{"id":"https://openalex.org/W4413639902","doi":"https://doi.org/10.1109/csr64739.2025.11130039","title":"A Structured Process for Scenario-Based Gamification of Cyber Threat Intelligence for Space System Security","display_name":"A Structured Process for Scenario-Based Gamification of Cyber Threat Intelligence for Space System Security","publication_year":2025,"publication_date":"2025-08-04","ids":{"openalex":"https://openalex.org/W4413639902","doi":"https://doi.org/10.1109/csr64739.2025.11130039"},"language":"en","primary_location":{"id":"doi:10.1109/csr64739.2025.11130039","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130039","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5099383911","display_name":"Mona Kriesten","orcid":"https://orcid.org/0000-0001-9348-8428"},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"education","lineage":["https://openalex.org/I170239107"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Mona Kriesten","raw_affiliation_strings":["UniSA STEM University of South Australia,Adelaide,South Australia,Australia"],"affiliations":[{"raw_affiliation_string":"UniSA STEM University of South Australia,Adelaide,South Australia,Australia","institution_ids":["https://openalex.org/I170239107"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023362402","display_name":"Mamello Thinyane","orcid":"https://orcid.org/0000-0001-5900-0601"},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"education","lineage":["https://openalex.org/I170239107"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Mamello Thinyane","raw_affiliation_strings":["UniSA STEM University of South Australia,Adelaide,South Australia,Australia"],"affiliations":[{"raw_affiliation_string":"UniSA STEM University of South Australia,Adelaide,South Australia,Australia","institution_ids":["https://openalex.org/I170239107"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5040977135","display_name":"David Ormrod","orcid":"https://orcid.org/0000-0002-0599-8362"},"institutions":[{"id":"https://openalex.org/I170239107","display_name":"University of South Australia","ror":"https://ror.org/01p93h210","country_code":"AU","type":"education","lineage":["https://openalex.org/I170239107"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"David Ormrod","raw_affiliation_strings":["UniSA STEM University of South Australia,Adelaide,South Australia,Australia"],"affiliations":[{"raw_affiliation_string":"UniSA STEM University of South Australia,Adelaide,South Australia,Australia","institution_ids":["https://openalex.org/I170239107"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5099383911"],"corresponding_institution_ids":["https://openalex.org/I170239107"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37856443,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"413","last_page":"418"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9089000225067139,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9089000225067139,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6797780990600586},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6782293319702148},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5275375843048096},{"id":"https://openalex.org/keywords/cyber-space","display_name":"Cyber Space","score":0.5113617777824402},{"id":"https://openalex.org/keywords/space","display_name":"Space (punctuation)","score":0.5099135637283325},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3622356653213501},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3292687237262726},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.1667933166027069},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10853680968284607},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.07562869787216187}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6797780990600586},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6782293319702148},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5275375843048096},{"id":"https://openalex.org/C2909575446","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyber Space","level":3,"score":0.5113617777824402},{"id":"https://openalex.org/C2778572836","wikidata":"https://www.wikidata.org/wiki/Q380933","display_name":"Space (punctuation)","level":2,"score":0.5099135637283325},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3622356653213501},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3292687237262726},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.1667933166027069},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10853680968284607},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.07562869787216187},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/csr64739.2025.11130039","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csr64739.2025.11130039","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Cyber Security and Resilience (CSR)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Climate action","id":"https://metadata.un.org/sdg/13","score":0.4099999964237213}],"awards":[],"funders":[{"id":"https://openalex.org/F4320315885","display_name":"Australian Government","ror":"https://ror.org/0314h5y94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2049080106","https://openalex.org/W2061419792","https://openalex.org/W2068141066","https://openalex.org/W2150435858","https://openalex.org/W2536591707","https://openalex.org/W2610867349","https://openalex.org/W2806206692","https://openalex.org/W2900798914","https://openalex.org/W2980174164","https://openalex.org/W3041620850","https://openalex.org/W3042306246","https://openalex.org/W3151279870","https://openalex.org/W3175126468","https://openalex.org/W4242331924","https://openalex.org/W4306316827","https://openalex.org/W4399311127"],"related_works":["https://openalex.org/W4312636841","https://openalex.org/W2260732578","https://openalex.org/W2383307377","https://openalex.org/W3041672727","https://openalex.org/W4242137431","https://openalex.org/W1556979642","https://openalex.org/W2038905316","https://openalex.org/W4323341852","https://openalex.org/W4285325633","https://openalex.org/W748062150"],"abstract_inverted_index":{"Gamification":[0],"of":[1,8,40,75,155,183],"cyber":[2,23,61,79,112,127],"threat":[3,62,80,128],"intelligence":[4,81,129],"holds":[5],"the":[6,35,102,111,123,143,147,165,180],"promise":[7],"enhancing":[9],"user":[10,144],"engagement":[11,145],"and":[12,18,38,53,64,83,99,115,138,140,160,189,192],"interaction":[13],"in":[14,16,33,51,173,185],"cybersecurity":[15,76],"general,":[17],"specifically":[19],"for":[20,48,59,196,199],"space":[21,116],"systems":[22],"resilience.":[24],"The":[25,153,176],"narrative":[26,49,68,103,197],"game":[27],"mechanic":[28],"plays":[29],"an":[30,194],"important":[31],"role":[32],"shaping":[34],"overall":[36,166],"interactivity":[37],"agility":[39],"gamification":[41,84,167,184],"solutions.":[42],"This":[43,87],"paper":[44,177],"explores":[45],"theoretical":[46],"foundations":[47],"development":[50,69,198],"games":[52],"gamification,":[54],"presents":[55],"key":[56],"design":[57,93],"considerations":[58],"gamifying":[60],"intelligence,":[63],"formulates":[65],"a":[66,91,150],"structured":[67],"process":[70],"comprising":[71],"three":[72],"distinct":[73],"phases":[74],"storyline":[77],"development,":[78,82],"rules":[85],"development.":[86],"process,":[88],"developed":[89,131,172],"through":[90],"humancentred":[92],"approach":[94,157,195],"that":[95,169],"engaged":[96],"domain":[97],"experts":[98],"endusers,":[100],"adopts":[101],"interweaving":[104],"technique":[105],"by":[106],"adapting":[107],"representative":[108],"cyber-attacks":[109],"from":[110],"supply":[113],"chain":[114],"system":[117],"security":[118],"context,":[119],"it":[120],"then":[121],"links":[122],"resulting":[124],"scenario":[125],"to":[126,164,179],"information":[130],"using":[132],"opensource":[133],"frameworks":[134],"like":[135],"MITRE":[136],"ATT&CK":[137],"DEF3ND,":[139],"finally":[141],"structures":[142],"with":[146,162],"content":[148],"along":[149],"decision":[151],"tree.":[152],"utility":[154],"this":[156,174],"is":[158],"demonstrated":[159],"discussed":[161],"reference":[163],"solution":[168],"has":[170],"been":[171],"project.":[175],"contributes":[178],"growing":[181],"area":[182],"cybersecurity,":[186],"beyond":[187],"education":[188],"awareness":[190],"training,":[191],"proposes":[193],"CTI-based":[200],"gamification.":[201]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
