{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T10:13:28Z","timestamp":1742984008540,"version":"3.40.3"},"publisher-location":"Cham","reference-count":71,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031480560"},{"type":"electronic","value":"9783031480577"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-48057-7_28","type":"book-chapter","created":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T06:01:30Z","timestamp":1700892090000},"page":"445-460","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Free Guy or\u00a0Bad Guy: Safety, Privacy, and\u00a0Security Risks for\u00a0Minors in\u00a0the\u00a0Metaverse and\u00a0Prominent Educational Considerations"],"prefix":"10.1007","author":[{"given":"Andria","family":"Procopiou","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0376-1713","authenticated-orcid":false,"given":"Andriani","family":"Piki","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4040-4942","authenticated-orcid":false,"given":"Eliana","family":"Stavrou","sequence":"additional","affiliation":[]},{"given":"Nelly","family":"Zeniou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,26]]},"reference":[{"key":"28_CR1","doi-asserted-by":"publisher","unstructured":"Mystakidis, S.: Metaverse. Encyclopedia 2(1), 486\u2013497 (2022). (Basel, 2021). https:\/\/doi.org\/10.3390\/encyclopedia2010031","DOI":"10.3390\/encyclopedia2010031"},{"issue":"1","key":"28_CR2","doi-asserted-by":"publisher","first-page":"17","DOI":"10.5325\/intelitestud.19.1.0017","volume":"19","author":"J Joshua","year":"2017","unstructured":"Joshua, J.: Information bodies: computational anxiety in Neal Stephenson\u2019s Snow Crash. Interdiscip. Lit. Stud. 19(1), 17\u201347 (2017)","journal-title":"Interdiscip. Lit. Stud."},{"key":"28_CR3","doi-asserted-by":"publisher","unstructured":"Lacey, C., Caudwell, C.: Cuteness as a \u2018dark pattern\u2019 in home robots. In: 2019 14th ACM\/IEEE International Conference on Human-Robot Interaction (HRI), pp. 374\u2013381 (2019). https:\/\/doi.org\/10.1109\/HRI.2019.8673274","DOI":"10.1109\/HRI.2019.8673274"},{"key":"28_CR4","unstructured":"Lee, L.-H., et al.: All one needs to know about metaverse: a complete survey on technological singularity, virtual ecosystem, and research agenda. arXiv [cs.CY] (2021)"},{"issue":"2","key":"28_CR5","first-page":"90","volume":"10","author":"A Davis","year":"2009","unstructured":"Davis, A., et al.: Avatars, people, and virtual worlds: foundations for research in metaverses. J. Assoc. Inf. Syst. 10(2), 90\u2013117 (2009)","journal-title":"J. Assoc. Inf. Syst."},{"issue":"102542","key":"28_CR6","doi-asserted-by":"publisher","first-page":"102542","DOI":"10.1016\/j.ijinfomgt.2022.102542","volume":"66","author":"YK Dwivedi","year":"2022","unstructured":"Dwivedi, Y.K., et al.: Metaverse beyond the hype: multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. Int. J. Inf. Manage. 66(102542), 102542 (2022)","journal-title":"Int. J. Inf. Manage."},{"key":"28_CR7","unstructured":"Maganis, J.: Top companies building in the metaverse. Crowdcreate, 27 April 2022"},{"issue":"2","key":"28_CR8","doi-asserted-by":"publisher","first-page":"101717","DOI":"10.1016\/j.jsis.2022.101717","volume":"31","author":"E Dincelli","year":"2022","unstructured":"Dincelli, E., Yayla, A.: Immersive virtual reality in the age of the metaverse: a hybrid-narrative review based on the technology affordance perspective. J. Strat. Inf. Syst. 31(2), 101717 (2022)","journal-title":"J. Strat. Inf. Syst."},{"key":"28_CR9","unstructured":"Hirsh-Pasek, K., et al.: A whole new world: education meets the metaverse. Report (2002). https:\/\/www.brookings.edu\/research\/a-whole-new-world-education-meets-the-metaverse"},{"key":"28_CR10","doi-asserted-by":"publisher","unstructured":"Kerdvibulvech, C.: Exploring the impacts of COVID-19 on digital and metaverse games. In: Stephanidis, C., Antona, M., Ntoa, S. (eds.) HCI International 2022 Posters, HCII 2022. Communications in Computer and Information Science, vol. 1582, pp. 561\u2013565. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-06391-6_69","DOI":"10.1007\/978-3-031-06391-6_69"},{"key":"28_CR11","doi-asserted-by":"publisher","unstructured":"Petrigna, L., Musumeci, G.: The metaverse: a new challenge for the healthcare system: a scoping review. J. Funct. Morphol. Kinesiol. 7(3), 63 (2022). https:\/\/doi.org\/10.3390\/jfmk7030063","DOI":"10.3390\/jfmk7030063"},{"key":"28_CR12","doi-asserted-by":"publisher","unstructured":"Tsirtsis, A., Tsapatsoulis, N., Stamatelatos, M., Papadamou, K., Sirivianos, M.: Cyber security risks for minors: a taxonomy and a software architecture. In: 2016 11th International Workshop on Semantic and Social Media Adaptation and Personalization (SMAP), Thessaloniki, Greece, pp. 93\u201399 (2016). https:\/\/doi.org\/10.1109\/SMAP.2016.7753391","DOI":"10.1109\/SMAP.2016.7753391"},{"key":"28_CR13","unstructured":"ITU: Guidelines for children on child online protection (2020). https:\/\/www.itu-cop-guidelines.com"},{"key":"28_CR14","unstructured":"Nidirect: Social media, online gaming and keeping children safe online (2015). https:\/\/www.nidirect.gov.uk\/articles\/social-media-online-gaming-and-keeping-children-safe-online"},{"key":"28_CR15","unstructured":"Cyberbullying Research Center: What is cyberbullying? Cyberbullying Research Center. https:\/\/cyberbullying.org\/what-is-cyberbullying"},{"issue":"1","key":"28_CR16","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.chb.2012.05.024","volume":"29","author":"R Slonje","year":"2013","unstructured":"Slonje, R., Smith, P.K., Fris\u00e9n, A.: The nature of cyberbullying, and strategies for prevention. Comput. Hum. Behav. 29(1), 26\u201332 (2013)","journal-title":"Comput. Hum. Behav."},{"issue":"6","key":"28_CR17","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1089\/cyber.2020.0253","volume":"24","author":"F Stevens","year":"2021","unstructured":"Stevens, F., Nurse, J.R.C., Arief, B.: Cyber stalking, cyber harassment, and adult mental health: a systematic review. Cyberpsychol. Behav. Soc. Netw. 24(6), 367\u2013376 (2021)","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"key":"28_CR18","unstructured":"US Legal, Inc.: Cyber harassment law and legal definition. Uslegal.com. https:\/\/definitions.uslegal.com\/c\/cyber-harassment"},{"key":"28_CR19","unstructured":"Cyber harassment: European Institute for Gender Equality. https:\/\/eige.europa.eu\/thesaurus\/terms\/1486"},{"key":"28_CR20","unstructured":"Pittaro , M.: Cyber stalking: an analysis of online harassment and intimidation. Cybercrimejournal.com (2007). https:\/\/www.cybercrimejournal.com\/pdf\/mpittarojccjuly2007.pdf"},{"key":"28_CR21","doi-asserted-by":"crossref","unstructured":"Ngejane, C.H., Mabuza-Hocquet, G., Eloff, J.H.P., Lefophane, S.: Mitigating online sexual grooming cybercrime on social media using machine learning: a desktop survey. In: 2018 International Conference on Advances in Big Data, Computing and Data Communication Systems (icABCD), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ICABCD.2018.8465413"},{"key":"28_CR22","unstructured":"Nguyen, Q.: Don\u2019t let your kids try these 9 dangerous TikTok trends 2021. CyberPurify. https:\/\/cyberpurify.com\/knowledge\/9-dangerous-tiktok-trends"},{"key":"28_CR23","unstructured":"LawInsider. Online gambling definition. https:\/\/www.lawinsider.com\/dictionary\/online-gambling"},{"issue":"3","key":"28_CR24","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1007\/s10899-019-09923-3","volume":"36","author":"P G\u00f3mez","year":"2020","unstructured":"G\u00f3mez, P., Feij\u00f3o, S., Bra\u00f1a, T., Varela, J., Rial, A.: Minors and online gambling: prevalence and related variables. J. Gambl. Stud. 36(3), 735\u2013745 (2020)","journal-title":"J. Gambl. Stud."},{"key":"28_CR25","unstructured":"Wall, D.S.: Future identities: changing identities in the UK - the next 10 years DR 19: Identity Related Crime in the UK. Gov.uk (2013). Retrieved 31 December 2022"},{"key":"28_CR26","doi-asserted-by":"publisher","unstructured":"Aldawood, H., Skinner, G.: Educating and raising awareness on cyber security social engineering: a literature review. In: 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), Wollongong, NSW, Australia, pp. 62\u201368 (2018). https:\/\/doi.org\/10.1109\/TALE.2018.8615162","DOI":"10.1109\/TALE.2018.8615162"},{"issue":"50","key":"28_CR27","first-page":"19","volume":"178","author":"H Aldawood","year":"2019","unstructured":"Aldawood, H., Skinner, G.: A taxonomy for social engineering attacks via personal devices. Int. J. Comput. Appl. 178(50), 19\u201326 (2019)","journal-title":"Int. J. Comput. Appl."},{"key":"28_CR28","unstructured":"Ivaturi, K., Janczewski, L.: A taxonomy for social engineering attacks. In: CONF-IRM 2011 Proceedings, pp. 2\u201311 (2011)"},{"key":"28_CR29","doi-asserted-by":"publisher","unstructured":"Nicholson, J., Javed, Y., Dixon, M., Coventry, L., Ajayi, O.D., Anderson, P.: Investigating teenagers\u2019 ability to detect phishing messages. In: IEEE European Symposium on Security and Privacy Workshops, pp. 140\u2013149 (2020). https:\/\/doi.org\/10.1109\/EuroSPW51379.2020.00027","DOI":"10.1109\/EuroSPW51379.2020.00027"},{"key":"28_CR30","unstructured":"Police.uk: Identity fraud and identity theft. https:\/\/www.actionfraud.police.uk\/a-z-of-fraud\/identity-fraud-and-identity-theft"},{"key":"28_CR31","unstructured":"Internet Matters: Learn about privacy and identity theft (2019). https:\/\/www.internetmatters.org\/issues\/privacy-identity\/learn-about-privacy-and-identity-theft"},{"key":"28_CR32","unstructured":"Ingham, A.: 7 real life cyberbullying horror stories. Family Orbit Blog (2018). https:\/\/www.familyorbit.com\/blog\/real-life-cyberbullying-horror-stories"},{"key":"28_CR33","unstructured":"Georgiou, M.: Harassment still exists in the metaverse, even for kids. Newsy (2022). https:\/\/www.newsy.com\/stories\/harassment-still-exists-in-the-metaverse-even-for-kids"},{"key":"28_CR34","unstructured":"Florian, M.-C.: Can public space be created in the metaverse? ArchDaily (2022). https:\/\/www.archdaily.com\/987613\/can-public-space-be-created-in-the-metaverse"},{"key":"28_CR35","unstructured":"Marr, B.: How to buy land and real estate in the metaverse. Forbes (2022). https:\/\/www.forbes.com\/sites\/bernardmarr\/2022\/03\/23\/how-to-buy-land-real-estate-in-the-metaverse"},{"key":"28_CR36","unstructured":"Frenkel, S., Browning, K.: The metaverse\u2019s dark side: here come harassment and assaults. The New York Times (2021). https:\/\/www.nytimes.com\/2021\/12\/30\/technology\/metaverse-harassment-assaults.htm"},{"key":"28_CR37","doi-asserted-by":"publisher","unstructured":"Procopiou, A.: Ready player bad: the future rise of extremism and terrorism in the Metaverse. In: 2022 IEEE 2nd International Conference on Intelligent Reality (ICIR), Piscataway, NJ, USA, pp. 31\u201334 (2022). https:\/\/doi.org\/10.1109\/ICIR55739.2022.00022","DOI":"10.1109\/ICIR55739.2022.00022"},{"issue":"16","key":"28_CR38","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1080\/01419870.2019.1689279","volume":"43","author":"M Sommier","year":"2020","unstructured":"Sommier, M.: \u201cHow ELSE are you supposed to dress up like a Black Guy?\u2019\u2019: negotiating accusations of Blackface in online newspaper comments. Ethn. Racial Stud. 43(16), 57\u201375 (2020)","journal-title":"Ethn. Racial Stud."},{"issue":"2","key":"28_CR39","doi-asserted-by":"publisher","first-page":"205630512091685","DOI":"10.1177\/2056305120916850","volume":"6","author":"S Ozalp","year":"2020","unstructured":"Ozalp, S., Williams, M.L., Burnap, P., Liu, H., Mostafa, M.: Antisemitism on Twitter: collective efficacy and the role of community organisations in challenging online hate speech. Soc. Media Soc. 6(2), 205630512091685 (2020)","journal-title":"Soc. Media Soc."},{"key":"28_CR40","unstructured":"Neva: How will the metaverse change online gambling? 800gambler.org (2022). https:\/\/800gambler.org\/how-will-the-metaverse-change-online-gambling"},{"key":"28_CR41","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.chb.2018.05.030","volume":"87","author":"A Rial","year":"2018","unstructured":"Rial, A., Golpe, S., Isorna, M., Bra\u00f1a, T., G\u00f3mez, P.: Minors and problematic Internet use: evidence for better prevention. Comput. Hum. Behav. 87, 140\u2013145 (2018)","journal-title":"Comput. Hum. Behav."},{"key":"28_CR42","unstructured":"Webroot.com: Internet gambling among teens and college students. https:\/\/www.webroot.com\/us\/en\/resources\/tips-articles\/internet-gambling-among-teens-and-college-students"},{"issue":"1","key":"28_CR43","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1186\/s40309-022-00208-4","volume":"10","author":"L Bojic","year":"2022","unstructured":"Bojic, L.: Metaverse through the prism of power and addiction: what will happen when the virtual world becomes more attractive than reality? Eur. J. Fut. Res. 10(1), 22 (2022). https:\/\/doi.org\/10.1186\/s40309-022-00208-4","journal-title":"Eur. J. Fut. Res."},{"issue":"4","key":"28_CR44","doi-asserted-by":"publisher","first-page":"e100825","DOI":"10.1136\/gpsych-2022-100825","volume":"35","author":"SS Usmani","year":"2022","unstructured":"Usmani, S.S., Sharath, M., Mehendale, M.: Future of mental health in the metaverse. Gen. Psychiatr. 35(4), e100825 (2022)","journal-title":"Gen. Psychiatr."},{"key":"28_CR45","unstructured":"Lillibridge, R.: Socializing in the metaverse - science, translated. Science, Translated - Science (2022)"},{"key":"28_CR46","unstructured":"Patel, N.J.: Reality or fiction? Kabuni, 21 December 2021. https:\/\/medium.com\/kabuni\/fiction-vs-non-fiction-98aa0098f3b0"},{"key":"28_CR47","unstructured":"Singh, K.: There\u2019s not much we can legally do about sexual assault in the metaverse. Refinery29, 09 June 2022. https:\/\/www.refinery29.com\/en-us\/2022\/06\/11004248\/is-metaverse-sexual-assault-illegal"},{"key":"28_CR48","unstructured":"Eberhart, C.: Metaverse experts reveal if you can murder someone in virtual world - and whether you can be punished if you\u2019re violent. The US Sun (2022). Retrieved 31 December 2022. https:\/\/www.the-sun.com\/tech\/5066296\/can-you-murder-in-metaverse\/"},{"key":"28_CR49","unstructured":"Daly, C.: Metaverse murders could be punished just like real crimes under tough new rules. Dailystar.co.uk, 01 June 2022. https:\/\/www.dailystar.co.uk\/tech\/news\/murders-metaverse-could-punished-just-27120692"},{"key":"28_CR50","unstructured":"Crawford, A., Smith, T.: Metaverse app allows kids into virtual strip clubs. BBC, BBC News, 23 February 2022"},{"key":"28_CR51","unstructured":"Hu, R.: Understanding children\u2019s vulnerabilities in the metaverse: the role of the online community. Parenting for a Digital Future, 15 June 2022. https:\/\/blogs.lse.ac.uk\/parenting4digitalfuture\/2022\/06\/15\/metaverse-vrchat"},{"issue":"2","key":"28_CR52","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MTS.2018.2826060","volume":"37","author":"B Falchuk","year":"2018","unstructured":"Falchuk, B., Loeb, S., Neff, R.: The social metaverse: battle for privacy. IEEE Technol. Soc. Mag. 37(2), 52\u201361 (2018). https:\/\/doi.org\/10.1109\/MTS.2018.2826060","journal-title":"IEEE Technol. Soc. Mag."},{"key":"28_CR53","unstructured":"Bosworth, A., Facebook Reality Labs, Clegg, N., Global Affairs: Building the metaverse responsibly. Meta, 27 September 2021. https:\/\/about.fb.com\/news\/2021\/09\/building-the-metaverse-responsibly"},{"key":"28_CR54","doi-asserted-by":"publisher","unstructured":"Rosenberg, L.B.: The growing need for metaverse regulation. In: Arai, K. (eds.) Intelligent Systems and Applications, IntelliSys 2022. LNNS, vol. 544, pp. 540\u2013547. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-16075-2_39","DOI":"10.1007\/978-3-031-16075-2_39"},{"key":"28_CR55","doi-asserted-by":"publisher","unstructured":"Fernandez, C.B., Hui, P.: Life, the metaverse and everything: an overview of privacy, ethics, and governance in metaverse. In: 2022 IEEE 42nd International Conference on Distributed Computing Systems Workshops (ICDCSW), Bologna, Italy, pp. 272\u2013277 (2022). https:\/\/doi.org\/10.1109\/ICDCSW56584.2022.00058","DOI":"10.1109\/ICDCSW56584.2022.00058"},{"key":"28_CR56","unstructured":"Protecting children in the metaverse: it\u2019s easy to blame big tech, but we all have a role to play. Lse.ac.uk. http:\/\/eprints.lse.ac.uk\/114781\/1\/parenting4digitalfuture-2022-03-23.pdf. Accessed 19 Jun 2023"},{"key":"28_CR57","unstructured":"NIST: National Institute of Standards and Technology (NIST): Cybersecurity Framework. https:\/\/www.nist.gov\/itl\/smallbusinesscyber\/planning-guides\/nist-cybersecurity-framework"},{"issue":"7","key":"28_CR58","first-page":"73","volume":"18","author":"E Stavrou","year":"2020","unstructured":"Stavrou, E.: Back to basics: towards building societal resilience against a cyber pandemic. J. Syst. Cybern. Inf. 18(7), 73\u201380 (2020)","journal-title":"J. Syst. Cybern. Inf."},{"issue":"1","key":"28_CR59","first-page":"47","volume":"3","author":"WJ Triplett","year":"2023","unstructured":"Triplett, W.J.: Addressing cybersecurity challenges in education. Int. J. STEM Educ. Sustain. 3(1), 47\u201367 (2023)","journal-title":"Int. J. STEM Educ. Sustain."},{"key":"28_CR60","doi-asserted-by":"publisher","unstructured":"Moumouh, C., Chkouri, M.Y., Fern\u00e1ndez-Alem\u00e1n, J.L.: Cybersecurity awareness through serious games: a systematic literature review. In: Ben Ahmed, M., Abdelhakim, B.A., Ane, B.K., Rosiyadi, D. (eds.) Emerging Trends in Intelligent Systems & Network Security, NISS 2022. Lecture Notes on Data Engineering and Communications Technologies, vol. 147, pp. 190\u2013199. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-15191-0_18","DOI":"10.1007\/978-3-031-15191-0_18"},{"key":"28_CR61","doi-asserted-by":"publisher","unstructured":"Inceoglu, M.M., Ciloglugil, B.: Use of metaverse in education. In: Gervasi, O., Murgante, B., Misra, S., Rocha, A.M.A.C., Garau, C. (eds.) Computational Science and Its Applications, ICCSA 2022 Workshops, ICCSA 2022. LNCS, vol. 13377, pp. 171\u2013184. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-10536-4_12","DOI":"10.1007\/978-3-031-10536-4_12"},{"key":"28_CR62","unstructured":"Globalauthorid: Adaptive serious games to teach cybersecurity concepts using a machine learning approach. http:\/\/www.globalauthorid.com\/"},{"key":"28_CR63","doi-asserted-by":"crossref","unstructured":"Hofmeier, M., Lechner, U.: Operation digital ant: a serious game approach to collect insider threat scenarios and raise awareness. In: European Interdisciplinary Cybersecurity Conference (2021)","DOI":"10.1145\/3487405.3487655"},{"key":"28_CR64","doi-asserted-by":"crossref","unstructured":"Leitner, M., et al.: AIT cyber range: flexible cyber security environment for exercises, training and research. In: Proceedings of the European Interdisciplinary Cybersecurity Conference (2020)","DOI":"10.1145\/3424954.3424959"},{"key":"28_CR65","doi-asserted-by":"crossref","unstructured":"Heid, K., Heider, J., Qasempour, K.: Raising security awareness on mobile systems through gamification. In: Proceedings of the European Interdisciplinary Cybersecurity Conference (2020)","DOI":"10.1145\/3424954.3424958"},{"key":"28_CR66","doi-asserted-by":"crossref","unstructured":"Povse, D.F.: It\u2019s all fun and games, and some legalese: data protection implications for increasing cyber-skills of employees through games. In: 2018 Proceedings of the Central European Cybersecurity Conference (2018)","DOI":"10.1145\/3277570.3277580"},{"issue":"10","key":"28_CR67","doi-asserted-by":"publisher","first-page":"417","DOI":"10.3390\/info12100417","volume":"12","author":"M Khader","year":"2021","unstructured":"Khader, M., Karam, M., Fares, H.: Cybersecurity awareness framework for academia. Information (Basel) 12(10), 417 (2021)","journal-title":"Information (Basel)"},{"key":"28_CR68","unstructured":"Center for Cybersecurity and Cyber Operations. https:\/\/nps.edu\/web\/c3o\/cyberciege"},{"key":"28_CR69","doi-asserted-by":"crossref","unstructured":"R\u00f6pke, R., Schroeder, U.: The problem with teaching defence against the dark arts: a review of game-based learning applications and serious games for cyber security education. In: Proceedings of the 11th International Conference on Computer Supported Education, Heraklion, Greece, 2\u20134 May 2019 (2019)","DOI":"10.5220\/0007706100580066"},{"issue":"4","key":"28_CR70","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1002\/cae.22123","volume":"27","author":"C Mio","year":"2019","unstructured":"Mio, C., Ventura-Medina, E., Jo\u00e3o, E.: Scenario-based eLearning to promote active learning in large cohorts: students\u2019 perspective. Comput. Appl. Eng. Educ. 27(4), 894\u2013909 (2019)","journal-title":"Comput. Appl. Eng. Educ."},{"key":"28_CR71","unstructured":"CISA: Cybersecurity & Infrastructure Security Agency: Cybersecurity Games (2022). https:\/\/www.cisa.gov\/cybergames\/"}],"container-title":["Lecture Notes in Computer Science","HCI International 2023 \u2013 Late Breaking Papers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-48057-7_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,25]],"date-time":"2023-11-25T06:06:25Z","timestamp":1700892385000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-48057-7_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031480560","9783031480577"],"references-count":71,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-48057-7_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"26 November 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2023.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7472","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1578","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"396","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}