ABSTRACT
This PhD thesis revolutionizes cyber security education by harnessing the power of gamification. The research develops standardized methodologies and algorithms to evaluate trainees’ performance across platforms, creating a unified scoring system reflecting educational progress. Diverse gamification techniques are implemented to attract and engage trainees, promoting active participation and continuous improvement. Existing gamification methodologies are analyzed and tailored to specific user profiles, enhancing motivation and learning outcomes. Moreover, the research explores the potential of an AI-assisted co-pilot system that generates personalized exercises based on trainees’ skills, guiding them towards areas requiring improvement. The anticipated outcomes include a standardized evaluation system, enriched learning experiences, personalized training approaches, and an AI-driven co-pilot system. This work advances cybersecurity education, fostering a more effective and engaging learning environment. The motivation for this research arises from the need to enhance learner engagement and improve cyber security education.
- European Defence Agency. 2018. Cyber Ranges Federation Project reaches new milestone. Retrieved Jun 06, 2022 from https://bit.ly/3cU3Lm2Google Scholar
- Mauro Andreolini, Vincenzo Giuseppe Colacino, Michele Colajanni, and Mirco Marchetti. 2020. A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises. Mobile Networks and Applications 25 (2020), 236–247.Google ScholarDigital Library
- Agnė Brilingaitė, Linas Bukauskas, and Aušrius Juozapavičius. 2020. A framework for competence development and assessment in hybrid cybersecurity exercises. Computers & Security 88 (2020), 101607. https://doi.org/10.1016/j.cose.2019.101607Google ScholarDigital Library
- Mario Buljan. 2021. Gamification For Learning: Strategies And Examples. Retrieved Jul 04, 2023 from https://elearningindustry.com/gamification-for-learning-strategies-and-examplesGoogle Scholar
- Circadence. 2020. Teach Cyber Security. Retrieved Jun 06, 2022 from https://bit.ly/30YPUpbGoogle Scholar
- Alexis Le Compte, David A. Elizondo, and Tim Watson. 2015. A renewed approach to serious games for cyber security. 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace (2015), 203–216. https://doi.org/10.1109/CYCON.2015.7158478Google ScholarCross Ref
- Cyber-MAR. 2020. Cyber preparedness actions for a holistic approach and awareness raising in the MARitime logistics supply chain D2.1: State of the art cyber range technologies analysis. PdF. Retrieved June 06, 2022 from https://bit.ly/38ZSNh4Google Scholar
- Simone de Sousa Borges, Vinicius H. S. Durelli, Helena Macedo Reis, and Seiji Isotani. 2014. A Systematic Mapping on Gamification Applied to Education. In Proceedings of the 29th Annual ACM Symposium on Applied Computing (Gyeongju, Republic of Korea) (SAC ’14). Association for Computing Machinery, New York, NY, USA, 216–222. https://doi.org/10.1145/2554850.2554956Google ScholarDigital Library
- Sebastian Deterding, Miguel Sicart, Lennart Nacke, Kenton O’Hara, and Dan Dixon. 2011. Gamification. Using Game-Design Elements in Non-Gaming Contexts. In CHI ’11 Extended Abstracts on Human Factors in Computing Systems (Vancouver, BC, Canada) (CHI EA ’11). Association for Computing Machinery, New York, NY, USA, 2425–2428. https://doi.org/10.1145/1979742.1979575Google ScholarDigital Library
- Jason Diakoumakos, Evangelos Chaskos, Nicholas Kolokotronis, and George Lepouras. 2021. Cyber-Range Federation and Cyber-Security Games: A Gamification Scoring Model. In 2021 IEEE International Conference on Cyber Security and Resilience (CSR). 186–191. https://doi.org/10.1109/CSR51186.2021.9527972Google ScholarCross Ref
- Adrián Domínguez, Joseba Saenz de Navarrete, Luis de Marcos, Luis Fernández-Sanz, Carmen Pagés, and José-Javier Martínez-Herráiz. 2013. Gamifying learning experiences: Practical implications and outcomes. Computers and Education 63 (2013), 380–392. https://doi.org/10.1016/j.compedu.2012.12.020Google ScholarDigital Library
- S. Emk. 2020. ECHO project summary. Retrieved Jun 06, 2022 from https://bit.ly/3c51AgpGoogle Scholar
- Bernard Ferguson, Anne Tall, and Denise Olsen. 2014. National Cyber Range Overview. In 2014 IEEE Military Communications Conference. Baltimore, MD, USA, 123–128. https://doi.org/10.1109/MILCOM.2014.27Google ScholarDigital Library
- Glenn Fink, Daniel Best, David Manz, Viatcheslav Popovsky, and Barbara Endicott-Popovsky. 2013. Gamification for Measuring Cyber Security Situational Awareness. In Foundations of Augmented Cognition, Dylan D. Schmorrow and Cali M. Fidopiastis (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 656–665.Google Scholar
- FORESIGHT. 2020. Advanced Cyber Security Simulation Platform for Preparedness Training in Aviation, Power Grid and Naval Environments. Retrieved Jun 06, 2022 from https://bit.ly/3xUK4UUGoogle Scholar
- Tiago Espinha Gasiba, Ulrike Lechner, Filip Rezabek, and Maria Pinto-Albuquerque. 2020. Cybersecurity Games for Secure Programming Education in the Industry: Gameplay Analysis. In Cybersecurity games for secure programming education in the industry (ICPEC). 10:1–10:11. https://doi.org/10.4230/OASIcs.ICPEC.2020.10Google ScholarCross Ref
- Patricia Ghann, Emmanuel Dortey Tetteh, and Nina Doe. 2022. The Impact of Covid-19 on Cybersecurity. International Journal of Recent Contributions from Engineering, Science and IT (iJES) 10, 01 (Mar. 2022), pp. 67–75. https://doi.org/10.3991/ijes.v10i01.27889Google ScholarCross Ref
- Dominika Giantas and Andrew Liaropoulos. 2019. Cybersecurity in the EU: Threats, frameworks and future perspectives.Google Scholar
- Carina González González and Alberto Mora. 2014. Gamification in intelligent tutoring systems. TEEM ’14 Proceedings of the Second International Conference on Technological Ecosystems for Enhancing Multiculturality (10 2014). https://doi.org/10.1145/2669711.2669903Google ScholarDigital Library
- Maurice Hendrix, Ali Al-Sherbaz, and Victoria Bloom. 2016. Game Based Cyber Security Training: are Serious Games suitable for cyber security training?International Journal of Serious Games 3 (03 2016). https://doi.org/10.17083/ijsg.v3i1.107Google ScholarCross Ref
- R.A. Kemmerer. 2003. Cybersecurity. In 25th International Conference on Software Engineering, 2003. Proceedings.705–715. https://doi.org/10.1109/ICSE.2003.1201257Google ScholarCross Ref
- T.J. Machado and L.B Gouveia. 2021. Covid-19 effects on cybersecurity issues., 222–229 pages. https://doi.org/doi:10.22161/ijaers.88.27Google ScholarCross Ref
- M. Moore. 2022. Bringing gamification to cyber security training.Retrieved May 12, 2022 from https://bit.ly/2OJ1QJbGoogle Scholar
- R. Mukherjee. 2020. Automate deployment of CTF challenges using CI/CD. Retrieved Jun 06, 2022 from https://bit.ly/2NzdhCqGoogle Scholar
- Benjamin Price, Michael Zhivich, Michael Thompson, and Chris Eagle. 2018. House rules: Designing the scoring algorithm for cyber grand challenge. IEEE Security and Privacy 16, 2 (2018), 23–31. https://doi.org/10.1109/MSP.2018.1870877Google ScholarCross Ref
- Iris Rieff. 2018. Systematically Applying Gamification to Cyber Security Awareness Trainings: A framework and case study approach.Google Scholar
- Sam Scholefield and Lynsay Shepherd. 2019. Gamification Techniques for Raising Cyber Security Awareness. https://doi.org/10.48550/arXiv.1903.08454Google ScholarCross Ref
- Katie Seaborn and Deborah I. Fels. 2015. Gamification in theory and action: A survey. Int. J. Hum. Comput. Stud. 74 (2015), 14–31. https://doi.org/10.1016/j.ijhcs.2014.09.006Google ScholarDigital Library
- Ioana Andreea Stanescu, Antoniu Stefan, and Jannicke Madeleine Baalsrud Hauge. 2016. Using Gamification Mechanisms and Digital Games in Structured and Unstructured Learning Contexts. In Entertainment Computing - ICEC 2016, Günter Wallner, Simone Kriglstein, Helmut Hlavacs, Rainer Malaka, Artur Lugmayr, and Hyun-Seung Yang (Eds.). Springer International Publishing, Cham, 3–14.Google ScholarCross Ref
- Matthew Swann, Joseph Rose, Gueltoum Bendiab, Stavros Shiaeles, and Fudong Li. 2021. Open Source and Commercial Capture The Flag Cyber Security Learning Platforms - A Case Study. In 2021 IEEE International Conference on Cyber Security and Resilience (CSR). 198–205. https://doi.org/10.1109/CSR51186.2021.9527941Google ScholarCross Ref
- Gamified UK. 2017. 52 Gamification Mechanics and Elements. Retrieved Jul 04, 2023 from https://www.gamified.uk/user-types/gamification-mechanics-elements/Google Scholar
- Jan Vykopal, Radek OÅ¡lejÅ¡ek, Pavel Celeda, Martin Vizváry, and Daniel Tovarňák. 2017. KYPO Cyber Range: Design and Use Cases. In ICSOFT. 310–321. https://doi.org/10.5220/0006428203100321Google ScholarCross Ref
- Joseph Werther, Michael Zhivich, Tim Leek, and Nickolai Zeldovich. 2011. Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise. In 4th Workshop on Cyber Security Experimentation and Test (CSET). San Francisco, CA, 12–12.Google Scholar
Index Terms
- Enhancing Cyber Security Education and Training through Gamification
Recommendations
Integrating gamification and instructional design to enhance usability of online learning
AbstractThe current study investigates the interaction of Gamification, and Instructional Design to enhance the Usability of e-Learning in higher education programs. The study also examines the mediating role of Instructional design. Data were collected ...
Clashroom: A Game to Enhance the Classroom Experience (Abstract Only)
SIGCSE '16: Proceedings of the 47th ACM Technical Symposium on Computing Science EducationClashroom is a web-based fantasy game that was created to enhance the motivation and learning of a traditional classroom. It was created to address several drawbacks of other educational games by being broadly applicable to any course, requiring no ...
Pre-service teachers’ perception of active learning methodologies in history: Flipped classroom and gamification in an e-learning environment
AbstractThe scientific literature reveals the impact of applying game-based videos and gamification on undergraduates' learning. This work proposes, within an online context, using these educational strategies to make students the active protagonists of ...
Comments