Experiencing Cybersecurity One Game at a Time: A Systematic Review of Cybersecurity Digital Games

Background. Cybersecurity is of increasing importance in our interconnected world, yet the field has a growing workforce deficit and an underrepresentation of women and people of color. In an effort to address these issues, many digital games have been created to teach individuals about cybersecurit...

Full description

Saved in:
Bibliographic Details
Published inSimulation & gaming Vol. 51; no. 5; pp. 586 - 611
Main Authors Coenraad, Merijke, Pellicone, Anthony, Ketelhut, Diane Jass, Cukier, Michel, Plane, Jan, Weintrop, David
Format Journal Article
LanguageEnglish
Published Los Angeles, CA SAGE Publications 01.10.2020
SAGE PUBLICATIONS, INC
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Background. Cybersecurity is of increasing importance in our interconnected world, yet the field has a growing workforce deficit and an underrepresentation of women and people of color. In an effort to address these issues, many digital games have been created to teach individuals about cybersecurity and keeping themselves, their data, and their networks safe. Intervention. We present the results of a systematic review of digital games related to cybersecurity as a means to understand how players are being introduced to cybersecurity in game-based contexts. Methods. Using a systematic search, we identified 181 games related to cybersecurity (either through content or aesthetics) by searching the Apple App Store, the Google Play Store, Steam, and the web broadly. Each game was played for up to an hour and characteristics such as the game story, game elements, and presentation of cybersecurity were gathered. Results. We found diverse conceptualizations of cybersecurity and of cybersecurity professionals. Further, the nature of games and the framing of cybersecurity varied by the platform and device on which the game was available (computer, mobile, or web). Web games were most likely to present cybersecurity as cyber safety and were more likely to be a gamified quiz or worksheet. Computer and mobile games tended to present cybersecurity through game aesthetics or deep content engagement. The games mirrored the underrepresentation of women and minoritized individuals in the field. Discussion. With the variety of digital cybersecurity games and the differences in games based on the platform on which the game is available, it is important game developers move beyond presenting cybersecurity through gamification and focusing on cyber safety. The current scope of cybersecurity games leaves room for the development of games focused on deeper content engagement with cybersecurity topics in an environment conducive to the broadening participation goals of the cybersecurity field.
AbstractList Background. Cybersecurity is of increasing importance in our interconnected world, yet the field has a growing workforce deficit and an underrepresentation of women and people of color. In an effort to address these issues, many digital games have been created to teach individuals about cybersecurity and keeping themselves, their data, and their networks safe. Intervention. We present the results of a systematic review of digital games related to cybersecurity as a means to understand how players are being introduced to cybersecurity in game-based contexts. Methods. Using a systematic search, we identified 181 games related to cybersecurity (either through content or aesthetics) by searching the Apple App Store, the Google Play Store, Steam, and the web broadly. Each game was played for up to an hour and characteristics such as the game story, game elements, and presentation of cybersecurity were gathered. Results. We found diverse conceptualizations of cybersecurity and of cybersecurity professionals. Further, the nature of games and the framing of cybersecurity varied by the platform and device on which the game was available (computer, mobile, or web). Web games were most likely to present cybersecurity as cyber safety and were more likely to be a gamified quiz or worksheet. Computer and mobile games tended to present cybersecurity through game aesthetics or deep content engagement. The games mirrored the underrepresentation of women and minoritized individuals in the field. Discussion. With the variety of digital cybersecurity games and the differences in games based on the platform on which the game is available, it is important game developers move beyond presenting cybersecurity through gamification and focusing on cyber safety. The current scope of cybersecurity games leaves room for the development of games focused on deeper content engagement with cybersecurity topics in an environment conducive to the broadening participation goals of the cybersecurity field.
