Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Gamification by Students : An Effective Approach to Cyber Security Concept Learning


Affiliations
1 MKSSS’S Cummins College of Engineering for women, Pune, Maharashtra, India
     

   Subscribe/Renew Journal


The young (millennial) learners are not particularly motivated only by traditional classroom-based, one-way presentation/ lecture-based approaches as they are exposed to digital lives. Furthermore, in an outcome-based education system, all features of teaching focus on course outcomes. Therefore, the teachers face the challenge of student engagement. The work in this paper is regarding the active learning method for the final year students of the ‘Information and Cyber Security' course. In this activity, the students design (in a group of 2) and build the game using the software platform of their choice. The game is built around the CIA triad (privacy, integrity. and availability), network security concepts and protocols. After designing and building the prototype of the game, the students for assessment and feedback play the game with their class mates and the faculty members. Then classmates and teachers give scores for each core drive on the Octalysis tool. This helps student game designers to improve the weak core. Octalysis is a gamification framework designed as an octagon shaped with 8 core drivers representing each side. The entire exercise is stimulating and motivates the students as indicated in their feedback of the students (68% of students rated excellent). Gamification by students proved to enhance student learning by promoting critical thinking and problem-solving skills, as evident from the assessment. Finally, course coordinator evaluates the game using rubrics that were shared with students beforehand. The evaluation rubric focuses on the title of the game, content, creativity, rules, instructions of the game, and cooperative efforts. Game design and implementation by students activity proves that the greatest benefit is that the maximum learning happens in the design process (for game designers) compared to players. Further, the students also learn to work in groups and solve problems. Furthermore, the most significant of the entire activity is learning of cyber security concepts and protocols in a fun way.

Keywords

Active Learning, Game Design, Octalysis Framework, Assessment, Evaluation and Cyber Security.
Subscription Login to verify subscription
User
Notifications
Font Size


  • All India survey on higher Education. 2022. https://aishe.gov.in/aishe/gotoAisheReports. online] Available [Accessed 2 January 2022].
  • Boopathi, K., Sreejith, S., & Bithin, A. (2015). Learning cyber-Security through gamification. Indian Journal of Science and Technology, 8(7), 642-649.
  • Yasin, A., Liu, L., Li, T., Wang, J., & Zowghi, D. (2018). Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG). Information and Softwar Technology, 95, 179-200.
  • Yasin, A., Liu, L., Li, T., Fatima, R., & Jianmin, W. (2019). Improving software security awareness using a serious game. IET Software, 13(2), 159-169.
  • Hart, S., Margheri, A., Paci, F., & Sassone, V. (2020). Riskio: A serious game for cyber security awareness and education. Computers & Security, 95, 101827.
  • Hwang, G. J., Hung, C. M., & Chen, N. S. (2014). Improving learning achievements, motivations and problem-solving skills through a peer assessment-based game development approach. Educational technology research and development, 62(2), 129-145.
  • Bentley, T. M. (2015). The game studio: Developing Literacy through the lens of game design (Doctoral dissertation, Middle Tennessee State University).
  • Akcaoglu, M., & Bowman, N. D. (2016). Using instructor-led Facebook groups to enhance students’ perceptions of course content. Computers in Human Behavior, 65,582-590.
  • Van Steen, T., & Deeleman, J. R. (2021). Successful gamification of cybersecurity training. Cyberpsychology, Behavior, and Social Networking, 24(9), 593-598.
  • Malone, M., Wang, Y., James, K., Anderegg, M., Werner, J., & Monrose, F. (2021, March). To gamify or not? On leaderboard effects, student engagement and learning outcomes in a cybersecurity intervention. In Proceedings of the 52nd ACM Technical Symposium on Computer Science Education (pp. 1135-1141).
  • Sharif, K. H., & Ameen, S. Y. (2020, December). A review of security awareness approaches with special emphasis on gamification. In 2020 International Conference on Advanced Science and Engineering (ICOASE) (pp. 151-156). IEEE.
  • Adams, M., & Makramalla, M. (2015). Cybersecurity skills training: An attacker-centric gamified approach. Technology Innovation Management Review, 5(1).
  • Wolfenden, B. (2019). Gamification as a winning cyber security strategy. Computer Fraud & Security, 2019(5), 9- 12.
  • Y.-K. Chou, “Actionable gamification: Beyond points, badges, and leaderboards,” Octalysis Media, 1–151, 2016, doi: 10.1017/CBO9781107415324.004.
  • Y. Chou, Octalysis: Complete Gamification Framework – Yu-Kai Chou, 2013.
  • Y. Chou, Octalysis / Gamification Building, Developing Online Tool - by Yukai Chou, Dec. 2020.

Abstract Views: 88

PDF Views: 0




  • Gamification by Students : An Effective Approach to Cyber Security Concept Learning

Abstract Views: 88  |  PDF Views: 0

Authors

Sneha Thombre
MKSSS’S Cummins College of Engineering for women, Pune, Maharashtra, India
Makarand Velankar
MKSSS’S Cummins College of Engineering for women, Pune, Maharashtra, India

Abstract


The young (millennial) learners are not particularly motivated only by traditional classroom-based, one-way presentation/ lecture-based approaches as they are exposed to digital lives. Furthermore, in an outcome-based education system, all features of teaching focus on course outcomes. Therefore, the teachers face the challenge of student engagement. The work in this paper is regarding the active learning method for the final year students of the ‘Information and Cyber Security' course. In this activity, the students design (in a group of 2) and build the game using the software platform of their choice. The game is built around the CIA triad (privacy, integrity. and availability), network security concepts and protocols. After designing and building the prototype of the game, the students for assessment and feedback play the game with their class mates and the faculty members. Then classmates and teachers give scores for each core drive on the Octalysis tool. This helps student game designers to improve the weak core. Octalysis is a gamification framework designed as an octagon shaped with 8 core drivers representing each side. The entire exercise is stimulating and motivates the students as indicated in their feedback of the students (68% of students rated excellent). Gamification by students proved to enhance student learning by promoting critical thinking and problem-solving skills, as evident from the assessment. Finally, course coordinator evaluates the game using rubrics that were shared with students beforehand. The evaluation rubric focuses on the title of the game, content, creativity, rules, instructions of the game, and cooperative efforts. Game design and implementation by students activity proves that the greatest benefit is that the maximum learning happens in the design process (for game designers) compared to players. Further, the students also learn to work in groups and solve problems. Furthermore, the most significant of the entire activity is learning of cyber security concepts and protocols in a fun way.

Keywords


Active Learning, Game Design, Octalysis Framework, Assessment, Evaluation and Cyber Security.

References