With COVID Alert an Exposure-Notification App. Proceedings of the ACM on Human-Computer Interaction 6 CSCW2 (2022) 1\u201333.","DOI":"10.1145\/3555770"},{"key":"e_1_3_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/1178477.1178573"},{"key":"e_1_3_3_2_97_2","doi-asserted-by":"publisher","DOI":"10.1145\/2393132.2393137"},{"key":"e_1_3_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66715-7_19"},{"key":"e_1_3_3_2_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSECS58457.2023.10256329"},{"key":"e_1_3_3_2_100_2","doi-asserted-by":"crossref","unstructured":"Cynthia\u00a0E Irvine Michael\u00a0F Thompson and Ken Allen. 2005. CyberCIEGE: gaming for information assurance. IEEE Security & Privacy 3 3 (2005) 61\u201364.","DOI":"10.1109\/MSP.2005.64"},{"key":"e_1_3_3_2_101_2","doi-asserted-by":"crossref","unstructured":"Mona Jami\u00a0Pour Khadije Rafiei Monireh Khani and Atena Sabrirazm. 2021. Gamification and customer experience: The mediating role of brand engagement in online grocery retailing. Nankai Business Review International 12 3 (2021) 340\u2013357.","DOI":"10.1108\/NBRI-07-2020-0041"},{"key":"e_1_3_3_2_102_2","first-page":"1","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)","author":"Jayakrishnan Gokul\u00a0Chettoor","year":"2020","unstructured":"Gokul\u00a0Chettoor Jayakrishnan, Gangadhara\u00a0Reddy Sirigireddy, Sukanya Vaddepalli, Vijayanand Banahatti, Sachin\u00a0Premsukh Lodha, and Sankalp\u00a0Suneel Pandit. 2020. Passworld: A serious game to promote password awareness and diversity in an enterprise. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 1\u201318."},{"key":"e_1_3_3_2_103_2","doi-asserted-by":"crossref","unstructured":"Matthew\u00a0L Jensen Ryan\u00a0T Wright Alexandra Durcikova and Shamya Karumbaiah. 2022. Improving phishing reporting using security gamification. Journal of Management Information Systems 39 3 (2022) 793\u2013823.","DOI":"10.1080\/07421222.2022.2096551"},{"key":"e_1_3_3_2_104_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025826"},{"key":"e_1_3_3_2_105_2","doi-asserted-by":"crossref","unstructured":"Ge Jin Manghui Tu Tae-Hoon Kim Justin Heffron and Jonathan White. 2018. Evaluation of game-based learning in cybersecurity education for high school students. Journal of Education and Learning (EduLearn) 12 1 (2018) 150\u2013158.","DOI":"10.11591\/edulearn.v12i1.7736"},{"key":"e_1_3_3_2_106_2","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159591"},{"key":"e_1_3_3_2_107_2","doi-asserted-by":"publisher","DOI":"10.1109\/SECON.2010.5453895"},{"key":"e_1_3_3_2_108_2","doi-asserted-by":"crossref","unstructured":"Jessica\u00a0L Kamerer and Donna McDermott. 2020. Cybersecurity: Nurses on the front line of prevention and education. Journal of Nursing Regulation 10 4 (2020) 48\u201353.","DOI":"10.1016\/S2155-8256(20)30014-4"},{"key":"e_1_3_3_2_109_2","first-page":"39","volume-title":"Eleventh symposium on usable privacy and security (SOUPS 2015)","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. { \u201cMy} data just goes { Everywhere:\u201d} user mental models of the internet and implications for privacy and security. In Eleventh symposium on usable privacy and security (SOUPS 2015). 39\u201352."},{"key":"e_1_3_3_2_110_2","doi-asserted-by":"crossref","unstructured":"Kristyn Karl and Yu Tao. 2023. Correcting overconfidence in online privacy: experimenting with an educational game. Information Communication & Society 26 5 (2023) 990\u20131007.","DOI":"10.1080\/1369118X.2023.2166360"},{"key":"e_1_3_3_2_111_2","doi-asserted-by":"crossref","unstructured":"Menelaos\u00a0N Katsantonis Athanassios Manikas Ioannis Mavridis and Dimitris Gritzalis. 2023. Cyber range design framework for cyber security education and training. International Journal of Information Security 22 4 (2023) 1005\u20131027.","DOI":"10.1007\/s10207-023-00680-4"},{"key":"e_1_3_3_2_112_2","doi-asserted-by":"crossref","unstructured":"Joakim K\u00e4vrestad Allex Hagberg Marcus Nohlberg Jana Rambusch Robert Roos and Steven Furnell. 2022. Evaluation of contextual and game-based training for phishing detection. Future Internet 14 4 (2022) 104.","DOI":"10.3390\/fi14040104"},{"key":"e_1_3_3_2_113_2","unstructured":"King. 2012. Candy Crush Saga. Game [iOS macOS Fire OS Android Windows Phone Windows Linux]. Bibliographic details are for the year of first release."