Safety and security education are important part of technology related education, because of recent number of increase in safety and security related incidents. Game based learning is an emerging and rapidly advancing forms of computer-assisted instruction. Game based learning for safety and security education enables students to learn concepts and skills without the risk of physical injury and security breach. In this paper, a pedestal grinder safety game and physical security game have been developed using industrial standard modeling and game development software. The average score of the knowledge test of grinder safety game was 82%, which is higher than traditional lecture only instruction method. In addition, the survey of physical security game shows 84% average satisfaction ratio from high school students who played the game during the summer camp. The results of these studies indicated that game based learning method can enhance students’ learning without potential harm to the students.
The burgeoning mobile enterprise brings opportunities as well as risks. Organizations are expanding beyond email to mobilizing a wide range of enterprise apps for tasks like workflow, business intelligence, sales, and customer support. They aim to support a mix of corporate and employee-owned devices through BYOD programs. This allows greater flexibility and choice for employees while improving productivity and business value through faster access to information and more agile, collaborative workflows. However, the use of consumer devices and expanding mobile apps also introduces new security challenges that must be addressed.
This document contains a chapter on governance and strategic planning for security. It includes multiple choice questions about topics like mission statements, strategic planning approaches, security life cycle models, roles and responsibilities in information security governance, and risk management standards. Key topics covered include the difference between top-down vs bottom-up strategic planning, the roles of the CISO and security manager, and frameworks for information security governance like ISO 27014.
So much effort has been put into educating people about hackers, viruses, ransomware and other cybersecurity threats and a key component of the problem has been largely overlooked - we're all human and we all make mistakes! I'm a firm believer that education is the route forward. For a few pounds a month you can with Doherty Associates continually educate your most important business assets - your staff - in a fun and rewarding manner. Google "employee cyber security negligence" and various reports will confirm the number one cause of data breaches is human error. Usually, these data breaches are accidental and are the result of an employee losing a mobile device or document containing passwords or sensitive information! I'd be happy to assist if you think your staff need some help.
Towards a Structured Information Security Awareness Programmetulipbiru64
Paper presented by Mohd Nabil Zulhemay, Rohama Mohamad Rashid and Omar Zakaria at the 4th PERPUN International Conference 2015: Information Revolution, 11-12th August 2015 at Avillion Legacy Hotel, Melaka.
The document discusses five issues for the current administration: cyber-terrorism, insider threats, risk mitigation, information security/corporate governance, and cloud computing. It provides details on each topic, including definitions, examples, studies that have been done, and considerations for each issue. The document contains information on how cyber-terrorism could impact national security infrastructure through massive blackouts or destruction of financial and transportation systems. It also discusses how insider threats are a major risk for businesses, with most events being triggered by workplace issues and motivated by financial gain. Risk mitigation aims to reduce risks through fixing flaws or compensatory controls. Information security and corporate governance deal with governance of information and ensuring security policies and roles are defined. Cloud computing
This document summarizes a webinar on meeting the cyber risk challenge. The webinar discussed how cyber attacks are increasing in frequency and impact. While organizations are becoming more concerned about cyber security, many are still not strategically focused on the issue. The webinar advocates for an enterprise risk management approach involving all departments and stakeholders. It also discusses the role of cyber risk insurance to cover gaps in traditional insurance policies.
The document summarizes the top 5 security issues for 2012 according to Joe Schorr, a principal security architect. The top 5 issues are: 1) mobile security due to increased use of mobile devices, 2) cloud security given challenges of managing security in the cloud, 3) malware and viruses as ongoing threats, 4) data leakage of intellectual property and personal information, and 5) targeted attacks like spear phishing that aim to steal information from specific individuals. The document provides tips and recommendations for addressing each of these security issues.
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...Jason Hong
Jason Hong presented on using microgames to educate users about cybersecurity. He discussed how mental models impact user interactions and the importance of designing systems that match user expectations. Hong described his research on the game "Anti-Phishing Phil" which significantly improved users' ability to identify phishing URLs and reduced false positives. He concluded microgames are an effective way to train users on cybersecurity if they incorporate learning science principles and provide opportunities to practice skills.
The burgeoning mobile enterprise brings opportunities as well as risks. Organizations are expanding beyond email to mobilizing a wide range of enterprise apps for tasks like workflow, business intelligence, sales, and customer support. They aim to support a mix of corporate and employee-owned devices through BYOD programs. This allows greater flexibility and choice for employees while improving productivity and business value through faster access to information and more agile, collaborative workflows. However, the use of consumer devices and expanding mobile apps also introduces new security challenges that must be addressed.
This document contains a chapter on governance and strategic planning for security. It includes multiple choice questions about topics like mission statements, strategic planning approaches, security life cycle models, roles and responsibilities in information security governance, and risk management standards. Key topics covered include the difference between top-down vs bottom-up strategic planning, the roles of the CISO and security manager, and frameworks for information security governance like ISO 27014.
So much effort has been put into educating people about hackers, viruses, ransomware and other cybersecurity threats and a key component of the problem has been largely overlooked - we're all human and we all make mistakes! I'm a firm believer that education is the route forward. For a few pounds a month you can with Doherty Associates continually educate your most important business assets - your staff - in a fun and rewarding manner. Google "employee cyber security negligence" and various reports will confirm the number one cause of data breaches is human error. Usually, these data breaches are accidental and are the result of an employee losing a mobile device or document containing passwords or sensitive information! I'd be happy to assist if you think your staff need some help.
Towards a Structured Information Security Awareness Programmetulipbiru64
Paper presented by Mohd Nabil Zulhemay, Rohama Mohamad Rashid and Omar Zakaria at the 4th PERPUN International Conference 2015: Information Revolution, 11-12th August 2015 at Avillion Legacy Hotel, Melaka.
The document discusses five issues for the current administration: cyber-terrorism, insider threats, risk mitigation, information security/corporate governance, and cloud computing. It provides details on each topic, including definitions, examples, studies that have been done, and considerations for each issue. The document contains information on how cyber-terrorism could impact national security infrastructure through massive blackouts or destruction of financial and transportation systems. It also discusses how insider threats are a major risk for businesses, with most events being triggered by workplace issues and motivated by financial gain. Risk mitigation aims to reduce risks through fixing flaws or compensatory controls. Information security and corporate governance deal with governance of information and ensuring security policies and roles are defined. Cloud computing
This document summarizes a webinar on meeting the cyber risk challenge. The webinar discussed how cyber attacks are increasing in frequency and impact. While organizations are becoming more concerned about cyber security, many are still not strategically focused on the issue. The webinar advocates for an enterprise risk management approach involving all departments and stakeholders. It also discusses the role of cyber risk insurance to cover gaps in traditional insurance policies.
The document summarizes the top 5 security issues for 2012 according to Joe Schorr, a principal security architect. The top 5 issues are: 1) mobile security due to increased use of mobile devices, 2) cloud security given challenges of managing security in the cloud, 3) malware and viruses as ongoing threats, 4) data leakage of intellectual property and personal information, and 5) targeted attacks like spear phishing that aim to steal information from specific individuals. The document provides tips and recommendations for addressing each of these security issues.
Leveraging Human Factors for Effective Security Training, for ISSA Webinar Ma...Jason Hong
Jason Hong presented on using microgames to educate users about cybersecurity. He discussed how mental models impact user interactions and the importance of designing systems that match user expectations. Hong described his research on the game "Anti-Phishing Phil" which significantly improved users' ability to identify phishing URLs and reduced false positives. He concluded microgames are an effective way to train users on cybersecurity if they incorporate learning science principles and provide opportunities to practice skills.
Secure Arcade: A Gamified Defense Against Cyber AttacksIJCSITJournal2
n modernity, we continually receive increasingly intricate technologies that allow us to increase our lives’
convenience and efficiency. Our technology, particularly technology available over the internet, is
advancing at unprecedented speed. However, this speed of advancement allows those behind malicious
attacks to have an increasingly easier time taking advantage of those who know little about computer
security. Unfortunately, education in the computer security field is generally limited only to tertiary
education. This research addresses this problem through a gamified web-based application that drives
users to reach learning goals to help them become more vigilant internet users: 1. Learn and memorize
general computer security terminology, 2. Become familiar with basic cryptography concepts, 3. Learn to
recognize potential phishing scams via email quickly, and 4. Learn common attacks on servers and how to
deal with them.
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...IRJET Journal
This document discusses the importance of cybersecurity awareness training for organizations and proposes an effective training model. It analyzes how artificial intelligence (AI) can enhance security awareness programs. Specifically, it examines the Technology Acceptance Model (TAM) and how AI-enabled tools like the viCyber system can help design training based on the National Initiative for Cybersecurity Education (NICE) framework. The study concludes that regular, comprehensive security awareness training is critical to address the human factors that can weaken an organization's cyber defenses. AI tools show promise in developing trainings but require further evaluation of their usability and reliability.
Game based learning is a new game play mechanism that the players explore various aspects of game play in a learning context designed by the instructor or the game designer. Nevertheless, general acceptance of game based learning as a new learning paradigm was deferred by a lack of wellcontrolled, large sample efficacy studies. To address the increasing need of cybersecurity workforce, this paper introduces a game based learning method for high school cybersecurity education. Purdue University Northwest launched GenCyber high school summer camps to about 200 high school students in Chicago metropolitan area. The survey conducted after the summer camp indicated that the game based learning for cybersecurity education was very effective in cybersecurity awareness training. Further analysis of survey data revealed that there is a gender difference in raising students’ interests in cybersecurity and computer science education using game based learning method.
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSijfcstjournal
Recent advances in computing have caused cyber security to become an increasingly critical issue that
affects our everyday life. Both young and old in society are exposed to benefits and dangers that
accompany technological advance. Cyber security education is a vital part of reducing the risks associated
with cyber-threats. This is particularly important for current and future youth, who are the most
technology-literate generations. Many research studies and competitions have been undertaken around the
world to emphasize and identify the significance of cyber security as a relevant and pressing research area.
Cyber security competitions are great means of raising interest in the young generation and attracting them
to educational programmes in this area. These competitions show the need for cyber security to be taught
as a formal subject in secondary schools to enhance the effectiveness of computer science concepts in cyber
space. This paper presents an effective educational approach, justifying such competitions as a means of
introducing cyber security as a computer science subject for New Zealand secondary school students, and
also presents methods of implementation.
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSijfcstjournal
Recent advances in computing have caused cyber security to become an increasingly critical issue that
affects our everyday life. Both young and old in society are exposed to benefits and dangers that
accompany technological advance. Cyber security education is a vital part of reducing the risks associated
with cyber-threats. This is particularly important for current and future youth, who are the most
technology-literate generations. Many research studies and competitions have been undertaken around the
world to emphasize and identify the significance of cyber security as a relevant and pressing research area.
Cyber security competitions are great means of raising interest in the young generation and attracting them
to educational programmes in this area. These competitions show the need for cyber security to be taught
as a formal subject in secondary schools to enhance the effectiveness of computer science concepts in cyber
space. This paper presents an effective educational approach, justifying such competitions as a means of
introducing cyber security as a computer science subject for New Zealand secondary school students, and
also presents methods of implementation.
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
Increasingly, all kinds of organizations and institutions are adopting the E-business model to conduct their
activities and provide E-Services for their customers. In the process, whether they know it or not, those
organizations are also opening themselves up to the risk of information security breaches. Therefore
protecting an organization’s ICT infrastructure, IT systems, and Data is a vital issue that is often
underestimated. Research has shown that one of the most significant threats to information security comes
not from external attack but rather from the system's users, because they are familiar with the
infrastructure and have access to its resources, but may be unaware of the risks. Moreover, using only
technological solutions to protect an organization’s assets is not enough; there is a need to consider the
human factor by raising users’ security awareness. Our contribution to this problem is to propose an
Information Security Awareness Program that aims at raising and maintaining the level of users’ security
awareness. This paper puts forward a general model for an information security awareness program and
describes how it could be incorporated into an organization’s website through the process of development
life cycle.
This document provides information about Module 002 of the course IT 411 - Information Assurance and Security 2. The module aims to examine fundamental computer security techniques and identify potential security issues. It covers topics like cryptography, application security, incident response, risk assessment, and compliance with regulations. The module outlines learning objectives, outcomes, resources, tasks, content items, and assessments. It also includes detailed lessons on topics like the financial impacts of cybercrime, developing a security strategy using the 10 steps approach, techniques for protecting against attacks like examining the perimeter and network segregation, and methods for detecting attacks through logging.
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
The document discusses the need for cybersecurity awareness programs in K-12 schools. It emphasizes that such programs should empower students with age-appropriate cyber knowledge, engage parents in cybersecurity discussions, and promote a culture of continuous learning. The document provides strategies for delivering cybersecurity education to students, examples of interactive activities, and tips for collaborating with parents and measuring program effectiveness. The overall goal is to safeguard the school community from online threats through a united effort between educators, parents and students.
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYIJNSA Journal
As universities migrate online due to the advent of Covid-19, there is a need for enhanced security in information systems in the institution of higher learning. Many opted to invest in technological approaches to mitigate cybersecurity threats; however, the most common types of cybersecurity breaches happen due to the human factor, well known as end-user error or actions. Thus, this study aimed to identify and explore possible end-user errors in academia and the resulting vulnerabilities and threats that could affect the integrity of the university's information system. The study further presented state-of-the-art humanoriented security threats countermeasures to compliment universities' cybersecurity plans. Countermeasures include well-tailored ICT policies, incident response procedures, and education to protect themselves from security events (disruption, distortion, and exploitation). Adopted is a mixedmethod research approach with a qualitative research design to guide the study. An open-ended questionnaire and semi-structured interviews were used as data collection tools. Findings showed that system end-user errors remain the biggest security threat to information systems security in institutions of higher learning. Indeed errors make information systems vulnerable to certain cybersecurity attacks and, when exploited, put legitimate users, institutional network, and its computers at risk of contracting viruses, worms, Trojan, and expose it to spam, phishing, e-mail fraud, and other modern security attacks such as DDoS, session hijacking, replay attack and many more. Understanding that technology has failed to fully protect systems, specific recommendations are provided for the institution of higher education to consider improving employee actions and minimizing security incidents in their eLearning platforms, post Covid-19.
Cyber security: challenges for society- literature reviewIOSR Journals
This document summarizes challenges related to cyber security for society based on a literature review. It discusses how cyber security plays an important role in technology development and internet services. Key challenges include a lack of coordination between security agencies and critical IT infrastructure, as well as widespread computer illiteracy in some countries like India that has led to increased cybercrime. The document also reviews common approaches to IT security risk analysis and discusses threats to cyber security such as cyber attacks aimed at damaging systems and cyber exploitation for unlawful purposes.
A Bring Your Own Device Risk Assessment ModelCSCJournals
Bring Your Own Device (BYOD), a technology where individuals or employees use their own devices on the organization’s network to perform tasks assigned to them by the organization has been widely embraced. The reasons for adoption are diverse in every organization. In spite of the security control strategies implemented by these organizations to safeguard their information resources, there has been an upsurge in information security breaches as a result of existing vulnerabilities in these systems and the legacy systems in use. Various approaches have been employed to deal with security challenges in BYOD, but according to literature, risk assessment has proved to be the first key step towards improving security of the BYOD environment in an enterprise. Risk assessment models have been proposed by various researchers, although, most are largely influenced by the degree of technological advancement and utilization as well as the working cultures within institutions. The existing models were largely developed in technologically advanced countries and thus do not fit well in developing countries. This study sought to develop flexible BYOD risk assessment model that can be adopted by varied institutions to secure their information resources. The study was carried out in Five (5) purposively selected state universities in Kenya. The research adopted a mixed research design approach with mixed sampling technique utilized to select the participants. Reliability and validity of data collection tools were evaluated and recommended by IT security and network experts. The qualitative and quantitative data was collected by interviewing experts and administering a questionnaire to sampled participants. The developed model was validated both statistically and by experts. The findings revealed that threats and vulnerabilities contributed to 39.9% and 69.2% respectively to the risk of the BYOD environment while Data Encryption (DE) and Software Updates (SU) came out strongly as intervening variables which have a major impact on the relationship between the dependent and independent variables.
Cyber attack awareness and prevention in network securityIJICTJOURNAL
This article aims to provide an overview of cyber attack awareness and prevention in network security. This article discussed the different types of cyber attacks, current trends of cyber attacks, how to prevent cyber attacks and uum students' awareness of cyber attacks. First, we will go over the different types of cyber attack, current trend, impact of cyber attack and the prevention. The approach entailed comparing and observing the outcomes of 13 different papers. The survey's findings would demonstrate the results obtained after analyzing the data collection which are the questionnaire filled out by respondents after watching the cyber attack awareness video to improve awareness of students through the cyber attack. Depending on the outcome of this survey, we will have a better understanding of current students' knowledge and awareness of cyber attacks, allowing us to improve students' understanding of cyber threats and the necessity of cyber security.
An increasing number of cyber attacks o public and private sector organizations has created an economic "ripple effect" across the globe. To solve this urgent issue, organizations need to recruit, build and train a cyber security workforce of IT professionals that can keep up with sophisticated security threats.
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...CSCJournals
This document summarizes a research paper that conducted a critical review of contemporary social engineering solutions, measures, policies, tools, and applications. Through a systematic review of recent studies, the analysis identified that providing training for employees to understand social engineering risks and how to avoid attacks is important for protection. Key measures identified include awareness programs, training non-technical staff, implementing new security networks and protocols, and using software to address social engineering threats. The review examined 30 studies on measures, policies and tools adopted by organizations and found that education, training, and awareness programs are effective at enhancing employee behavior and defenses against social engineering.
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...IJNSA Journal
This document provides a summary of a literature review on social engineering defense mechanisms and information security policies. It discusses previous research on social engineering attacks and defenses. It also describes a taxonomy of social engineering targets and defenses developed by the authors. Surveys were conducted to measure employee awareness of defenses and the incorporation of information security policies in organizations. The results found over half of employees were unaware of social engineering and organizations only incorporated about 50% of recommended security policies on average. This highlights the need for better education and policies to protect against social engineering attacks.
The document discusses information security and analyzes its importance. It describes key aspects of information security like confidentiality, integrity and availability. It also outlines some common threats to information security such as computer viruses, theft, sabotage and vandalism. The document then analyzes some challenges to effective information security, including employees being fooled by scams, issues with authentication, and the growing threat of phishing. It emphasizes the importance of addressing security concerns to build trust with customers and gain a competitive advantage.
A Systematic Literature Review On The Cyber SecurityAmy Cernava
This document summarizes a literature review on cyber security. It begins by introducing the topic and defining cyber security as the methods used to protect networks, computers, programs and data from unauthorized access and attacks. It then discusses the growth of internet usage and connected devices, and how this has led to increased cyber threats. The review covers various topics related to cyber security including its history and importance, different types of threats, frameworks and tools used, and ongoing challenges. The goal is to provide a comprehensive overview of current research on cyber security issues and solutions.
The Evolving Landscape on Information SecuritySimoun Ung
This document provides an overview of the evolving landscape of information security. It discusses the motivation behind cyber attacks, including personal reasons, unlawful profiteering, and corporate or national interests. It then examines common security threats such as social engineering, phishing, distributed denial of service attacks, network attacks, and malwares. The document notes that security standards and best practices need constant refinement as threats continue to evolve in sophistication.
The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Cyber security is a potential activity by which information and other communication systems are protected from and or defended against the unauthorized use or modification or exploitation or even theft. Likewise, cyber security is a well designed technique to protect computers, networks, different programs, personal data, etc., from unauthorized access. All sorts of data whether it is government, corporate, or personal need high security however, some of the data, which belongs to the government defense system, banks, defense research and development organization, etc. are highly confidential and even small amount of negligence to these data may cause great damage to the whole nation. Therefore, such data need security at a very high level. Gajendra Kumar Malviya "Cyber Crime and Cyber Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49888.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/49888/cyber-crime-and-cyber-security/gajendra-kumar-malviya
Contents lists available at ScienceDirectJournal of AccounAlleneMcclendon878
This summary provides the key points from the document in 3 sentences:
The document discusses cybersecurity insurance and developing a model to determine the optimal set of insurance policies for a firm to purchase. The model considers minimizing the total cost of insurance premiums and expected losses not covered by the policies. Purchasing multiple policies that result in at least three areas of potential losses not covered can help address issues like high deductibles and low coverage ceilings in cybersecurity insurance.
