283
Views
3
CrossRef citations to date
0
Altmetric
Articles

Building a self-evolving iMonsters board game for cyber-security education

ORCID Icon, ORCID Icon, &
Pages 1300-1318 | Received 01 Jul 2021, Accepted 23 Jun 2022, Published online: 26 Sep 2022

References

  • Akour, M., Alsghaier, H., & Aldiabat, S. (2020). Game-based learning approach to improve self-learning motivated students. Technology Enhanced Learning, 12(2), 146. https://doi.org/10.1504/IJTEL.2020.106283
  • Akmal, H. A., & Coulton, P. (2019). Research Through Board Game Design, Research through Design Conference (RTD).
  • Bodnar, C. A., Enszer, J. A., & Buckey, D. D. (2016). Engineers at play: Games as teaching tools for undergraduate engineering students. Journal of Engineering Education, 105(1), 147–200. https://doi.org/10.1002/jee.20106
  • Cliburn, J. W. Jr., (1987). Helping students understand physiological interactions: A concept mapping activity. The American Biology Teacher, 49(7), 426–427. https://doi.org/10.2307/4448578
  • DC Collins-Creative Director. (2020). Hackers’ Epoch Cybersecurity Card Game, https://www.hackersepoch.com/.
  • Eseryel, D., & Ge, X. (2017). Designing effective game-based learning environments: Implications for design research. Hershey. IGI Global.
  • Fire, M., Goldschmidt, R., & Elovici, Y. (2014). Online social networks: Threats and solutions. IEEE Communications Surveys & Tutorials, 16(4), 2019–2036. https://doi.org/10.1109/COMST.2014.2321628
  • Granic, I., & Lobel, A. (2013). Video games play may provide learning, health, social benefits, review finds. Retrieved from American Psychological Association (APA).
  • Herrington, J., & Oliver, R. (1995). Critical characteristics of situated learning: Implications for the instructional design of multimedia. ASCILITE 1995 Conference, University of Melbourne, Melbourne.
  • Hou, H.-T., & Li, M.-C. (2014). Evaluating multiple aspects of a digital educational problem-solving-based adventure game. Computers in Human Behavior, 30, 29–38. https://doi.org/10.1016/j.chb.2013.07.052
  • Hwang, G.-J., Wu, C.-H., & Kuo, F.-R. (2013). Effects of touch technology-based concept mapping on students’ learning attitudes and perceptions. Educational Technology & Society, 16(3), 274–285.
  • Ifenthaler, D. (2019). The abc-model of game-design. Available at https://www.researchgate.net/figure/The-ABC-model-of-game-design-Ifenthaler-in-press_fig1_328465807.
  • Jansson, K., & von Solms, R. (2013). Phishing for phishing awareness. Behaviour & Information Technology, 32(6), 584–593. https://doi.org/10.1080/0144929X.2011.632650
  • Kearsley, G. (2010). The theory into practice database. https://www.ala.org/rt/lirt/adult-learning-theories.
  • Kinchin, I., & Hay, D. (2005). Using concept maps to optimize the composition of collaborative student groups: A pilot study. Journal of Advanced Nursing, 51(2), 182–187. https://doi.org/10.1111/j.1365-2648.2005.03478.x
  • Konami Digital Entertainment. (2020). YU-GI-OH online-game, https://www.konami.com/yugioh/duel_links/en/game/.
  • Lam, H. C. (2019). Revisiting variation affordance: Applying variation theory in the design of educational software. Interactive Learning Environments, 30, 527–538. https://doi.org/10.1080/10494820.2019.1668812
  • Lin, J.-D., Yen, C.-F., & Chen, M.-H. (2005). Qualitative research method: Models and steps of interviewing. Journal of Disability Research, 3(2), 122–136. https://doi.org/10.30072/JDR.200506.0005
  • Margoudi, M., Oliveira, M., & Waddel, G. (2016). Game-based learning of musical instruments: A review and recommendations. Proceedings of the 10th European conference on games based learning.
  • Moen, E. M. J. C., & Boersma, K. T. (1997). The significance of concept mapping for education and curriculum development. Journal of Interactive Learning Research, 8(3-4), 487–502.
  • Otto, K., Krohn, C., & Sabitzer, B. (2020). Immersion into the world of gaming: An approach of introducing gamification in an educational context. International Conference on Computer Supported Education (CSEDU), 2, 245–252. https://doi.org/10.5220/0009343402450252
