Experiencing Cybersecurity One Game at a Time: A Systematic Review of Cybersecurity Digital Games
Background. Cybersecurity is of increasing importance in our interconnected world, yet the field has a growing workforce deficit and an underrepresentation of women and people of color. In an effort to address these issues, many digital games have been created to teach individuals about cybersecurit...
Saved in:
Published in | Simulation & gaming Vol. 51; no. 5; pp. 586 - 611 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
Los Angeles, CA
SAGE Publications
01.10.2020
SAGE PUBLICATIONS, INC |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Background. Cybersecurity is of increasing importance in our interconnected world, yet the field has a growing workforce deficit and an underrepresentation of women and people of color. In an effort to address these issues, many digital games have been created to teach individuals about cybersecurity and keeping themselves, their data, and their networks safe.
Intervention. We present the results of a systematic review of digital games related to cybersecurity as a means to understand how players are being introduced to cybersecurity in game-based contexts.
Methods. Using a systematic search, we identified 181 games related to cybersecurity (either through content or aesthetics) by searching the Apple App Store, the Google Play Store, Steam, and the web broadly. Each game was played for up to an hour and characteristics such as the game story, game elements, and presentation of cybersecurity were gathered.
Results. We found diverse conceptualizations of cybersecurity and of cybersecurity professionals. Further, the nature of games and the framing of cybersecurity varied by the platform and device on which the game was available (computer, mobile, or web). Web games were most likely to present cybersecurity as cyber safety and were more likely to be a gamified quiz or worksheet. Computer and mobile games tended to present cybersecurity through game aesthetics or deep content engagement. The games mirrored the underrepresentation of women and minoritized individuals in the field.
Discussion. With the variety of digital cybersecurity games and the differences in games based on the platform on which the game is available, it is important game developers move beyond presenting cybersecurity through gamification and focusing on cyber safety. The current scope of cybersecurity games leaves room for the development of games focused on deeper content engagement with cybersecurity topics in an environment conducive to the broadening participation goals of the cybersecurity field. |
---|---|
AbstractList | Background. Cybersecurity is of increasing importance in our interconnected world, yet the field has a growing workforce deficit and an underrepresentation of women and people of color. In an effort to address these issues, many digital games have been created to teach individuals about cybersecurity and keeping themselves, their data, and their networks safe.
Intervention. We present the results of a systematic review of digital games related to cybersecurity as a means to understand how players are being introduced to cybersecurity in game-based contexts.
Methods. Using a systematic search, we identified 181 games related to cybersecurity (either through content or aesthetics) by searching the Apple App Store, the Google Play Store, Steam, and the web broadly. Each game was played for up to an hour and characteristics such as the game story, game elements, and presentation of cybersecurity were gathered.
Results. We found diverse conceptualizations of cybersecurity and of cybersecurity professionals. Further, the nature of games and the framing of cybersecurity varied by the platform and device on which the game was available (computer, mobile, or web). Web games were most likely to present cybersecurity as cyber safety and were more likely to be a gamified quiz or worksheet. Computer and mobile games tended to present cybersecurity through game aesthetics or deep content engagement. The games mirrored the underrepresentation of women and minoritized individuals in the field.