The role of entrepreneurship in addressing the issue of educated unemployment is well acknowledged, while its specific implications for health professions students remain inadequately explored. This study's main objective is to investigate entrepreneurship education's effect on entrepreneurial intention by considering entrepreneurial self-efficacy as a mediator in students majoring in medical laboratory technology. This quantitative research uses an exploratory approach involving 300 respondents determined through simple random sampling techniques and analyzed using partial least square structural equation model (PLS-SEM). The analysis revealed that entrepreneurship education directly impacts self-efficacy and entrepreneurial intention. Furthermore, entrepreneurial self-efficacy was identified to exert a positive mediating effect between these variables. However, the effect size between the relationships of the research variables is low. Nevertheless, higher education offering health majors can optimize entrepreneurship education by implementing practical learning and field experience to increase confidence and intention in entrepreneurial activities.
Recent studies claimed that the absence of a paradigm is a challenge to developing education for sustainable development and soft skills competencies. This integrative study examines stimulating these transferable and transversal competencies through constructivist approaches to teaching from the cognitive, social, radical, and critical perspectives. The study argues that the use of constructivist approaches to teaching can contribute to the achievement of education for sustainable development and soft skills competencies through the delegation of power from teachers/lecturers to students. This, in active and interactive classrooms, empowers students and builds their confidence to develop on the personal, academic, and professional levels. The use of the cognitive constructivist approach assists in developing competencies based on a clear understanding of the cognitive structures of students in a vibrant classroom environment. The use of the social constructivist approach assists in constructing individualized learning environment based on predetermined zones of proximal development in sociocultural contexts. The radical and critical constructivist approaches to teaching, through the rejection of conventional epistemologies, allow students the freedom to creatively address issues related to environmental, economic, and social sustainability. This becomes effective through the fostering of self and social awareness, challenging existing ideas, and provoking innovative thoughts that are necessary to shape a sustainable future.
More Related Content
Similar to Game based learning for safety and security education
Secure Arcade: A Gamified Defense Against Cyber AttacksIJCSITJournal2
n modernity, we continually receive increasingly intricate technologies that allow us to increase our lives’
convenience and efficiency. Our technology, particularly technology available over the internet, is
advancing at unprecedented speed. However, this speed of advancement allows those behind malicious
attacks to have an increasingly easier time taking advantage of those who know little about computer
security. Unfortunately, education in the computer security field is generally limited only to tertiary
education. This research addresses this problem through a gamified web-based application that drives
users to reach learning goals to help them become more vigilant internet users: 1. Learn and memorize
general computer security terminology, 2. Become familiar with basic cryptography concepts, 3. Learn to
recognize potential phishing scams via email quickly, and 4. Learn common attacks on servers and how to
deal with them.
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...IRJET Journal
This document discusses the importance of cybersecurity awareness training for organizations and proposes an effective training model. It analyzes how artificial intelligence (AI) can enhance security awareness programs. Specifically, it examines the Technology Acceptance Model (TAM) and how AI-enabled tools like the viCyber system can help design training based on the National Initiative for Cybersecurity Education (NICE) framework. The study concludes that regular, comprehensive security awareness training is critical to address the human factors that can weaken an organization's cyber defenses. AI tools show promise in developing trainings but require further evaluation of their usability and reliability.
Game based learning is a new game play mechanism that the players explore various aspects of game play in a learning context designed by the instructor or the game designer. Nevertheless, general acceptance of game based learning as a new learning paradigm was deferred by a lack of wellcontrolled, large sample efficacy studies. To address the increasing need of cybersecurity workforce, this paper introduces a game based learning method for high school cybersecurity education. Purdue University Northwest launched GenCyber high school summer camps to about 200 high school students in Chicago metropolitan area. The survey conducted after the summer camp indicated that the game based learning for cybersecurity education was very effective in cybersecurity awareness training. Further analysis of survey data revealed that there is a gender difference in raising students’ interests in cybersecurity and computer science education using game based learning method.
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSijfcstjournal
Recent advances in computing have caused cyber security to become an increasingly critical issue that
affects our everyday life. Both young and old in society are exposed to benefits and dangers that
accompany technological advance. Cyber security education is a vital part of reducing the risks associated
with cyber-threats. This is particularly important for current and future youth, who are the most
technology-literate generations. Many research studies and competitions have been undertaken around the
world to emphasize and identify the significance of cyber security as a relevant and pressing research area.
Cyber security competitions are great means of raising interest in the young generation and attracting them
to educational programmes in this area. These competitions show the need for cyber security to be taught
as a formal subject in secondary schools to enhance the effectiveness of computer science concepts in cyber
space. This paper presents an effective educational approach, justifying such competitions as a means of
introducing cyber security as a computer science subject for New Zealand secondary school students, and
also presents methods of implementation.
CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONSijfcstjournal
Recent advances in computing have caused cyber security to become an increasingly critical issue that
affects our everyday life. Both young and old in society are exposed to benefits and dangers that
accompany technological advance. Cyber security education is a vital part of reducing the risks associated
with cyber-threats. This is particularly important for current and future youth, who are the most
technology-literate generations. Many research studies and competitions have been undertaken around the
world to emphasize and identify the significance of cyber security as a relevant and pressing research area.
Cyber security competitions are great means of raising interest in the young generation and attracting them
to educational programmes in this area. These competitions show the need for cyber security to be taught
as a formal subject in secondary schools to enhance the effectiveness of computer science concepts in cyber
space. This paper presents an effective educational approach, justifying such competitions as a means of
introducing cyber security as a computer science subject for New Zealand secondary school students, and
also presents methods of implementation.
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVESijcsit
Increasingly, all kinds of organizations and institutions are adopting the E-business model to conduct their
activities and provide E-Services for their customers. In the process, whether they know it or not, those
organizations are also opening themselves up to the risk of information security breaches. Therefore
protecting an organization’s ICT infrastructure, IT systems, and Data is a vital issue that is often
underestimated. Research has shown that one of the most significant threats to information security comes
not from external attack but rather from the system's users, because they are familiar with the
infrastructure and have access to its resources, but may be unaware of the risks. Moreover, using only
technological solutions to protect an organization’s assets is not enough; there is a need to consider the
human factor by raising users’ security awareness. Our contribution to this problem is to propose an
Information Security Awareness Program that aims at raising and maintaining the level of users’ security
awareness. This paper puts forward a general model for an information security awareness program and
describes how it could be incorporated into an organization’s website through the process of development
life cycle.
This document provides information about Module 002 of the course IT 411 - Information Assurance and Security 2. The module aims to examine fundamental computer security techniques and identify potential security issues. It covers topics like cryptography, application security, incident response, risk assessment, and compliance with regulations. The module outlines learning objectives, outcomes, resources, tasks, content items, and assessments. It also includes detailed lessons on topics like the financial impacts of cybercrime, developing a security strategy using the 10 steps approach, techniques for protecting against attacks like examining the perimeter and network segregation, and methods for detecting attacks through logging.
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
The document discusses the need for cybersecurity awareness programs in K-12 schools. It emphasizes that such programs should empower students with age-appropriate cyber knowledge, engage parents in cybersecurity discussions, and promote a culture of continuous learning. The document provides strategies for delivering cybersecurity education to students, examples of interactive activities, and tips for collaborating with parents and measuring program effectiveness. The overall goal is to safeguard the school community from online threats through a united effort between educators, parents and students.
SYSTEM END-USER ACTIONS AS A THREAT TO INFORMATION SYSTEM SECURITYIJNSA Journal
As universities migrate online due to the advent of Covid-19, there is a need for enhanced security in information systems in the institution of higher learning. Many opted to invest in technological approaches to mitigate cybersecurity threats; however, the most common types of cybersecurity breaches happen due to the human factor, well known as end-user error or actions. Thus, this study aimed to identify and explore possible end-user errors in academia and the resulting vulnerabilities and threats that could affect the integrity of the university's information system. The study further presented state-of-the-art humanoriented security threats countermeasures to compliment universities' cybersecurity plans. Countermeasures include well-tailored ICT policies, incident response procedures, and education to protect themselves from security events (disruption, distortion, and exploitation). Adopted is a mixedmethod research approach with a qualitative research design to guide the study. An open-ended questionnaire and semi-structured interviews were used as data collection tools. Findings showed that system end-user errors remain the biggest security threat to information systems security in institutions of higher learning. Indeed errors make information systems vulnerable to certain cybersecurity attacks and, when exploited, put legitimate users, institutional network, and its computers at risk of contracting viruses, worms, Trojan, and expose it to spam, phishing, e-mail fraud, and other modern security attacks such as DDoS, session hijacking, replay attack and many more. Understanding that technology has failed to fully protect systems, specific recommendations are provided for the institution of higher education to consider improving employee actions and minimizing security incidents in their eLearning platforms, post Covid-19.
Cyber security: challenges for society- literature reviewIOSR Journals
This document summarizes challenges related to cyber security for society based on a literature review. It discusses how cyber security plays an important role in technology development and internet services. Key challenges include a lack of coordination between security agencies and critical IT infrastructure, as well as widespread computer illiteracy in some countries like India that has led to increased cybercrime. The document also reviews common approaches to IT security risk analysis and discusses threats to cyber security such as cyber attacks aimed at damaging systems and cyber exploitation for unlawful purposes.
A Bring Your Own Device Risk Assessment ModelCSCJournals
Bring Your Own Device (BYOD), a technology where individuals or employees use their own devices on the organization’s network to perform tasks assigned to them by the organization has been widely embraced. The reasons for adoption are diverse in every organization. In spite of the security control strategies implemented by these organizations to safeguard their information resources, there has been an upsurge in information security breaches as a result of existing vulnerabilities in these systems and the legacy systems in use. Various approaches have been employed to deal with security challenges in BYOD, but according to literature, risk assessment has proved to be the first key step towards improving security of the BYOD environment in an enterprise. Risk assessment models have been proposed by various researchers, although, most are largely influenced by the degree of technological advancement and utilization as well as the working cultures within institutions. The existing models were largely developed in technologically advanced countries and thus do not fit well in developing countries. This study sought to develop flexible BYOD risk assessment model that can be adopted by varied institutions to secure their information resources. The study was carried out in Five (5) purposively selected state universities in Kenya. The research adopted a mixed research design approach with mixed sampling technique utilized to select the participants. Reliability and validity of data collection tools were evaluated and recommended by IT security and network experts. The qualitative and quantitative data was collected by interviewing experts and administering a questionnaire to sampled participants. The developed model was validated both statistically and by experts. The findings revealed that threats and vulnerabilities contributed to 39.9% and 69.2% respectively to the risk of the BYOD environment while Data Encryption (DE) and Software Updates (SU) came out strongly as intervening variables which have a major impact on the relationship between the dependent and independent variables.
Cyber attack awareness and prevention in network securityIJICTJOURNAL
This article aims to provide an overview of cyber attack awareness and prevention in network security. This article discussed the different types of cyber attacks, current trends of cyber attacks, how to prevent cyber attacks and uum students' awareness of cyber attacks. First, we will go over the different types of cyber attack, current trend, impact of cyber attack and the prevention. The approach entailed comparing and observing the outcomes of 13 different papers. The survey's findings would demonstrate the results obtained after analyzing the data collection which are the questionnaire filled out by respondents after watching the cyber attack awareness video to improve awareness of students through the cyber attack. Depending on the outcome of this survey, we will have a better understanding of current students' knowledge and awareness of cyber attacks, allowing us to improve students' understanding of cyber threats and the necessity of cyber security.
An increasing number of cyber attacks o public and private sector organizations has created an economic "ripple effect" across the globe. To solve this urgent issue, organizations need to recruit, build and train a cyber security workforce of IT professionals that can keep up with sophisticated security threats.
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...CSCJournals
This document summarizes a research paper that conducted a critical review of contemporary social engineering solutions, measures, policies, tools, and applications. Through a systematic review of recent studies, the analysis identified that providing training for employees to understand social engineering risks and how to avoid attacks is important for protection. Key measures identified include awareness programs, training non-technical staff, implementing new security networks and protocols, and using software to address social engineering threats. The review examined 30 studies on measures, policies and tools adopted by organizations and found that education, training, and awareness programs are effective at enhancing employee behavior and defenses against social engineering.
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...IJNSA Journal
This document provides a summary of a literature review on social engineering defense mechanisms and information security policies. It discusses previous research on social engineering attacks and defenses. It also describes a taxonomy of social engineering targets and defenses developed by the authors. Surveys were conducted to measure employee awareness of defenses and the incorporation of information security policies in organizations. The results found over half of employees were unaware of social engineering and organizations only incorporated about 50% of recommended security policies on average. This highlights the need for better education and policies to protect against social engineering attacks.
The document discusses information security and analyzes its importance. It describes key aspects of information security like confidentiality, integrity and availability. It also outlines some common threats to information security such as computer viruses, theft, sabotage and vandalism. The document then analyzes some challenges to effective information security, including employees being fooled by scams, issues with authentication, and the growing threat of phishing. It emphasizes the importance of addressing security concerns to build trust with customers and gain a competitive advantage.
A Systematic Literature Review On The Cyber SecurityAmy Cernava
This document summarizes a literature review on cyber security. It begins by introducing the topic and defining cyber security as the methods used to protect networks, computers, programs and data from unauthorized access and attacks. It then discusses the growth of internet usage and connected devices, and how this has led to increased cyber threats. The review covers various topics related to cyber security including its history and importance, different types of threats, frameworks and tools used, and ongoing challenges. The goal is to provide a comprehensive overview of current research on cyber security issues and solutions.
The Evolving Landscape on Information SecuritySimoun Ung
This document provides an overview of the evolving landscape of information security. It discusses the motivation behind cyber attacks, including personal reasons, unlawful profiteering, and corporate or national interests. It then examines common security threats such as social engineering, phishing, distributed denial of service attacks, network attacks, and malwares. The document notes that security standards and best practices need constant refinement as threats continue to evolve in sophistication.
The crime that involves and uses computer devices and Internet, is known as cybercrime. Cybercrime can be committed against an individual or a group it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm. Cyber security is a potential activity by which information and other communication systems are protected from and or defended against the unauthorized use or modification or exploitation or even theft. Likewise, cyber security is a well designed technique to protect computers, networks, different programs, personal data, etc., from unauthorized access. All sorts of data whether it is government, corporate, or personal need high security however, some of the data, which belongs to the government defense system, banks, defense research and development organization, etc. are highly confidential and even small amount of negligence to these data may cause great damage to the whole nation. Therefore, such data need security at a very high level. Gajendra Kumar Malviya "Cyber Crime and Cyber Security" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49888.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/49888/cyber-crime-and-cyber-security/gajendra-kumar-malviya
Contents lists available at ScienceDirectJournal of AccounAlleneMcclendon878
This summary provides the key points from the document in 3 sentences:
The document discusses cybersecurity insurance and developing a model to determine the optimal set of insurance policies for a firm to purchase. The model considers minimizing the total cost of insurance premiums and expected losses not covered by the policies. Purchasing multiple policies that result in at least three areas of potential losses not covered can help address issues like high deductibles and low coverage ceilings in cybersecurity insurance.
Similar to Game based learning for safety and security education (20)
The role of entrepreneurship in addressing the issue of educated unemployment is well acknowledged, while its specific implications for health professions students remain inadequately explored. This study's main objective is to investigate entrepreneurship education's effect on entrepreneurial intention by considering entrepreneurial self-efficacy as a mediator in students majoring in medical laboratory technology. This quantitative research uses an exploratory approach involving 300 respondents determined through simple random sampling techniques and analyzed using partial least square structural equation model (PLS-SEM). The analysis revealed that entrepreneurship education directly impacts self-efficacy and entrepreneurial intention. Furthermore, entrepreneurial self-efficacy was identified to exert a positive mediating effect between these variables. However, the effect size between the relationships of the research variables is low. Nevertheless, higher education offering health majors can optimize entrepreneurship education by implementing practical learning and field experience to increase confidence and intention in entrepreneurial activities.
Recent studies claimed that the absence of a paradigm is a challenge to developing education for sustainable development and soft skills competencies. This integrative study examines stimulating these transferable and transversal competencies through constructivist approaches to teaching from the cognitive, social, radical, and critical perspectives. The study argues that the use of constructivist approaches to teaching can contribute to the achievement of education for sustainable development and soft skills competencies through the delegation of power from teachers/lecturers to students. This, in active and interactive classrooms, empowers students and builds their confidence to develop on the personal, academic, and professional levels. The use of the cognitive constructivist approach assists in developing competencies based on a clear understanding of the cognitive structures of students in a vibrant classroom environment. The use of the social constructivist approach assists in constructing individualized learning environment based on predetermined zones of proximal development in sociocultural contexts. The radical and critical constructivist approaches to teaching, through the rejection of conventional epistemologies, allow students the freedom to creatively address issues related to environmental, economic, and social sustainability. This becomes effective through the fostering of self and social awareness, challenging existing ideas, and provoking innovative thoughts that are necessary to shape a sustainable future.
The research aimed to describe the development of solar electric cars as a prop in energy conversion learning using the analyze, design, develop, implement, and evaluate (ADDIE) model and to ascertain the effectiveness of an electric car as a prop in energy conversion learning. Utilization of prop in the learning process is one way to support the development of knowledge, skills, and basic needs for delivering material, concepts, and physics information. This research is a descriptive study involving media and pedagogical experts and 40 students of the university in Tasikmalaya. Data collection techniques were carried out through the study of literature, expert validation, and student perception questionnaires. Expert validation and student perception were obtained by using a Likert scale. The expert judgment results were processed using the V value equation developed by Aiken. The results showed a value of 1, meeting the minimum validation requirements. The students also had positive responses to a prop. They have new experience learning in energy conversion and have good media to help their comprehension. It has a significant impact on helping students to achieve their learning goals.
The rise and growing prevalence of juvenile delinquency is a matter of concern for many parties. This study aims to establish a research instrument in the form of a questionnaire that can be deployed to assess the learning environment perceived by high school students. This research endeavor constitutes a developmental study, wherein the outcomes are a single survey instrument encompassing six variables, nineteen indicators, and forty questions. The data-collecting process involved the utilization of a Google Form across five schools in five districts, containing a total of 1615 participants. The analysis of expert data was conducted utilizing V. Aiken and field trials employing confirmatory factor analysis (CFA) Second Order. The findings of this study indicate that the diagnostic survey instrument used to assess the learning environment's impact on the mental health of high school students demonstrated validity, as evidenced by loading factor values exceeding the established minimal threshold. The reliability of the instrument remains insufficient. This survey can be utilized to detect adolescent persistent tendencies carried out by students or other school members that interfere with mental health: the emergence and significant raising of juvenile delinquency.
Marinyo is a culture left by the Portuguese around the 15th century in Maluku. The purpose of this study was to find out to what extent students' misconceptions about the concept of sound in the Marinyo case in the Kepuluan Tanimbar Regency. The method used was a qualitative study in ethnography in ten villages in two sub-districts. In addition, they conducted a survey in the form of a diagnostic test in the form of questions related to the Marinyo case on 300 elementary school students. The findings in the field show that students experience relatively high misconceptions. It was because teachers did not accustom students to learn from natural phenomena around them and were given scientific questions to seek, find and provide answers and solutions related to these natural phenomena. The teacher was more pursuing the conditions and problems of physics in textbooks and less exploring contextual matters. Future researchers are suggested to develop physics or science teaching materials based on regional local advantages that are oriented towards understanding concepts, mental models, critical thinking, problem-solving, creativity and innovative thinking so that teachers and students can learn well so that knowledge of science becomes better.
Online learning is a growing trend in education during the corona virus disease (COVID-19) pandemic. The purpose of this study is to ascertain the difficulties that online majors in non-English languages have when attempting to acquire English. The subject of this study involved using the questionnaire method for as many as 412 students and interviewing 15 students with a total of 17 questions. The results of this study indicate that there are several challenges faced by students during online learning; i) less familiarity with online learning as shown by 31% of students agreeing that online learning is a new learning method, ii) psychologically 30% of students choose strongly agree that they have limited opportunities to interact directly and freely with lecturers as well as with students, iii) limited facilities and infrastructure as much as 28% agree that the budget is limited to get quota or internet credit, and iv) limited internet access as many as 35% of students do not have good internet coverage to take online lectures. The findings of this study should be a reference for English lecturers to continue learning to innovate in providing online English learning by considering the existing challenges.
English for young learners (EYL) teachers have practiced some creative activities to maintain their pupils’ learning with natural exposure to the target language amidst the pandemic. One activity practiced by Indonesian and Korean teachers was an international collaboration to perform a virtual drama of each country’s folktale. This phenomenological research aimed at tapping the teachers’ perceptions regarding interculturality and world Englishes (WE) in the virtual dramatic play collaboratively conducted and delving into their commitments in honing interculturality and WE. Two Indonesian and Korean teachers were involved in three sessions of in-depth interviews using pre-prepared interview questions. The trustworthiness of the data was achieved by the group discussions allowing the participants to comment on and revise the transcribed data, as well as triangulation by two international collaborators. Thematic analysis was performed to identify emerging themes and to provide novel insights into EYL teachers' encounters with interculturality and WE. The Indonesian and Korean teachers admitted the compatibility between language and culture, the urgency of introducing varieties of English, and the merits of conducting international collaboration to promote interculturality and WE. The teachers are committed to integrate interculturality and WE in their instructions despite some differences in the stipulated curricula.
The fear of failure stops students from thinking logically and processing information in mathematics. Creating an appropriate classroom climate based on every student's ability is crucial to overcoming the prejudices associated with mathematics. In this regard, this study aims to create the best classroom climate approach that will increase interest in mathematics and ensure academic success. For this purpose, mathematicians' views on the classroom climate approach and how they create them were discussed by using qualitative techniques. It was considered that teachers participating in this research are working in 9th grade in state high schools affiliated with the Turkish Republic of North Cyprus Ministry of Education, accepting students through examination. The researchers collected teacher views through a semistructured interview form and analyzed them using context analysis. The findings showed that teachers were in a hurry to teach and generally paid attention to creating a comfortable classroom climate in which students could express their thoughts and opinions. This situation also revealed a lack of adequate classroom climate approach skills among teachers. Therefore, the classroom climate approaches discussed in this study are expected to make a significant contribution to this field by offering solutions to teachers in creating a supportive classroom climate.
The article is devoted to the study of the issue of training future police officers to use unmanned aerial vehicles (UAVs) in their professional activities. Based on the results of the theoretical analysis of scientific and applied works, modern trends in the development of drones in the activities of law enforcement agencies were identified, and the problem of their implementation in practical activities was outlined. An online survey was conducted in order to study the opinion of scientific, scientific and pedagogical workers and graduates of higher education institutions with specific learning conditions that train police officers about the need to train future police officers in the control of UAVs. The need to introduce into the system of primary professional training the training of service skills using drones is substantiated. On the basis of the study of the content of the training program for unmanned aircraft systems of the first class according to the basic qualification level of the first level, it is proposed to introduce the general professional educational unit “formation of skills and skills of controlling an UAV” into the training program of the primary professional training of police officers in the specified specialty.
English language teaching (ELT) in Islamic boarding schools in Indonesia, commonly known as pesantren, presents a unique context that requires a tailored pedagogical approach. This study aimed to explore the application of context-responsive pedagogy in ELT within the unique context of Islamic boarding schools in Indonesia. This qualitative study employed semistructured interviews and classroom observation as data generation methods to gain insights into the experiences and perspectives of English language teachers regarding the implementation of context-responsive pedagogy in English language instruction. The findings revealed the importance of understanding learner needs, incorporating authentic materials, promoting cultural sensitivity, and effective use of technology in ELT practices in Islamic boarding school contexts. This study delves into how English language teachers navigated and negotiated their practices with the socio-cultural and religious values entrenched in this institution. It also highlighted the challenges English language teachers in this school context faced in the implementation of context-responsive pedagogy. Eventually, this research provides valuable insights for ELT practitioners, policymakers, and researchers interested in incorporating context-specific pedagogy to optimize ELT in Islamic boarding schools and similar educational contexts.
This study aimed to develop and evaluate a training curriculum intended to enhance the quality of life for the elderly. As Thailand witnesses a demographic shift with increasing numbers of older adults, driven by declining birth rates and extended life expectancies, the importance of ensuring quality elderly care becomes paramount. The devised curriculum encompasses eight principal elements focusing on the elderly, defined as those aged 60 and above, addressing their physical and mental changes, well-being, health, and overall satisfaction. The content is holistic, integrating components of music, art, health care, and exercise. Delivered over a two-day period, the curriculum employs a structured approach featuring lectures, discussions, and knowledge exchanges, supported by a range of media and materials. Initial assessments revealed a moderate quality of life among the elderly, but post-training evaluations indicated enhanced knowledge, understanding, and positive attitudes towards the activities, pointing to an overall high level of effectiveness of the curriculum.
The study of the role of the pedagogy of partnership (PoP) in building the professional competence of future primary school teachers is relevant in the context of modern educational and pedagogical transformations, which require the preparation of teachers for new challenges and creating a favourable learning environment. Therefore, the aim of our study was to check the effect of observing the pedagogical partnership principles in the educational process on the development of the communicative competence of future primary school teachers. The study employed the following psychodiagnostic methods: the Thomas-Kilmann conflict mode instrument (TKI), Myers-Briggs type indicator (MBTI), Snyder’s self-control in communication. The implementation of the PoP programme in higher education institutions (HEIs) has a positive effect on the development of the communicative competence of future teachers, in particular, on developing the ability for self-control and increasing the scope of psychological knowledge. The study revealed some important correlations. Our results indicate that cooperation and the ability to make compromises are directly related to the communicative abilities of future teachers. Further research can be focused on studying the impact of pedagogical partnership on other aspects of future teacher training, such as methodical mastery, motivation for learning and development.
This study examined the relationship between students’ academic performance, teachers’ commitment, and leadership behavior of school administrators. Teachers’ commitment was measured in two areas– commitment to job and commitment to organization and the leadership behavior of school administrators were evaluated in terms of consideration and initiating structure. Eighty-one teachers, 11 school heads, and 470 students served as respondents. The descriptive survey research technique, correlation analysis, and the following statistical methods were used: frequency, mean, standard deviation, and correlation coefficient. The study revealed that the initiating structure and consideration dimensions of leadership behavior affect teachers’ commitment to job (CTJ) and teacher’s commitment to organization (CTO). The correlation between CTJ and CTO and leadership behavior-initiating structure is positive and with leadership behavior-consideration negative. CTJ and CTO is correlated with the students’ academic performance in math, but not in Science and English. The correlation is negative. Students’ academic performance in all subject areas is negatively correlated with leadership behavior-initiating structure and has no significant relationship with leadership behavior-consideration. The leadership behavior-initiating structure is positively correlated with teachers’ commitment to both job and organization but has negative correlation with students’ academic performance in math, science, and English.
This study aims to describe preservice mathematics teacher knowledge of higher order thinking skills in terms of definition, Bloom's taxonomy level, curriculum, learning, and evaluation. This research is quantitative research with a survey method. and sample consisted of 248 preservice mathematics teachers in semesters VI - VIII of the Department of Mathematics Education, Nusa Cendana University, Timor University, and Wira Wacana Sumba University. The instrument used was a questionnaire about high order thinking skill (HOTS) which consisted of 105 statements. Data analysis used Likert's summeted rating, one sample test, Mann Whitney, Kruskall-Wallis tests, multiple linear regression test, and multivariate analyisis of variance (MANOVA) test. The results showed that the knowledge level of preservice mathematics teacher was in the good category. Based on gender differences, there was no significant difference in the average knowledge of preservice mathematics teacher about HOTS, there was a significant difference in the average knowledge of preservice mathematics teacher about HOTS which is significant based on differences in academic ability and gender differences do not significantly affect knowledge about HOTS levels in Bloom's taxonomy, curriculum, and pedagogy while academic knowledge has a significant effect on HOTS knowledge of preservice teachers in almost all aspects except for pedagogy.
Formative assessment is an evaluative practice developed in the classroom for the improvement of learning using evidence on student progression. The objective of this research is to compare sample groups from multigrade and single-grade classrooms on the theme of formative assessment based on the students' opinion of the teacher's performance. The method used was a comparative quantitative method. The sample type is a probability sample of 683 students from 5th to 8th grade from urban and rural schools in the commune of Longaví, located in the Maule Region of Chile. A validated Likert scale questionnaire with a high level of reliability (α = 0.93) was used. The results of the research showed that, in the six dimensions, the best teacher performance concerning formative assessment is found in multi-grade schools and not in single-grade schools. This can be explained on the basis of several reasons, among them the level of adaptability that teachers have in this type of classroom, the heterogeneous characteristics of the classroom (different ages and learning goals) and the need for teachers to monitor the learning progression of students with different classroom characteristics.
Financial literacy, as a fundamental skill in the 21st century, has become a life skill that is urgently needed to be improved. Globally, the drive to enhance financial literacy involves integrating it into the education curriculum, necessitating educators’ comprehensive grasp of financial literacy education before imparting it to students. This research aims to outline a conceptual model of financial literacy professional development to improve teachers’ professional competence, employing a narrative review that synthesizes 28 relevant literatures retrieved from Scopus databases. The results of the study show that an effective training model for teacher professional development (TPD) in financial literacy education should focus on essential financial literacy content consisting of planning and budgeting, banking services, income and careers, insurance, investment, savings, also spending and credit. Furthermore, the main characteristics of TPD regarding financial literacy education should encompass content focus, coherence, ownership, active learning, duration, and collective participation.
