ABSTRACT
Utilizing game based approaches for learning and training on cyber security is a way to foster innovative methods and effectively train learners in highly-motivating settings. In this work, we investigate related works on such approaches. Our study reveals only a limited set of works focusing on diverse target groups and methodologies and a lack of conceptual analysis and design standards. To this end, we analyse the structure of cyber security learning and training approaches that utilize gamification and game based learning notions; we decompose these approaches into their respective elements; we define their relations; and we construct a concept map of pedagogical and technological elements of game based learning and training approaches on cyber security.
- A. Nagarajan, J. M. Allbeck, A. Sood, and T. L. Janssen. 2012 May. Exploring game design for cybersecurity training. In Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), 2012 IEEE International Conference on (pp. 256--262). IEEE.Google Scholar
- A. Le Compte, T. Watson and D. Elizondo. 2015. A renewed approach to serious games for cyber security. Cyber Conflict: Architectures in Cyberspace (CyCon), 2015 7th International Conference on. IEEE.Google Scholar
- S. Arnab, T. Lim, M. B. Carvalho, F. Bellotti, S. De Freitas, S. Louchart, N. Suttie, R. Berta and A. De Gloria. 2015. Mapping learning and game mechanics for serious games analysis. British Journal of Educational Technology, 46(2), 391--411.Google ScholarCross Ref
- B. Winn. 2008. The design, play, and experience framework. Handbook of research on effective electronic gaming in education 3: 1010--1024.Google Scholar
- J. Vykopal, and M. Barták. 2016, August. On the Design of Security Games: From Frustrating to Engaging Learning. In ASE@ USENIX Security Symposium.Google Scholar
- P. D. Allen and K. A. Straub. 2015. Using Games to Enrich Continuous Cyber Training. Johns Hopkins APL Technical Digest, Volume 33, Number 2 (2015), www.jhuapl.edu/techdigest.Google Scholar
- J. A. Amorim, M. Hendrix, S. F. Andler and P. M. Gustavsson. 2013. Gamified training for cyber defence: Methods and automated tools for situation and threat assessment. In NATO Modelling and Simulation Group (MSG) Annual Conference 2013 (MSG-111).Google Scholar
Index Terms
- Conceptualization of Game Based Approaches for Learning and Training on Cyber Security
Recommendations
A Survey of Semi-Supervised Learning Methods
CIS '08: Proceedings of the 2008 International Conference on Computational Intelligence and Security - Volume 02In traditional machine learning approaches to classification, one uses only a labelled set to train the classifier. Labelled instances however are often difficult, expensive, or time consuming to obtain, as they require the efforts of experienced human ...
An Evaluation of Gamified Training
Background and Aim. Gamification is growing in popularity in education and workplace training, but it is unclear which game elements are conducive to learning. The theory of gamified learning suggests that one type of gamification, the addition of game ...
Training Security Assurance Teams Using Vulnerability Injection
PRDC '08: Proceedings of the 2008 14th IEEE Pacific Rim International Symposium on Dependable ComputingWriting secure web applications is a complex task. In fact, a vast majority of web applications are likely to have security vulnerabilities that can be exploited using simple tools like a common web browser. This represents a great danger as the attacks ...
Comments