Discussion. With the variety of digital cybersecurity games and the differences in games based on the platform on which the game is available, it is important game developers move beyond presenting cybersecurity through gamification and focusing on cyber safety. The current scope of cybersecurity games leaves room for the development of games focused on deeper content engagement with cybersecurity topics in an environment conducive to the broadening participation goals of the cybersecurity field. Background. Cybersecurity is of increasing importance in our interconnected world, yet the field has a growing workforce deficit and an underrepresentation of women and people of color. In an effort to address these issues, many digital games have been created to teach individuals about cybersecurity and keeping themselves, their data, and their networks safe.Intervention. We present the results of a systematic review of digital games related to cybersecurity as a means to understand how players are being introduced to cybersecurity in game-based contexts.Methods. Using a systematic search, we identified 181 games related to cybersecurity (either through content or aesthetics) by searching the Apple App Store, the Google Play Store, Steam, and the web broadly. Each game was played for up to an hour and characteristics such as the game story, game elements, and presentation of cybersecurity were gathered.Results. We found diverse conceptualizations of cybersecurity and of cybersecurity professionals. Further, the nature of games and the framing of cybersecurity varied by the platform and device on which the game was available (computer, mobile, or web). Web games were most likely to present cybersecurity as cyber safety and were more likely to be a gamified quiz or worksheet. Computer and mobile games tended to present cybersecurity through game aesthetics or deep content engagement. The games mirrored the underrepresentation of women and minoritized individuals in the field.Discussion. With the variety of digital cybersecurity games and the differences in games based on the platform on which the game is available, it is important game developers move beyond presenting cybersecurity through gamification and focusing on cyber safety. The current scope of cybersecurity games leaves room for the development of games focused on deeper content engagement with cybersecurity topics in an environment conducive to the broadening participation goals of the cybersecurity field. |
Author | Plane, Jan Pellicone, Anthony Weintrop, David Ketelhut, Diane Jass Cukier, Michel Coenraad, Merijke |
Author_xml | – sequence: 1 givenname: Merijke orcidid: 0000-0002-0535-1876 surname: Coenraad fullname: Coenraad, Merijke – sequence: 2 givenname: Anthony surname: Pellicone fullname: Pellicone, Anthony – sequence: 3 givenname: Diane Jass surname: Ketelhut fullname: Ketelhut, Diane Jass – sequence: 4 givenname: Michel surname: Cukier fullname: Cukier, Michel – sequence: 5 givenname: Jan surname: Plane fullname: Plane, Jan – sequence: 6 givenname: David surname: Weintrop fullname: Weintrop, David |
BookMark | eNp9kM1Lw0AQxRepYK3ePS54ju5XNom3UmsVCgWt4C1M1knZ0iZ1d6vmv3drBaGgpxmY95t5b05Jr2kbJOSCsyvOs-yaM6XzLOeCFVJKLo5In6epSHKhX3qxj-NkNz8hp94vGeNCF6pPYPy5QWexMbZZ0FFXofNots6Gjs4apBNYI4VAgc7tGm_okD51PuAagjX0Ed8tftC2PgBv7cIGWH3D_owc17DyeP5TB-T5bjwf3SfT2eRhNJwmRrIiJOkrACDkiuuqQJaDKYzJMs1ipFgAKy15zFUjS1Wao-aF5HUqUlXFyJDLAbnc79249m2LPpTLduuaeLIUSnEhFdNZVOm9yrjWe4d1aaLVYNsmOLCrkrNy987y8J0RZAfgxtk1uO4_JNkjHhb46-ZP_RdBWYPc |