},{"key":"e_1_3_3_2_114_2","doi-asserted-by":"crossref","unstructured":"Shinobu Kitayama and Hyekyung Park. 2007. Cultural shaping of self emotion and well-being: How does it work? Social and Personality Psychology Compass 1 1 (2007) 202\u2013222.","DOI":"10.1111\/j.1751-9004.2007.00016.x"},{"key":"e_1_3_3_2_115_2","doi-asserted-by":"crossref","unstructured":"Antje Kohnle Shaaron\u00a0E Ainsworth and Gina Passante. 2020. Sketching to support visual learning with interactive tutorials. Physical Review Physics Education Research 16 2 (2020) 020139.","DOI":"10.1103\/PhysRevPhysEducRes.16.020139"},{"key":"e_1_3_3_2_116_2","doi-asserted-by":"crossref","unstructured":"Spyros Kokolakis. 2017. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. Computers & security 64 (2017) 122\u2013134.","DOI":"10.1016\/j.cose.2015.07.002"},{"key":"e_1_3_3_2_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00060"},{"key":"e_1_3_3_2_118_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2011.6027538"},{"key":"e_1_3_3_2_119_2","first-page":"125","volume-title":"13th European Conference on Cyber Warfare and Security ECCWS-2014 The University of Piraeus Piraeus, Greece","author":"Labuschagne William\u00a0Aubrey","year":"2014","unstructured":"William\u00a0Aubrey Labuschagne and Mariki Eloff. 2014. The effectiveness of online gaming as part of a security awareness program. In 13th European Conference on Cyber Warfare and Security ECCWS-2014 The University of Piraeus Piraeus, Greece. 125."},{"key":"e_1_3_3_2_120_2","doi-asserted-by":"crossref","unstructured":"Josephine Lau Benjamin Zimmerman and Florian Schaub. 2018. Alexa are you listening? Privacy perceptions concerns and privacy-seeking behaviors with smart speakers. Proceedings of the ACM on human-computer interaction 2 CSCW (2018) 1\u201331.","DOI":"10.1145\/3274371"},{"key":"e_1_3_3_2_121_2","unstructured":"Jerri Ledford. October 4 2024. 37% Of Companies Don\u2019t Protect Executives From Cyber Attacks\u2014Is Yours One of Them?https:\/\/www.lifewire.com\/companies-dont-protect-executives-from-cyber-attacks-8722793?"},{"key":"e_1_3_3_2_122_2","doi-asserted-by":"crossref","unstructured":"Weijane Lin Jui-Ying Wang and Hsiu-Ping Yueh. 2022. Learning information ethical decision making with a simulation game. Frontiers in Psychology 13 (2022) 933298.","DOI":"10.3389\/fpsyg.2022.933298"},{"key":"e_1_3_3_2_123_2","doi-asserted-by":"publisher","DOI":"10.1109\/GHTC55712.2022.9911042"},{"key":"e_1_3_3_2_124_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11548-7_21"},{"key":"e_1_3_3_2_125_2","doi-asserted-by":"crossref","unstructured":"Uwe Maier and Christian Klotz. 2022. Personalized feedback in digital learning environments: Classification framework and literature review. Computers and Education: Artificial Intelligence 3 (2022) 100080.","DOI":"10.1016\/j.caeai.2022.100080"},{"key":"e_1_3_3_2_126_2","doi-asserted-by":"crossref","unstructured":"Borja Manero Javier Torrente Manuel Freire and Baltasar Fern\u00e1ndez-Manj\u00f3n. 2016. An instrument to build a gamer clustering framework according to gaming preferences and habits. Computers in Human Behavior 62 (2016) 353\u2013363.","DOI":"10.1016\/j.chb.2016.03.085"},{"key":"e_1_3_3_2_127_2","doi-asserted-by":"crossref","unstructured":"Ana Manzano-Le\u00f3n Pablo Camacho-Lazarraga Miguel\u00a0A Guerrero Laura Guerrero-Puerta Jos\u00e9\u00a0M Aguilar-Parra Rub\u00e9n Trigueros and Antonio Alias. 2021. Between level up and game over: A systematic literature review of gamification in education. Sustainability 13 4 (2021) 2247.","DOI":"10.3390\/su13042247"},{"key":"e_1_3_3_2_128_2","doi-asserted-by":"crossref","unstructured":"Sana Maqsood and Sonia Chiasson. 2021. Design development and evaluation of a cybersecurity privacy and digital literacy game for tweens. ACM Transactions on Privacy and Security (TOPS) 24 4 (2021) 1\u201337.","DOI":"10.1145\/3469821"},{"key":"e_1_3_3_2_129_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00058"},{"key":"e_1_3_3_2_130_2","unstructured":"MECC. 1971. The Oregon Trail). Game[Minicomputer (HP 2100) Mainframe (CDC Cyber 70\/73-26) Apple II Atari 8-bit Commodore 64]. Bibliographic details are for the original release of The Oregon Trail video game."},{"key":"e_1_3_3_2_131_2","doi-asserted-by":"crossref","unstructured":"Suzanne Mello-Stark Mary\u00a0Ann VanValkenburg and Emily Hao. 2020. Thinking outside the box: Using escape room games to increase interest in cyber security. Innovations in Cybersecurity Education (2020) 39\u201353.","DOI":"10.1007\/978-3-030-50244-7_3"},{"key":"e_1_3_3_2_132_2","doi-asserted-by":"crossref","unstructured":"Eleonora Mencarini Amon Rapp Lia Tirabeni and Massimo Zancanaro. 2019. Designing wearable systems for sports: A review of trends and opportunities in human\u2013computer interaction. IEEE Transactions on Human-Machine Systems 49 4 (2019) 314\u2013325.","DOI":"10.1109\/THMS.2019.2919702"},{"key":"e_1_3_3_2_133_2","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3170633"},{"key":"e_1_3_3_2_134_2","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2017.8190424"},{"volume-title":"Elevation of Privilege (EoP) Card Game","key":"e_1_3_3_2_135_2","unstructured":"Microsoft. [n. d.]. Elevation of Privilege (EoP) Card Game. https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=20303 Feb. 1, 2024."},{"key":"e_1_3_3_2_136_2","unstructured":"Milanote. [n. d.]. Get organized. Stay creative.https:\/\/milanote.com\/"},{"key":"e_1_3_3_2_137_2","unstructured":"Gaurav Misra Nalin Asanka\u00a0Gamagedara Arachchilage and Shlomo Berkovsky. 2017. Phish phinder: a game design approach to enhance user confidence in mitigating phishing attacks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1710.06064 (2017)."},{"key":"e_1_3_3_2_138_2","doi-asserted-by":"publisher","DOI":"10.1145\/1899503.1899525"},{"key":"e_1_3_3_2_139_2","unstructured":"Steve Morgan. 2024. Cybercrime To Cost The World $10.5 Trillion Annually By 2025. https:\/\/cybersecurityventures.com\/cybercrime-damage-costs-10-trillion-by-2025\/ Jan. 16 2024."},{"key":"e_1_3_3_2_140_2","doi-asserted-by":"crossref","unstructured":"Mahmoud Mostafa and Osama\u00a0S Faragallah. 2019. Development of serious games for teaching information security courses. IEEE Access 7 (2019) 169293\u2013169305.","DOI":"10.1109\/ACCESS.2019.2955639"},{"key":"e_1_3_3_2_141_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15191-0_18"},{"key":"e_1_3_3_2_142_2","doi-asserted-by":"publisher","DOI":"10.21125\/edulearn.2017.1203"},{"key":"e_1_3_3_2_143_2","doi-asserted-by":"publisher","DOI":"10.1109\/iV.2017.78"},{"key":"e_1_3_3_2_144_2","doi-asserted-by":"crossref","unstructured":"Jema\u00a0David Ndibwile Edith\u00a0Talina Luhanga Doudou Fall Daisuke Miyamoto Gregory Blanc and Youki Kadobayashi. 2019. An empirical approach to phishing countermeasures through smart glasses and validation agents. IEEE Access 7 (2019) 130758\u2013130771.","DOI":"10.1109\/ACCESS.2019.2940669"},{"key":"e_1_3_3_2_145_2","doi-asserted-by":"crossref","unstructured":"Joaqu\u00edn Nicol\u00e1s Juan M\u00a0Carrillo De\u00a0Gea Bernabe Nicolas Jose\u00a0L Fernandez-Aleman and Ambrosio Toval. 2018. On the risks and safeguards for requirements engineering in global software development: Systematic literature review and quantitative assessment. IEEE Access 6 (2018) 59628\u201359656.","DOI":"10.1109\/ACCESS.2018.2874096"},{"key":"e_1_3_3_2_146_2","doi-asserted-by":"crossref","unstructured":"Sokratis Nifakos Krishna Chandramouli Charoula\u00a0Konstantina Nikolaou Panagiotis Papachristou Sabine Koch Emmanouil Panaousis and Stefano Bonacina. 2021. Influence of human factors on cyber security within healthcare organisations: A systematic review. Sensors 21 15 (2021) 5119.","DOI":"10.3390\/s21155119"},{"key":"e_1_3_3_2_147_2","doi-asserted-by":"crossref","unstructured":"Fakhroddin Noorbehbahani Fereshteh Salehi and Reza\u00a0Jafar Zadeh. 2019. A systematic mapping study on gamification applied to e-marketing. Journal of Research in Interactive Marketing 13 3 (2019) 392\u2013410.","DOI":"10.1108\/JRIM-08-2018-0103"},{"key":"e_1_3_3_2_148_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376632"},{"key":"e_1_3_3_2_149_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833663"},{"key":"e_1_3_3_2_150_2","unstructured":"University of Melbourne\u00a0Science and Engineering\u00a0Library Team. [n. d.]