The objective of this research is to examine teachers' competence in designing activities after engaging in professional development activities aimed at enhancing teaching design in order to develop students' thinking abilities that are contextually appropriate. The participants consist of 5 elementary school science teachers from schools. The research employed semi-structured interviews and classroom observation as research instruments. The findings reveal that teachers engaged in self-development through observation and learning from their peers within the community of practice (CoP). They receive advice and feedback from fellow teachers and apply these insights to improve their activities. Consequently, teachers are able to continuously refine and develop their teaching approaches to align with students' contexts. This approach facilitate diversification in thinking and learning management, as well as collaborative teamwork to enhance teaching methods. As a result, engaging and interesting thinking development activities are incorporated into student learning, along with the creation of a seamless learning-promoting environment. Collaborative teamwork in instructional design and problem-solving further afford teachers the opportunity for additional self-learning and personal development. This collaborative approach also contributes to fostering cognitive diversity and relieved the need for individual teachers to undertake all tasks independently.
Adaptive online learning can be realized through the evaluation of the learning process. Monitoring and supervising learners’ cognitive levels and adjusting learning strategies can increasingly improve the quality of online learning. This analysis is made possible by real-time measurement of learners’ cognitive levels during the online learning process. However, most of the currently used techniques for evaluating cognitive levels rely on labour-intensive and time-consuming manual coding. In this study, we explore the machine learning (ML) algorithms and taxonomy of Bloom’s cognitive levels to explore features that affect learner’s cognitive level in online assessments and the ability to automatically predict learner’s cognitive level and thus, come up with a recommendation or pedagogical intervention to improve learner’s acquisition. The analysis of 15,182 learners’ assessments of a specific learning concept affirms the effectiveness of our approach. We attain an accuracy of 82.21% using ML algorithms. These results are very encouraging and have implications for how automated cognitive-level analysis tools for online learning will be developed in the future.
This systematic literature review (SLR) aimed to investigate the potential of digital online game-based learning (DOGBL) to enhance motivation in English as a foreign language (EFL). Online gaming has grown in popularity among students, opening up the possibility of using games as powerful instructional resources. Academic achievement depends on motivation, and this study, led by self-determination theory (SDT), explored how external rules, like rewards and recognition, could increase motivation in EFL utilizing DOGBL. The study used the SLR method, examining databases and choosing articles based on predetermined criteria. The chosen publications were examined in-depth, and a preferred reporting items for systematic reviews and meta-analyses (PRISMA) diagram was employed for analysis. For results, DOGBL could enhance teaching EFL by providing flexible and interesting learning environments. Key elements in motivating in DOGBL included game design, personalization, social engagement, curricular integration, and instructor assistance. As a promising method to improve EFL instruction, game-based learning, especially DOGBL, saw considerable developments between 2018 and 2023. Thus, these ground-breaking techniques transformed the way people learn English vocabulary and provided a fun and engaging way to learn the language. For educators and students, the potential for DOGBL to change EFL education is still exciting as technology develops.
The development of postmodern-era technology in the world of education is increasingly sophisticated, thus impacting the character of students and their social environment. Technological progress negatively affects the lives of today's generation. When misuse of technology is widespread, it is imperative to strengthen cultural and religious filtration. So that the influence of globalization on technological development can be minimized. So as not to damage the cultural values and morality of students as the next generation of the nation. This study aims to explain the importance of transforming the values of Bima's local wisdom "Nggusu Waru" through the media of social studies e-books. The results and conclusions of this study are efforts to develop students' social character that require teacher collaboration, supervision, and optimal parental attention so that their interest in learning is higher and minimizes deviant behavior. This research method uses research and development design. At the stage of preliminary studies with models developed by Borg and Gall. Through several stages of research, information gathering, development of initial forms of products, and initial field testing. In this step, data is collected through interviews, observation and documentation. The data is analyzed to find out some of its weaknesses and shortcomings.
More from Journal of Education and Learning (EduLearn) (20)
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Assessment and Planning in Educational technology.pptxKavitha Krishnan
In an education system, it is understood that assessment is only for the students, but on the other hand, the Assessment of teachers is also an important aspect of the education system that ensures teachers are providing high-quality instruction to students. The assessment process can be used to provide feedback and support for professional development, to inform decisions about teacher retention or promotion, or to evaluate teacher effectiveness for accountability purposes.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Game based learning for safety and security education
1. Journal of Education and Learning (EduLearn)
Vol. 14, No. 1, February 2020, pp. 114~122
ISSN: 2089-9823 DOI: 10.11591/edulearn.v14i1.14139 114
Journal homepage: http://journal.uad.ac.id/index.php/EduLearn
Game based learning for safety and security education
Ge Jin1
, Shoji Nakayama2
, Manghui Tu3
1,3
Department of Computer Information Technology and Graphics, Purdue University Northwest, USA
2
Department of Construction Science and Organizational Leadership, Purdue University Northwest, USA
Article Info ABSTRACT
Article history:
Received Sep 18, 2019
Revised Nov 08, 2019
Accepted Jan 31, 2020
Safety and security education are important part of technology related
education, because of recent number of increase in safety and security related
incidents. Game based learning is an emerging and rapidly advancing forms
of computer-assisted instruction. Game based learning for safety and security
education enables students to learn concepts and skills without the risk of
physical injury and security breach. In this paper, a pedestal grinder safety
game and physical security game have been developed using industrial
standard modeling and game development software. The average score of the
knowledge test of grinder safety game was 82%, which is higher than
traditional lecture only instruction method. In addition, the survey of physical
security game shows 84% average satisfaction ratio from high school
students who played the game during the summer camp. The results of these
studies indicated that game based learning method can enhance students’
learning without potential harm to the students.
Keywords:
Game based learning,
Physical security
Safety education,
This is an open access article under the CC BY-SA license.
Corresponding Author:
Ge Jin,
Department of Computer Information Technology and Graphics,
Purdue University Northwest,
2200 169th St, Hammond, IN 46323, USA.
Email: ge.jin@pnw.edu
1. INTRODUCTION
The advance of graphics hardware, high-speed internet, and the pervasiveness of mobile devices,
have enabled various computer-assisted instruction (CAI) pedagogical methods. One of the most emergent
and rapidly mutating forms of computer-assisted instruction is "game based learning.” As its name suggests,
this method uses computer games to immerse learners in a simulated game environment while experiencing
it as real. Game based learning includes virtual reality games, web-based games, multi-user virtual
environments (MUVEs), massively multiplayer online games (MMOs), and simulations [1].
To date, however, applying game based learning instructional methods to safety and security education has
been limited [2].
2. IMPORTANCE OF SAFETY AND SECURITY
In 2017, 5,147 fatal work injuries and approximately 2.8million nonfatal workplace injuries and
illnesses were reported [3]. In other words, 5,147 workers went to work to make a living and trying to enjoy
life have become persons who never returned home. Injuries, illnesses and fatalities are not only pain and
suffering of an individual, but it also affect their family, friends and co-workers.
In addition to those numbers, these incidents cost U.S. business between $150 and $170billion every
year. In 2018, the total cost of work injuries cost U.S. business approximately $161.5 billion [4]. However,
it’s not that these cannot be prevented. Just because hazards exist, it doesn’t mean people should get fatally
2. J. Edu. & Learn. ISSN: 2089-9823
Game based learning for safety and security education (Ge Jin)
115
injured. As indicated by the State of New York Safety Bulletin, approximately 95% of all workplace
accidents are preventable [5]. And this statement was also supported by the OSHA area director in Appleton,
Wisconsin, who has indicated that injuries and fatalities from accidents are preventable [6].
OSHA estimated employers pay almost 1 billion dollars per week for direct worker’s compensation
cost alone. However, each company would pay both direct and indirect costs when an incident was to occur.
Direct cost includes worker’s compensation cost, medical costs and costs of legal services. And some of
the examples of indirect costs include lost time, loss in earning power, cost of retraining a new workers who
fills in for injured workers, loss of production due to an incident, failure to fill, and costs associated with
lower employee morale and absenteeism to name a few. Generally speaking, every dollar spent on direct
costs generates three to five dollars of indirect costs [7-9] Liberty Mutual gave an example that outlines this
costs associated with an incident. They estimated that the hidden cost of $15,000 incident would be more
than likely between $45,000 and $75,000.
Security has become one of the major topics for various organizations, because of the increase in the
number of incident in the past several years. Over the past few years, a large number of fraud incidents have
been committed, especially in the financial and healthcare sectors [10, 11]. Such security breaches not only
result in substantial financial losses, but also greatly hurt the confidence of customers, business partners and
stakeholders [12]. Physical security is the protection of personnel, hardware, software, networks and data
from physical actions and events that could cause serious loss or damage to an enterprise, agency or
institution. Physical security describes security measures that are designed to deny unauthorized access to
facilities, equipment and resources and to protect personnel and property from damage or harm. Physical
security involves the use of multiple layers of interdependent systems which include CCTV surveillance,
security guards, protective barriers, locks, access control protocols, and many other techniques. More
organization has started to develop and/or enhance their workplace violence programs. Depending on the size
of an organization, safety professionals often take a responsibility of securing the organization’s physical
perimeters. Hence, security can be often listed as one of the safety professionals’ job. The increasing demand
for safety and security professionals requires collaborative efforts from government, industry, and K-12 and
higher education institutions to attract, prepare, and train future cybersecurity professionals [13, 14].
3. GAME BASED LEARNING
Game-based learning shares the common features of entertainment games, while the primary
purpose of game-based learning is education or training [15-17]. The objective of this study is to streamline
safety and security education and keep them effective by experimenting with 3D game environment [18].
Specifically, the game-based learning would bypass the real-life dangers of the workplace safety and security
while still effectively educate how to avoid them. An ideal game based learning environment would allow
participants to immerse themselves into the environment, interact with it, identify hazards and security
pitfalls, and acquire application-oriented experience safely. Recently, gaming technologies have been applied
to safety education in mining, construction, and manufacturing industries [19]. This game may even
successfully teach fire-safety skills to younger people [20]. In that study, game was used to simulate
situations that are too dangerous to practice in real life. A paired t-test indicated significant improvement in
test scores after the VR fire-safety training (t= 4.74, p = 0.0001). Thus the literature suggests that game-based
learning is effective in teaching people to avert danger.
The goal of safety and security education games was to streamline safety and security training yet
keep it effective by experimenting with 3D virtual environment. Specifically, the goal is to bypass the real-
life dangers of the workplace while it effectively teach how to avoid them. An ideal game would allow
participants to immerse themselves into the “real-life” environment, interact with it, identify hazards, and
acquire application-oriented experience safely [21].
