{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T20:18:24Z","timestamp":1762546704351,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,4]]},"DOI":"10.1145\/3757232.3757249","type":"proceedings-article","created":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T12:13:01Z","timestamp":1762258381000},"page":"243-255","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Who Wants to Be Cybersecure? Expert Evaluation of a Culturally Adaptive Gamified Cybersecurity Awareness App"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6606-7660","authenticated-orcid":false,"given":"Victor Legbo","family":"Yisa","sequence":"first","affiliation":[{"name":"Dalhousie University, Halifax, NS, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6152-8034","authenticated-orcid":false,"given":"Rita","family":"Orji","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, NS, Canada"}]}],"member":"320","published-online":{"date-parts":[[2025,11,4]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"Moses\u00a0Adeleke Adeoye. 2024. Gamification Intervention on Student Academic Performance in Private Secondary School. Journal of Education Technology (2024). 10.23887\/jet.v8i2.79540","DOI":"10.23887\/jet.v8i2.79540"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","unstructured":"S. Agha D. Tollefson Shadae Paul Dylan Green and J. Babigumira. 2019. Use of the Fogg Behavior Model to Assess the Impact of a Social Marketing Campaign on Condom Use in Pakistan. Journal of Health Communication 24 (2019) 284 \u2013 292. 10.1080\/10810730.2019.1597952","DOI":"10.1080\/10810730.2019.1597952"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","unstructured":"Muhammad Aizuddin Abd Aziz Suzila\u00a0Mat Salleh Siti Fatimah Mardiah Hamzah Noor Hafiza Hani Sakina and Mohamad Yusof. 2022. Relationship Between Ease of Use Content and User Satisfaction on Enterprise Content Management System (ECM). Journal of Advanced Research in Business and Management Studies (2022). 10.37934\/arbms.26.1.1016","DOI":"10.37934\/arbms.26.1.1016"},{"key":"e_1_3_3_2_5_2","unstructured":"Maria Bada Angela\u00a0M. Sasse and Jason R.\u00a0C. Nurse. 2014. Cyber Security Awareness Campaigns: Why do they fail to change behaviour? ArXiv abs\/1901.02672 (2014). https:\/\/api.semanticscholar.org\/CorpusID:17775217"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","unstructured":"O. Baidarova and V. Shkuro. 2023. COMPETENCE OF CHILDREN IN INTERNET SAFETY TO COUNTER RISKS OF SEXUAL VIOLENCE. Bulletin of Taras Shevchenko National University of Kyiv. Social work (2023). 10.17721\/2616-7786.2023\/9-1\/1","DOI":"10.17721\/2616-7786.2023\/9-1\/1"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","unstructured":"Rafael Capilla R. Kazman Carlos Romera and Carlos Carrillo. 2020. Usability implications in software architecture: The case study of a mobile app. Software: Practice and Experience 50 (2020) 2145 \u2013 2168. 10.1002\/spe.2883","DOI":"10.1002\/spe.2883"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","unstructured":"Sunil Chaudhary V. Gkioulos and S. Katsikas. 2022. Developing metrics to assess the effectiveness of cybersecurity awareness program. J. Cybersecur. 8 (2022). 10.1093\/cybsec\/tyac006","DOI":"10.1093\/cybsec\/tyac006"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","unstructured":"Daniel Corral Shana\u00a0K. Carpenter and Sam Clingan-Siverly. 2020. The effects of immediate versus delayed feedback on complex concept learning. Quarterly Journal of Experimental Psychology 74 (2020) 786 \u2013 799. 10.1177\/1747021820977739","DOI":"10.1177\/1747021820977739"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","unstructured":"Sonai\u00a0Maria da Silva. 2023. COLLABORATIVE PRACTICES AND THE USE OF DIGITAL TECHNOLOGIES FROM A BLOOM TAXONOMY PERSPECTIVE. International Journal of Human Sciences Research (2023). 