{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,18]],"date-time":"2023-12-18T10:34:42Z","timestamp":1702895682375},"reference-count":36,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,1,1]]},"abstract":"<p>There is a high demand for skilled cybersecurity professionals, however, entry-level employees and college graduates often lack the hands-on and real-world experience they need to be successful in the cybersecurity industry. This high demand has led educators to pursue innovative and smart application technologies as a way for students to gain hands-on skills and to practice those skills in a safe and fun environment. Cybergames are now being used by educational institutions and in private and public industry sectors. One popular game in the cybersecurity space is called Capture the Flag (CTF). This study investigates Facebook's CTF platform as a cost-effective learning and assessment tool for undergraduate and graduate cybersecurity adult students for an online university.<\/p>","DOI":"10.4018\/ijcssa.2018010102","type":"journal-article","created":{"date-parts":[[2018,5,30]],"date-time":"2018-05-30T12:04:14Z","timestamp":1527681854000},"page":"18-32","source":"Crossref","is-referenced-by-count":2,"title":["Using Facebook's Open Source Capture the Flag Platform as a Hands-on Learning and Assessment Tool for Cybersecurity Education"],"prefix":"10.4018","volume":"6","author":[{"given":"Rhonda","family":"Chicone","sequence":"first","affiliation":[{"name":"Purdue University Global, Chicago, USA"}]},{"given":"Tina Marie","family":"Burton","sequence":"additional","affiliation":[{"name":"Purdue University Global, Chicago, USA"}]},{"given":"Julie A.","family":"Huston","sequence":"additional","affiliation":[{"name":"Kaplan University, Davenport, USA"}]}],"member":"2432","reference":[{"key":"IJCSSA.2018010102-0","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-013-9913-9"},{"issue":"1","key":"IJCSSA.2018010102-1","doi-asserted-by":"crossref","first-page":"5","DOI":"10.22215\/timreview\/861","article-title":"Cybersecurity skills training: An attacker-centric gamified approach.","volume":"5","author":"M.Adams","year":"2015","journal-title":"Technology Innovation Management Review"},{"issue":"6","key":"IJCSSA.2018010102-2","first-page":"41","article-title":"Innovative methods of teaching and learning science and engineering in secondary schools.","volume":"4","author":"N.Balasubramanian","year":"2006","journal-title":"Journal of Systemics, Cybernetics and Informatics"},{"key":"IJCSSA.2018010102-3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511617850.004"},{"issue":"10","key":"IJCSSA.2018010102-4","doi-asserted-by":"crossref","first-page":"13","DOI":"10.22215\/timreview\/835","article-title":"Defining cybersecurity.","volume":"4","author":"D.Craigen","year":"2014","journal-title":"Technology Innovation Management Review"},{"key":"IJCSSA.2018010102-5","doi-asserted-by":"publisher","DOI":"10.1007\/s11528-016-0048-1"},{"key":"IJCSSA.2018010102-6","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12314"},{"key":"IJCSSA.2018010102-7","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2016.2636125"},{"key":"IJCSSA.2018010102-8","doi-asserted-by":"crossref","unstructured":"Hammerstein, J., & May, C. (2010). The CERT approach to cybersecurity workforce development. Defense Technical Information Center. Retrieved from http:\/\/www.dtic.mil\/get-tr-doc\/pdf?AD=ADA537055","DOI":"10.21236\/ADA537055"},{"key":"IJCSSA.2018010102-9","doi-asserted-by":"publisher","DOI":"10.5465\/amle.2012.0063"},{"key":"IJCSSA.2018010102-10","unstructured":"Harmon, T. (2016). Cyber security Capture the Flag (CTF): What is it? Cisco Blog: Perspectives. Retrieved from https:\/\/blogs.cisco.com\/perspectives\/cyber-security-capture-the-flag-ctf-what-is-it"},{"key":"IJCSSA.2018010102-11","unstructured":"ITU-International Telecommunication Union. (2009). Overview of cybersecurity. Recommendation ITU-T X.1205. Geneva: International Telecommunication Union (ITU). Retrieved from http:\/\/www.itu.int\/rec\/T-REC-X.1205-200804-I\/en"},{"key":"IJCSSA.2018010102-12","doi-asserted-by":"crossref","unstructured":"Jordan, C., Knapp, M., Mitchell, D., Claypool, M., & Fisler, K. (2011, October). CounterMeasures: A game for teaching computer security. In Proceedings of the 10th ACM Network and System Support for Games (NetGames). Retrieved from http:\/\/web.cs.wpi.edu\/~claypool\/papers\/security-game\/","DOI":"10.1109\/NetGames.2011.6080983"},{"key":"IJCSSA.2018010102-13","unstructured":"Kelly, D. (2017). The economics of cybersecurity. In International Conference on Cyber Warfare and Security; Reading. Retrieved from https:\/\/search.proquest.com\/central\/docview\/1897683119\/abstract\/726966149386421FPQ\/1?accountid=34544"},{"issue":"5","key":"IJCSSA.2018010102-14","first-page":"16","article-title":"Connecting to things.","volume":"89","author":"M.Kennedy","year":"2017","journal-title":"American School & University"},{"key":"IJCSSA.2018010102-15","unstructured":"Kerner, S. M. (2016, May). Facebook open-sources its capture the flag competition platform. eWeek. Retrieved from http:\/\/www.eweek.com\/security\/facebook-open-sources-its-capture-the-flag-competition-platform.html"},{"key":"IJCSSA.2018010102-16","doi-asserted-by":"publisher","DOI":"10.4135\/9781452276090"},{"key":"IJCSSA.2018010102-17","doi-asserted-by":"publisher","DOI":"10.1080\/00461520.2015.1036273"},{"key":"IJCSSA.2018010102-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2017.09.004"},{"key":"IJCSSA.2018010102-19","doi-asserted-by":"publisher","DOI":"10.1177\/1046878114563660"},{"key":"IJCSSA.2018010102-20","unstructured":"Lohrmann, D. (2012, November 9). Introducing the Michigan cyber range. Government Technology. Retrieved from http:\/\/www.govtech.com\/blogs\/lohrmann-on-cybersecurity\/Introducing-the-Michigan-Cyber-111212.html"},{"key":"IJCSSA.2018010102-21","unstructured":"Marinescu, P. (2016, June 15). #HITB2016AMS CommSec track D2 - Facebook presents capture the flag. Retrieved from https:\/\/www.youtube.com\/watch?v=z_Xic03zor0"},{"key":"IJCSSA.2018010102-22","author":"D.Michael","year":"2006","journal-title":"Serious games: Games that educate, train and inform"},{"key":"IJCSSA.2018010102-23","unstructured":"Miller, D. (2015, November 2). Intro to CTFS. Retrieved from https:\/\/www.youtube.com\/watch?v=bxt-JidP3bU"},{"key":"IJCSSA.2018010102-24","doi-asserted-by":"publisher","DOI":"10.1080\/08832323.2015.1110553"},{"key":"IJCSSA.2018010102-25","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v15i2.3491"},{"key":"IJCSSA.2018010102-26","doi-asserted-by":"publisher","DOI":"10.1080\/00131857.2014.920975"},{"key":"IJCSSA.2018010102-27","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0168675"},{"key":"IJCSSA.2018010102-28","author":"B. H.S\u00f8rensen","year":"2011","journal-title":"Serious games in education: A global perspective"},{"key":"IJCSSA.2018010102-29","unstructured":"Statistics How To. (2017). What is a t-test? Retrieved from http:\/\/www.statisticshowto.com\/probability-and-statistics\/t-test\/"},{"key":"IJCSSA.2018010102-30","doi-asserted-by":"publisher","DOI":"10.1037\/mil0000042"},{"key":"IJCSSA.2018010102-31","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12223"},{"key":"IJCSSA.2018010102-32","unstructured":"Wenz, J. (2015, August 10). Human hackers will play digital capture the flag against AI. Retrieved from http:\/\/www.popularmechanics.com\/technology\/security\/a16827\/ai-capture-the-flag\/"},{"issue":"1","key":"IJCSSA.2018010102-33","first-page":"21","article-title":"Learning outcomes for cyber defense competitions.","volume":"28","author":"A. B.Woszczynski","year":"2017","journal-title":"Journal of Information Systems Education"},{"issue":"1","key":"IJCSSA.2018010102-34","first-page":"198","article-title":"An Experiential learning perspective on students\u2019 satisfaction model in a flipped classroom context.","volume":"20","author":"Z.Xuesong","year":"2017","journal-title":"Journal of Educational Technology & Society"},{"issue":"5","key":"IJCSSA.2018010102-35","first-page":"118","article-title":"Developing hands-on cybersecurity laboratory with virtualization.","volume":"32","author":"D.Yuan","year":"2017","journal-title":"Journal of Computing Sciences in Colleges"}],"container-title":["International Journal of Conceptual Structures and Smart Applications"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=206904","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T19:04:06Z","timestamp":1651863846000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCSSA.2018010102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,1,1]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcssa.2018010102","relation":{},"ISSN":["2166-7292","2166-7306"],"issn-type":[{"value":"2166-7292","type":"print"},{"value":"2166-7306","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,1]]}}}