. Computer Science Software Engineering and Information Technology. https:\/\/unimelb.libguides.com\/comsci_softeng_infotech"},{"key":"e_1_3_3_2_151_2","unstructured":"Press office. November 19 2024. Rapid rise in advanced AI-driven phishing attacks is leaving majority of UK business unprepared according to new Vodafone Business study. https:\/\/www.vodafone.co.uk\/newscentre\/press-release\/proactive-security-phishing-of-the-future"},{"key":"e_1_3_3_2_152_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025831"},{"key":"e_1_3_3_2_153_2","doi-asserted-by":"crossref","unstructured":"Wilk Oliveira Juho Hamari Lei Shi Armando\u00a0M Toda Luiz Rodrigues Paula\u00a0T Palomino and Seiji Isotani. 2023. Tailored gamification in education: A literature review and future agenda. Education and Information Technologies 28 1 (2023) 373\u2013406.","DOI":"10.1007\/s10639-022-11122-4"},{"key":"e_1_3_3_2_154_2","unstructured":"Barack Onduto R Ali and AJ Smed. 2021. Gamification of Cyber Security Awareness\u2013A Systematic Review of Games. Computing Faculty of Technology (2021)."},{"key":"e_1_3_3_2_155_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23451-5_12"},{"key":"e_1_3_3_2_156_2","unstructured":"Gabriel\u00a0A. Orenstein and Lindsay Lewis.2006. Eriksons Stages of Psychosocial Development. Retrieved Sep 10 2024 from https:\/\/www.ncbi.nlm.nih.gov\/books\/NBK556096\/"},{"key":"e_1_3_3_2_157_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174009"},{"key":"e_1_3_3_2_158_2","unstructured":"Ovos. 2011. Ludwig. Game [Windows]. https:\/\/ovos.at\/en\/projekte\/knowledge-rules-the-game\/"},{"key":"e_1_3_3_2_159_2","doi-asserted-by":"crossref","unstructured":"Mario Passalacqua Rapha\u00ebl Morin Sylvain S\u00e9n\u00e9cal Lennart\u00a0E Nacke and Pierre-Majorique L\u00e9ger. 2020. Demystifying the first-time experience of mobile games: The presence of a tutorial has a positive impact on non-expert players\u2019 flow and continuous-use intentions. Multimodal Technologies and Interaction 4 3 (2020) 41.","DOI":"10.3390\/mti4030041"},{"key":"e_1_3_3_2_160_2","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3606962"},{"key":"e_1_3_3_2_161_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29047-3_5"},{"key":"e_1_3_3_2_162_2","unstructured":"Brandon Phipps. 2024. The Evolution of Cybersecurity: Staying Ahead of Emerging Threats. Retrieved Sep 10 2024 from https:\/\/www.secondstartechnologies.com\/2024\/01\/the-evolution-of-cybersecurity-staying-ahead-of-emerging-threats\/"},{"key":"e_1_3_3_2_163_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_24"},{"key":"e_1_3_3_2_164_2","doi-asserted-by":"crossref","unstructured":"Mario\u00a0A Pulido Chris\u00a0W Johnson and Ahmed Alzahrani. 2021. Security Awareness Level Evaluation of Healthcare Participants Through Educational Games. International Journal of Serious Games 8 3 (2021) 25\u201341.","DOI":"10.17083\/ijsg.v8i3.459"},{"key":"e_1_3_3_2_165_2","doi-asserted-by":"crossref","unstructured":"Leilei Qu Ruojin Xiao and Wenchang Shi. 2023. Interactions of Framing and Timing in Nudging Online Game Security. Computers & Security 124 (2023) 102962.","DOI":"10.1016\/j.cose.2022.102962"},{"key":"e_1_3_3_2_166_2","doi-asserted-by":"crossref","unstructured":"Farzana Quayyum and Letizia Jaccheri. 2025. CyberFamily: A collaborative family game to increase children\u2019s cybersecurity awareness. Entertainment Computing 52 (2025) 100826.","DOI":"10.1016\/j.entcom.2024.100826"},{"key":"e_1_3_3_2_167_2","doi-asserted-by":"crossref","unstructured":"Habeeb\u00a0Ur Rahiman Rashmi Kodikal and Sucharitha Suresh. 2023. Game on: Can gamification enhance productivity? F1000Research 12 (2023).","DOI":"10.12688\/f1000research.131579.2"},{"key":"e_1_3_3_2_168_2","doi-asserted-by":"publisher","DOI":"10.1145\/3468784.3468789"},{"key":"e_1_3_3_2_169_2","doi-asserted-by":"publisher","DOI":"10.1145\/1866898.1866907"},{"key":"e_1_3_3_2_170_2","unstructured":"Ramotion. [n. d.]. User Research Report: Key Components and Best Practices. Retrieved Feburary 21 2023 from https:\/\/www.ramotion.com\/blog\/user-research-report"},{"key":"e_1_3_3_2_171_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173654"},{"key":"e_1_3_3_2_172_2","doi-asserted-by":"publisher","DOI":"10.1109\/WorldCIS.2015.7359406"},{"key":"e_1_3_3_2_173_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-71368-7_24"},{"key":"e_1_3_3_2_174_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91540-7_37"},{"key":"e_1_3_3_2_175_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22124-8_12"},{"key":"e_1_3_3_2_176_2","unstructured":"Jonathan\u00a0P Rowe Lucy\u00a0R Shores Bradford\u00a0W Mott and James\u00a0C Lester. 