Valuing Security by Getting [d0x3d!]: Experiences with a Network Security Board Game
暂无分享,去创建一个
[1] Jackie Bradshaw,et al. An Investigation into Gender Bias in Educational Software Used in English Primary Schools , 1995 .
[2] Rachel T. A. Croson,et al. Gender Differences in Preferences , 2009 .
[3] Lorrie Faith Cranor,et al. Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.
[4] John L. Sherry,et al. Sex Differences in Video Game Play: , 2004, Commun. Res..
[5] Christoph Klimmt,et al. Gender and Computer Games: Exploring Females' Dislikes , 2006, J. Comput. Mediat. Commun..
[6] Deborah A. Frincke,et al. Integrating Security into the Curriculum , 1998, Computer.
[7] Michael Gegick,et al. Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer , 2009, ESSoS.
[8] Ken Allen,et al. CyberCIEGE: An Information Assurance Teaching Tool for Training and Awareness , 2005 .
[9] Jedidiah R. Crandall,et al. Students Who Don't Understand Information Flow Should Be Eaten: An Experience Paper , 2012, CSET.
[10] Adam Shostack adam. Control-alt-hack Tm : a Card Game for Computer Security Outreach, Education, and Fun , 2012 .
[11] Jochen Rick,et al. Collaborative games: Lessons learned from board games , 2006 .
[12] Ivona Bezáková,et al. Board game strategies in introductory computer science , 2013, SIGCSE '13.
[13] Victor R. Lee,et al. Collaborative Strategic Board Games as a Site for Distributed Computational Thinking , 2011, Int. J. Game Based Learn..
[14] N. Augustine. Rising Above The Gathering Storm: Energizing and Employing America for a Brighter Economic Future , 2006 .
[15] Maureen Ewing,et al. Advanced Placement® Exam Participation: Is AP® Exam Participation and Performance Related to Choice of College Major? Research Report No. 2011-6. , 2011 .
[16] Punya Mishra,et al. Alien Games , 2008 .
[17] Michael S. Horn,et al. Spinners , Dice , and Pawns : Using Board Games to Prepare for Agent-Based Modeling Activities , 2012 .
[18] Chris Stephenson,et al. Running on Empty: the Failure to Teach K--12 Computer Science in the Digital Age , 2010 .
[19] Gregory Conti,et al. MAADNET: Toward a Web-Distributed Tool for Teaching Networks and Information Assurance , 2003 .
[20] Christian Rauh,et al. The Influence of the Avatar on Online Perceptions of Anthropomorphism, Androgyny, Credibility, Homophily, and Attraction , 2005, J. Comput. Mediat. Commun..
[21] Yasmin Kafai. Video game designs by girls and boys: variability and consistency of gender differences , 1998 .
[22] Matt Bishop. Computer security education: training, scholarship, and research , 2002 .