skip to main content
10.1145/3609987.3610016acmotherconferencesArticle/Chapter ViewAbstractPublication PageschigreeceConference Proceedingsconference-collections
extended-abstract

Enhancing Cyber Security Education and Training through Gamification

Published:27 September 2023Publication History

ABSTRACT

This PhD thesis revolutionizes cyber security education by harnessing the power of gamification. The research develops standardized methodologies and algorithms to evaluate trainees’ performance across platforms, creating a unified scoring system reflecting educational progress. Diverse gamification techniques are implemented to attract and engage trainees, promoting active participation and continuous improvement. Existing gamification methodologies are analyzed and tailored to specific user profiles, enhancing motivation and learning outcomes. Moreover, the research explores the potential of an AI-assisted co-pilot system that generates personalized exercises based on trainees’ skills, guiding them towards areas requiring improvement. The anticipated outcomes include a standardized evaluation system, enriched learning experiences, personalized training approaches, and an AI-driven co-pilot system. This work advances cybersecurity education, fostering a more effective and engaging learning environment. The motivation for this research arises from the need to enhance learner engagement and improve cyber security education.

References

  1. European Defence Agency. 2018. Cyber Ranges Federation Project reaches new milestone. Retrieved Jun 06, 2022 from https://bit.ly/3cU3Lm2Google ScholarGoogle Scholar
  2. Mauro Andreolini, Vincenzo Giuseppe Colacino, Michele Colajanni, and Mirco Marchetti. 2020. A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises. Mobile Networks and Applications 25 (2020), 236–247.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Agnė Brilingaitė, Linas Bukauskas, and Aušrius Juozapavičius. 2020. A framework for competence development and assessment in hybrid cybersecurity exercises. Computers & Security 88 (2020), 101607. https://doi.org/10.1016/j.cose.2019.101607Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Mario Buljan. 2021. Gamification For Learning: Strategies And Examples. Retrieved Jul 04, 2023 from https://elearningindustry.com/gamification-for-learning-strategies-and-examplesGoogle ScholarGoogle Scholar
  5. Circadence. 2020. Teach Cyber Security. Retrieved Jun 06, 2022 from https://bit.ly/30YPUpbGoogle ScholarGoogle Scholar
  6. Alexis Le Compte, David A. Elizondo, and Tim Watson. 2015. A renewed approach to serious games for cyber security. 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace (2015), 203–216. https://doi.org/10.1109/CYCON.2015.7158478Google ScholarGoogle ScholarCross RefCross Ref
  7. Cyber-MAR. 2020. Cyber preparedness actions for a holistic approach and awareness raising in the MARitime logistics supply chain D2.1: State of the art cyber range technologies analysis. PdF. Retrieved June 06, 2022 from https://bit.ly/38ZSNh4Google ScholarGoogle Scholar
  8. Simone de Sousa Borges, Vinicius H. S. Durelli, Helena Macedo Reis, and Seiji Isotani. 2014. A Systematic Mapping on Gamification Applied to Education. In Proceedings of the 29th Annual ACM Symposium on Applied Computing (Gyeongju, Republic of Korea) (SAC ’14). Association for Computing Machinery, New York, NY, USA, 216–222. https://doi.org/10.1145/2554850.2554956Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Sebastian Deterding, Miguel Sicart, Lennart Nacke, Kenton O’Hara, and Dan Dixon. 2011. Gamification. Using Game-Design Elements in Non-Gaming Contexts. In CHI ’11 Extended Abstracts on Human Factors in Computing Systems (Vancouver, BC, Canada) (CHI EA ’11). Association for Computing Machinery, New York, NY, USA, 2425–2428. https://doi.org/10.1145/1979742.1979575Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Jason Diakoumakos, Evangelos Chaskos, Nicholas Kolokotronis, and George Lepouras. 2021. Cyber-Range Federation and Cyber-Security Games: A Gamification Scoring Model. In 2021 IEEE International Conference on Cyber Security and Resilience (CSR). 186–191. https://doi.org/10.1109/CSR51186.2021.9527972Google ScholarGoogle ScholarCross RefCross Ref
  11. Adrián Domínguez, Joseba Saenz de Navarrete, Luis de Marcos, Luis Fernández-Sanz, Carmen Pagés, and José-Javier Martínez-Herráiz. 2013. Gamifying learning experiences: Practical implications and outcomes. Computers and Education 63 (2013), 380–392. https://doi.org/10.1016/j.compedu.2012.12.020Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Emk. 2020. ECHO project summary. Retrieved Jun 06, 2022 from https://bit.ly/3c51AgpGoogle ScholarGoogle Scholar
  13. Bernard Ferguson, Anne Tall, and Denise Olsen. 2014. National Cyber Range Overview. In 2014 IEEE Military Communications Conference. Baltimore, MD, USA, 123–128. https://doi.org/10.1109/MILCOM.2014.27Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Glenn Fink, Daniel Best, David Manz, Viatcheslav Popovsky, and Barbara Endicott-Popovsky. 2013. Gamification for Measuring Cyber Security Situational Awareness. In Foundations of Augmented Cognition, Dylan D. Schmorrow and Cali M. Fidopiastis (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 656–665.Google ScholarGoogle Scholar