2011. Integrating learning problem solving and engagement in narrative-centered learning environments. International Journal of Artificial Intelligence in Education 21 1-2 (2011) 115\u2013133."},{"key":"e_1_3_3_2_177_2","doi-asserted-by":"publisher","DOI":"10.1145\/3209281.3209320"},{"key":"e_1_3_3_2_178_2","doi-asserted-by":"crossref","unstructured":"Lorenzo Salas-Morera Antonio Arauzo-Azofra and Laura Garc\u00eda-Hern\u00e1ndez. 2012. Analysis of online quizzes as a teaching and assessment tool. JOTSE: Journal of technology and science education 2 1 (2012) 39\u201345.","DOI":"10.3926\/jotse.30"},{"key":"e_1_3_3_2_179_2","doi-asserted-by":"crossref","unstructured":"Awaz\u00a0Naaman Saleem Narmin\u00a0Mohammed Noori and Fezile Ozdamli. 2022. Gamification applications in E-learning: A literature review. Technology Knowledge and Learning 27 1 (2022) 139\u2013159.","DOI":"10.1007\/s10758-020-09487-x"},{"key":"e_1_3_3_2_180_2","volume-title":"Instructional & Research Technology Symposium for Arts, Humanities and Social Sciences, Camden, USA","author":"Sawyer Ben","year":"2007","unstructured":"Ben Sawyer. 2007. The\" serious games\" landscape. In Instructional & Research Technology Symposium for Arts, Humanities and Social Sciences, Camden, USA."},{"key":"e_1_3_3_2_181_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22351-9_13"},{"key":"e_1_3_3_2_182_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-19-2080-6_74"},{"key":"e_1_3_3_2_183_2","unstructured":"Scribbr. [n. d.]. Types of Bias in Research | Definition & Examples. https:\/\/www.scribbr.com\/category\/research-bias\/"},{"key":"e_1_3_3_2_184_2","doi-asserted-by":"crossref","unstructured":"Katie Seaborn and Deborah\u00a0I Fels. 2015. Gamification in theory and action: A survey. International Journal of human-computer studies 74 (2015) 14\u201331.","DOI":"10.1016\/j.ijhcs.2014.09.006"},{"key":"e_1_3_3_2_185_2","unstructured":"Shivanee Shah. [n. d.]. 7 Biases to avoid in qualitative research. https:\/\/www.editage.com\/insights\/7-biases-to-avoid-in-qualitative-research"},{"key":"e_1_3_3_2_186_2","doi-asserted-by":"publisher","DOI":"10.1109\/MTICTI53925.2021.9664771"},{"key":"e_1_3_3_2_187_2","unstructured":"Karzan\u00a0Hussein Sharif and Siddeeq\u00a0Yousif Ameen. 2023. A Intelligent Security Power Lab (SPL): The Ultimate Serious Game Training in Cybersecurity. International Journal of Intelligent Systems and Applications in Engineering 11 11s (2023) 245\u2013259."},{"key":"e_1_3_3_2_188_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICoDSA53588.2021.9617548"},{"key":"e_1_3_3_2_189_2","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_3_2_190_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300886"},{"key":"e_1_3_3_2_191_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300427"},{"key":"e_1_3_3_2_192_2","doi-asserted-by":"crossref","unstructured":"Katie Shilton Donal Heidenblad Adam Porter Susan Winter and Mary Kendig. 2020. Role-playing computer ethics: Designing and evaluating the privacy by design (PbD) simulation. Science and Engineering Ethics 26 (2020) 2911\u20132926.","DOI":"10.1007\/s11948-020-00250-0"},{"key":"e_1_3_3_2_193_2","volume-title":"2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)","author":"Shostack Adam","year":"2014","unstructured":"Adam Shostack. 2014. Elevation of privilege: Drawing developers into threat modeling. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14)."},{"key":"e_1_3_3_2_194_2","doi-asserted-by":"crossref","unstructured":"Benjamin Shreeve Joseph Hallett Matthew Edwards Kopo\u00a0M Ramokapane Richard Atkins and Awais Rashid. 2020. The best laid plans or lack thereof: Security decision-making of different stakeholder groups. IEEE Transactions on Software Engineering 48 5 (2020) 1515\u20131528.","DOI":"10.1109\/TSE.2020.3023735"},{"key":"e_1_3_3_2_195_2","doi-asserted-by":"crossref","unstructured":"Mario Silic and Paul\u00a0Benjamin Lowry. 