Applying Basic Gamification Techniques to IT Compliance Training: Evidence from the Lab and Field

ABSTRACT: Companies depend on internal control to protect the integrity of information systems. IT security and data privacy training are critical controls for safeguarding company information. Employees often dislike the training, however, which can cause a lack of attention to, and poor understanding of, training concepts leading to less effective internal control. To improve the training experience, companies are implementing principles of games in employee training modules, a practice known as gamification. Utilizing a laboratory experiment on data privacy training and a field study involving IT security training for employees of a bank, we test whether a training environment with basic gamification elements results in greater trainee satisfaction and knowledge acquisition than traditional, non-gamified training. We find basic gamification results in higher satisfaction levels in the lab and field, but only marginally significant improvements in learning. Furthermore, these learning improvements are q...

[1]  S. Tomkins Illuminating and Stimulating. (Book Reviews: Affect, Imagery, Consciousness. vol. 1, The Positive Affects) , 1963 .

[2]  D. Berlyne Novelty, complexity, and hedonic value , 1970 .

[3]  John R. Anderson Cognitive Psychology and Its Implications , 1980 .

[4]  E. Tulving,et al.  Novelty assessment in the brain and long-term memory encoding , 1995, Psychonomic bulletin & review.

[5]  Guglielmo Trentin Metaphor: the educational mediator , 2000 .

[6]  T. Goetz,et al.  Academic Emotions in Students' Self-Regulated Learning and Achievement: A Program of Qualitative and Quantitative Research , 2002 .

[7]  Kurt Squire,et al.  Video games in education , 2003, Int. J. Intell. Games Simul..

[8]  Hans van der Heijden,et al.  User Acceptance of Hedonic Information Systems , 2004, MIS Q..

[9]  Maria Virvou,et al.  Combining Software Games with Education: Evaluation of its Educational Effectiveness , 2005, J. Educ. Technol. Soc..

[10]  Ed Halter From Sun Tzu to Xbox: War and Video Games , 2006 .

[11]  Cynthia E. Irvine,et al.  A video game for cyber security training and awareness , 2007, Comput. Secur..

[12]  Merrilea J. Mayo,et al.  Games for science and engineering education , 2007, CACM.

[13]  Byron Reeves,et al.  Total Engagement: Using Games and Virtual Worlds to Change the Way People Work and Businesses Compete , 2009 .

[14]  Marcia Weidenmier Watson,et al.  SOX 404 Reported Internal Control Weaknesses: A Test of COSO Framework Components and Information Technology , 2009, J. Inf. Syst..

[15]  P. Vorderer,et al.  Serious games : mechanisms and effects , 2009 .

[16]  Gary Bente,et al.  Why so serious? On the relation of serious games and learning , 2010, Eludamos: Journal for Computer Game Culture.

[17]  David J. Miller,et al.  Educational benefits of using game consoles in a primary classroom: A randomised controlled trial , 2011, Br. J. Educ. Technol..

[18]  John Ainley,et al.  A Cultural Perspective on the Structure of Student Interest in Science , 2011 .

[19]  Anne C. Frenzel,et al.  Measuring emotions in students learning and performance: The Achievement Emotions Questionnaire (AE , 2011 .

[20]  Mikko T. Siponen,et al.  Toward a New Meta-Theory for Designing Information Systems (IS) Security Training Approaches , 2011, J. Assoc. Inf. Syst..

[21]  John Ainley,et al.  Student engagement with science in early adolescence : the contribution of enjoyment to students' continuing interest in learning about science , 2011 .

[22]  Charalampos Manifavas,et al.  How Effective Is Your Security Awareness Program? An Evaluation Methodology , 2012, Inf. Secur. J. A Glob. Perspect..

[23]  Lisa Linnenbrink-Garcia,et al.  Academic Emotions and Student Engagement , 2012 .

[24]  S. Christenson,et al.  Handbook of Research on Student Engagement , 2012 .

[25]  T. L. Janssen,et al.  Exploring game design for cybersecurity training , 2012, 2012 IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (CYBER).

[26]  R. Henson,et al.  How schema and novelty augment memory formation , 2012, Trends in Neurosciences.

[27]  James M. Boyle,et al.  A systematic literature review of empirical evidence on computer games and serious games , 2012, Comput. Educ..

[28]  T. Guin,et al.  Myths and Realities of Respondent Engagement in Online Surveys , 2012 .

[29]  Luis de Marcos,et al.  Gamifying learning experiences: Practical implications and outcomes , 2013, Comput. Educ..

[30]  P. Wouters,et al.  A meta-analysis of the cognitive and motivational effects of serious games , 2013 .

[31]  Juho Hamari,et al.  Does Gamification Work? -- A Literature Review of Empirical Studies on Gamification , 2014, 2014 47th Hawaii International Conference on System Sciences.

[32]  Joaquim A. Jorge,et al.  Relating gaming habits with student performance in a gamified learning experience , 2014, CHI PLAY.

[33]  Tovi Grossman,et al.  CADament: a gamified multiplayer software tutorial system , 2014, CHI.

[34]  S. Hidi,et al.  Interest and Enjoyment , 2014, Encyclopedia of Creativity, Invention, Innovation and Entrepreneurship.

[35]  Elena Novak,et al.  Toward a mathematical model of motivation, volition, and performance , 2014, Comput. Educ..

[36]  Ethan Mollick,et al.  Mandatory Fun: Consent, Gamification and the Impact of Games at Work , 2014 .

[37]  Juho Hamari,et al.  Demographic differences in perceived benefits from gamification , 2014, Comput. Hum. Behav..

[38]  Scott Nicholson,et al.  A RECIPE for Meaningful Gamification , 2015 .

[39]  Christopher J. Devers,et al.  Critical Perspective on Gamification in Education , 2015 .

[40]  Thorsten Daubenfeld,et al.  A Game-Based Approach to an Entire Physical Chemistry Course , 2015 .