  • Roberts, R. E. (2020). Qualitative interview questions: Guidance for novice researchers. The Qualitative Report, 25(9), 3185–3203. https://doi.org/10.46743/2160-3715/2020.4640
  • Schunk, D. H., Meece, J. L., & Pintrich, P. R. (2013). Motivation in education: Theory, research, and applications. Pearson, NJ: Upper Saddle River.
  • Sinclair, J., Joy, M., Yau, J. Y. K., & Hagan, S. (2013). A practice-oriented review of learning objects. IEEE Transactions on Learning Technologies, 6(2), 177–192. https://doi.org/10.1109/TLT.2013.6
  • Sun, C.-Y., & Lee, K.-H. (2016). Which teaching strategy is better for enhancing anti-phishing learning motivation and achievement? The concept maps on tablet PCs or worksheets? Educational Technology & Society, 19(4), 87–99.
  • Sun, C.-Y., Yu, S.-J., Lin, S.-J., & Tseng, S.-S. (2016). The mediating effect of anti-phishing self-efficacy between college students’ internet self-efficacy and anti-phishing behavior and gender difference. Computers in Human Behavior, 59, 249–257. https://doi.org/10.1016/j.chb.2016.02.004
  • Sun, J. C.-Y., Kuo, C.-Y., Hou, H.-T., & Lin, Y.-Y. (2017). Exploring learners’ sequential behavioral patterns, flow experience, and learning performance in an anti-phishing educational game. Educational Technology & Society, 20(1), 45–60.
  • Sun, L., Ruokamo, H., Siklander, P.-T., & Li, B. (2021). Primary school students’ perceptions of scaffolding in digital game-based learning in mathematics, learning. Culture and Social Interaction, 28(4). https://doi.org/10.1016/j.lcsi.2020.100457
  • Sweller, J. (1994). Cognitive load theory, learning difficulty, and instructional design. Learning and Instruction, 4(4), 295–312. https://doi.org/10.1016/0959-4752(94)90003-5
  • Trybus, J. (2014). Game-based learning: What it is, why it works, and where it’s going. New Media Institute.
  • Tsai, F.-H., Yu, K.-C., & Hsiao, H.-S. (2010). Exploring the factors that influence learning behaviors and learning transfer in digital game-based learning. Journal of Educational Science Research, 55(2), 167–206. https://doi.org/10.3966/2073753X2010065502006
  • Tseng, S.-S., Ku, C.-H., Lee, T.-J., Geng, G.-G., & Wang, Y.-J. (2013). Building a frame-based anti-phishing model based on phishing ontology. AIT.
  • Tseng, S.-S., Weng, J.-F., & Yang, T.-Y. (2015). Case-based Learning Game Design on Internet Security, TAIWAN E-Learning FORUM (TWELF).
  • Turner, P. E., Johnston, E., Kebritchi, M., Evans, S., & David, A. (2018). Influence of online computer games on the academic achievement of nontraditional undergraduate students. Cogent Education, 5(1), 1. https://doi.org/10.1080/2331186X.2018.1437671
  • Wang, Y.-H. (2021). Exploring the effects of using various designs of game-based materials on music learning. Interactive Learning Environments. https://doi.org/10.1080/10494820.2021.1894182
  • Wishart, J. M., Oades, C., & Morris, M. (2007). Using online role play to teach internet safety awareness. Computers & Education, 48(3), 460–473. https://doi.org/10.1016/j.compedu.2005.03.003
  • Yang, C.-C., Hwang, G.-J., Hung, C.-M., & Tseng, S.-S. (2013). An evaluation of the learning effectiveness of concept map based science book reading via mobile devices. Journal of Educational Technology & Society, 16(3), 167–178.
  • Yang, J., Gao, Y., Liu, H., & Huang, Z. (2015). Constructing the personalized knowledge Map through a self-evolved knowledge management model. International conference on semantics, Knowledge and Grids.
  • Zhao, T., Gasiba, T.-E., Lechner, U., & Pinto-Albuquerque, M. (2021). Exploring a Board Game to Improve Cloud Security Training in Industry, Second International Computer Programming Education Conference (ICPEC).
  • Zou, C.-Y., & Qi, M. (2009). A study of anti-phishing strategies based on TRIZ. International Conference on Networks Security. Wireless Communications and Trusted Computing, 2, 536–538. https://doi.org/10.1109/NSWCTC.2009.154

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.