CitedBy_id | crossref_primary_10_1016_j_cose_2023_103585 crossref_primary_10_1016_j_ins_2021_08_098 crossref_primary_10_1007_s11042_024_19341_2 crossref_primary_10_1155_hbe2_9982666 crossref_primary_10_4018_IJGCMS_296705 crossref_primary_10_1007_s12528_023_09392_z crossref_primary_10_1108_ICS_05_2022_0087 crossref_primary_10_1093_cybsec_tyae018 crossref_primary_10_1007_s12599_024_00852_z crossref_primary_10_1177_1046878120947201 crossref_primary_10_3390_info15100607 crossref_primary_10_1007_s10639_024_13155_3 crossref_primary_10_1016_j_caeo_2022_100119 crossref_primary_10_1108_JEIM_05_2023_0226 crossref_primary_10_3390_su14084763 |
Cites_doi | 10.1145/3017680.3017811 10.2307/2529310 10.7551/mitpress/8429.001.0001 10.1109/MSP.2016.107 10.11591/edulearn.v12i1.7736 10.1111/j.1744-6570.2011.01190.x 10.1109/FIE.2018.8658840 10.1002/job.724 10.3102/0013189X035008019 10.1177/1046878112471509 10.1080/10508406.2018.1487302 10.1109/CGames.2015.7272970 10.1145/2543882.2543883 10.1371/journal.pmed.1000100 10.1145/2568195.2568213 10.1016/j.compedu.2012.03.004 10.1504/IJISD.2009.028067 10.2190/FLHV-K4WA-WPVQ-H0YM 10.1177/1046878114552166 10.1007/s10956-006-9038-y 10.1007/s10207-014-0262-9 10.1037/a0031311 10.1145/3328778.3366816 10.1109/MSP.2016.119 10.1177/1046878113480867 10.1177/1046878114554191 10.3102/0034654315582065 10.1145/2858036.2858062 |
ContentType | Journal Article |
Copyright | The Author(s) 2020 |
Copyright_xml | – notice: The Author(s) 2020 |
DBID | AAYXX CITATION 7SC 7TA 8BJ 8FD FQK JBE JG9 JQ2 L7M L~C L~D |
DOI | 10.1177/1046878120933312 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Materials Business File International Bibliography of the Social Sciences (IBSS) Technology Research Database International Bibliography of the Social Sciences International Bibliography of the Social Sciences Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Materials Research Database International Bibliography of the Social Sciences (IBSS) Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Materials Business File Computer and Information Systems Abstracts Professional |
DatabaseTitleList | CrossRef Materials Research Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Social Sciences (General) |
EISSN | 1552-826X |
EndPage | 611 |
ExternalDocumentID | 10_1177_1046878120933312 10.1177_1046878120933312 |
GrantInformation_xml | – fundername: Department of Defense |
GroupedDBID | --Z -TM -~X .2G .2L .DC 01A 09Z 0R~ 123 186 18M 1~K 31S 31V 31W 31X 4.4 56W 5VS 85S AABOD AACKU AADIR AADUE AAGGD AAGLT AAIKC AAJPV AAKTJ AAMFR AAMNW AANSI AAPEO AAQDB AAQXI AARIX AATAA AAUIH AAWLO AAZCK ABAWP ABCCA ABCJG ABDPE ABEIX ABFXH ABHQH ABIDT ABIVO ABKRH ABPNF ABQDK ABQKF ABQPY ABQXT ABRHV ABUJY ABYTW ACAEP ACDXX ACFUR ACFZE ACGFS ACIWK ACJER ACLZU ACOFE ACOXC ACROE ACRPL ACSIQ ACUFS ACUIR ADDLC ADEBD ADEIA ADIYS ADMHG ADNMO ADNON ADPEE ADRRZ ADSTG ADTOS ADUKL ADXHL ADYCS AEDXQ AEOBU AESMA AESZF AEUHG AEVPJ AEWDL AEWHI AEXNY AFEET AFFNX AFKBI AFKRG AFMOU AFQAA AFUIA AFWMB AGDVU AGKLV AGNHF AGNWV AGQPQ AGUGZ AGWNL AHDMH AHWHD AJUZI ALMA_UNASSIGNED_HOLDINGS ANDLU ARCSS ARTOV AUTPY AUVAJ AYPQM AZFZN B8O B8S B8T B8Z BDZRT BKOMP BMVBW BPACV BYIEH CAG CBRKF CCGJY CEADM COF CS3 DD0 DD~ DG~ DOPDO DV7 DV8 EBS EJD F5P FEDTE FHBDP GROUPED_SAGE_PREMIER_JOURNAL_COLLECTION H13 HF~ HVGLF HZ~ H~9 IAO ICO IEA IGS INH INR IOF ITC IVC J8X MS~ MVM N9A O9- OHT P.B PQQKQ Q1R Q7O Q7P Q7X RIG ROL RXW S01 SASJQ SAUOL SBI SCNPE SFB SFC SFK SFM SFT SFX SGP SGU SGV SHB SHF SHM SPJ SPP SQCSI SSDHQ TAE TN5 UHB WH7 YR5 YYQ ZCG ZPLXX ZPPRI ZY4 ~32 AAYXX ACCVC AJGYC AMNSR CITATION 7SC 7TA 8BJ 8FD AAPII AJHME AJVBE FQK JBE JG9 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c309t-5daaaea8416b9e08ac9cc7760812776aeb631312fe05458e61931f5254b209a83 |
