skip to main content
10.1145/3125659.3125696acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Starships and Cybersecurity: Teaching Security Concepts through Immersive Gaming Experiences

Published:27 September 2017Publication History

ABSTRACT

As the world grows more technology involved, teaching some measure of cybersecurity has become imperative. Our research lab aims to help increase the cybersecurity interest and awareness among those of all ages. To aid us in this endeavor, we decided to introduce an interesting method that gamifies cybersecurity.

Our methodology tests whether our new method is a viable vehicle for cybersecurity education. To do this, we asked participants to take surveys and included our own observations. We conclude our paper with our analysis of survey results and future improvements for an effective educational tool.

References

  1. Bonsignore, E. et al. 2012. Alternate Reality Games: Platforms for Collaborative Learning. Proceedings of the Tenth International Conference of the Learning Sciences (Sydney, 2012).Google ScholarGoogle Scholar
  2. Goodman, B. et al. 2001. A Framework for Asynchronous Collaborative Learning and Problem Solving. Proceedings of the 10th International Conference on Artificial Intelligence in Education (2001).Google ScholarGoogle Scholar
  3. Hou, H.-T. and Chou, Y.-S. 2012. Exploring the technology acceptance and flow state of a chamber escape game - Escape the lab© for learning electromagnet concept. (2012).Google ScholarGoogle Scholar
  4. Jagoda, P. et al. 2015. Worlding through Play: Alternate Reality Games, Large-Scale Learning, and The Source. American Journal of Play. 8, 1 (2015), 74--100.Google ScholarGoogle Scholar
  5. White, G. B. and Williams, D. 2005. Collegiate Cyber Defense Competitions. Ninth Colloquium for Information Systems Security Education. The ISSA Journal.Google ScholarGoogle Scholar
  6. White, G. B. and Williams, D. 2006. The National Collegiate Cyber Defense Competition. Tenth Colloquium for Information Systems Security Education.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SIGITE '17: Proceedings of the 18th Annual Conference on Information Technology Education
    September 2017
    202 pages
    ISBN:9781450351003
    DOI:10.1145/3125659

    Copyright © 2017 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 27 September 2017

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    SIGITE '17 Paper Acceptance Rate23of58submissions,40%Overall Acceptance Rate176of429submissions,41%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader