{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:57:42Z","timestamp":1740103062352,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["DGE 21-38925,DGE 21-38921"],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,3]]},"DOI":"10.1145\/3649217.3653538","type":"proceedings-article","created":{"date-parts":[[2024,7,3]],"date-time":"2024-07-03T22:30:20Z","timestamp":1720045820000},"page":"611-617","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A User Experience Study of MeetingMayhem: A Web-Based Game to Teach Adversarial Thinking"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5358-720X","authenticated-orcid":false,"given":"Shan","family":"Huang","sequence":"first","affiliation":[{"name":"University of Illinois Urbana-Champaign, Champaign, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-9488-4048","authenticated-orcid":false,"given":"JiWoo","family":"Lee","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign, Champaign, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9520-2438","authenticated-orcid":false,"given":"Chenyan","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Illinois Urbana-Champaign, Champaign, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9501-2295","authenticated-orcid":false,"given":"Geoffrey L.","family":"Herman","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4209-6103","authenticated-orcid":false,"given":"Marc","family":"Olano","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0056-7819","authenticated-orcid":false,"given":"Linda","family":"Oliva","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1130-4678","authenticated-orcid":false,"given":"Alan","family":"Sherman","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore County, Baltimore, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"DY Fuzzing: Formal Dolev-Yao Models Meet Protocol Fuzz Testing. Cryptology ePrint Archive","author":"Ammann Max","year":"2023","unstructured":"Max Ammann, Lucca Hirschi, and Steve Kremer. 2023. DY Fuzzing: Formal Dolev-Yao Models Meet Protocol Fuzz Testing. Cryptology ePrint Archive, Paper 2023\/057. https:\/\/eprint.iacr.org\/2023\/057 https:\/\/eprint.iacr.org\/2023\/057."},{"key":"e_1_3_2_1_2_1","unstructured":"Iliano Cervesato. 2001. The Dolev-Yao intruder is the most powerful attacker. Citeseer."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194923"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.27"},{"key":"e_1_3_2_1_5_1","volume-title":"Using games and simulations for supporting learning. Learning, media and technology","author":"De Freitas Sara I","year":"2006","unstructured":"Sara I De Freitas. 2006. Using games and simulations for supporting learning. Learning, media and technology, Vol. 31, 4 (2006), 343--358."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_7_1","volume-title":"6th Workshop on Cyber Security Experimentation and Test (CSET 13)","author":"Gondree Mark","year":"2013","unstructured":"Mark Gondree and Zachary NJ Peterson. 2013. Valuing Security by Getting $$[d0x3d!]$$: Experiences with a Network Security Board Game. In 6th Workshop on Cyber Security Experimentation and Test (CSET 13)."},{"key":"e_1_3_2_1_8_1","first-page":"19","article-title":"Teaching adversarial thinking for cybersecurity","volume":"4","author":"Hamman Seth T","year":"2016","unstructured":"Seth T Hamman and Kenneth M Hopkinson. 2016. Teaching adversarial thinking for cybersecurity. In Journal of The Colloquium for Information Systems Security Education, Vol. 4. 19--19.","journal-title":"Journal of The Colloquium for Information Systems Security Education"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2016.2636125"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.64"},{"key":"e_1_3_2_1_11_1","volume-title":"SITE Interactive Conference. Association for the Advancement of Computing in Education (AACE), 136--141","author":"Lee Eunsun","year":"2020","unstructured":"Eunsun Lee and YoungKyun Baek. 2020. Game based approach to enhance player's adversarial thinking in cybersecurity education. In SITE Interactive Conference. Association for the Advancement of Computing in Education (AACE), 136--141."},{"key":"e_1_3_2_1_12_1","volume-title":"International Workshop on Security Protocols. Springer, 34--46","author":"Mao Wenbo","year":"2002","unstructured":"Wenbo Mao. 2002. A structured operational modelling of the Dolev-Yao threat model. In International Workshop on Security Protocols. Springer, 34--46."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE43999.2019.9028652"},{"key":"e_1_3_2_1_14_1","unstructured":"Marc Olano Alan Sherman Linda Oliva Ryan Cox Deborah Firestone Oliver Kubik Milind Patil John Seymour Isaac Sohn and Donna Thomas. 2014. SecurityEmpire: Development and evaluation of a digital game to promote cybersecurity education. In 2014 USENIX Summit on Gaming Games and Gamification in Security Education (3GSE 14)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2017.2715174"},{"key":"e_1_3_2_1_16_1","first-page":"1","article-title":"Psychometric evaluation of the Cybersecurity Concept Inventory","volume":"22","author":"Poulsen Seth","year":"2021","unstructured":"Seth Poulsen, Geoffrey L. Herman, Peter AH Peterson, Enis Golaszewski, Akshita Gorti, Linda Oliva, Travis Scheponik, and Alan T Sherman. 2021. Psychometric evaluation of the Cybersecurity Concept Inventory. ACM Transactions on Computing Education (TOCE), Vol. 22, 1 (November 2021), 1--18.","journal-title":"ACM Transactions on Computing Education (TOCE)"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/MSP.2013.84","article-title":"Cybersecurity education in universities","volume":"11","author":"Schneider Fred B","year":"2013","unstructured":"Fred B Schneider. 2013. Cybersecurity education in universities. IEEE Security & Privacy, Vol. 11, 4 (2013), 3--4.","journal-title":"IEEE Security & Privacy"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2017.1362063"},{"key":"e_1_3_2_1_19_1","volume-title":"National Cyber Summit (NCS) Research Track","author":"Sherman Alan T.","year":"2020","unstructured":"Alan T. Sherman, Geoffrey L. Herman, Linda Oliva, Peter A. H. Peterson, Enis Golaszewski, Seth Poulsen, Travis Scheponik, and Akshita Gorti. 2021. Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity. In National Cyber Summit (NCS) Research Track 2020,, Kim-Kwang Raymond Choo, Tommy Morris, Gilbert L. Peterson, and Eric Imsand (Eds.). Springer International Publishing, Cham, 3--34."},{"key":"e_1_3_2_1_20_1","volume-title":"Student misconceptions about cybersecurity concepts: Analysis of think-aloud interviews. Journal of Cybersecurity Education, Research and Practice (07","author":"Thompson Julia","year":"2018","unstructured":"Julia Thompson, Geoffrey Herman, Travis Scheponik, Linda Oliva, Alan T. Sherman, and Ennis Golaszewski. 2018. Student misconceptions about cybersecurity concepts: Analysis of think-aloud interviews. Journal of Cybersecurity Education, Research and Practice (07 2018)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3446871.3469743"}],"event":{"name":"ITiCSE 2024: Innovation and Technology in Computer Science Education","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Milan Italy","acronym":"ITiCSE 2024"},"container-title":["Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3649217.3653538","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,3]],"date-time":"2024-08-03T11:05:47Z","timestamp":1722683147000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3649217.3653538"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,3]]},"references-count":21,"alternative-id":["10.1145\/3649217.3653538","10.1145\/3649217"],"URL":"https:\/\/doi.org\/10.1145\/3649217.3653538","relation":{},"subject":[],"published":{"date-parts":[[2024,7,3]]},"assertion":[{"value":"2024-07-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}