Hew, K., & Cheung, W. (2014). Students’ and instructors’
use of massive open online courses (MOOCs):
Motivations and challenges. Educational Research
Review, 12, 45-58. doi: 10.1016/j.edurev.2014.05.001
Irvine, C. E., & Thompson, M. F. (2010, October).
Simulation of PKI-enabled communication for identity
management using CyberCIEGE. In 2010-MILCOM
2010 Military Communications Conference (pp. 906-
911). IEEE.
Jonassen, D. (2013). Transforming Learning with
Technology. The Nature of Technology, 101-110. doi:
10.1007/978-94-6209-269-3_7
Jonassen, D., Davidson, M., Collins, M., Campbell, J., &
Haag, B. (1995). Constructivism and computer‐
mediated communication in distance education.
American Journal of Distance Education, 9(2), 7-26.
doi: 10.1080/08923649509526885
Jordan, C., Knapp, M., Mitchell, D., Claypool, M. and
Fisler, K., 2011. CounterMeasures: A game for
teaching computer security. 2011 10th Annual
Workshop on Network and Systems Support for Games,.
Kapp, K. M. (2012). The gamification of learning and
instruction: Game-based methods and strategies for
training and education. Hoboken: Wiley.
Kim, S., Song, K., Lockee, B., & Burton, J. (2018).
Gamification in Learning and Education. doi:
10.1007/978-3-319-47283-6
Korpela, K. (2015). Improving Cyber Security Awareness
and Training Programs with Data Analytics.
Information Security Journal: A Global Perspective,
24(1-3), 72-77. doi: 10.1080/19393555.2015.1051676
Koster, R. 1971-. A Theory of Fun for Game Design.
Scottsdale, AZ :Paraglyph Press, 2005.
Kyewski, E. and Krämer, N., 2018. To gamify or not to
gamify? An experimental field study of the influence of
badges on motivation, activity, and performance in an
online learning course. Computers & Education, 118,
pp.25-37.
Lin, H. (2007). Measuring Online Learning Systems
Success: Applying the Updated DeLone and McLean
Model. Cyberpsychology & Behavior, 10(6), 817-820.
doi: 10.1089/cpb.2007.9948
Lock, R., & Kingsley, K. (2007). Empower Diverse
Learners with Educational Technology and Digital
Media. Intervention In School and Clinic, 43(1), 52-56.
doi: 10.1177/10534512070430010701
Malone, T. (1982). Heuristics for designing enjoyable user
interfaces. Proceedings of The 1982 Conference On
Human Factors In Computing Systems - CHI '82. doi:
10.1145/800049.801756
Manisi, P., Jantjies, M., & Kimani, L.W. (2018). A
Conceptual Integrated Model for Measuring the
Success of eLearning in Developing Countries:
Literature Review. 2018 IST-Africa Week Conference
(IST-Africa), Page 1 of 9-Page 9 of 9.
Milligan, C., & Littlejohn, A. (2017). Why Study on a
MOOC? The Motives of Students and Professionals.
The International Review Of Research In Open And
Distributed Learning, 18(2). doi:
10.19173/irrodl.v18i2.3033
Mirkovic, J., & Benzel, T. (2012). Teaching cybersecurity
with DeterLab. IEEE Security & Privacy, 10(1), 73-76.
Murphy, J., Kalbaska, N., Horton-Tognazzini, L., &
Cantoni, L. (2015). Online learning and MOOCs: A
framework proposal. In Information and
Communication Technologies in Tourism 2015 (pp.
847-858). Springer, Cham.
Niemiec, C., & Ryan, R. (2009). Autonomy, competence,
and relatedness in the classroom. Theory and Research
In Education, 7(2), 133-144. doi: 10.1177/1477
878509104318
Nicholson, S. (2012). A User-Centered Theoretical
Framework for Meaningful Gamification.
Paja, E., Dalpiaz, F., & Giorgini, P. (2015). Modelling and
reasoning about security requirements in socio-
technical systems. Data & Knowledge Engineering, 98,
123-143.
Paulsen, C., McDuffie, E., Newhouse, W., & Toth, P.
(2012). NICE: Creating a cybersecurity workforce and
aware public. IEEE Security & Privacy, 10(3), 76-79.
Ramesh, A., Goldwasser, D., Huang, B., Daumé III, H., &
Getoor, L. (2013). Modeling learner engagement in
MOOCs using probabilistic soft logic. In NIPS
workshop on data driven education (Vol. 21, p. 62).
Reigeluth, C., Aslan, S., Chen, Z., Dutta, P., Huh, Y., &
Lee, D. et al. (2015). Personalized Integrated
Educational System. Journal Of Educational
Computing Research, 53(3), 459-496. doi:
10.1177/0735 633115603998
Salah, K. (2014, March). Harnessing the cloud for teaching
cybersecurity. In Proceedings of the 45th ACM
technical symposium on Computer science education
(pp. 529-534).
Scholefield, S., & Shepherd, L. (2019). Gamification
Techniques for Raising Cyber Security Awareness. HCI
For Cybersecurity, Privacy and Trust, 191-203. doi:
10.1007/978-3-030-22351-9_13
Silic, M., & Lowry, P. (2020). Using Design-Science Based
Gamification to Improve Organizational Security
Training and Compliance. Journal Of Management
Information Systems, 37(1), 129-161. doi:
10.1080/07421222.2019.1705512
Staubitz, T., Pfeiffer, T., Renz, J., Willems, C., & Meinel,
C. (2015, November). Collaborative learning in a
MOOC environment. In Proceedings of the 8th annual
international conference of education, research and
innovation (pp. 8237-8246).
Tate, M., Sedera, D., McLean, E., & Burton-Jones, A.
(2014). Information Systems Success Research: The
“20-Year Update?” Panel Report from PACIS, 2011.
Communications of the Association for Information
Systems, 34, pp-pp. https://doi.org/10.17705/1CAIS
.03466
Thornton, D., & Francia, G.A. (2014). Gamification of
Information Systems and Security Training: Issues and
Case Studies.
Vaibhav, A., & Gupta, P. (2014). Gamification of MOOCs
for increasing user engagement. In 2014 IEEE
International Conference on MOOC, Innovation and
Technology in Education (MITE) (pp. 290-295). IEEE.