  15. FORESIGHT. 2020. Advanced Cyber Security Simulation Platform for Preparedness Training in Aviation, Power Grid and Naval Environments. Retrieved Jun 06, 2022 from https://bit.ly/3xUK4UUGoogle ScholarGoogle Scholar
  16. Tiago Espinha Gasiba, Ulrike Lechner, Filip Rezabek, and Maria Pinto-Albuquerque. 2020. Cybersecurity Games for Secure Programming Education in the Industry: Gameplay Analysis. In Cybersecurity games for secure programming education in the industry (ICPEC). 10:1–10:11. https://doi.org/10.4230/OASIcs.ICPEC.2020.10Google ScholarGoogle ScholarCross RefCross Ref
  17. Patricia Ghann, Emmanuel Dortey Tetteh, and Nina Doe. 2022. The Impact of Covid-19 on Cybersecurity. International Journal of Recent Contributions from Engineering, Science and IT (iJES) 10, 01 (Mar. 2022), pp. 67–75. https://doi.org/10.3991/ijes.v10i01.27889Google ScholarGoogle ScholarCross RefCross Ref
  18. Dominika Giantas and Andrew Liaropoulos. 2019. Cybersecurity in the EU: Threats, frameworks and future perspectives.Google ScholarGoogle Scholar
  19. Carina González González and Alberto Mora. 2014. Gamification in intelligent tutoring systems. TEEM ’14 Proceedings of the Second International Conference on Technological Ecosystems for Enhancing Multiculturality (10 2014). https://doi.org/10.1145/2669711.2669903Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Maurice Hendrix, Ali Al-Sherbaz, and Victoria Bloom. 2016. Game Based Cyber Security Training: are Serious Games suitable for cyber security training?International Journal of Serious Games 3 (03 2016). https://doi.org/10.17083/ijsg.v3i1.107Google ScholarGoogle ScholarCross RefCross Ref
  21. R.A. Kemmerer. 2003. Cybersecurity. In 25th International Conference on Software Engineering, 2003. Proceedings.705–715. https://doi.org/10.1109/ICSE.2003.1201257Google ScholarGoogle ScholarCross RefCross Ref
  22. T.J. Machado and L.B Gouveia. 2021. Covid-19 effects on cybersecurity issues., 222–229 pages. https://doi.org/doi:10.22161/ijaers.88.27Google ScholarGoogle ScholarCross RefCross Ref
  23. M. Moore. 2022. Bringing gamification to cyber security training.Retrieved May 12, 2022 from https://bit.ly/2OJ1QJbGoogle ScholarGoogle Scholar
  24. R. Mukherjee. 2020. Automate deployment of CTF challenges using CI/CD. Retrieved Jun 06, 2022 from https://bit.ly/2NzdhCqGoogle ScholarGoogle Scholar
  25. Benjamin Price, Michael Zhivich, Michael Thompson, and Chris Eagle. 2018. House rules: Designing the scoring algorithm for cyber grand challenge. IEEE Security and Privacy 16, 2 (2018), 23–31. https://doi.org/10.1109/MSP.2018.1870877Google ScholarGoogle ScholarCross RefCross Ref
  26. Iris Rieff. 2018. Systematically Applying Gamification to Cyber Security Awareness Trainings: A framework and case study approach.Google ScholarGoogle Scholar
  27. Sam Scholefield and Lynsay Shepherd. 2019. Gamification Techniques for Raising Cyber Security Awareness. https://doi.org/10.48550/arXiv.1903.08454Google ScholarGoogle ScholarCross RefCross Ref
  28. Katie Seaborn and Deborah I. Fels. 2015. Gamification in theory and action: A survey. Int. J. Hum. Comput. Stud. 74 (2015), 14–31. https://doi.org/10.1016/j.ijhcs.2014.09.006Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Ioana Andreea Stanescu, Antoniu Stefan, and Jannicke Madeleine Baalsrud Hauge. 2016. Using Gamification Mechanisms and Digital Games in Structured and Unstructured Learning Contexts. In Entertainment Computing - ICEC 2016, Günter Wallner, Simone Kriglstein, Helmut Hlavacs, Rainer Malaka, Artur Lugmayr, and Hyun-Seung Yang (Eds.). Springer International Publishing, Cham, 3–14.Google ScholarGoogle ScholarCross RefCross Ref
  30. Matthew Swann, Joseph Rose, Gueltoum Bendiab, Stavros Shiaeles, and Fudong Li. 2021. Open Source and Commercial Capture The Flag Cyber Security Learning Platforms - A Case Study. In 2021 IEEE International Conference on Cyber Security and Resilience (CSR). 198–205. https://doi.org/10.1109/CSR51186.2021.9527941Google ScholarGoogle ScholarCross RefCross Ref
  31. Gamified UK. 2017. 52 Gamification Mechanics and Elements. Retrieved Jul 04, 2023 from https://www.gamified.uk/user-types/gamification-mechanics-elements/Google ScholarGoogle Scholar
  32. Jan Vykopal, Radek OÅ¡lejÅ¡ek, Pavel Celeda, Martin Vizváry, and Daniel Tovarňák. 2017. KYPO Cyber Range: Design and Use Cases. In ICSOFT. 310–321. https://doi.org/10.5220/0006428203100321Google ScholarGoogle ScholarCross RefCross Ref
  33. Joseph Werther, Michael Zhivich, Tim Leek, and Nickolai Zeldovich. 2011. Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise. In 4th Workshop on Cyber Security Experimentation and Test (CSET). San Francisco, CA, 12–12.Google ScholarGoogle Scholar

Index Terms

  1. Enhancing Cyber Security Education and Training through Gamification

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        CHIGREECE '23: Proceedings of the 2nd International Conference of the ACM Greek SIGCHI Chapter
        September 2023
        218 pages
        ISBN:9798400708886
        DOI:10.1145/3609987

        Copyright © 2023 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 27 September 2023

        Check for updates

        Qualifiers

        • extended-abstract
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)127
        • Downloads (Last 6 weeks)24

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format