Background. Cybersecurity is of increasing importance in our interconnected world, yet the field has a growing workforce deficit and an underrepresentation of women and people of color. In an effort to address these issues, many digital games have been created to teach individuals about cybersecurity and keeping themselves, their data, and their networks safe.Intervention. We present the results of a systematic review of digital games related to cybersecurity as a means to understand how players are being introduced to cybersecurity in game-based contexts.Methods. Using a systematic search, we identified 181 games related to cybersecurity (either through content or aesthetics) by searching the Apple App Store, the Google Play Store, Steam, and the web broadly. Each game was played for up to an hour and characteristics such as the game story, game elements, and presentation of cybersecurity were gathered.Results. We found diverse conceptualizations of cybersecurity and of cybersecurity professionals. Further, the nature of games and the framing of cybersecurity varied by the platform and device on which the game was available (computer, mobile, or web). Web games were most likely to present cybersecurity as cyber safety and were more likely to be a gamified quiz or worksheet. Computer and mobile games tended to present cybersecurity through game aesthetics or deep content engagement. The games mirrored the underrepresentation of women and minoritized individuals in the field.Discussion. With the variety of digital cybersecurity games and the differences in games based on the platform on which the game is available, it is important game developers move beyond presenting cybersecurity through gamification and focusing on cyber safety. The current scope of cybersecurity games leaves room for the development of games focused on deeper content engagement with cybersecurity topics in an environment conducive to the broadening participation goals of the cybersecurity field.
Author Plane, Jan
Pellicone, Anthony
Weintrop, David
Ketelhut, Diane Jass
Cukier, Michel
Coenraad, Merijke
Author_xml – sequence: 1
  givenname: Merijke
  orcidid: 0000-0002-0535-1876
  surname: Coenraad
  fullname: Coenraad, Merijke
– sequence: 2
  givenname: Anthony
  surname: Pellicone
  fullname: Pellicone, Anthony
– sequence: 3
  givenname: Diane Jass
  surname: Ketelhut
  fullname: Ketelhut, Diane Jass
– sequence: 4
  givenname: Michel
  surname: Cukier
  fullname: Cukier, Michel
– sequence: 5
  givenname: Jan
  surname: Plane
  fullname: Plane, Jan
– sequence: 6
  givenname: David
  surname: Weintrop
  fullname: Weintrop, David
BookMark eNp9kM1Lw0AQxRepYK3ePS54ju5XNom3UmsVCgWt4C1M1knZ0iZ1d6vmv3drBaGgpxmY95t5b05Jr2kbJOSCsyvOs-yaM6XzLOeCFVJKLo5In6epSHKhX3qxj-NkNz8hp94vGeNCF6pPYPy5QWexMbZZ0FFXofNots6Gjs4apBNYI4VAgc7tGm_okD51PuAagjX0Ed8tftC2PgBv7cIGWH3D_owc17DyeP5TB-T5bjwf3SfT2eRhNJwmRrIiJOkrACDkiuuqQJaDKYzJMs1ipFgAKy15zFUjS1Wao-aF5HUqUlXFyJDLAbnc79249m2LPpTLduuaeLIUSnEhFdNZVOm9yrjWe4d1aaLVYNsmOLCrkrNy987y8J0RZAfgxtk1uO4_JNkjHhb46-ZP_RdBWYPc
