skip to main content
10.1145/3364510.3366163acmotherconferencesArticle/Chapter ViewAbstractPublication Pageskoli-callingConference Proceedingsconference-collections
poster

Evaluating Cybersecurity-Related Competences through Serious Games

Published:21 November 2019Publication History

ABSTRACT

This thesis looks at ways how to use serious games to evaluate cybersecurity-related competences. Various case studies show how competency-driven design of technical exercises can help to target specific competencies in a scalable manner.

References

  1. Mackenzie Adams and Maged Makramalla. 2015. Cybersecurity skills training: an attacker-centric gamified approach. Technology Innovation Management Review 5, 1 (2015).Google ScholarGoogle ScholarCross RefCross Ref
  2. Ashley A Cain, Morgan E Edwards, and Jeremiah D Still. 2018. An exploratory study of cyber hygiene behaviors and knowledge. Journal of information security and applications 42 (2018), 36--45.Google ScholarGoogle ScholarCross RefCross Ref
  3. Tom Chothia and Chris Novakovic. 2015. An offline capture the flag-style virtual machine and an assessment of its value for cybersecurity education. In 2015 {USENIX} Summit on Gaming, Games, and Gamification in Security Education (3GSE 15)Google ScholarGoogle Scholar
  4. Yu-kai Chou. 2015. Actionable gamification: beyond points, badges, and leaderboards. Octalysis Group, United States.Google ScholarGoogle Scholar
  5. Jessica Dawson and Robert Thomson. 2018. The future cybersecurity workforce: Going beyond technical skills for successful cyber performance. Frontiers in psychology 9 (2018).Google ScholarGoogle Scholar
  6. Timothy J Ellis and Yair Levy. 2009. Towards a Guide for Novice Researchers on Research Methodology: Review and Proposed Methods. Issues in Informing Science & Information Technology 6 (2009).Google ScholarGoogle Scholar
  7. Margus Ernits, Kaie Maennel, Sten Mäses, Olaf Maennel, and Toomas Lepik. [n.d.]. From Simple Scoring Towards a Meaningful Interpretation of Learning in Cybersecurity Exercises. ([n. d.]). UNPUBLISHED.Google ScholarGoogle Scholar
  8. Juho Hamari, Jonna Koivisto, Harri Sarsa, et al. 2014. Does Gamification Work?-A Literature Review of Empirical Studies on Gamification.. In HICSS, Vol. 14. 3025--3034.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Diane S Henshel, Gary M Deckard, Brad Lufkin, Norbou Buchler, Blaine Hoffman, Prashanth Rajivan, and Steve Collman. 2016. Predicting proficiency in cyber defense team exercises. In MILCOM 2016-2016 IEEE Military Communications Conference. IEEE, 776--781.Google ScholarGoogle ScholarCross RefCross Ref
  10. Kaie Maennel, Sten Mäses, and Olaf Maennel. 2018. Cyber Hygiene: The Big Picture. In Nordic Conference on Secure IT Systems. Springer, 218--226.Google ScholarGoogle Scholar
  11. Kaie Maennel, Rain Ottis, and Olaf Maennel. 2017. Improving and Measuring Learning Effectiveness at Cyber Defense Exercises. In Nordic Conference on Secure IT Systems. Springer, 123--138.Google ScholarGoogle ScholarCross RefCross Ref
  12. Sten Mäses, Heleri Aitsam, and Liina Randmann. [n.d.]. A Method for adding cyberethical behaviour measurements to computer science homework assignments. ([n. d.]). UNPUBLISHED.Google ScholarGoogle Scholar
  13. Sten Mäses, Bil Hallaq, and Olaf Maennel. 2017. Obtaining Better Metrics for Complex Serious Games Within Virtualised Simulation Environments. In ECGBL 2017 11th European Conference on Game-Based Learning. Academic Conferences and publishing limited, 428--434.Google ScholarGoogle Scholar
  14. Sten Mäses, Kristjan Kikerpill, Kaspar Jüristo, and Olaf Maennel. 2017. Mixed Methods Research Approach and Experimental Procedure for Measuring Human Factors in Cybersecurity Using Phishing Simulations. In ECRM 2019 18th European Conference on Research Methodology for Business and Management Studies. Academic Conferences and publishing limited, 428--434.Google ScholarGoogle Scholar
  15. Sten Mäses, Liina Randmann, Olaf Maennel, and Birgy Lorenz. 2018. Stenmap: Framework for Evaluating Cybersecurity-Related Skills Based on Computer Simulations. In Learning and Collaboration Technologies. Learning and Teaching. Springer, 1--13.Google ScholarGoogle Scholar
  16. Jelena Mirkovic and Peter AH Peterson. 2014. Class capture-the-flag exercises. In 2014 {USENIX} Summit on Gaming, Games, and Gamification in Security Education (3GSE 14).Google ScholarGoogle Scholar
  17. Celia Paulsen, Ernest McDuffie, William Newhouse, and Patricia Toth. 2012. NICE: Creating a cybersecurity workforce and aware public. IEEE Security & Privacy 10, 3 (2012), 76--79.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Philip L Roth, Philip Bobko, and Lynn A McFarland. 2005. A meta-analysis of work sample test validity: Updating and integrating some classic literature. Personnel Psychology 58, 4 (2005), 1009--1037.Google ScholarGoogle ScholarCross RefCross Ref
  19. Nicolaj Siggelkow. 2007. Persuasion with case studies. Academy of management journal 50, 1 (2007), 20--24.Google ScholarGoogle Scholar
  20. Mike Smith. 2005. Testing people at work: competencies in psychometric testing. BPS Blackwell, Malden, MA.Google ScholarGoogle Scholar
  21. Richard Weiss, Michael E Locasto, and Jens Mache. 2016. A reflective approach to assessing student performance in cybersecurity exercises. In Proceedings of the 47th ACM Technical Symposium on Computing Science Education. ACM, 597--602.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Joseph Werther, Michael Zhivich, Tim Leek, and Nickolai Zeldovich. 2011. Experiences in cyber security education: The MIT Lincoln laboratory capture-the-flag exercise.. In CSET.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    Koli Calling '19: Proceedings of the 19th Koli Calling International Conference on Computing Education Research
    November 2019
    247 pages
    ISBN:9781450377157
    DOI:10.1145/3364510

    Copyright © 2019 Owner/Author

    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 21 November 2019

    Check for updates

    Qualifiers

    • poster
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate80of182submissions,44%
  • Article Metrics

    • Downloads (Last 12 months)22
    • Downloads (Last 6 weeks)5

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader