You Hacked My Program! Teaching Cybersecurity using Game-based Learning
Saved in:
Published in | The 26th Western Canadian Conference on Computing Education |
---|---|
Format | Conference Proceeding |
Language | English |
Online Access | Get full text |
DOI | 10.1145/3660650.3660672 |
Cover
BookMark | eNotj7tOwzAYhT3AAIWZ1TxAii-J7YwoghQpCIYyMFm_HbtEJE7lNEJ-e1LIdKRzk75rdBHG4BC6o2RLaV48cCGIKMj2TyW7QvXnOOMd2G_X4teE3-N4iDDc470D-9WFA66ScXFydo7dKeF5Ons1DC4zMC2bxkEMi3eDLj30k7tddYM-np_21S5r3uqX6rHJgAl1yhQHYq0sFS0L7qUrPVih8lJ4KmnOPC-NFdYwAUvMrFSMtwyYa6ldOobzDSL_v3M4QvqBvtfH2A0Qk6ZEnxn1yqhXRv4LQ3pLCA |
---|---|
ContentType | Conference Proceeding |
DBID | ADTOC UNPAY |
DOI | 10.1145/3660650.3660672 |
DatabaseName | Unpaywall for CDI: Periodical Content Unpaywall |
Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
DeliveryMethod | fulltext_linktorsrc |
ExternalDocumentID | 10.1145/3660650.3660672 |
GroupedDBID | ADTOC UNPAY |
ID | FETCH-LOGICAL-a268t-83a0cc7981953f7e9fac68496f17142f39bc6cb26a53f2c7823d2a2ed1c96fb33 |
IEDL.DBID | UNPAY |
IngestDate | Sun Sep 07 11:27:09 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
License | cc-by-nc-nd |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-a268t-83a0cc7981953f7e9fac68496f17142f39bc6cb26a53f2c7823d2a2ed1c96fb33 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=https://doi.org/10.1145/3660650.3660672 |
ParticipantIDs | unpaywall_primary_10_1145_3660650_3660672 |
PublicationTitle | The 26th Western Canadian Conference on Computing Education |
Score | 1.8808808 |
SourceID | unpaywall |
SourceType | Open Access Repository |
Title | You Hacked My Program! Teaching Cybersecurity using Game-based Learning |
URI | https://doi.org/10.1145/3660650.3660672 |
UnpaywallVersion | publishedVersion |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3BSgMxEA3SHsSLihUVlQhePKTuJruzm6MU20Vo6aGFelom2WwP1rWULVK_3qSNtYgHPSWQgYQJybxkZt4Qcit4IKRWignQYB8oCTCUImYAZaxCnWpTuq-B_gCycfQ0iSeeJMnlwuz678MovhcADkS0121i79omOE9SgzTHg-HDsyfr-UXygOwvqzmu3nE227EY3UOSfc21CRR5aS9r1dYfP2gY_7CYI9L6Tsujw63BOSZ7pjohPXteaYb2MBa0v3LjLt7qho58mCTtrJSFeL5MHXVx7lPaw1fDnAErqCdYnbbIuPs46mTMV0dgyCGtWSow0DqRa0dYmRhZooY0klC6mua8FFJp0IoD2mGuLRIQBUduilBbGSXEKWlUb5U5I9RCIIwstMA0MFHBYzS2J3Xods0CrOCc3G11mc83LBj5JqM5zr1Scq-Ui3_IXpJGvViaK2vWa3Xtt_QTOm6dlQ |
linkProvider | Unpaywall |
linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3BSgMxEA3SHsSLihUVlQhePKTuJruzm6MU20Vo6aGFelom2WwP1rWULVK_3qSNtYgHPSWQgYQJybxkZt4Qcit4IKRWignQYB8oCTCUImYAZaxCnWpTuq-B_gCycfQ0iSeeJMnlwuz678MovhcADkS0121i79omOE9SgzTHg-HDsyfr-UXygOwvqzmu3nE227EY3UOSfc21CRR5aS9r1dYfP2gY_7CYI9L6Tsujw63BOSZ7pjohPXteaYb2MBa0v3LjLt7qho58mCTtrJSFeL5MHXVx7lPaw1fDnAErqCdYnbbIuPs46mTMV0dgyCGtWSow0DqRa0dYmRhZooY0klC6mua8FFJp0IoD2mGuLRIQBUduilBbGSXEKWlUb5U5I9RCIIwstMA0MFHBYzS2J3Xods0CrOCc3G11mc83LBj5JqM5zr1Scq-Ui3_IXpJGvViaK2vWa3Xtt_QTOm6dlQ |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=The+26th+Western+Canadian+Conference+on+Computing+Education&rft.atitle=You+Hacked+My+Program%21+Teaching+Cybersecurity+using+Game-based+Learning&rft_id=info:doi/10.1145%2F3660650.3660672&rft.externalDocID=10.1145%2F3660650.3660672 |