skip to main content
10.1145/3139367.3139415acmotherconferencesArticle/Chapter ViewAbstractPublication PagespciConference Proceedingsconference-collections
short-paper

Conceptualization of Game Based Approaches for Learning and Training on Cyber Security

Published:28 September 2017Publication History

ABSTRACT

Utilizing game based approaches for learning and training on cyber security is a way to foster innovative methods and effectively train learners in highly-motivating settings. In this work, we investigate related works on such approaches. Our study reveals only a limited set of works focusing on diverse target groups and methodologies and a lack of conceptual analysis and design standards. To this end, we analyse the structure of cyber security learning and training approaches that utilize gamification and game based learning notions; we decompose these approaches into their respective elements; we define their relations; and we construct a concept map of pedagogical and technological elements of game based learning and training approaches on cyber security.

References

  1. A. Nagarajan, J. M. Allbeck, A. Sood, and T. L. Janssen. 2012 May. Exploring game design for cybersecurity training. In Cyber Technology in Automation, Control, and Intelligent Systems (CYBER), 2012 IEEE International Conference on (pp. 256--262). IEEE.Google ScholarGoogle Scholar
  2. A. Le Compte, T. Watson and D. Elizondo. 2015. A renewed approach to serious games for cyber security. Cyber Conflict: Architectures in Cyberspace (CyCon), 2015 7th International Conference on. IEEE.Google ScholarGoogle Scholar
  3. S. Arnab, T. Lim, M. B. Carvalho, F. Bellotti, S. De Freitas, S. Louchart, N. Suttie, R. Berta and A. De Gloria. 2015. Mapping learning and game mechanics for serious games analysis. British Journal of Educational Technology, 46(2), 391--411.Google ScholarGoogle ScholarCross RefCross Ref
  4. B. Winn. 2008. The design, play, and experience framework. Handbook of research on effective electronic gaming in education 3: 1010--1024.Google ScholarGoogle Scholar
  5. J. Vykopal, and M. Barták. 2016, August. On the Design of Security Games: From Frustrating to Engaging Learning. In ASE@ USENIX Security Symposium.Google ScholarGoogle Scholar
  6. P. D. Allen and K. A. Straub. 2015. Using Games to Enrich Continuous Cyber Training. Johns Hopkins APL Technical Digest, Volume 33, Number 2 (2015), www.jhuapl.edu/techdigest.Google ScholarGoogle Scholar
  7. J. A. Amorim, M. Hendrix, S. F. Andler and P. M. Gustavsson. 2013. Gamified training for cyber defence: Methods and automated tools for situation and threat assessment. In NATO Modelling and Simulation Group (MSG) Annual Conference 2013 (MSG-111).Google ScholarGoogle Scholar

Index Terms

  1. Conceptualization of Game Based Approaches for Learning and Training on Cyber Security

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        PCI '17: Proceedings of the 21st Pan-Hellenic Conference on Informatics
        September 2017
        322 pages

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 September 2017

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate190of390submissions,49%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader