{"id":"https://openalex.org/W4403307506","doi":"https://doi.org/10.1145/3665463.3678832","title":"C.A.L.Y.P.S.O.: Designing Gameplay Features for Improving Player's Cybersecurity Self-Efficacy","display_name":"C.A.L.Y.P.S.O.: Designing Gameplay Features for Improving Player's Cybersecurity Self-Efficacy","publication_year":2024,"publication_date":"2024-10-10","ids":{"openalex":"https://openalex.org/W4403307506","doi":"https://doi.org/10.1145/3665463.3678832"},"language":"en","primary_location":{"id":"doi:10.1145/3665463.3678832","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3665463.3678832","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Companion Proceedings of the 2024 Annual Symposium on Computer-Human Interaction in Play","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088719030","display_name":"Isadora Krsek","orcid":"https://orcid.org/0000-0001-9624-5077"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Isadora Krsek","raw_affiliation_strings":["Carnegie Mellon University, United States"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, United States","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081968952","display_name":"Shuqi Chen","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shuyang Chen","raw_affiliation_strings":["Carnegie Mellon University, United States"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, United States","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006053551","display_name":"Sauvik Das","orcid":"https://orcid.org/0000-0002-9073-8054"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sauvik Das","raw_affiliation_strings":["Carnegie Mellon University, United States"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, United States","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090310268","display_name":"Jason Hong","orcid":"https://orcid.org/0000-0002-9856-9654"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jason I. Hong","raw_affiliation_strings":["Human-Computer Interaction Institute, Carnegie Mellon University, United States"],"affiliations":[{"raw_affiliation_string":"Human-Computer Interaction Institute, Carnegie Mellon University, United States","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089412314","display_name":"Laura Dabbish","orcid":"https://orcid.org/0000-0001-9489-4188"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Laura Dabbish","raw_affiliation_strings":["Carnegie Mellon University, United States"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, United States","institution_ids":["https://openalex.org/I74973139"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5088719030"],"corresponding_institution_ids":["https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":0.7009,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.69457266,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"372","last_page":"377"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.992900013923645,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6202355623245239},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5555456876754761}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6202355623245239},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5555456876754761}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3665463.3678832","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3665463.3678832","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Companion Proceedings of the 2024 Annual Symposium on Computer-Human Interaction in Play","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1514535932","https://openalex.org/W1993722065","https://openalex.org/W2090949570","https://openalex.org/W2096393790","https://openalex.org/W2136136174","https://openalex.org/W2146115169","https://openalex.org/W2256695479","https://openalex.org/W2471998880","https://openalex.org/W2537669654","https://openalex.org/W2615697402","https://openalex.org/W2793082563","https://openalex.org/W2795673503","https://openalex.org/W2802670796","https://openalex.org/W3031264381","https://openalex.org/W3038479367","https://openalex.org/W3112955976","https://openalex.org/W4307475457","https://openalex.org/W6819083493"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052","https://openalex.org/W4402327032","https://openalex.org/W2382290278"],"abstract_inverted_index":{"Cybersecurity":[0],"campaigns":[1],"often":[2],"fail":[3],"because":[4],"tools":[5,106],"and":[6,51,71,75,107,124,161],"practices,":[7],"like":[8],"password":[9],"managers,":[10],"appear":[11],"too":[12],"daunting":[13],"or":[14,56],"difficult":[15],"to":[16,28,99,138,145,153,156,162,170,180],"implement.":[17],"While":[18],"prior":[19],"work":[20,122,136],"has":[21],"shown":[22],"that":[23,149,166],"transformational":[24,79],"game":[25,80,165],"design":[26,74,87,95,112,117,147,176],"approaches":[27,59],"improving":[29],"players\u2019":[30,65],"security":[31],"self-efficacy":[32,94,116,144],"can":[33,150],"show":[34],"promise":[35],"in":[36,41,61,97,120,178],"encouraging":[37],"more":[38],"secure":[39],"behaviors":[40,160],"players,":[42],"we":[43],"still":[44],"lack":[45],"a":[46,78,164],"systematic":[47],"understanding":[48],"of":[49,77,103,115,127,134,143,174],"how":[50,57],"why":[52],"these":[53,58,175],"features":[54,118],"work,":[55],"differ":[60],"their":[62],"impact":[63],"on":[64,140],"behavior":[66],"change.":[67],"This":[68],"paper":[69],"presents":[70],"describes":[72],"the":[73,128,172],"implementation":[76],"called":[81],"C.A.L.Y.P.S.O.,":[82],"incorporating":[83],"12":[84,111],"dynamically":[85],"toggle-able":[86],"patterns":[88,113,148,177],"inspired":[89],"by":[90],"Bandura\u2019s":[91],"principles":[92],"for":[93],"[7]":[96],"order":[98],"encourage":[100],"users\u2019":[101],"adoption":[102],"expert-recommended":[104],"cybersecurity":[105,159],"best":[108],"practices.":[109],"These":[110],"consist":[114],"explored":[119],"other":[121,125,154],"[9],":[123],"techniques":[126],"authors\u2019":[129],"own":[130],"design.":[131],"The":[132],"goal":[133],"this":[135],"is":[137],"draw":[139],"psychological":[141],"theories":[142],"develop":[146],"be":[151],"translated":[152],"contexts":[155],"enhance":[157],"end-user":[158],"build":[163],"will":[167],"enable":[168],"researchers":[169],"assess":[171],"effectiveness":[173],"comparison":[179],"one":[181],"another.":[182]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