ISSN | 1046-8781 |
IngestDate | Wed Aug 13 05:11:04 EDT 2025 Tue Jul 01 05:26:31 EDT 2025 Thu Apr 24 23:02:50 EDT 2025 Tue Jun 17 22:28:53 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 5 |
Keywords | digital games cybersecurity digital game-based learning |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c309t-5daaaea8416b9e08ac9cc7760812776aeb631312fe05458e61931f5254b209a83 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 content type line 14 ObjectType-Feature-3 ObjectType-Evidence Based Healthcare-1 |
ORCID | 0000-0002-0535-1876 |
PQID | 2441234067 |
PQPubID | 48987 |
PageCount | 26 |
ParticipantIDs | proquest_journals_2441234067 crossref_citationtrail_10_1177_1046878120933312 crossref_primary_10_1177_1046878120933312 sage_journals_10_1177_1046878120933312 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20201000 2020-10-00 20201001 |
PublicationDateYYYYMMDD | 2020-10-01 |
PublicationDate_xml | – month: 10 year: 2020 text: 20201000 |
PublicationDecade | 2020 |
PublicationPlace | Los Angeles, CA |
PublicationPlace_xml | – name: Los Angeles, CA – name: Thousand Oaks |
PublicationTitle | Simulation & gaming |
PublicationYear | 2020 |
Publisher | SAGE Publications SAGE PUBLICATIONS, INC |
Publisher_xml | – name: SAGE Publications – name: SAGE PUBLICATIONS, INC |
References | Scott, Zhang 2014; 6 Gee 2005; 85 Yang, Konrad 2011; 32 Clinkenbeard 2018 Ladabouche, LaFountain 2016; 14 Pusey, Gondree, Peterson 2016; 14 2011 2016 Ricci, Gulick 2017; 5 Ryu, Ke 2018; 19 Kessler, Ramsay 2013; 2 Landis, Koch 1977; 33 Vogel, Vogel, Cannon-Bowers, Bowers, Muse, Wright 2006; 34 Clinkenbeard I. (bibr9-1046878120933312) 2018 bibr25-1046878120933312 Gee J. P. (bibr17-1046878120933312) 2007 bibr33-1046878120933312 bibr3-1046878120933312 i273 LLC (bibr21-1046878120933312) 2016 bibr50-1046878120933312 bibr59-1046878120933312 Mishra P. (bibr34-1046878120933312) 2007 Kessler G. C. (bibr26-1046878120933312) 2013; 2 bibr32-1046878120933312 AMGAMES Inc (bibr1-1046878120933312) Osmotic Studios (bibr35-1046878120933312) 2016 bibr44-1046878120933312 bibr31-1046878120933312 bibr49-1046878120933312 bibr36-1046878120933312 bibr52-1046878120933312 bibr23-1046878120933312 bibr10-1046878120933312 bibr5-1046878120933312 Konijn E. (bibr28-1046878120933312) 2009 bibr57-1046878120933312 bibr13-1046878120933312 bibr18-1046878120933312 Rebelephant (bibr37-1046878120933312) 2017 bibr39-1046878120933312 Dark M. (bibr11-1046878120933312) 2002 bibr47-1046878120933312 bibr60-1046878120933312 Skunkape Interactive (bibr46-1046878120933312) 2015 Bashir M. (bibr2-1046878120933312) 2015 bibr8-1046878120933312 Ryu J. (bibr41-1046878120933312) 2018; 19 bibr20-1046878120933312 bibr38-1046878120933312 Gee J. P. (bibr15-1046878120933312) 2004 bibr29-1046878120933312 bibr55-1046878120933312 Digital Eel (bibr12-1046878120933312) 2011 Squire K. (bibr48-1046878120933312) 2011 bibr54-1046878120933312 bibr6-1046878120933312 bibr45-1046878120933312 Ricci M. (bibr40-1046878120933312) 2017; 5 Scott K. (bibr43-1046878120933312) 2014; 6 bibr19-1046878120933312 Saldaña J. (bibr42-1046878120933312) 2015 Gee J. P. (bibr16-1046878120933312) 2005; 85 bibr22-1046878120933312 bibr27-1046878120933312 bibr53-1046878120933312 bibr61-1046878120933312 bibr14-1046878120933312 bibr7-1046878120933312 bibr51-1046878120933312 bibr56-1046878120933312 Juul J. (bibr24-1046878120933312) 2010 Wee J. M. C. (bibr58-1046878120933312) 2016 bibr4-1046878120933312 bibr30-1046878120933312 |