CitedBy_id crossref_primary_10_1016_j_cose_2023_103585
crossref_primary_10_1016_j_ins_2021_08_098
crossref_primary_10_1007_s11042_024_19341_2
crossref_primary_10_1155_hbe2_9982666
crossref_primary_10_4018_IJGCMS_296705
crossref_primary_10_1007_s12528_023_09392_z
crossref_primary_10_1108_ICS_05_2022_0087
crossref_primary_10_1093_cybsec_tyae018
crossref_primary_10_1007_s12599_024_00852_z
crossref_primary_10_1177_1046878120947201
crossref_primary_10_3390_info15100607
crossref_primary_10_1007_s10639_024_13155_3
crossref_primary_10_1016_j_caeo_2022_100119
crossref_primary_10_1108_JEIM_05_2023_0226
crossref_primary_10_3390_su14084763
Cites_doi 10.1145/3017680.3017811
10.2307/2529310
10.7551/mitpress/8429.001.0001
10.1109/MSP.2016.107
10.11591/edulearn.v12i1.7736
10.1111/j.1744-6570.2011.01190.x
10.1109/FIE.2018.8658840
10.1002/job.724
10.3102/0013189X035008019
10.1177/1046878112471509
10.1080/10508406.2018.1487302
10.1109/CGames.2015.7272970
10.1145/2543882.2543883
10.1371/journal.pmed.1000100
10.1145/2568195.2568213
10.1016/j.compedu.2012.03.004
10.1504/IJISD.2009.028067
10.2190/FLHV-K4WA-WPVQ-H0YM
10.1177/1046878114552166
10.1007/s10956-006-9038-y
10.1007/s10207-014-0262-9
10.1037/a0031311
10.1145/3328778.3366816
10.1109/MSP.2016.119
10.1177/1046878113480867
10.1177/1046878114554191
10.3102/0034654315582065
10.1145/2858036.2858062
ContentType Journal Article
Copyright The Author(s) 2020
Copyright_xml – notice: The Author(s) 2020
DBID AAYXX
CITATION
7SC
7TA
8BJ
8FD
FQK
JBE
JG9
JQ2
L7M
L~C
L~D
DOI 10.1177/1046878120933312
DatabaseName CrossRef
Computer and Information Systems Abstracts
Materials Business File
International Bibliography of the Social Sciences (IBSS)
Technology Research Database
International Bibliography of the Social Sciences
International Bibliography of the Social Sciences
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Materials Research Database
International Bibliography of the Social Sciences (IBSS)
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Materials Business File
Computer and Information Systems Abstracts Professional
DatabaseTitleList CrossRef

Materials Research Database
DeliveryMethod fulltext_linktorsrc
Discipline Social Sciences (General)
EISSN 1552-826X
EndPage 611
ExternalDocumentID 10_1177_1046878120933312
10.1177_1046878120933312
GrantInformation_xml – fundername: Department of Defense
GroupedDBID --Z
-TM
-~X
.2G
.2L
.DC
01A
09Z
0R~
123
186
18M
1~K
31S
31V
31W
31X
4.4
56W
5VS
85S
AABOD
AACKU
AADIR
AADUE
AAGGD
AAGLT
AAIKC
AAJPV
AAKTJ
AAMFR
AAMNW
AANSI
AAPEO
AAQDB
AAQXI
AARIX
AATAA
AAUIH
AAWLO
AAZCK
ABAWP
ABCCA
ABCJG
ABDPE
ABEIX
ABFXH
ABHQH
ABIDT
ABIVO
ABKRH
ABPNF
ABQDK
ABQKF
ABQPY
ABQXT
ABRHV
ABUJY
ABYTW
ACAEP
ACDXX
ACFUR
ACFZE
ACGFS
ACIWK
ACJER
ACLZU
ACOFE
ACOXC
ACROE
ACRPL
ACSIQ
ACUFS
ACUIR
ADDLC
ADEBD
ADEIA
ADIYS
ADMHG
ADNMO
ADNON
ADPEE
ADRRZ
ADSTG
ADTOS
ADUKL
ADXHL
ADYCS
