A Gamified Tutorial for Learning About Security Requirements Engineering
暂无分享,去创建一个
[1] Peng Liang,et al. Experiences of using role playing andwiki in requirements engineering course projects , 2010, 2010 5th International Workshop on Requirements Engineering Education and Training.
[2] Galia Angelova,et al. Gamification in Education: A Systematic Mapping Study , 2015, J. Educ. Technol. Soc..
[3] E. Deci,et al. Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. , 2000, The American psychologist.
[4] Xavier Franch,et al. iStar 2.0 Language Guide , 2016, ArXiv.
[5] Yu-kai Chou,et al. Actionable Gamification: Beyond Points, Badges, and Leaderboards , 2015 .
[6] Premkumar T. Devanbu,et al. Software engineering for security: a roadmap , 2000, ICSE '00.
[7] Pierluigi Roberti,et al. STS-tool: Socio-technical Security Requirements through social commitments , 2012, 2012 20th IEEE International Requirements Engineering Conference (RE).
[8] I. Ajzen. The theory of planned behavior , 1991 .
[9] Klaus Pohl,et al. Requirements Engineering - Fundamentals, Principles, and Techniques , 2010 .
[10] Ljerka Beus-Dukic. Final year project: A test case for requirements engineering skills , 2011, 2011 6th International Workshop on Requirements Engineering Education and Training.
[11] Gary McGraw,et al. Software Security: Building Security In , 2006, 2006 17th International Symposium on Software Reliability Engineering.
[12] G. Boulton‐Lewis. Teaching for quality learning at university , 2008 .
[13] Mario Piattini,et al. Quality in conceptual modeling: five examples of the state of the art , 2005, Data Knowl. Eng..
[14] David A. Basin,et al. Automated analysis of security-design models , 2009, Inf. Softw. Technol..
[15] John W. Rice,et al. The Gamification of Learning and Instruction: Game-Based Methods and Strategies for Training and Education , 2012, Int. J. Gaming Comput. Mediat. Simulations.
[16] Monique Snoeck,et al. Assessing the effectiveness of feedback enabled simulation in teaching conceptual modeling , 2014, Comput. Educ..
[17] Michelle K. Smith,et al. Active learning increases student performance in science, engineering, and mathematics , 2014, Proceedings of the National Academy of Sciences.
[18] Siobhan O'Donovan,et al. A case study in the gamification of a university-level games development course , 2013, SAICSIT '13.
[19] Andrew J. Martin,et al. Long and short measures of flow: the construct validity of the FSS-2, DFS-2, and new brief counterparts. , 2008, Journal of sport & exercise psychology.
[20] E. Deci,et al. Self-determination theory and the facilitation of intrinsic motivation , 2000 .
[21] Rüdiger Weißbach,et al. ImProject: Improving RE Trainings by Combining them with Improvisation Theatre Sessions A Research Proposal , 2014, REET.
[22] Haralambos Mouratidis,et al. Guest editorial: security requirements engineering: past, present and future , 2009, Requirements Engineering.
[23] Paolo Giorgini,et al. Modelling and reasoning about security requirements in socio-technical systems , 2015, Data Knowl. Eng..
[24] Vero Vanden Abeele,et al. Gradequest - Evaluating the impact of using game design techniques in an undergraduate course , 2014, FDG.
[25] Yair Wand,et al. Theoretical foundations for conceptual modelling in information systems development , 1995, Decis. Support Syst..
[26] Daniela E. Damian,et al. Instructional design and assessment strategies for teaching global software development: a framework , 2006, ICSE.
[27] Tovi Grossman,et al. ToolClips: an investigation of contextual video assistance for functionality understanding , 2010, CHI.
[28] Michael J. Hannafin,et al. Empirically-based guidelines for the design of interactive multimedia , 1993 .
[29] Didar Zowghi,et al. Teaching requirements engineering through role playing: lessons learnt , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..
[30] Nancy R. Mead,et al. Security quality requirements engineering (SQUARE) methodology , 2005, SESS@ICSE.
[31] Luisa Mich. Teaching Requirements Analysis: A Student Project Framework to Bridge the Gap between Business Analysis and Software Engineering , 2014, REET.
[32] Ben Shneiderman,et al. Show Me! Guidelines for producing recorded demonstrations , 2005, 2005 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC'05).
[33] Paolo Giorgini,et al. Security Requirements Engineering: Designing Secure Socio-Technical Systems , 2016 .
[34] Sebastian Deterding,et al. Eudaimonic Design, or: Six Invitations to Rethink Gamification , 2014 .
[35] John M. Carroll,et al. Principles and Heuristics for Designing Minimalist Instruction , 1998 .