behaviour? International Conference on Cyber Secu-
rity for Sustainable Society, pages 118–131.
Bahrick, H. P. and Hall, L. K. (2005). The importance of
retrieval failures to long-term retention: A metacog-
nitive explanation of the spacing effect. Journal of
Memory and Language, 52(4):566–577.
Baxter, R. J., Holderness, D. K., and Wood, D. A. (2015).
Applying Basic Gamification Techniques to IT Com-
pliance Training: Evidence from the Lab and Field.
Journal of Information Systems. American Account-
ing Association.
Beris, O., Beautement, A., and Sasse, M. A. (2015). Em-
ployee rule breakers, excuse makers and security
champions:: Mapping the risk perceptions and emo-
tions that drive security behaviors. In Proc. of the
2015 New Security Paradigms Workshop, pages 73–
84. ACM.
Burke, B. (2014). Gamify: How Gamification Motivates
People to Do Extraordinary Things. Bibliomotion.
Cone, B. D., Irvine, C. E., Thompson, M. F., and Nguyen,
T. D. (2007). A Video Game for Cyber Security Train-
ing and Awareness. Computers & Security, 26(1):63–
72. Elsevier Ltd.
Deci, E. L. (1971). Effects of Externally Mediated Rewards
on Intrinsic Motivation. Journal of personality and
Social Psychology, 18(1):105–115. American Psy-
chological Association.
Deterding, S., Dixon, D., Khaled, R., and Nacke, L. (2011).
From game design elements to gamefulness: defining
gamification. Proc. of the 15th international academic
MindTrek conference: Envisioning future media envi-
ronments, pages 9–15.
Hamari, J., Koivisto, J., and Sarsa, H. (2014). Does Gamifi-
cation Work?–A Literature Review of Empirical Stud-
ies on Gamification. Proc. of the 47th Hawaii Inter-
national Conference on System Sciences. IEEE.
Huotari, K. and Hamari, J. (2011). Gamification from the
perspective of service marketing. In Proc. CHI 2011
Workshop Gamification.
Lebek, B., Uffen, J., Breitner, M. H., Neumann, M., and
Hohler, B. (2013). Employees’ information security
awareness and behavior: A literature review. Proc. of
the Annual Hawaii International Conference on Sys-
tem Sciences, pages 2978–2987.
Maslow, A. H. (1943). A Theory of Human Motivation.
Psychological Review, 50:370–396. American Psy-
chological Association.
Mollick, E. R. and Rothbard, N. (2013). Mandatory Fun:
Gamification and the Impact of Games at Work. SSRN
Electronic Journal, pages 1–68.
NIST (2003). Special Publication 800-50: Building an In-
formation Technology Security Awareness and Train-
ing Program. National Institute of Standards and
Technology (NIST).
Oracle (2016). Customer engagement platform.
https://opower.com. Opower Inc. Accessed on
15 Dec 2016.
PCISSC (2014). Best Practices for Implementing a
Security Awareness Program. Payment Card In-
dustry (PCI) Security Standards Council. Available
at https://www.pcisecuritystandards.org/document li-
brary.
Peffers, K., Tuunanen, T., Gengler, C. E., Rossi, M., Hui,
W., Virtanen, V., and Bragge, J. (2006). The De-
sign Science Research Process: A Model for Pro-
ducing and Presenting Information Systems Research.
Proc. of the first international conference on design
science research in information systems and technol-
ogy (DESRIST 2006), pages 83–106.
Puhakainen, P. P. and Siponen, M. (2010). Improving Em-
ployee’ Compliance Through Information Systems
Security Training: An Action Research Study. MIS
Quarterly, 34:757–778.
Ramirez, D. and Squire, K. (2015). Gamification and learn-
ing. The gameful world: approaches, issues, applica-
tions, pages 629–652.
Rigby, C. S. (2015). Gamification and motivation. The
gameful world: Approaches, issues, applications,
pages 113–137.
Rocha Flores, W. and Ekstedt, M. (2016). Shaping in-
tention to resist social engineering through transfor-
mational leadership, information security culture and
awareness. Computers and Security, 59:26–44.
Ruighaver, A. B., Maynard, S. B., and Chang, S. (2007). Or-
ganisational security culture: Extending the end-user
perspective. Computers & Security, 26(1):56–62.
Ryan, R. M. and Deci, E. L. (2000). Self-Determination
Theory and the Facilitation of Intrinsic Motivation,
Social Development, and Well-Being. American Psy-
chologist, 55(1):68–78. American Psychological As-
sociation, Inc.
Shaw, R. S., Chen, C. C., Harris, A. L., and Huang, H.-J.
(2009). The impact of information richness on in-
formation security awareness training effectiveness.
Computers & Education, 52:92–100. Elsevier Ltd.
Sicart, M. (2015). Playing the good life: Gamification and
ethics. The gameful world: Approaches, issues, appli-
cations, pages 225–244.
Siponen, M., Adam Mahmood, M., and Pahnila, S. (2014).
Employees’ adherence to information security poli-
cies: An exploratory field study. Information and
Management, 51(2):217–224.
Thornton, D. and Francia, G. (2014). Gamification of In-
formation Systems and Security Training: Issues and
Case Studies. Information Security Education Jour-
nal, 1:16–29. DLINE.
Tsohou, A., Karyda, M., and Kokolakis, S. (2015). Ana-
lyzing the Role of Cognitive and Cultural Biases in
the Internalization of Information Security Policies:
Recommendations for Information Security Aware-
ness Programs. Computers & Security, 52:128–141.
Elsevier Ltd.
Verizon (2016). 2016 Data Breach Investigations Report.
Technical Report 1.
Zichermann, G. (2011). The Six Rules of Gamifica-
tion. http://www.gamification.co/2011/11/29/the-six-
rules-of-gamification. Gamification Co. Accessed on
28 May 2016.
ICISSP 2017 - 3rd International Conference on Information Systems Security and Privacy
70