References_xml | – year: 2018 publication-title: Obio – volume: 19 start-page: 61 issue: 1 year: 2018 end-page: 91 article-title: Increasing persona effects: Does it matter the voice and appearance of animated pedagogical agent publication-title: Educational Technology International – volume: 14 start-page: 84 issue: 5 year: 2016 end-page: 86 article-title: GenCyber: Inspiring the next generation of cyber stars publication-title: IEEE Security & Privacy – year: 2016 publication-title: Hack NET – year: 2011 publication-title: Data Jammers: FastForward – volume: 5 start-page: 183 issue: 2 year: 2017 end-page: 224 article-title: Cybersecurity games: Building tomorrow’s workforce publication-title: Journal of Law & Cyber Warfare – publication-title: Cyber Defence War – volume: 34 start-page: 229 year: 2006 end-page: 243 article-title: Computer gaming and interactive simulations for learning: A meta-analysis publication-title: Journal of Educational Computing Research – volume: 85 start-page: 33 issue: 2 year: 2005 end-page: 38 article-title: Good video games and good learning publication-title: Phi Kappa Phi Forum – volume: 6 start-page: 264 issue: 2 year: 2014 end-page: 276 article-title: Designing a culturally responsive computing curriculum for girls publication-title: International Journal of Gender, Science and Technology – volume: 14 start-page: 90 issue: 6 year: 2016 end-page: 95 article-title: The outcomes of cybersecurity competitions and implications for underrepresented populations publication-title: IEEE Security & Privacy – volume: 33 start-page: 159 issue: 1 year: 1977 end-page: 174 article-title: The measurement of observer agreement for categorical data publication-title: Biometrics – volume: 32 start-page: 1062 year: 2011 end-page: 1083 article-title: Diversity and organizational innovation: The role of employee involvement publication-title: Journal of Organizational Behavior – volume: 2 start-page: 35 year: 2013 end-page: 44 article-title: Paradigms for cybersecurity education in a homeland security program publication-title: Journal of Homeland Security Education – volume: 85 start-page: 33 issue: 2 year: 2005 ident: bibr16-1046878120933312 publication-title: Phi Kappa Phi Forum – ident: bibr1-1046878120933312 publication-title: Cyber Defence War – ident: bibr4-1046878120933312 doi: 10.1145/3017680.3017811 – volume-title: The coding manual for qualitative researchers year: 2015 ident: bibr42-1046878120933312 – ident: bibr30-1046878120933312 doi: 10.2307/2529310 – ident: bibr5-1046878120933312 doi: 10.7551/mitpress/8429.001.0001 – ident: bibr29-1046878120933312 doi: 10.1109/MSP.2016.107 – ident: bibr39-1046878120933312 – ident: bibr23-1046878120933312 doi: 10.11591/edulearn.v12i1.7736 – ident: bibr45-1046878120933312 doi: 10.1111/j.1744-6570.2011.01190.x – ident: bibr49-1046878120933312 doi: 10.1109/FIE.2018.8658840 – volume-title: Situated language and learning: A critique of traditional schooling year: 2004 ident: bibr15-1046878120933312 – ident: bibr61-1046878120933312 doi: 10.1002/job.724 – volume-title: Mainlining year: 2017 ident: bibr37-1046878120933312 – ident: bibr47-1046878120933312 doi: 10.3102/0013189X035008019 – volume-title: Defining a curriculum framework in information assurance and