There are several advantages and disadvantages of using games for safety training. Some of
the advantages includes game allows participants to experience hazardous environment without putting them
in any danger. It also give several advantages such as immediate feedbacks to trainees, good for training
where participants would get exposed to those hazards where you cannot see. Some of the disadvantages
include some people may get sick from the virtual environment, some older trainees may have hard time
navigating through such technology environment and it could become expensive if one tries to envelope
a company specific training.
3. ISSN: 2089-9823
J. Edu. & Learn. Vol. 14, No. 1, February 2020 : 114 – 122
116
4. RESEARCH METHOD
The research method for game-based learning in safety and security disciplines requires four
components: 1) Topic identification, 2) 3D modeling of virtual game environment, 3) Game programming
and 4) Assessment of learning.
4.1. Topic identification
The primary goal of this game based learning research is to: 1) raise general awareness of safety and
security concepts for the students, and 2) help students to understand appropriate safety and security
procedures. To achieve the game based learning objectives, safety game and physical security game have
been developed.
a. Pedestal grinder safety game: The equipment and machine operation selected for this study was through
discussions with industry professionals in the areas of Safety, Health and Environmental Management.
Specific safety related issues in the manufacturing industry were identified based on a simple gap
analysis between industry needs and safety related topics covered in engineering technology programs.
One of the OSHA’s top 10 most cited violations in 2019 was “machine guarding” [22]. As indicated by
the safety academic advisory board members, a pedestal grinder is one of the dangerous machineries that
many organizations have. Therefore, the authors had decided to develop the virtual safety exercise in 3D
environment focusing on machine guarding of a pedestal grinder.
b. Physical security game: Physical security is the protection of personnel, hardware, software, networks
and data from physical actions and events that could cause serious loss or damage to an enterprise,
agency or institution. Physical security describes security measures that are designed to deny
unauthorized access to facilities, equipment and resources and to protect personnel and property from
damage or harm. Physical security involves the use of multiple layers of interdependent systems which
include CCTV surveillance, security guards, protective barriers, locks, access control protocols, and
many other techniques.
4.2. 3D modeling of safety game environment
The 3D virtual environment was created by using the Unreal game engine [23]. Unreal engine
allows researchers and academic institutions to develop games and interactive virtual environments
for educational purposes and redistribute them without licensing fees. In addition, Autodesk 3D Max
software was used to create 3D models of the grinder, Personal Protection Equipment (PPE),
and human operators [24].
In order to create the 3D virtual environment of the laboratory, it was also necessary to create
models for surrounding mechanical equipment and PPE. First, photographs of a grinder as shown in Figure 1,
and other mechanical equipment and personal protective equipment (PPE) were taken from different
viewpoints for 3D modeling and texturing purposes. Second, these photos were brought into 3D modeling
software to be used as reference images. Third, measurements (in inches) were taken for the equipment and
then proper scale and unit data were input to the 3D modeling software. Finally, low-polygon modeling
techniques were utilized to transform the real-world object to a virtual 3D model.
Figure 1. Picture of a pedestal grinder and completed 3D model
The 3D grinder model was unwrapped in UV texture coordinates to map the texture from photos.
UV texture mapping is a process of assigning unique 2D coordinates for every 3D vertex in a polygonal
model. This process was accomplished by using “UVW Unwrap” tool in 3D Studio Max to match the real
photos. A similar approach has been used to convert other equipment, such as a fire extinguisher and a lathe,
to be placed within the 3D virtual environment.
4. J. Edu. & Learn. ISSN: 2089-9823
Game based learning for safety and security education (Ge Jin)
117
4.3. Creation of 3D virtual environment for safety game
The grinder model and other safety-related components were merged into the 3D virtual
environment by utilizing Unreal Game Engine. This allowed students to interact and immerse themselves in a
real-world-like environment without the risk associated with operating a grinder. In addition, necessary
safety features could also be easily added within the virtual 3D environment.
To enhance student understanding of hazards associated with operation of a grinding wheel,
the environment included 3D models of the PPE such as goggles, masks, ear plugs, gloves and boots. In
addition, two human models were incorporated to illustrate additional operator hazards such as wearing a
necklace, tie, long skirt, or other loose objects. Additional mechanical and storage equipment was also
included to create a 3D virtual environment as close to a real laboratory environment as possible. The similar
approach has been used to convert other equipment such as a fire extinguisher and a lathe to be placed within
3D virtual environment in Figure 2.
Figure 2. An example of visual conversion of a lathe
The virtual environment was created based on the layout of the mechanical engineering laboratory at
Purdue University Northwest. Figure 3 show the virtual environment used in this virtual safety exercise.
Figure 3. Front view of the layout
4.4. 3D Modeling for physical security game
Physical security game was developed in the Unity3D game engine (Unity 2019). This game can be
classified as 3D Role-Playing-Games (RPG). The development of the 3D RPG physical security game
consisted of three major technical components: (1) 3D character and game environment modeling, (2)
animation of the 3D game characters, and (3) scripting/programming of the interaction between game
characters and dynamic behaviors.
The physical security game environment was created by using the Unity game engine. In order to
create the 3D virtual environment of the network operation center, it was also necessary to create models for
physical building and data center interiors. Autodesk Maya software was used to create 3D models of
the desktop computers, buildings, data and network servers, and furniture. The most important part
in physical security game is to model the data center and data server. Figure 4 shows individual data server
modeled in Autodesk Maya [25].
The 3D characters were created from Adobe Fuse software. Instead of modeling a 3D character
from scratch, Adobe Fuse allows a user to assemble a 3D character from more than 20 base characters
and further customize it with different weight, height, skin tones, and texture shown in Figure 5(a).
The 3D character created in Adobe Fuse was transferred seamlessly into the Mixamo software shown in
Figure 5(b). Mixamo offers hundreds of different motion clips that can be used in animation, so essential
motion clips (such as idle, walk, run, talk, sit, and stand) were chosen for each character and exported to
the Unity3D game engine.
5. ISSN: 2089-9823
J. Edu. & Learn. Vol. 14, No. 1, February 2020 : 114 – 122
118
Figure 4. Examples of furniture and data server
(a) (b)
Figure 5. 3D character modeling and animation
The game environment was modeled mostly using Autodesk Maya software shown in Figure 6.
Several 3D assets that related with physical security were imported from loyalty-free 3D assets from Unity
Marketplaces. The behaviors of the 3D game characters were implemented by programming Unity C# script
for each 3D character and dynamic assets in the game environment.
Figure 6. Simulated network center and building inertia modeling
4.5. Game programming for safety game
For safety game, three areas that affect safe operation of a grinder were identified. These are, 1)
the safe distance between surface of a wheel and the work-rest, 2) the safe distance between surface of wheel
and tongue guards, and 3) the proper placement of eye shield. To simulate potential hazards related to these
three areas, the virtual grinder was broken into separate components so that each component could be
operated independently. This process allowed each component to function separately and illustrate
the possible hazards and allowed to be corrected in the virtual environment. Potential hazards and appropriate
corrective measures were programmed into the virtual safety exercise that allowed students to visually
identify and correct such hazards appropriately.
6. J. Edu. & Learn. ISSN: 2089-9823
Game based learning for safety and security education (Ge Jin)
119
Once a trainee launches the virtual safety game, the user first must pick up the correct PPE and then
must identify and correct hazards affecting an operator. For this safety game, a trainee moves a cursor over a
specific hazard(s) and clicks a mouse on a computer screen. Once the trainee selects a pre-determined hazard
within the virtual environment, an interface will pop up, allowing him/her to select an appropriate corrective
action(s). The trainee’s corrective action will then be compared with the preprogrammed action sequences
inside the game engine.
If a student correctly selected PPE, identified all the safety hazards, and adjusted guarding
components inside the virtual environment, immediate feedback will appear in Figure 7(b). Otherwise,
trainees receive a failure notice that indicates they have not followed the correct procedures. However,
trainees can retake the training until they correctly identify all the safety hazards in pedestal grinder
operation. A typical user interface dialog for this safety game consists of descriptive texts, buttons, and
dynamic text field that can be modified. The dynamic text field is updated based on the student’s
performance during the exercise. The user interface dialog is activated by clicking the mouse on a
controllable mechanical part such as a tongue guard displayed inside the virtual environment in Figure 7(a).
Unreal Kismet is a visual scripting language used to create the virtual safety exercise.
(a) (b)
Figure 7. Example of user interaction inside virtual environment
4.6. Game programming for physical security game
The purpose of physical security game is to teach the importance of physical security for network
and data centers, and security measures using multiple layers of interdependent systems. For physical
security game, several areas that affect physical security were identified. These are, 1) security guard at
entrance, 2) CCTV surveillance, 3) protective barriers, 4) access control protocols, 5) password protection,
and 6) doors and locks for protected areas.
Once a student launches the physical security game, user can either “walk” or “drive” into
the security gate. When student drive close to the security gate, a message will pop up and show protocols
need to follow to enter the facility. The student must provide his/her name and ID to go into the network
center. After park the car, a student can walk into the data center building. Inside the data center, the student
must register at the information desk to get visitor’s pass to access any restricted area, as illustrated in Figure
8. The student need provide name and date of visit to get the pass.
Figure 8. Visitor pass registration and access restricted areas with pass
7. ISSN: 2089-9823
J. Edu. & Learn. Vol. 14, No. 1, February 2020 : 114 – 122
120
The student can use the visitor’s pass to open the doors with access control on the first floor. After
accessing all rooms in the first floor, take the elevator to the second floor. On the second floor, the student
need to talk with the information desk to get the passwords for the server room and network monitor room.
At each room student needs to provide correct password to open the door. After completing all physical
security tasks, the student who completed in the shortest amount of time will be the winner.
The physical security game required 3D characters to walk, talk, and make unique gestures. To
animate a game character in RPG style games, an animation component was added to the imported 3D
character asset, providing these essential movements to the character so that a game player can control and
animate the 3D virtual character in different situations. To make the virtual game character perform different
actions based on the input event, a “Box Collider” from Unity Inspector control panel was added to
the character to trigger different animations when another character entered the “Box Collider” area. A
character control C# script was also programmed to allow a 3D character behave differently based on
the input event used. Figure 9 shows a simple dialogue script that has been applied to a game character.
The character will repeat “idle” motion until a game player approaches a non-player character. If a game
player entered the “Box Collider” region, the character will start to talk with the game player by triggering a
“talking” animation clip. A simple dialogue script was added to the 3D game character through the Unity
Inspector control panel.
Figure 9. Passcode acquisition from the information desk and access restricted areas with passcode
5. ASSESSMENT
5.1. Assessment of grinder safety operation
The authors conducted a pilot study to determine the effectiveness of 3D safety game in three
sections of the Safety and Health for Engineering Technologies course. This game was introduced in this
course to enhance their comprehension of various safety topics. The effectiveness of this game was assessed
by evaluating students’ ability to recognize certain hazards related to the operation of a grinder. Students in
each section received the same information on safe operating procedures of a grinder that included areas of
potential hazards and appropriate measures to avoid these hazards. The following are the three sections:
lecture only; lecture with laboratory exercise in the mechanical laboratory, and lecture with 3D safety game.
Students in each section were assessed on knowledge gained about safe grinder operations. Student learning
assessment were conducted for students in each section, a week after they had completed the lecture (section
1), lecture and physical laboratory exercise (section 2), and lecture and 3D safety game (section 3),
respectively. On average, the first section scored 59%, the second section scored 76%, and the third section
using virtual safety exercise received the highest assessment score of 82%. Thus the study supported
the advantages of utilization of virtual safety exercise in enhancing students’ learning.
5.2. Assessment of physical security game
The physical security game was introduced to high school students during one-week high school
summer camp. Purdue University Northwest offered one-week summer camps from 2016 to 2018 to a total
of 181 high school students with 107 underrepresented minority populations. During this one-week summer
camp, each participant played this 3D physical security game at his/her own pace to learn the concept of
security measures. Upon completion of camp, a survey was conducted to assess the student’s satisfaction
with 3D physical security game. A 5-point Likert scale was used to measure the students’ satisfaction with
game experiences ranging from 5 (strongly agree) to 1 (strongly disagree). Survey participants showed that
game-based learning for physical security enhanced their knowledge in general security awareness. 86% of
participants indicated that they knew more about physical security than they did before this camp. 82% of
participants mentioned that they were more comfortable learning security concepts after playing the physical
security game. 84% of participants responded that the physical security game was interesting.
8. J. Edu. & Learn. ISSN: 2089-9823
Game based learning for safety and security education (Ge Jin)
121
6. CONCLUSION
This paper presented an innovative game-based learning method for safety and security education.
Game based learning is an upcoming method to teach various topics in an educational setting. This method is
especially valuable when learning safety and security concepts without the risk of getting physically injured.
This article described the process of developing 3D safety and security games to assist student’s learning.
This process consists of four major steps: topic identification, 3D environment modeling, game
programming, and assessment of learning. Based on the result of assessments, the 3D safety game produced
similar learning outcome as physical environment. The physical security game was an excellent approach to
assist high school students’ learning of security concepts. This approach is beneficial to the future workforce
as it exposes more high school students to the security discipline. This was also supported by the survey
conducted after the summer camp, with average ratings of 4.26 out of 5 on all Likert-scale. The result of this
study supports the potential of game based learning method to be utilized to various disciplines to enhance
learning without putting learners in harm’s way and get more realistic experience.
ACKNOWLEDGEMENTS
This research was supported in part by NSA/NSF grant H98230-17-1-2006 and NSF DGE SFS
grant #1723666.
REFERENCES
[1] Kumar, A., Gupta, S., Rai, A., and Sinha, S., "Social Networking Sites and Their Security Issues," International
Journal of Scientific and Research Publications, vol. 3, no. 4, pp. 1-5, 2015.
[2] Tang, S. and Hanneghan, M., "A Model-Driven Framework to Support Development of Serious Games for Game
based Learning," The 3rd International Conference on Developments in e-Systems Engineering, pp. 95-100,
London, UK. 2010.
[3] Bureau of Labor Statistics, "Injuries, Illnesses, and Fatalities," BLS, 2019. [Online]. Available:
https://www.bls.gov/iif/. [Accessed Aug 26, 2019]
[4] National Safety Council, "Work injury costs," Injury Facts National Safety Council 2018. [Online]. Available:
https://injuryfacts.nsc.org/work/costs/work-injury-costs/. [accessed Aug 26, 2019]
[5] New York State Department of Transportation, "Safety Bulletin Code SB-04-1," 2004.
[6] Occupational Safety and Health Administration (OSHA), "U.S. Labor Department's OSHA Region 5 News
Release: 07-1489-CHI," 2007.
[7] Roughton, J.E. and Mercurio, J.J., Developing an Effective Safety Culture, Boston: Butterworth Heinemann, 2002.
[8] Manuele, F., "Prevention Through Design," Professional Safety, vol. 53, no. 10, pp. 28-40, 2008.
[9] Lazzara, J., "Why machine safety makes dollars and sense," Machinesafety, 2008. [Online]. Available:
http://www.machinesafety.net/dollars.html. [Accessed December 18, 2008]
[10] Johnson, E., and Willey, N., "Usability Failures and Healthcare Data Hemorrhages," IEEE Security and Privacy,
vol. 9, no. 2, pp. 18-25, 2011.
[11] Tu, M., and Spoa-Harty, K., "Data Loss Prevention Management and Control: Inside Activity Monitoring,
Identification, and Tracking in Healthcare Enterprise Environments," Journal of Digital Forensics, Security, and
Law, vol. 10, no. 1, pp. 27-44, 2015.
[12] Trautman, L., "Cyberseurity: What about US policy?," Journal of Law, Technology and Policy, vol. 2015, no. 2,
pp. 341-391, 2015.
[13] Ladabouche, T. and LaFountain, S., "GenCyber: Inspiring the Next Generation of Cyber Stars," IEEE Security &
Privacy, vol. 14, no. 5, pp. 84-86, 2016.
[14] Jin, G., Tu, M., Kim, T.H., Heffron, J., White, J., "Evaluation of game-based learning in cybersecurity education
for high school students," Journal of Education and Learning (EduLearn), vol. 12, no. 1, pp. 150-158, 2018.
[15] Davidson, D., Beyond fun: Serious games and media, ETC Press, Pittsburgh, PA. 2008.
[16] Findley, M., "The relationship between student learning styles and motivation during educational video game play,"
International Journal of Online Pedagogy and Course Design, vol. 1, no. 3, pp. 63-73, 2011.
[17] Hamari J. and Koivisto, J., "Why do people use gamification services?," International Journal of Information
Management, vol. 35, no. 4, pp. 419-431, 2015.
[18] Nakayama,S., Jin, G., "Safety training: enhancing outcomes through virtual environments," Professional Safety:
American Society of Safety Engineers, vol. 30, no. 2, pp. 34-38, 2015.
[19] Orr, T. J., Mallet, L. G., and Margolis, K. A., "Enhanced fire escape training for mine workers using virtual reality
simulation," Mining Engineering, vol. 61, no. 11, pp. 41-44, 2009.
[20] Smith, S., and Erickson, E., "Using immersive game-based virtual reality to teach fire-safety skills to children,"
Virtual Reality, vol. 13, pp. 87–99, 2009.
[21] Norris, W.M., Spicer, K., and Byrd T., "Virtual reality: The new pathway for effective safety training,"
Professional Safety, vol. 64, no. 6, pp. 36-39, 2019.
[22] Occupational Safety and Health Administration, "Top 10 OSHA violations: 2019," 2019. [Online]. Available:
https://www.grainger.com/know-how/safety/safety-management/safety-compliance/kh-top-10-osha-violations-
2019. [Accessed Aug 26, 2019]
9. ISSN: 2089-9823
J. Edu. & Learn. Vol. 14, No. 1, February 2020 : 114 – 122
122
[23] EPIC Games., "Unreal Engine," [Online]. Available: https://www.unrealengine.com/en-US/, Accessed Sep 14,
2019, 2019.
[24] Autodesk 3DS Max, "Autodesk® 3DS Max®," 2019.
[25] Autodesk Maya, "Autodesk® Maya®," 2019.
BIOGRAPHIES OF AUTHORS
Dr. Ge Jin is currently a professor in the Department of Computer Information Technology and
Graphics at the Purdue University Northwest. He holds a B.S. in Computer Science from Peking
University, China, and an M.S. in Computer Science from Seoul National University, South
Korea. He earned his Doctor of Science degree in Computer Science with a concentration in
computer graphics from the George Washington University. His research spans the fields of
computer graphics, virtual reality, computer animation, medical visualization, and educational
game development.
Dr. Shoji Nakayama is an associate professor of Organizational Leadership and Supervision in
the Department of Construction Science and Organizational Leadership at Purdue University
Northwest. In this position, he teaches safety and health related courses, as well as improving
Environmental Health and Safety curriculum through Industrial Advisory Committees. Dr.
Nakayama has safety related experience in automotive, airline, regulatory agency, and print
industries. He worked as an Environmental, Health, and Safety System Analyst in the
telecommunication industry prior to his current position. His research interests include human
performance development/improvement, safety performance analysis, integration of safety
principles into lean manufacturing, and development of effective online training modules. Dr.
Nakayama holds a B.S. in Safety Management and M.S. in Industrial Management from
University of Central Missouri and a Ph.D. in Technology Management, with specialization in
Human Resource Development and Industrial Training from Indiana State University.
Dr. Manghui Tu is an associate professor of Computer Information Technology, Director of the
Center of Excellence for Cyber Security and Infrastructure Protection, and the Point of Contact
of the NSA/DHS Designated National Center of Academic Excellence in Cyber Defense
Education at Purdue University Northwest. Dr. Tu’s areas of expertise are information assurance,
digital forensics, cybersecurity education, and cloud computing. His research has been supported
by NSA and NSF and published over 40 peer reviewed papers in prestigious journals and peer
reviewed conference proceedings. Dr. Tu has over 11 years of college teaching and research
experiences in cybersecurity and digital forensics.