Evaluation of Game-Based Learning in Cybersecurity Education for High School Students
E. Johnson and N. Willey, “Usability failures and healthcare data hemorrhages,” IEEE Security and Privacy, vol 9, pp. 18-25, 2011.
M. Tu and K. Spoa-Harty, “Data loss prevention management and control: inside activity monitoring, identification, and tracking in healthcare enterprise environments,” Journal of Digital Forensics, Security, and Law. vol. 10, pp. 27-44, 2015.
L. Trautman, “Cyberseurity: what about US policy?,” Journal of Law, Technology and Policy, vol. 2015, pp. 341, 2015. Available from: https://ssrn.com/abstract=2548561.
A Frost and Sullivan Executive Briefing, Global Information Security Workforce Study, 2017. Available from: https://iamcybersafe.org/wp-content/uploads/2017/06/Europe-GISWS-Report.pdf. [Accessed 27th August 2017].
J. Cuny and J. Hamos, NICE cybersecurity in K-12 formal education, 2011. Available from: http://csrc.nist.gov/nice/Sept2011-workshop/presentations/Thursday/Thurs_Cuny_NICE_K-12_092211.pdf. [Accessed 25th August 2017].
T. Ladabouche and S. LaFountain. “GenCyber: Inspiring the Next Generation of Cyber Stars,” IEEE Security & Privacy, vol 14 (5), pp. 84-86, 2016.
S. Zweben, “Computing Degree and Enrollment Trends,” 2012-2013 CRA Taulbee Survey, 2013. Available from: http://archive2.cra.org/uploads/documents/resources/taulbee/CRA_Taulbee_CS_Degrees_and_Enrollment_2012-13.pdf. [Accessed 26th August 2017].
M. Findley, “The relationship between student learning styles and motivation during educational video game play,” International Journal of Online Pedagogy and Course Design, vol. 1 (3), pp. 63-73, 2011.
A. Kumar, S. Gupta, A. Rai, and S. Sinha, “Social networking sites and their security issues,” International Journal of Scientific and Research Publications, vol. 3 (4), pp. 1-5, 2013.
S. Tang and M. Hanneghan, “A Model-Driven Framework to Support Development of Serious Games for Game based Learning,” The 3rd International Conference on Developments in e-Systems Engineering. London, pp. 95-100, 2010.
D. Reece. “Best Tower Defense Games of All Time,” Gameranx: Top Rated Games, Reviews and News, 2015. Available from: http://gameranx.com/features/id/13529/article/best-tower-defense-games/. [Accessed 6th May 2017].
S. Tan. Tower Defense ToolKit (TDTK), 2016. Available from: https://www.songgamedev.com/tdtk. [Accessed 12th March 2017].
V. Nestler. Cyber Realm, 2016. Available from: http://gencybercards.com/. [Accessed 25th May 2017].
- There are currently no refbacks.
Copyright (c) 2018 Universitas Ahmad Dahlan
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Journal of Education and Learning (EduLearn)
ISSN: 2089-9823, e-ISSN 2302-9277
Published by: Universitas Ahmad Dahlan (UAD) in collaboration with Institute of Advanced Engineering and Science (IAES)