10.22533\/at.ed.558372316037","DOI":"10.22533\/at.ed.558372316037"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","unstructured":"Stefanie D\u00f6ringer. 2020. \u2018The problem-centred expert interview\u2019. Combining qualitative interviewing approaches for investigating implicit expert knowledge. International Journal of Social Research Methodology 24 (2020) 265 \u2013 278. 10.1080\/13645579.2020.1766777","DOI":"10.1080\/13645579.2020.1766777"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","unstructured":"Fatokun Faith Zalizah\u00a0Awang Long and Suraya Hamid. 2024. Promoting Cybersecurity Knowledge via Gamification: An Innovative Intervention Design. 2024 Third International Conference on Distributed Computing and High Performance Computing (DCHPC) (2024) 1\u20138. 10.1109\/DCHPC60845.2024.10454080","DOI":"10.1109\/DCHPC60845.2024.10454080"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581038"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","unstructured":"J. Garba J. Kaur E.\u00a0N. Mior and O. Ani. 2023. Design of a conceptual framework for cybersecurity culture amongst online banking users in Nigeria. Nigerian Journal of Technology (2023). 10.4314\/njt.v42i3.13","DOI":"10.4314\/njt.v42i3.13"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","unstructured":"Filippos Giannakas G. Kambourakis and S. Gritzalis. 2015. CyberAware: A mobile game-based app for cybersecurity education and awareness. 2015 International Conference on Interactive Mobile Communication Technologies and Learning (IMCL) (2015) 54\u201358. 10.1109\/IMCTL.2015.7359553","DOI":"10.1109\/IMCTL.2015.7359553"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","unstructured":"E. Gilliard Abdul Maziko Gideon\u00a0C. Rwechungura Ahmed\u00a0Abubakar Aliyu and Erasto Kayumbe. 2024. Protecting Africa\u2019s Future: Cybersecurity Strategies for Child Safety Learning and Skill Acquisition in Tanzania. ArXiv abs\/2409.13159 (2024). 10.48550\/arXiv.2409.13159","DOI":"10.48550\/arXiv.2409.13159"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","unstructured":"Matthew\u00a0O. Iwuchukwu. 2021. LANGUAGE EDUCATION IN NIGERIA: CONTEMPORARY ISSUES AND WAY FORWARD. 1 (2021) 1\u201320. 10.47760\/COGNIZANCE.2021.V01I02.001","DOI":"10.47760\/COGNIZANCE.2021.V01I02.001"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","unstructured":"Rodrigue Kalumendo. 2022. Predictive Factors of IT Systems Adoption by SME Employees in Developing Countries: Evidence from SME Employees in North Kivu DRC. Texila International Journal of Academic Research (2022). 10.21522\/tijar.2014.09.04.art003","DOI":"10.21522\/tijar.2014.09.04.art003"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","unstructured":"Nuning Kurniasih. 2023. Digital Literacy: Education for Safe Internet Usage. Engagement: Jurnal Pengabdian Kepada Masyarakat (2023). 10.29062\/engagement.v7i1.1534","DOI":"10.29062\/engagement.v7i1.1534"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","unstructured":"I. Lubenets Oleksandr Kulyk Nataliia Kulakova Lilia Lisnychenko and I. Naumova. 2023. The problem of child safety in the digital space. Revista Amazonia Investiga (2023). 10.34069\/ai\/2023.69.09.25","DOI":"10.34069\/ai\/2023.69.09.25"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","unstructured":"Sadiq Nasir\u00a0Sadiq Nasir. 2023. Exploring the Effectiveness of Cybersecurity Training Programs: Factors Best Practices and Future Directions. Advances in Multidisciplinary and scientific Research Journal Publication (2023). 10.22624\/aims\/csean-smart2023p18","DOI":"10.22624\/aims\/csean-smart2023p18"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3448696.3448706"},{"key":"e_1_3_3_2_23_2","unstructured":"Newscentral. 