2020. Using design-science based gamification to improve organizational security training and compliance. Journal of management information systems 37 1 (2020) 129\u2013161.","DOI":"10.1080\/07421222.2019.1705512"},{"key":"e_1_3_3_2_196_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858574"},{"key":"e_1_3_3_2_197_2","unstructured":"Sandra\u00a0Ku\u010dina Softi\u0107 Mirela Ruvi\u0107 Zvonko Martinovi\u0107 and Tona Radobolja. 2024. Exploring student\u2019s learning experience with an e-learning platform. Ubiquity Proceedings 4 1 (2024)."},{"key":"e_1_3_3_2_198_2","unstructured":"Marek Strba and Marek Strba. [n. d.]. UX Research Report. Retrieved July 29 2024 from https:\/\/www.uxtweak.com\/ux-research\/report\/"},{"key":"e_1_3_3_2_199_2","doi-asserted-by":"crossref","unstructured":"Jerry Chih-Yuan Sun Cian-Yu Kuo Huei-Tse Hou and Yu-Yan Lin. 2017. Exploring learners\u2019 sequential behavioral patterns flow experience and learning performance in an anti-phishing educational game. Journal of Educational Technology & Society 20 1 (2017) 45\u201360.","DOI":"10.1109\/ICIMSA.2017.7985594"},{"key":"e_1_3_3_2_200_2","unstructured":"Supercell. 2012. Clash of Clans. Game [iOS Android]. Bibliographic details are for the year of first release."},{"key":"e_1_3_3_2_201_2","doi-asserted-by":"crossref","unstructured":"Anne\u00a0C Tally Jacob Abbott Ashley Bochner Sanchari Das and Christena Nippert-Eng. 2023. What mid-career professionals think know and feel about phishing: Opportunities for university it departments to better empower employees in their anti-phishing decisions. Proceedings of the ACM on Human-Computer Interaction 7 CSCW1 (2023) 1\u201327.","DOI":"10.1145\/3579547"},{"key":"e_1_3_3_2_202_2","unstructured":"Omer Taran. 2023. The Complete Cybersecurity Training Guide for Banks. Retrieved Sep 10 2024 from https:\/\/cybeready.com\/awareness-training\/the-complete-cybersecurity-training-guide-for-banks"},{"key":"e_1_3_3_2_203_2","unstructured":"Sivasailam Thiagarajan. 1993. How to maximize transfer from simulation games through systematic debriefing. Simulation and gaming yearbook 1 (1993) 47\u201347."},{"key":"e_1_3_3_2_204_2","doi-asserted-by":"crossref","unstructured":"Michael\u00a0K Thomas Andria Shyjka Skip Kumm and Rigel Gjomemo. 2019. Educational design research for the development of a collectible card game for cybersecurity learning. Journal of Formative Design in Learning 3 (2019) 27\u201338.","DOI":"10.1007\/s41686-019-00027-0"},{"key":"e_1_3_3_2_205_2","doi-asserted-by":"crossref","unstructured":"Sneha Thombre and Makarand Velankar. 2022. Gamification by Students: An effective approach to cyber security concept learning. Journal of Engineering Education Transformations 36 Special Issue 1 (2022).","DOI":"10.16920\/jeet\/2022\/v36is1\/22178"},{"key":"e_1_3_3_2_206_2","doi-asserted-by":"crossref","unstructured":"Debbe Thompson. 2014. Talk to me please!: the importance of qualitative research to games for health. Games Health J 3 3 (2014) 117\u2013118.","DOI":"10.1089\/g4h.2014.0023"},{"key":"e_1_3_3_2_207_2","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2017.8190712"},{"key":"e_1_3_3_2_208_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517437"},{"key":"e_1_3_3_2_209_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445497"},{"key":"e_1_3_3_2_210_2","doi-asserted-by":"publisher","DOI":"10.1109\/FIE56618.2022.9962410"},{"key":"e_1_3_3_2_211_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376886"},{"key":"e_1_3_3_2_212_2","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3170662"},{"key":"e_1_3_3_2_213_2","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3561148"},{"key":"e_1_3_3_2_214_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05230-9_117"},{"key":"e_1_3_3_2_215_2","doi-asserted-by":"crossref","unstructured":"Marie-Laurence Tremblay Jimmie Leppink Gilles Leclerc Jan-Joost Rethans and Diana\u00a0HJM Dolmans. 2019. Simulation-based education for novices: complex learning tasks promote reflective practice. Medical Education 53 4 (2019) 380\u2013389.","DOI":"10.1111\/medu.13748"},{"key":"e_1_3_3_2_216_2","unstructured":"Raven\u00a0Software Treyarch. 2024. Call of Duty: Black Ops 6. Game [Playstation 4 Playstation 5 Windows Xbox One Xbox Series X\/S."