{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T20:29:53Z","timestamp":1773520193984,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","funder":[{"name":"NSF &#x28;National Science Foundation&#x29;","award":["1753681"],"award-info":[{"award-number":["1753681"]}]},{"name":"NSF &#x28;National Science Foundation&#x29;","award":["1819521"],"award-info":[{"award-number":["1819521"]}]},{"name":"NSF &#x28;National Science Foundation&#x29;","award":["2138921"],"award-info":[{"award-number":["2138921"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,2,18]]},"DOI":"10.1145\/3770761.3777176","type":"proceedings-article","created":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T15:18:26Z","timestamp":1770995906000},"page":"1367-1368","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A Classroom-Based Study of CyberGuardian: An Educational Game for Learning Cryptographic Primitives"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5358-720X","authenticated-orcid":false,"given":"Shan","family":"Huang","sequence":"first","affiliation":[{"name":"University of Illinois Urbana-Champaign, Champaign, Illinois, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9501-2295","authenticated-orcid":false,"given":"Geoffrey L.","family":"Herman","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, Illinois, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1130-4678","authenticated-orcid":false,"given":"Alan","family":"Sherman","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, Maryland, USA"}]}],"member":"320","published-online":{"date-parts":[[2026,2,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Jacob Cohen. 2013. Statistical power analysis for the behavioral sciences. routledge.","DOI":"10.4324\/9780203771587"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2016.2636125"},{"key":"e_1_3_2_1_3_1","volume-title":"IEEE Frontiers in Education Conference (FIE). 1-6.","author":"Huang Shan","year":"2025","unstructured":"Shan Huang, JiWoo Lee, Geoffrey L. Herman, and Alan Sherman. 2025. A User- Experience Study of CyberGuardian: a Role-Playing Educational Game for Learning Cryptographic Primitives in Authentic Cybersecurity Scenarios. In IEEE Frontiers in Education Conference (FIE). 1-6."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3649217.3653538"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1093\/wentk\/9780199918096.001.0001"},{"key":"e_1_3_2_1_6_1","volume-title":"The probable error of a mean. Biometrika","year":"1908","unstructured":"Student. 1908. The probable error of a mean. Biometrika (1908), 1-25."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.62915\/2472-2707.1030"},{"key":"e_1_3_2_1_8_1","volume-title":"Cybersecurity for everyone. Cybersecurity Best Practices: L\u00f6sungen zur Erh\u00f6hung der Cyberresilienz f\u00fcr Unternehmen und Beh\u00f6rden","author":"van den Berg Jan","year":"2018","unstructured":"Jan van den Berg. 2018. Cybersecurity for everyone. Cybersecurity Best Practices: L\u00f6sungen zur Erh\u00f6hung der Cyberresilienz f\u00fcr Unternehmen und Beh\u00f6rden (2018), 571-583."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.11.003"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-2907-4"}],"event":{"name":"SIGCSE TS 2026:The 57th ACM Technical Symposium on Computer Science Education","location":"St. Louis MO USA","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"]},"container-title":["Proceedings of the 57th ACM Technical Symposium on Computer Science Education V.2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3770761.3777176","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:18:46Z","timestamp":1773508726000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3770761.3777176"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,17]]},"references-count":10,"alternative-id":["10.1145\/3770761.3777176","10.1145\/3770761"],"URL":"https:\/\/doi.org\/10.1145\/3770761.3777176","relation":{},"subject":[],"published":{"date-parts":[[2026,2,17]]},"assertion":[{"value":"2026-02-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}