security year: 2002 ident: bibr11-1046878120933312 – ident: bibr33-1046878120933312 doi: 10.1177/1046878112471509 – volume-title: Orwell: Keeping an Eye On You year: 2016 ident: bibr35-1046878120933312 – year: 2018 ident: bibr9-1046878120933312 publication-title: Obio – volume-title: Video games and learning: Teaching and participatory culture in the digital age year: 2011 ident: bibr48-1046878120933312 – ident: bibr20-1046878120933312 doi: 10.1080/10508406.2018.1487302 – ident: bibr55-1046878120933312 – volume: 6 start-page: 264 issue: 2 year: 2014 ident: bibr43-1046878120933312 publication-title: International Journal of Gender, Science and Technology – year: 2011 ident: bibr12-1046878120933312 publication-title: Data Jammers: FastForward – ident: bibr18-1046878120933312 doi: 10.1109/CGames.2015.7272970 – ident: bibr44-1046878120933312 doi: 10.1145/2543882.2543883 – ident: bibr31-1046878120933312 doi: 10.1371/journal.pmed.1000100 – ident: bibr59-1046878120933312 – volume: 19 start-page: 61 issue: 1 year: 2018 ident: bibr41-1046878120933312 publication-title: Educational Technology International – volume-title: USENIX Security Symposium, Austin, TX year: 2016 ident: bibr58-1046878120933312 – ident: bibr53-1046878120933312 – ident: bibr54-1046878120933312 doi: 10.1145/2568195.2568213 – ident: bibr10-1046878120933312 doi: 10.1016/j.compedu.2012.03.004 – ident: bibr32-1046878120933312 – ident: bibr14-1046878120933312 – ident: bibr56-1046878120933312 doi: 10.1504/IJISD.2009.028067 – ident: bibr7-1046878120933312 – ident: bibr57-1046878120933312 doi: 10.2190/FLHV-K4WA-WPVQ-H0YM – ident: bibr25-1046878120933312 doi: 10.1177/1046878114552166 – ident: bibr27-1046878120933312 doi: 10.1007/s10956-006-9038-y – volume: 5 start-page: 183 issue: 2 year: 2017 ident: bibr40-1046878120933312 publication-title: Journal of Law & Cyber Warfare – ident: bibr51-1046878120933312 doi: 10.1007/s10207-014-0262-9 – start-page: 2227 volume-title: Proceedings of SITE 2007 year: 2007 ident: bibr34-1046878120933312 – ident: bibr60-1046878120933312 doi: 10.1037/a0031311 – ident: bibr50-1046878120933312 doi: 10.1145/3328778.3366816 – start-page: 201 volume-title: Serious games: Mechanisms and effects year: 2009 ident: bibr28-1046878120933312 – ident: bibr13-1046878120933312 – volume-title: Proceedings of the USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE) year: 2015 ident: bibr2-1046878120933312 – volume-title: What video games have to teach us about learning and literacy year: 2007 ident: bibr17-1046878120933312 – volume-title: A casual revolution: Reinventing video games and their players year: 2010 ident: bibr24-1046878120933312 – ident: bibr19-1046878120933312 – ident: bibr36-1046878120933312 doi: 10.1109/MSP.2016.119 – ident: bibr38-1046878120933312 doi: 10.1177/1046878113480867 – ident: bibr22-1046878120933312 doi: 10.1177/1046878114554191 – volume: 2 start-page: 35 year: 2013 ident: bibr26-1046878120933312 publication-title: Journal of Homeland Security Education – ident: bibr52-1046878120933312 – ident: bibr8-1046878120933312 doi: 10.3102/0034654315582065 – ident: bibr3-1046878120933312 doi: 10.1145/2858036.2858062 – year: 2016 ident: bibr21-1046878120933312 publication-title: Hack NET – ident: bibr6-1046878120933312 – volume-title: ROOT year: 2015 ident: bibr46-1046878120933312 |
SSID | ssj0012694 |
Score | 2.3931062 |
Snippet | Background. Cybersecurity is of increasing importance in our interconnected world, yet the field has a growing workforce deficit and an underrepresentation of... |