AEDXQ
AEOBU
AESMA
AESZF
AEUHG
AEVPJ
AEWDL
AEWHI
AEXNY
AFEET
AFFNX
AFKBI
AFKRG
AFMOU
AFQAA
AFUIA
AFWMB
AGDVU
AGKLV
AGNHF
AGNWV
AGQPQ
AGUGZ
AGWNL
AHDMH
AHWHD
AJUZI
ALMA_UNASSIGNED_HOLDINGS
ANDLU
ARCSS
ARTOV
AUTPY
AUVAJ
AYPQM
AZFZN
B8O
B8S
B8T
B8Z
BDZRT
BKOMP
BMVBW
BPACV
BYIEH
CAG
CBRKF
CCGJY
CEADM
COF
CS3
DD0
DD~
DG~
DOPDO
DV7
DV8
EBS
EJD
F5P
FEDTE
FHBDP
GROUPED_SAGE_PREMIER_JOURNAL_COLLECTION
H13
HF~
HVGLF
HZ~
H~9
IAO
ICO
IEA
IGS
INH
INR
IOF
ITC
IVC
J8X
MS~
MVM
N9A
O9-
OHT
P.B
PQQKQ
Q1R
Q7O
Q7P
Q7X
RIG
ROL
RXW
S01
SASJQ
SAUOL
SBI
SCNPE
SFB
SFC
SFK
SFM
SFT
SFX
SGP
SGU
SGV
SHB
SHF
SHM
SPJ
SPP
SQCSI
SSDHQ
TAE
TN5
UHB
WH7
YR5
YYQ
ZCG
ZPLXX
ZPPRI
ZY4
~32
AAYXX
ACCVC
AJGYC
AMNSR
CITATION
7SC
7TA
8BJ
8FD
AAPII
AJHME
AJVBE
FQK
JBE
JG9
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c309t-5daaaea8416b9e08ac9cc7760812776aeb631312fe05458e61931f5254b209a83
ISSN 1046-8781
IngestDate Wed Aug 13 05:11:04 EDT 2025
Tue Jul 01 05:26:31 EDT 2025
Thu Apr 24 23:02:50 EDT 2025
Tue Jun 17 22:28:53 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 5
Keywords digital games
cybersecurity
digital game-based learning
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c309t-5daaaea8416b9e08ac9cc7760812776aeb631312fe05458e61931f5254b209a83
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
content type line 14
ObjectType-Feature-3
ObjectType-Evidence Based Healthcare-1
ORCID 0000-0002-0535-1876
PQID 2441234067
PQPubID 48987
PageCount 26
ParticipantIDs proquest_journals_2441234067
crossref_citationtrail_10_1177_1046878120933312
crossref_primary_10_1177_1046878120933312
sage_journals_10_1177_1046878120933312
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20201000
2020-10-00
20201001
PublicationDateYYYYMMDD 2020-10-01
PublicationDate_xml – month: 10
  year: 2020
  text: 20201000
PublicationDecade 2020
PublicationPlace Los Angeles, CA
PublicationPlace_xml – name: Los Angeles, CA
– name: Thousand Oaks
PublicationTitle Simulation & gaming
PublicationYear 2020
Publisher SAGE Publications
SAGE PUBLICATIONS, INC
Publisher_xml – name: SAGE Publications
– name: SAGE PUBLICATIONS, INC
References Scott, Zhang 2014; 6
Gee 2005; 85
Yang, Konrad 2011; 32
Clinkenbeard 2018
Ladabouche, LaFountain 2016; 14
Pusey, Gondree, Peterson 2016; 14
2011
2016
Ricci, Gulick 2017; 5
Ryu, Ke 2018; 19
Kessler, Ramsay 2013; 2
Landis, Koch 1977; 33
Vogel, Vogel, Cannon-Bowers, Bowers, Muse, Wright 2006; 34
Clinkenbeard I. (bibr9-1046878120933312) 2018
bibr25-1046878120933312
Gee J. P. (bibr17-1046878120933312) 2007
bibr33-1046878120933312
bibr3-1046878120933312
i273 LLC (bibr21-1046878120933312) 2016
bibr50-1046878120933312
bibr59-1046878120933312
Mishra P. (bibr34-1046878120933312) 2007
Kessler G. C. (bibr26-1046878120933312) 2013; 2
bibr32-1046878120933312
AMGAMES Inc (bibr1-1046878120933312)
Osmotic Studios (bibr35-1046878120933312) 2016
bibr44-1046878120933312
bibr31-1046878120933312
bibr49-1046878120933312
bibr36-1046878120933312
bibr52-1046878120933312