2024. Nigeria\u2019s Internet Subscribers Reach 164.4 Million in Q1 2024. https:\/\/newscentral.africa\/nigerias-internet-subscribers-reach-164-4m-in-q1-2024\/"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/191666.191729"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/97243.97281"},{"key":"e_1_3_3_2_26_2","unstructured":"Mike Nkongolo. 2024. CyberMoraba: A Game-Based Approach Enhancing Cybersecurity Awareness. https:\/\/arxiv.org\/abs\/2403.10118."},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","unstructured":"Hazwani Nordin Dalbir Singh Zulkefli Mansor and E. Yadegaridehkordi. 2022. Impact of Power Distance Cultural Dimension in E-Learning Interface Design among Malaysian Generation Z Students. IEEE Access PP (2022) 1\u20131. 10.1109\/ACCESS.2022.3183117","DOI":"10.1109\/ACCESS.2022.3183117"},{"key":"e_1_3_3_2_28_2","unstructured":"J.\u00a0O. Odumesi. 2015. Approaches to Increase Public Awareness on Cybersecurity. (2015)."},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","unstructured":"Ayodeji\u00a0Emmanuel Oke John Aliu Erastus Mwanaumo T. Abayomi and Charles Kahanji. 2023. Leveraging gamification to enhance productivity and employee engagement in the Nigerian construction industry. Built Environment Project and Asset Management (2023). 10.1108\/bepam-04-2023-0064","DOI":"10.1108\/bepam-04-2023-0064"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","unstructured":"Francess Okolo and Arume Ighoroje. 2024. Security Awareness Programs and Behavioral Patterns in Nigeria Deposit Money Banks: Adopting a Robust Cybersecurity Culture. International Journal of Research and Innovation in Social Science (2024). 10.47772\/ijriss.2024.806019","DOI":"10.47772\/ijriss.2024.806019"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Rita Orji Derek Reilly Kiemute Oyibo and Fidelia\u00a0A Orji. 2019. Deconstructing persuasiveness of strategies in behaviour change systems using the ARCS model of motivation. Behaviour & Information Technology 38 4 (2019) 319\u2013335.","DOI":"10.1080\/0144929X.2018.1520302"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","unstructured":"Oladapo\u00a0Adeboye Popoola Michael\u00a0Oladipo Akinsanya Godwin Nzeako Excel\u00a0G Chukwurah and Chukwuekem\u00a0David Okeke. 2024. Exploring theoretical constructs of cybersecurity awareness and training programs: comparative analysis of African and U.S. Initiatives. International Journal of Applied Research in Social Sciences (2024). 10.51594\/ijarss.v6i5.1104","DOI":"10.51594\/ijarss.v6i5.1104"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","unstructured":"Fajar Pradana P. Setyosari Saida Ulfa Tsukasa Hirashima and Faizatul Amalia. 2023. The Effect of Gamification-Based Programming E-Learning Platform on Students\u2019 Achievement. Proceedings of the 8th International Conference on Sustainable Information Engineering and Technology (2023). 10.1145\/3626641.3626675","DOI":"10.1145\/3626641.3626675"},{"key":"e_1_3_3_2_34_2","unstructured":"A. Rufai Salisu Modi and B. Wadata. 2020. A Survey of Cyber-Security Practices in Nigeria. (2020)."},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","unstructured":"Abigail\u00a0A. Scholer James F.\u00a0M. Cornwell and E. Higgins. 2019. Regulatory Focus Theory and Research. The Oxford Handbook of Human Motivation (2019). 10.1093\/oxfordhb\/9780190666453.013.4","DOI":"10.1093\/oxfordhb\/9780190666453.013.4"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","unstructured":"Pintu\u00a0R Shah and A. Agarwal. 2020. Cybersecurity Behaviour of Smartphone Users Through the Lens of Fogg Behaviour Model. 2020 3rd International Conference on Communication System Computing and IT Applications (CSCITA) (2020) 79\u201382. 