Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Design of a Virtual Cybersecurity Escape Room

  • Conference paper
  • First Online:
National Cyber Summit (NCS) Research Track 2021 (NCS 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 310))

Included in the following conference series:

Abstract

As cybersecurity education and training methods endeavor to build a skilled workforce to meet the growing demands of government and industry, it is important to craft training exercises to build and assess a learner’s understanding of cybersecurity topics in a fun and meaningful way. To meet this need, we designed a concept map and virtual model of a collaborative, virtual cybersecurity escape room. Escape rooms, which are a form of serious games intended to increase knowledge and skills or measure learning outcomes, are scenario-based and interactive in nature. The artifacts described align the serious gaming elements with elements associated with the learning experience to assist game designers and educators in addressing the need for a collaborative virtual space where learners can practice skills associated with cybersecurity in a gamified manner.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Novak, J.D., Gowin, D.B., Bob, G.D.: Learning How to Learn. Cambridge University Press, Cambridge (1984)

    Book  Google Scholar 

  2. Marín-Vega, H., Alor-Hernández, G., Colombo-Mendoza, L.O., Sánchez-Ramírez, C., García-Alcaraz, J.L., Avelar-Sosa, L.: Zeus a tool for generating rule-based serious games with gamification techniques. IET Softw. 14(2), 88–97 (2020). https://doi.org/10.1049/iet-sen.2019.0028

    Article  Google Scholar 

  3. López-Belmonte, J., Segura-Robles, A., Fuentes-Cabrera, A., Parra-González, M.E.: Evaluating activation and absence of negative effect: gamification and escape rooms for learning. Int. J. Environ. Res. Public Health 17(7), Article no. 7 (2020). https://doi.org/10.3390/ijerph17072224.

  4. Cornel, C.J., Rowe, D.C., Cornel, C.M.: Starships and cybersecurity: teaching security concepts through immersive gaming experiences. In: Proceedings of the 18th Annual Conference on Information Technology Education, New York, NY, USA, September 2017, pp. 27–32 (2017). https://doi.org/10.1145/3125659.3125696

  5. Hale, M.L., Gamble, R.F., Gamble, P.: CyberPhishing: a game-based platform for phishing awareness testing. In: 2015 48th Hawaii International Conference on System Sciences, January 2015, pp. 5260–5269 (2015). https://doi.org/10.1109/HICSS.2015.670

  6. Ross, R.: Design of an open-source decoder for educational escape rooms. IEEE Access 7, 145777–145783 (2019). https://doi.org/10.1109/ACCESS.2019.2945289

    Article  Google Scholar 

  7. Jin, G., Tu, M., Kim, T.-H., Heffron, J., White, J.: Game based cybersecurity training for high school students. In: Proceedings of the 49th ACM Technical Symposium on Computer Science Education, New York, NY, USA, February 2018, pp. 68–73 (2018). https://doi.org/10.1145/3159450.3159591

  8. Streiff, J., Justice, C., Camp, J.: Escaping to Cybersecurity Education: Using Manipulative Challenges to Engage and Educate - ProQuest, October 2019. http://dx.doi.org.elib.uah.edu/10.34190/GBL.19.183

  9. Nicholson, S.: The State of Escape: Escape Room Design and Facilities, p. 20

    Google Scholar 

  10. Shakeri, H., Singhal, S., Pan, R., Neustaedter, C., Tang, A.: Escaping together: the design and evaluation of a distributed real-life escape room. In: Proceedings of the Annual Symposium on Computer-Human Interaction in Play, New York, NY, USA, October 2017, pp. 115–128 (2017). https://doi.org/10.1145/3116595.3116601

  11. Cybersecurity Supply and Demand Heat Map. https://www.cyberseek.org/heatmap.html. Accessed 27 Oct 2019

  12. Hoffman, L., Burley, D., Toregas, C.: Holistically building the cybersecurity workforce. IEEE Secur. Priv. 10(2), 33–39 (2012). https://doi.org/10.1109/MSP.2011.181

    Article  Google Scholar 

  13. Eukel, H., Morrell, B.: Ensuring educational escape-room success: the process of designing, piloting, evaluating, redesigning, and re-evaluating educational escape rooms. Simul. Gaming, p. 1046878120953453, August 2020. https://doi.org/10.1177/1046878120953453

  14. Pradeep Raj, K.B., Sinha, S., Arvind, R.S., Solanki, D., Lahiri, U.: Design of virtual reality based intelligent storytelling platform with human computer interaction. In: 2018 IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS), June 2018, pp. 142–147 (2018). https://doi.org/10.1109/ICIS.2018.8466457

  15. Cotner, S., Smith, K.M., Simpson, L., Burgess, D.S., Cain, J.: 1311. Incorporating an ‘Escape Room’ game design in infectious diseases instruction. Open Forum Infect. Dis. 5(suppl_1), S401–S401 (2018). https://doi.org/10.1093/ofid/ofy210.1144

  16. Deeb, F.A., Hickey, T.J.: Teaching introductory cryptography using a 3D escape-the-room game. In: 2019 IEEE Frontiers in Education Conference (FIE), October 2019, pp. 1–6 (2019). https://doi.org/10.1109/FIE43999.2019.9028549

  17. Löffler, E., Schneider, B., Zanwar, T., Asprion, P.M.: CySecEscape 2.0—a virtual escape room to raise cybersecurity awareness. IJSG 8(1), Article no. 1 (2021). https://doi.org/10.17083/ijsg.v8i1.413

  18. Peffers, K., Tuunanen, T., Rothenberger, M.A., Chatterjee, S.: A design science research methodology for information systems research. J. Manag. Inf. Syst. 24(3), 45–77, Winter2007/2008 (2007). https://doi.org/10.2753/MIS0742-1222240302

  19. Hevner, A.R., March, S.T., Park, J., Ram, S.: Design Science in Information Systems Research, p. 32

    Google Scholar 

  20. Hay, L., Cash, P., McKilligan, S.: The future of design cognition analysis. Des. Sci. 6 (2020). https://doi.org/10.1017/dsj.2020.20

  21. Storey, M.-A.D., Fracchia, F.D., Müller, H.A.: Cognitive design elements to support the construction of a mental model during software exploration. J. Syst. Softw. 44(3), 171–185 (1999). https://doi.org/10.1016/S0164-1212(98)10055-9

    Article  Google Scholar 

  22. Harteveld, C., Stahl, A., Smith, G., Talgar, C., Sutherland, S.C.: Standing on the shoulders of citizens: exploring gameful collaboration for creating social experiments. In: 2016 49th Hawaii International Conference on System Sciences (HICSS), January 2016, pp. 74–83 (2016). https://doi.org/10.1109/HICSS.2016.18

  23. Johnson-Laird, P., Byrne, R.: Mental models: a gentle introduction. Mentalmodelsblog, 02 August 2012. https://mentalmodelsblog.wordpress.com/mental-models-a-gentle-introduction/. Accessed 22 Nov 2020

  24. March, S.T., Smith, G.F.: Design and natural science research on information technology. Decis. Support Syst. 15(4), 251–266 (1995). https://doi.org/10.1016/0167-9236(94)00041-2

    Article  Google Scholar 

  25. Welcome to Hubs Hubs by Mozilla. https://hubs.mozilla.com/docs/index.html. Accessed 23 Oct 2020

  26. Douma, A.M., van Hillegersberg, J., Schuur, P.C.: Design and evaluation of a simulation game to introduce a Multi-Agent system for barge handling in a seaport. Decis. Support Syst. 53(3), 465–472 (2012). https://doi.org/10.1016/j.dss.2012.02.013

    Article  Google Scholar 

  27. Rusman, E., Ternier, S., Specht, M.: Early second language learning and adult involvement in a real-world context: design and evaluation of the ‘elena goes shopping’ mobile game. J. Educ. Technol. Soc. 21(3), 90–103 (2018)

    Google Scholar 

  28. Sullivan, G.M., Artino, A.R.: Analyzing and interpreting data from likert-type scales. J. Grad. Med. Educ. 5(4), 541–542 (2013). https://doi.org/10.4300/JGME-5-4-18

    Article  Google Scholar 

  29. Su, C.-H., Chen, K.T.-K., Fan, K.-K.: Rough set theory based fuzzy TOPSIS on serious game design evaluation framework. Math. Probl. Eng. 2013, e407395 (2013). https://doi.org/10.1155/2013/407395

    Article  MATH  Google Scholar 

  30. Couceiro, R.M., Papastergiou, M., Kordaki, M., Veloso, A.I.: Design and evaluation of a computer game for the learning of Information and Communication Technologies (ICT) concepts by physical education and sport science students. Educ. Inf. Technol. 18(3), 531–554 (2013). https://doi.org/10.1007/s10639-011-9179-3

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tania Williams .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Williams, T., El-Gayar, O. (2022). Design of a Virtual Cybersecurity Escape Room. In: Choo, KK.R., Morris, T., Peterson, G., Imsand, E. (eds) National Cyber Summit (NCS) Research Track 2021. NCS 2021. Lecture Notes in Networks and Systems, vol 310. Springer, Cham. https://doi.org/10.1007/978-3-030-84614-5_6

Download citation

Publish with us

Policies and ethics