bibr23-1046878120933312
bibr10-1046878120933312
bibr5-1046878120933312
Konijn E. (bibr28-1046878120933312) 2009
bibr57-1046878120933312
bibr13-1046878120933312
bibr18-1046878120933312
Rebelephant (bibr37-1046878120933312) 2017
bibr39-1046878120933312
Dark M. (bibr11-1046878120933312) 2002
bibr47-1046878120933312
bibr60-1046878120933312
Skunkape Interactive (bibr46-1046878120933312) 2015
Bashir M. (bibr2-1046878120933312) 2015
bibr8-1046878120933312
Ryu J. (bibr41-1046878120933312) 2018; 19
bibr20-1046878120933312
bibr38-1046878120933312
Gee J. P. (bibr15-1046878120933312) 2004
bibr29-1046878120933312
bibr55-1046878120933312
Digital Eel (bibr12-1046878120933312) 2011
Squire K. (bibr48-1046878120933312) 2011
bibr54-1046878120933312
bibr6-1046878120933312
bibr45-1046878120933312
Ricci M. (bibr40-1046878120933312) 2017; 5
Scott K. (bibr43-1046878120933312) 2014; 6
bibr19-1046878120933312
Saldaña J. (bibr42-1046878120933312) 2015
Gee J. P. (bibr16-1046878120933312) 2005; 85
bibr22-1046878120933312
bibr27-1046878120933312
bibr53-1046878120933312
bibr61-1046878120933312
bibr14-1046878120933312
bibr7-1046878120933312
bibr51-1046878120933312
bibr56-1046878120933312
Juul J. (bibr24-1046878120933312) 2010
Wee J. M. C. (bibr58-1046878120933312) 2016
bibr4-1046878120933312
bibr30-1046878120933312
References_xml – year: 2018
  publication-title: Obio
– volume: 19
  start-page: 61
  issue: 1
  year: 2018
  end-page: 91
  article-title: Increasing persona effects: Does it matter the voice and appearance of animated pedagogical agent
  publication-title: Educational Technology International
– volume: 14
  start-page: 84
  issue: 5
  year: 2016
  end-page: 86
  article-title: GenCyber: Inspiring the next generation of cyber stars
  publication-title: IEEE Security & Privacy
– year: 2016
  publication-title: Hack NET
– year: 2011
  publication-title: Data Jammers: FastForward
– volume: 5
  start-page: 183
  issue: 2
  year: 2017
  end-page: 224
  article-title: Cybersecurity games: Building tomorrow’s workforce
  publication-title: Journal of Law & Cyber Warfare
– publication-title: Cyber Defence War
– volume: 34
  start-page: 229
  year: 2006
  end-page: 243
  article-title: Computer gaming and interactive simulations for learning: A meta-analysis
  publication-title: Journal of Educational Computing Research
– volume: 85
  start-page: 33
  issue: 2
  year: 2005
  end-page: 38
  article-title: Good video games and good learning
  publication-title: Phi Kappa Phi Forum
– volume: 6
  start-page: 264
  issue: 2
  year: 2014
  end-page: 276
  article-title: Designing a culturally responsive computing curriculum for girls
  publication-title: International Journal of Gender, Science and Technology
– volume: 14
  start-page: 90
  issue: 6
  year: 2016
  end-page: 95
  article-title: The outcomes of cybersecurity competitions and implications for underrepresented populations
  publication-title: IEEE Security & Privacy
– volume: 33