},{"key":"e_1_3_3_2_217_2","unstructured":"Shian-Shyong Tseng Tsung-Yu Yang Wen-Chung Shih and Bo-Yang Shan. 2022. Building a self-evolving iMonsters board game for cyber-security education. Interactive Learning Environments (2022) 1\u201319."},{"key":"e_1_3_3_2_218_2","first-page":"98","volume-title":"Proceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE)","author":"Tseng Shian-Shyong","year":"2015","unstructured":"Shian-Shyong Tseng, Tsung-Yu Yang, Jui-Feng Weng, and Yuh-Jye Wang. 2015. Building a game-based internet security learning system by ontology crystallization approach. In Proceedings of the International Conference on e-Learning, e-Business, Enterprise Information Systems, and e-Government (EEE). The Steering Committee of The World Congress in Computer Science, Computer\u00a0\u2026, 98."},{"key":"e_1_3_3_2_219_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02762-9_8"},{"key":"e_1_3_3_2_220_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376723"},{"key":"e_1_3_3_2_221_2","first-page":"473","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023)","author":"Usman Warda","year":"2023","unstructured":"Warda Usman, Jackie Hu, McKynlee Wilson, and Daniel Zappala. 2023. Distrust of big tech and a desire for privacy: Understanding the motivations of people who have voluntarily adopted secure email. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). 473\u2013490."},{"key":"e_1_3_3_2_222_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISI53945.2021.9624680"},{"key":"e_1_3_3_2_223_2","doi-asserted-by":"crossref","unstructured":"Laura\u00a0M van\u00a0der Lubbe Charlotte Gerritsen Michel\u00a0CA Klein and Koen\u00a0V Hindriks. 2021. Empowering vulnerable target groups with serious games and gamification. Entertainment Computing 38 (2021) 100402.","DOI":"10.1016\/j.entcom.2020.100402"},{"key":"e_1_3_3_2_224_2","doi-asserted-by":"crossref","unstructured":"Lex Van\u00a0Velsen Thea Van Der\u00a0Geest Rob Klaassen and Michael Steehouder. 2008. User-centered evaluation of adaptive and adaptable systems: a literature review. The knowledge engineering review 23 3 (2008) 261\u2013281.","DOI":"10.1017\/S0269888908001379"},{"key":"e_1_3_3_2_225_2","doi-asserted-by":"crossref","unstructured":"Lev Velykoivanenko Kavous\u00a0Salehzadeh Niksirat No\u00e9 Zufferey Mathias Humbert K\u00e9vin Huguenin and Mauro Cherubini. 2021. Are those steps worth your privacy? Fitness-tracker users\u2019 perceptions of privacy and utility. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 5 4 (2021) 1\u201341.","DOI":"10.1145\/3494960"},{"key":"e_1_3_3_2_226_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3595997"},{"key":"e_1_3_3_2_227_2","doi-asserted-by":"crossref","unstructured":"Maja Videnovik Vladimir Trajkovik Tone Vold Linda Ki\u00f8nig Ana\u00a0Madevska Bogdanova and Sonja Filiposka. 2024. Using peer-learning and game-based instruction for achieving long-lasting knowledge of cybersecurity in primary schools. IEEE Access (2024).","DOI":"10.1109\/ACCESS.2024.3479921"},{"key":"e_1_3_3_2_228_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICT-ISPC.2018.8523947"},{"key":"e_1_3_3_2_229_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICT-ISPC.2018.8523965"},{"key":"e_1_3_3_2_230_2","volume-title":"2016 USENIX workshop on advances in security education (ASE 16)","author":"Vykopal Jan","year":"2016","unstructured":"Jan Vykopal and Milo\u0161 Bart\u00e1k. 2016. On the design of security games: From frustrating to engaging learning. In 2016 USENIX workshop on advances in security education (ASE 16)."},{"key":"e_1_3_3_2_231_2","doi-asserted-by":"crossref","unstructured":"Chaoguang Wang and Lusha Huang. 2021. A systematic review of serious games for collaborative learning: Theoretical framework game mechanic and efficiency assessment. International Journal of Emerging Technologies in Learning 16 6 (2021).","DOI":"10.3991\/ijet.v16i06.18495"},{"key":"e_1_3_3_2_232_2","doi-asserted-by":"publisher","DOI":"10.1145\/3125659.3125669"},{"key":"e_1_3_3_2_233_2","doi-asserted-by":"publisher","DOI":"10.1109\/FIE49875.2021.9637228"},{"key":"e_1_3_3_2_234_2","unstructured":"Nipuna\u00a0Hiranya Weeratunge and Rune Hjelsvold. 2023. A review of taxonomies of cybersecurity educational games. (2023)."