1 |
Ministry of Science and ICT, "Results of the survey on the status of information security in 2017", http://www.msit.go.kr/web/msipContents/contentsView.do?cateId=mssw311&artId=1372723, 2018.05.20
|
2 |
Amitava Dutta and Kevin Mccrohan "Management's role in information security in a cyber economy," California Management Review, vol. 45, no. 1, pp. 67-87, Oct. 2002.
DOI
|
3 |
Boannews, "Is not it a good time to s pend your company's security training time?", http://www.boannews.com/media/view.asp?idx=50323, 2018.05.22
|
4 |
Karina Korpela, "Improving cyber security awareness and training programs with data analytics," Information Security Journal: A Global Perspective, vol. 24, no. 1-3, pp. 72-77, Jun. 2015.
DOI
|
5 |
Clark C. Abt, Serious Games, Viking Press, NewYork, pp. 5-6, 1970.
|
6 |
Jesse Schell, The art of game design, ELSEVIER, Oxford, pp. 96, 2008.
|
7 |
S.J. Brown, D.A. Lieberman, B.A. Gemeny, Y.C. Fan, D.M. Wilson and D.J. Pasta "Educational video games for juvenile diabetes: result of a controlled trial," Medical informatics, vol. 22, no. 1, pp. 77-89, Jan. 1997.
DOI
|
8 |
B.D. Coller and D.J. Shernoff, "Video game-based education in mechanical engineering: a look at student engagement," International Journal of Engineering Education, vol. 25, no. 2, pp. 308-317, Jan. 2009.
|
9 |
Jeffrey M. Stanton, Kathryn R. Stam, Paul Mastrangelo and Jefferey Jolton, "An analysis of end user security behaviors," Computers and Security, vol. 24, no. 2, pp. 124-133. Mar. 2005.
DOI
|
10 |
Bilal Khan, Khaled S. Alghathbar, Syed Irfan Nabi and Muhammad Khurram Khan, "Effectiveness of information security awareness method based on psychological theories," African Journal of Business Management, vol. 5, no. 26, pp. 10862-10868, Oct. 2011.
|
11 |
Carrie Mccoy and Rebecca T.F., "You are the key to security: establishing a successful security awareness program," SIGUCCS '04 Proceedings of the 32nd annual ACM SIGUCCS conference on User service, pp. 346-349, Oct. 2004.
|
12 |
Mete Eminagaoglu, Erdem Ucar and Saban Eren, "The positive outcomes of information security awareness training in company - a case study," Information Security Technical Report, vol. 14, no. 4, pp. 223-229, Nov. 2010.
DOI
|
13 |
Basie Von Solms, "Information security - a multidimensional discipline," computers & security, vol. 20, no. 6, pp. 504-508, Sep. 2001.
DOI
|
14 |
Kil-sang Yoo, In-woo Kim, Je-hyuk Youn, Dong-jae Lee and Won-hyung Lee "A design of functional game contents and analysis of power spectrum," Journal of The Korean Society for Computer Game, 4(6), pp. 25-31, Jun. 2005.
|
15 |
P.S. Dowland, S.M. Furnell, H.M. Illingworth and P.L. Leynolds, "Computer crime and abuse: a survey of public attitudes and awareness," Computers and Security, vol. 18, no. 8, pp. 715-726, 1999.
DOI
|
16 |
Chang-gyu Oh and Jong-gi Kim, "Development of a framework for effective information protection education and training," Korea Institute Of Information Security And Cryptology, 13(2), pp. 59-69, April. 2003.
|
17 |
Karl M. Kapp, The gamification of learning and instruction: game-based methods and education, Wiley, Newjersey, pp. 49, 2012.
|
18 |
D.S. Vogel, J. Cannon Bouwes, C.A. Bowers, K. Muse and M. Wright, "Computer gaming and interative simulations for learning: a meta-analysis," Journal of Educational Computing Research, vol. 34, no. 4, pp. 229-243, April. 2006.
DOI
|
19 |
Konstantin Mitgutsch and Narda Alvarado, "Purposeful by design?:a serious game design assessment framework," FDG '12 Proceedings of the International Conference on the Foundations of Digital Games, pp. 121-128, Jun. 2012.
|
20 |
Randel J.M., Morris B.A., Wetzel C.D. and Whitehill B.V., "The effectiveness of games for educational purposes: a review of recent research," Simulation & Gaming, vol. 23, no. 3, pp. 261-276, Sep. 1992.
DOI
|
21 |
Sitzmann. T, "A meta-analytic examination of the instructional effectiveness of computerbased simulation games," Personnel Psychology, vol. 64, no. 2, pp. 489-528, May. 2011.
DOI
|
22 |
Min-jung Baek and Seyung-hee Son, "A study on the effect of Information security awareness and behavior on the information security performance in small and medium sized organization," Asia Pacific Journal of Small Business, 33(2), pp. 113-132, Jun. 2011.
|
23 |
Dong-hyeok Lee and Nam-je Park, "Teaching book and tools of elementary network security learning using gamification mechanism," Journal of the Korea Institute of Information Security & Cryptology, 26(3), pp 787-797, Jun. 2016.
DOI
|
24 |
Gamified UK, "Gamification Examples and Case Studies", https://www.gamified.uk/2013/07/29/gamification-in-the-wild-examples-and-case-studies/, 2018.04.05.
|
25 |
Chae-ho Lim, "Effective information protection awareness improvement plan," Journal of Information Security, 16(2), pp 30-36, April. 2006.
|
26 |
Anne Adams and Martina Angela Sasse, "Users are not the enemy," COMMUNICATIONS OF THE ACM, vol. 42, no. 12, pp. 40-46, Dec. 1999.
|