  start-page: 159
  issue: 1
  year: 1977
  end-page: 174
  article-title: The measurement of observer agreement for categorical data
  publication-title: Biometrics
– volume: 32
  start-page: 1062
  year: 2011
  end-page: 1083
  article-title: Diversity and organizational innovation: The role of employee involvement
  publication-title: Journal of Organizational Behavior
– volume: 2
  start-page: 35
  year: 2013
  end-page: 44
  article-title: Paradigms for cybersecurity education in a homeland security program
  publication-title: Journal of Homeland Security Education
– volume: 85
  start-page: 33
  issue: 2
  year: 2005
  ident: bibr16-1046878120933312
  publication-title: Phi Kappa Phi Forum
– ident: bibr1-1046878120933312
  publication-title: Cyber Defence War
– ident: bibr4-1046878120933312
  doi: 10.1145/3017680.3017811
– volume-title: The coding manual for qualitative researchers
  year: 2015
  ident: bibr42-1046878120933312
– ident: bibr30-1046878120933312
  doi: 10.2307/2529310
– ident: bibr5-1046878120933312
  doi: 10.7551/mitpress/8429.001.0001
– ident: bibr29-1046878120933312
  doi: 10.1109/MSP.2016.107
– ident: bibr39-1046878120933312
– ident: bibr23-1046878120933312
  doi: 10.11591/edulearn.v12i1.7736
– ident: bibr45-1046878120933312
  doi: 10.1111/j.1744-6570.2011.01190.x
– ident: bibr49-1046878120933312
  doi: 10.1109/FIE.2018.8658840
– volume-title: Situated language and learning: A critique of traditional schooling
  year: 2004
  ident: bibr15-1046878120933312
– ident: bibr61-1046878120933312
  doi: 10.1002/job.724
– volume-title: Mainlining
  year: 2017
  ident: bibr37-1046878120933312
– ident: bibr47-1046878120933312
  doi: 10.3102/0013189X035008019
– volume-title: Defining a curriculum framework in information assurance and security
  year: 2002
  ident: bibr11-1046878120933312
– ident: bibr33-1046878120933312
  doi: 10.1177/1046878112471509
– volume-title: Orwell: Keeping an Eye On You
  year: 2016
  ident: bibr35-1046878120933312
– year: 2018
  ident: bibr9-1046878120933312
  publication-title: Obio
– volume-title: Video games and learning: Teaching and participatory culture in the digital age
  year: 2011
  ident: bibr48-1046878120933312
– ident: bibr20-1046878120933312
  doi: 10.1080/10508406.2018.1487302
– ident: bibr55-1046878120933312
– volume: 6
  start-page: 264
  issue: 2
  year: 2014
  ident: bibr43-1046878120933312
  publication-title: International Journal of Gender, Science and Technology
– year: 2011
  ident: bibr12-1046878120933312
  publication-title: Data Jammers: FastForward
– ident: bibr18-1046878120933312
  doi: 10.1109/CGames.2015.7272970
– ident: bibr44-1046878120933312
  doi: 10.1145/2543882.2543883
– ident: bibr31-1046878120933312
  doi: 10.1371/journal.pmed.1000100
– ident: bibr59-1046878120933312
– volume: 19
  start-page: 61
  issue: 1
  year: 2018
  ident: bibr41-1046878120933312
  publication-title: Educational Technology International