10.1109\/CSCITA47329.2020.9137773","DOI":"10.1109\/CSCITA47329.2020.9137773"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","unstructured":"Jian Tang Y. Zhao Tianmei Wang and Zhiyuan Zeng. 2021. Examining the Effects of Feedback-giving as a Gamification Mechanic in Crowd Rating Systems. International Journal of Human\u2013Computer Interaction 37 (2021) 1916 \u2013 1930. 10.1080\/10447318.2021.1917866","DOI":"10.1080\/10447318.2021.1917866"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","unstructured":"A. Tarhini K. Hone Xiaohui Liu and Takwa Tarhini. 2017. Examining the moderating effect of individual-level cultural values on users\u2019 acceptance of E-learning in developing countries: a structural equation modeling of an extended technology acceptance model. Interactive Learning Environments 25 (2017) 306 \u2013 328. 10.1080\/10494820.2015.1122635","DOI":"10.1080\/10494820.2015.1122635"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","unstructured":"M. Tejada-Simon. 2024. Exploring the Impact of Game-Based Learning and Creative Active-Learning Activities on Student Engagement and Academic Performance: A Case Study in the basic sciences for Pharmacy Education. Physiology (2024). 10.1152\/physiol.2024.39.s1.935","DOI":"10.1152\/physiol.2024.39.s1.935"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","unstructured":"Reza Ghaiumy\u00a0Anaraky Victor\u00a0Yisa Gerry\u00a0Chan and Rita Orji. 2024. Beyond the Birthday Cake Emoji: Unraveling Gender Differences and Behavioral Nuances in Nigerian Birthday Disclosures on Social Media. International Journal of Human\u2013Computer Interaction 0 0 (2024) 1\u201318. 10.1080\/10447318.2024.2327200 arXiv:10.1080\/10447318.2024.2327200","DOI":"10.1080\/10447318.2024.2327200"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","unstructured":"Victor Yisa and Rita Orji. 2024. Hidden desires echoed distress: Dissecting Nigeria\u2019s sexting landscape and its ties to depression. Computers in Human Behavior 161 (2024) 108420. 10.1016\/j.chb.2024.108420","DOI":"10.1016\/j.chb.2024.108420"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","unstructured":"Victoria Yoko. 2023. Challenges and Opportunities for Cultural Diversity and Language Preservation in Nigeria. Journal of Social and Humanities Studies (2023). 10.56388\/jshj230718","DOI":"10.56388\/jshj230718"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","unstructured":"Tomoya Yuasa F. Harada and H. Shimakawa. 2022. Proposal to Improve Exercise Using the Fogg Behavior Model. 2022 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) (2022) 1\u20134. 10.1109\/CSDE56538.2022.10089262","DOI":"10.1109\/CSDE56538.2022.10089262"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","unstructured":"Tiange Zhao T. Gasiba Ulrike Lechner and Maria Pinto-Albuquerque. 2024. Thriving in the era of Hybrid Work: Raising Cybersecurity Awareness using Serious Games in Industry Trainings. 2024 36th International Conference on Software Engineering Education and Training (CSEET) (2024) 1\u20131. 10.1109\/CSEET62301.2024.10663040","DOI":"10.1109\/CSEET62301.2024.10663040"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.13140\/RG.2.2.19881.90721"}],"event":{"name":"Africhi 2025: The 5th Biennial African Human Computer Interaction Conference","acronym":"AfriCHI 2025","location":"Cairo Egypt"},"container-title":["Proceedings of the 5th Biennial African Human Computer Interaction Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757232.3757249","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T20:14:45Z","timestamp":1762546485000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757232.3757249"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,4]]},"references-count":44,"alternative-id":["10.1145\/3757232.3757249","10.1145\/3757232"],"URL":"https:\/\/doi.org\/10.1145\/3757232.3757249","relation":{},"subject":[],"published":{"date-parts":[[2025,11,4]]},"assertion":[{"value":"2025-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}