},{"key":"e_1_3_3_2_235_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300338"},{"key":"e_1_3_3_2_236_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07127-5_23"},{"key":"e_1_3_3_2_237_2","doi-asserted-by":"crossref","unstructured":"Laurie Williams Andrew Meneely and Grant Shipley. 2010. Protection poker: The new software security\" game\". IEEE Security & Privacy 8 3 (2010) 14\u201320.","DOI":"10.1109\/MSP.2010.58"},{"key":"e_1_3_3_2_238_2","doi-asserted-by":"crossref","unstructured":"Meredydd Williams Jason\u00a0RC Nurse and Sadie Creese. 2019. Smartwatch games: Encouraging privacy-protective behaviour in a longitudinal study. Computers in Human Behavior 99 (2019) 38\u201354.","DOI":"10.1016\/j.chb.2019.04.026"},{"key":"e_1_3_3_2_239_2","doi-asserted-by":"crossref","unstructured":"Jacob Willem\u00a0Abraham Witsenboer Klaas Sijtsma and Fedde Scheele. 2022. Measuring cyber secure behavior of elementary and high school students in the Netherlands. Computers & Education 186 (2022) 104536.","DOI":"10.1016\/j.compedu.2022.104536"},{"key":"e_1_3_3_2_240_2","doi-asserted-by":"crossref","unstructured":"Joost\u00a0F Wolfswinkel Elfi Furtmueller and Celeste\u00a0PM Wilderom. 2013. Using grounded theory as a method for rigorously reviewing literature. European journal of information systems 22 1 (2013) 45\u201355.","DOI":"10.1057\/ejis.2011.51"},{"key":"e_1_3_3_2_241_2","doi-asserted-by":"crossref","unstructured":"Nancy\u00a0V W\u00fcnderlich Anders Gustafsson Juho Hamari Petri Parvinen and Andr\u00e9 Haff. 2020. The great game of business: Advancing knowledge on gamification in business contexts. 273\u2013276\u00a0pages.","DOI":"10.1016\/j.jbusres.2019.10.062"},{"key":"e_1_3_3_2_242_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3641930"},{"key":"e_1_3_3_2_243_2","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2014.257242"},{"key":"e_1_3_3_2_244_2","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998316"},{"key":"e_1_3_3_2_245_2","doi-asserted-by":"crossref","unstructured":"Affan Yasin Lin Liu Tong Li Rubia Fatima and Wang Jianmin. 2019. Improving software security awareness using a serious game. IET Software 13 2 (2019) 159\u2013169.","DOI":"10.1049\/iet-sen.2018.5095"},{"key":"e_1_3_3_2_246_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICITSI.2014.7048279"},{"key":"e_1_3_3_2_247_2","doi-asserted-by":"publisher","DOI":"10.1145\/3629606.3629668"},{"key":"e_1_3_3_2_248_2","doi-asserted-by":"publisher","DOI":"10.1145\/3341215.3356273"},{"key":"e_1_3_3_2_249_2","first-page":"65","volume-title":"thirteenth symposium on usable privacy and security (SOUPS 2017)","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End user security and privacy concerns with smart homes. In thirteenth symposium on usable privacy and security (SOUPS 2017). 65\u201380."},{"key":"e_1_3_3_2_250_2","doi-asserted-by":"publisher","DOI":"10.1109\/IGIC.2013.6659158"},{"key":"e_1_3_3_2_251_2","doi-asserted-by":"crossref","unstructured":"Tiange Zhao Tiago Gasiba Ulrike Lechner and Maria Pinto-Albuquerque. 2021. Raising awareness about cloud security in industry through a board game. Information 12 11 (2021) 482.","DOI":"10.3390\/info12110482"},{"key":"e_1_3_3_2_252_2","volume-title":"Second International Computer Programming Education Conference (ICPEC 2021)","author":"Zhao Tiange","year":"2021","unstructured":"Tiange Zhao, Tiago\u00a0Espinha Gasiba, Ulrike Lechner, and Maria Pinto-Albuquerque. 2021. Exploring a board game to improve cloud security training in industry (short paper). In Second International Computer Programming Education Conference (ICPEC 2021). Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik."}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Yokohama Japan","acronym":"CHI '25"},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713798","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713798","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:49Z","timestamp":1750295929000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713798"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":251,"alternative-id":["10.1145\/3706598.3713798","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713798","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}