Funder
National Science Foundation
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Education
Reference50 articles.
1. Adams, M., & Makramalla, M. (2015). Cybersecurity skills training: An attacker-centric gamified approach. Technology Innovation Management Review, 5(1), 5–14.
2. Baker, M. (2016). Striving for effective cyber workforce development. Retrieved from https://resources.sei.cmu.edu/asset_files/WhitePaper/2016_019_001_473577.pdf. Accessed 22 Jan 2021.
3. Bashir, M., Wee, C., Memon, N., & Guo, B. (2017). Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool. Computers & Security, 65, 153–165. https://doi.org/10.1016/j.cose.2016.10.007.
4. Battles, J., Glenn, V., & Shedd, L. (2011). Rethinking the library game: Creating an alternate reality with social media. Journal of Web Librarianship, 5(2), 114–131.
5. Bonsignore, E., Hansen, D., Kraus, K., Visconti, A., Ahn, J., & Druin, A. (2013, June). Playing for real: designing alternate reality games for teenagers in learning contexts. In Proceedings of the 12th International Conference on Interaction Design and Children (pp. 237–246). New York, NY: ACM.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献