SourceID | proquest crossref sage |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 586 |
SubjectTerms | Aesthetics Computer & video games Computer security Computers Cybersecurity Disproportionate Representation Frame analysis Games Identification methods Mobile computing Safety Search engines Systematic review Video Games Women Workforce |
Title | Experiencing Cybersecurity One Game at a Time: A Systematic Review of Cybersecurity Digital Games |
URI | https://journals.sagepub.com/doi/full/10.1177/1046878120933312 https://www.proquest.com/docview/2441234067 |
Volume | 51 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9NAEF6F9MIF8RQpBe0BIarKrbN-pOYWpS1V1QfQRAona7wZF0OSoto5wC_h5zL78CtABVysxMn6sfN59lvPzjeMvRRppAztE3OT6PiggoRu4jtpIFK_L1FGutjE2Xl4PPFPpsG00_nRWLW0KpJd-f23eSX_Y1XaR3ZVWbL_YNnqoLSDPpN9aUsWpu1f2bjSKdbB-28JUTlbjm7ngsjjW1igSlYEnehhctAva-XmD1XWSrvpQXalKono5nmTvF5mC1vsSwPmChbluKcVfG-yz2alz-iaLhhgVrvd-ZwAt8RSqqD28gXOP630OHBAOMWdE8grkj9afckMoMx61eYLCpqNlkvdmpGxRmZ0KxNLO12ao5NXNqVbdtE64oA8tdBVDitPbaVps2YsXLvdoJTT1t9C475_HRx0eFqdTZ1MqHc5nl3D3dLhPr-Ijyanp_H4cDq-wzYETUBEl20MP757f1ZFqFQGsFG6MNdeh8D31s_Qpjz1PKaxdFCzmfF9ds9OQ_jQYOoB6-DyIeuZXG1u_X3OX1tR8u1HDJpY4y3AcMIaV2DhUHDgCmtv-JDXSOMGafw6XWtokaYb54_Z5OhwPDp2bHkOR3puVDjBDAAQVNw6idDdBxlJORiERDKpy0LAJPT6dPspuio6izRV9_rkAwI_oZ6Bfe8J6y4Je08ZD-WMmG86EwIjP5AiAs8VkRJ-ShCDEHtsr-zBWFrtelVCZR73rVz9ep_32HbV4qvRbbnlv1ulUWL7dOcx0V4idUR3Bz32Shmq_ulPx9m8_TjP2N368dhi3eJmhc-J0RbJCwuun6FpmQ4 |
linkProvider | SAGE Publications |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3NT8IwFH8xcNCL38Ypag_GyGG4tfv0RlBEBdQICXpZutIZo4KRcdC_3nbrBmI0xtMO7Wvavnbv17z3fg9gH0e-VLQlkBvjukWlk9AILT2ycWSZjDM_KTbRajuNrnXRs3tTpb7UDo4qMqxKzCj5Wee3O8kTtxzP9WTKJyFE1hcuejIZoQDF6t31TSt3IcgUzZSKwNGlwMRH-W2MrzZpAjSnYrsSc1NfgvtsommUyVNlHIs5fsxwOP5rJcuwqEAoqqanZgXm-GAVtDRTF6nbPkKHipK6vAY0Z0QWlg7V3kMBGlXhO3Q14OiMvnBEY0SRTCk5RlV0mzNEo9T9gIbRjODJ44OsWJIIj9ahWz_t1Bq6Ks6gM2L4sW73KaWcSq9l6HPDo8xnzHUdATGw-FAeOsQUq4q4IX1zXDzUiClOgG2FYsHUIxtQGAwHfBOQw_oC90R9jLlv2Qz7lBjYl7Q_Iee2wzU4ytQTMMVcLgtoPAemIiuf3UoNyrnEa8ra8UvfUqbxINNZIECPMOkC7LgaHEgFTpp-Gmfrrx33YL7RaTWD5nn7chsWsHzAJ9GBJSjEb2O-I1BOHO6q8_wJQ5Pr3Q |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dT8IwEG8MJMYXv41T1D4YIw-Drftg842AiB8gRknwaem6zhgViIwH_eu92wooRmN8Wpb1mrbX7n7N3f2OkEMW-6hoG5CbkLrN0UlohLYeOyy2TSGFnxabaLXdZte-6Dk9FZuDuTBqBUclDKuCEaU_azzdwyguKx9jGf2SXsXDtE_LsrDGcB5eGMuRfPW-c9OauhEwTTOjI3B1FJj5Kb_18dUuzcDmp_iu1OQ0VrK6qqOUqRAjTZ5K4wTG-T7H4_jv2aySZQVGaTXbPWtkQfbXiZZl7FJ16kf0WFFTFzcInzIjg8WjtbcQwKMqgEev-5Ke8RdJeUI5xdSSE1qlt1OmaJq5IeggnhOsPz5g5ZJUeLRJuo3Tu1pTV0UadGEZfqI7EedccvRehr40PC58ISoVF6AGgweXoWuZMKtYGuijk3Bhs0zYCY4dwoS5Z22RXH_Ql9uEuiIC_BNHjEnfdgTzuWUwH-l_QikdV2qkPFFRIBSDORbSeA5MRVo-v5QaKU4lhhl7xy9tCxOtBxO9BQB-wLQD6Klo5AiVOPv0Uz87f214QBY79UZwdd6-3CVLDO_xaZBggeSS17HcA7CThPtqS38AL9HuUg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Experiencing+Cybersecurity+One+Game+at+a+Time%3A+A+Systematic+Review+of+Cybersecurity+Digital+Games&rft.jtitle=Simulation+%26+gaming&rft.au=Merijke%2C+Coenraad&rft.au=Pellicone+Anthony&rft.au=Ketelhut%2C+Diane+Jass&rft.au=Cukier%2C+Michel&rft.date=2020-10-01&rft.pub=SAGE+PUBLICATIONS%2C+INC&rft.issn=1046-8781&rft.eissn=1552-826X&rft.volume=51&rft.issue=5&rft.spage=586&rft.epage=611&rft_id=info:doi/10.1177%2F1046878120933312&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1046-8781&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1046-8781&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1046-8781&client=summon |