– volume-title: USENIX Security Symposium, Austin, TX
  year: 2016
  ident: bibr58-1046878120933312
– ident: bibr53-1046878120933312
– ident: bibr54-1046878120933312
  doi: 10.1145/2568195.2568213
– ident: bibr10-1046878120933312
  doi: 10.1016/j.compedu.2012.03.004
– ident: bibr32-1046878120933312
– ident: bibr14-1046878120933312
– ident: bibr56-1046878120933312
  doi: 10.1504/IJISD.2009.028067
– ident: bibr7-1046878120933312
– ident: bibr57-1046878120933312
  doi: 10.2190/FLHV-K4WA-WPVQ-H0YM
– ident: bibr25-1046878120933312
  doi: 10.1177/1046878114552166
– ident: bibr27-1046878120933312
  doi: 10.1007/s10956-006-9038-y
– volume: 5
  start-page: 183
  issue: 2
  year: 2017
  ident: bibr40-1046878120933312
  publication-title: Journal of Law & Cyber Warfare
– ident: bibr51-1046878120933312
  doi: 10.1007/s10207-014-0262-9
– start-page: 2227
  volume-title: Proceedings of SITE 2007
  year: 2007
  ident: bibr34-1046878120933312
– ident: bibr60-1046878120933312
  doi: 10.1037/a0031311
– ident: bibr50-1046878120933312
  doi: 10.1145/3328778.3366816
– start-page: 201
  volume-title: Serious games: Mechanisms and effects
  year: 2009
  ident: bibr28-1046878120933312
– ident: bibr13-1046878120933312
– volume-title: Proceedings of the USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE)
  year: 2015
  ident: bibr2-1046878120933312
– volume-title: What video games have to teach us about learning and literacy
  year: 2007
  ident: bibr17-1046878120933312
– volume-title: A casual revolution: Reinventing video games and their players
  year: 2010
  ident: bibr24-1046878120933312
– ident: bibr19-1046878120933312
– ident: bibr36-1046878120933312
  doi: 10.1109/MSP.2016.119
– ident: bibr38-1046878120933312
  doi: 10.1177/1046878113480867
– ident: bibr22-1046878120933312
  doi: 10.1177/1046878114554191
– volume: 2
  start-page: 35
  year: 2013
  ident: bibr26-1046878120933312
  publication-title: Journal of Homeland Security Education
– ident: bibr52-1046878120933312
– ident: bibr8-1046878120933312
  doi: 10.3102/0034654315582065
– ident: bibr3-1046878120933312
  doi: 10.1145/2858036.2858062
– year: 2016
  ident: bibr21-1046878120933312
  publication-title: Hack NET
– ident: bibr6-1046878120933312
– volume-title: ROOT
  year: 2015
  ident: bibr46-1046878120933312
SSID ssj0012694
Score 2.3931062
Snippet Background. Cybersecurity is of increasing importance in our interconnected world, yet the field has a growing workforce deficit and an underrepresentation of...
SourceID proquest
crossref
sage
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 586
SubjectTerms Aesthetics
Computer & video games
Computer security
Computers
Cybersecurity
Disproportionate Representation
Frame analysis
Games
Identification methods
Mobile computing
Safety
Search engines
Systematic review
Video Games
Women
Workforce
Title Experiencing Cybersecurity One Game at a Time: A Systematic Review of Cybersecurity Digital Games
URI https://journals.sagepub.com/doi/full/10.1177/1046878120933312
