Skip to main content

MEMORABLE: A Multi-playEr custoMisable seriOus Game fRAmework for cyBer-security LEarning

  • Conference paper
  • First Online:
Intelligent Tutoring Systems (ITS 2022)

Abstract

In this paper, we propose an educational game framework allowing instructors to customise the game’s learning content in the context of cyber-security, with the aim of ensuring learners are engaged with educational games. This can further support them continuing to acquire useful cyber-security knowledge, while playing with their peers. Based on this framework, a prototype digital game called “Cyberpoly” was implemented and evaluated. This game allows unfamiliar or potentially unappealing, ‘dry’ learning contents (on cyber-attacks and incidents) to be placed in a context similar to a “monopoly” game board, encouraging multiple players to take an active role when landing on various cyber-attack or incident squares. The learner can not only answer the questions generated by the game, but also actively send cyber-attacks to other players, when landing on another’s land. Learner data was collected from 30 undergraduate participants, with results suggesting that most found it engaging and felt motivated to learn. Further to this, we also obtained feedback from two academic professors, to discuss not only game-play but also game element management.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Cybersecurity investment 2020. https://www.canalys.com/newsroom/cybersecurity-investment-2020

  2. Cybersecurity lab. https://www.pbs.org/wgbh/nova/labs/lab/cyber/

  3. Cybersprinters: Game and activities. https://www.ncsc.gov.uk/information/cybersprinters-game-and-activities

  4. Keep tradition secure. https://keeptraditionsecure.tamu.edu/

  5. Targeted attack: The game - defend your data. Choose wisely. Succeed or fail. http://targetedattacks.trendmicro.com/

  6. Uk National Crime Agency: Cybergames. https://cybergamesuk.com/cybergames

  7. Brooke, J.: Sus: A quick and dirty usability scale. Usabil. Eval. Ind. 189 (1995)

    Google Scholar 

  8. Garzotto: Investigating the educational effectiveness of multiplayer online games for children. In: Proceedings of the 6th International Conference on Interaction Design and Children, pp. 29–36 (2007). https://doi.org/10.1145/1297277.1297284

  9. Kordaki, M., Gousiou, A.: Digital card games in education: a ten year systematic review. Comput. Educ. 109, 122–161 (2017). https://doi.org/10.1016/j.compedu.2017.02.011, https://www.sciencedirect.com/science/article/pii/S036013151730043X

  10. Laal, M., Ghodsi, S.M.: Benefits of collaborative learning. Proc. Soc. Behav. Sci. 31, 486–490 (2012). https://doi.org/10.1016/j.sbspro.2011.12.091, https://www.sciencedirect.com/science/article/pii/S1877042811030205, World Conference on Learning, Teaching and Administration - 2011

  11. Lo, J.J., Kuo, T.Y.: A study of parent-child play in a multiplayer competitive educational game. In: 2013 IEEE 13th International Conference on Advanced Learning Technologies, pp. 43–47 (2013)

    Google Scholar 

  12. Putz, L.M., Hofbauer, F., Treiblmaier, H.: Can gamification help to improve education? Findings from a longitudinal study. Comput. Hum. Behav. 110, 106392 (2020). https://doi.org/10.1016/j.chb.2020.106392, https://www.sciencedirect.com/science/article/pii/S074756322030145X

  13. Seah, E.T.W., Kaufman, D., Sauvé, L., Zhang, F.: Play, learn, connect. J. Educ. Comput. Res. 56, 675–700 (2018)

    Article  Google Scholar 

  14. Shi, L., Cristea, A.I.: Motivational gamification strategies rooted in self-determination theory for social adaptive e-learning. In: Micarelli, A., Stamper, J., Panourgia, K. (eds.) ITS 2016. LNCS, vol. 9684, pp. 294–300. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39583-8_32

    Chapter  Google Scholar 

  15. Storm: 90% of security incidents trace back to pebkac and id10t errors (2015). https://www.computerworld.com/article/2910316/90-of-security-incidents-trace-back-to-pebkac-and-id10t-errors.html

  16. Toda, A.M., et al.: A taxonomy of game elements for gamification in educational contexts: proposal and evaluation. In: 2019 IEEE 19th International Conference on Advanced Learning Technologies (ICALT), vol. 2161, pp. 84–88. IEEE (2019)

    Google Scholar 

  17. Wendel, V., Gutjahr, M., Göbel, S., Steinmetz, R.: Designing collaborative multiplayer serious games: escape from Wilson island - a multiplayer 3D serious game for collaborative learning in teams. Educ. Inf. Technol. 18 (2013). https://doi.org/10.1007/s10639-012-9244-6

  18. Wendel, V., Konert, J.: Multiplayer serious games. In: Dörner, R., Göbel, S., Effelsberg, W., Wiemeyer, J. (eds.) Serious Games, pp. 211–241. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40612-1_8

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jingyun Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, J., Hodgson, R., Cristea, A.I. (2022). MEMORABLE: A Multi-playEr custoMisable seriOus Game fRAmework for cyBer-security LEarning. In: Crossley, S., Popescu, E. (eds) Intelligent Tutoring Systems. ITS 2022. Lecture Notes in Computer Science, vol 13284. Springer, Cham. https://doi.org/10.1007/978-3-031-09680-8_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-09680-8_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-09679-2

  • Online ISBN: 978-3-031-09680-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics