
The Library
A renewed approach to serious games for cyber security
Tools
Le Compte, Alexis, Elizondo, David and Watson, Tim (2015) A renewed approach to serious games for cyber security. In: 7th International Conference on Cyber Conflict: Architectures in Cyberspace (CyCon), 2015, Tallinn, 26-29 May 2015. Published in: 7th International Conference on Cyber Conflict: Architectures in Cyberspace (CyCon), 2015 pp. 203-216. ISBN 9789949954421. doi:10.1109/CYCON.2015.7158478
Research output not available from this repository, contact author.
Official URL: http://dx.doi.org/10.1109/CYCON.2015.7158478
Abstract
We are living in a world which is continually evolving and where modern conflicts have moved to the cyber domain. In its 2010 Strategic Concept, NATO affirmed its engagement to reinforce the defence and deterrence of its state members. In this light, it has been suggested that the gamification of training and education for cyber security will be beneficial. Although serious games have demonstrated pedagogic effectiveness in this field, they have only been used in a limited number of contexts, revealing some limitations. Thus, it is argued that serious games could be used in informal contexts while achieving similar pedagogic results. It is also argued that the use of such a serious game could potentially reach a larger audience than existing serious games, while complying with national cyber strategies. To this end, a framework for designing serious games which are aimed at raising an awareness of cyber security to those with little or no knowledge of the subject is presented. The framework, based upon existing frameworks and methodologies, is also accompanied with a set of cyber security skills, itself based upon content extracted from government sponsored awareness campaigns, and a method of integrating these skills into the framework. Finally, future research will be conducted to refine the framework and to improve the set of cyber security related skills in order to suit a larger range of players. A proof of concept will also be designed in order to collect empirical data and to validate the effectiveness of the framework.
Item Type: | Conference Item (Paper) | ||||
---|---|---|---|---|---|
Divisions: | Faculty of Science > WMG (Formerly the Warwick Manufacturing Group) | ||||
Journal or Publication Title: | 7th International Conference on Cyber Conflict: Architectures in Cyberspace (CyCon), 2015 | ||||
Publisher: | IEEE Computer Society | ||||
ISBN: | 9789949954421 | ||||
Book Title: | 2015 7th International Conference on Cyber Conflict: Architectures in Cyberspace | ||||
Official Date: | 2015 | ||||
Dates: |
|
||||
Page Range: | pp. 203-216 | ||||
DOI: | 10.1109/CYCON.2015.7158478 | ||||
Status: | Peer Reviewed | ||||
Publication Status: | Published | ||||
Access rights to Published version: | Restricted or Subscription Access | ||||
Conference Paper Type: | Paper | ||||
Title of Event: | 7th International Conference on Cyber Conflict: Architectures in Cyberspace (CyCon), 2015 | ||||
Type of Event: | Conference | ||||
Location of Event: | Tallinn | ||||
Date(s) of Event: | 26-29 May 2015 |
Request changes or add full text files to a record
Repository staff actions (login required)
![]() |
View Item |