https://www.proquest.com/docview/2441234067
Volume 51
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF6F9MIF8RQpBe0BIarKrbN-pOYWpS1V1QfQRAona7wZF0OSoto5wC_h5zL78CtABVysxMn6sfN59lvPzjeMvRRppAztE3OT6PiggoRu4jtpIFK_L1FGutjE2Xl4PPFPpsG00_nRWLW0KpJd-f23eSX_Y1XaR3ZVWbL_YNnqoLSDPpN9aUsWpu1f2bjSKdbB-28JUTlbjm7ngsjjW1igSlYEnehhctAva-XmD1XWSrvpQXalKono5nmTvF5mC1vsSwPmChbluKcVfG-yz2alz-iaLhhgVrvd-ZwAt8RSqqD28gXOP630OHBAOMWdE8grkj9afckMoMx61eYLCpqNlkvdmpGxRmZ0KxNLO12ao5NXNqVbdtE64oA8tdBVDitPbaVps2YsXLvdoJTT1t9C475_HRx0eFqdTZ1MqHc5nl3D3dLhPr-Ijyanp_H4cDq-wzYETUBEl20MP757f1ZFqFQGsFG6MNdeh8D31s_Qpjz1PKaxdFCzmfF9ds9OQ_jQYOoB6-DyIeuZXG1u_X3OX1tR8u1HDJpY4y3AcMIaV2DhUHDgCmtv-JDXSOMGafw6XWtokaYb54_Z5OhwPDp2bHkOR3puVDjBDAAQVNw6idDdBxlJORiERDKpy0LAJPT6dPspuio6izRV9_rkAwI_oZ6Bfe8J6y4Je08ZD-WMmG86EwIjP5AiAs8VkRJ-ShCDEHtsr-zBWFrtelVCZR73rVz9ep_32HbV4qvRbbnlv1ulUWL7dOcx0V4idUR3Bz32Shmq_ulPx9m8_TjP2N368dhi3eJmhc-J0RbJCwuun6FpmQ4
linkProvider SAGE Publications
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NT8IwFH8xcNCL38Ypag_GyGG4tfv0RlBEBdQICXpZutIZo4KRcdC_3nbrBmI0xtMO7Wvavnbv17z3fg9gH0e-VLQlkBvjukWlk9AILT2ycWSZjDM_KTbRajuNrnXRs3tTpb7UDo4qMqxKzCj5Wee3O8kTtxzP9WTKJyFE1hcuejIZoQDF6t31TSt3IcgUzZSKwNGlwMRH-W2MrzZpAjSnYrsSc1NfgvtsommUyVNlHIs5fsxwOP5rJcuwqEAoqqanZgXm-GAVtDRTF6nbPkKHipK6vAY0Z0QWlg7V3kMBGlXhO3Q14OiMvnBEY0SRTCk5RlV0mzNEo9T9gIbRjODJ44OsWJIIj9ahWz_t1Bq6Ks6gM2L4sW73KaWcSq9l6HPDo8xnzHUdATGw-FAeOsQUq4q4IX1zXDzUiClOgG2FYsHUIxtQGAwHfBOQw_oC90R9jLlv2Qz7lBjYl7Q_Iee2wzU4ytQTMMVcLgtoPAemIiuf3UoNyrnEa8ra8UvfUqbxINNZIECPMOkC7LgaHEgFTpp-Gmfrrx33YL7RaTWD5nn7chsWsHzAJ9GBJSjEb2O-I1BOHO6q8_wJQ5Pr3Q
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dT8IwEG8MJMYXv41T1D4YIw-Drftg842AiB8gRknwaem6zhgViIwH_eu92wooRmN8Wpb1mrbX7n7N3f2OkEMW-6hoG5CbkLrN0UlohLYeOyy2TSGFnxabaLXdZte-6Dk9FZuDuTBqBUclDKuCEaU_azzdwyguKx9jGf2SXsXDtE_LsrDGcB5eGMuRfPW-c9OauhEwTTOjI3B1FJj5Kb_18dUuzcDmp_iu1OQ0VrK6qqOUqRAjTZ5K4wTG-T7H4_jv2aySZQVGaTXbPWtkQfbXiZZl7FJ16kf0WFFTFzcInzIjg8WjtbcQwKMqgEev-5Ke8RdJeUI5xdSSE1qlt1OmaJq5IeggnhOsPz5g5ZJUeLRJuo3Tu1pTV0UadGEZfqI7EedccvRehr40PC58ISoVF6AGgweXoWuZMKtYGuijk3Bhs0zYCY4dwoS5Z22RXH_Ql9uEuiIC_BNHjEnfdgTzuWUwH-l_QikdV2qkPFFRIBSDORbSeA5MRVo-v5QaKU4lhhl7xy9tCxOtBxO9BQB-wLQD6Klo5AiVOPv0Uz87f214QBY79UZwdd6-3CVLDO_xaZBggeSS17HcA7CThPtqS38AL9HuUg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Experiencing+Cybersecurity+One+Game+at+a+Time%3A+A+Systematic+Review+of+Cybersecurity+Digital+Games&rft.jtitle=Simulation+%26+gaming&rft.au=Merijke%2C+Coenraad&rft.au=Pellicone+Anthony&rft.au=Ketelhut%2C+Diane+Jass&rft.au=Cukier%2C+Michel&rft.date=2020-10-01&rft.pub=SAGE+PUBLICATIONS%2C+INC&rft.issn=1046-8781&rft.eissn=1552-826X&rft.volume=51&rft.issue=5&rft.spage=586&rft.epage=611&rft_id=info:doi/10.1177%2F1046878120933312&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1046-8781&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1046-8781&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1046-8781&client=summon