The eighth volume in the "Simulation and Gaming Research Yearbook" series brings together topical and authoritative contributions from international professionals involved in the use of games and simulations. There are examples drawn from a wide range of countries.
The theme of this volume is emergency and crisis management and how games and simulations are effective tools in dealing with these issues. The work brings together topical contributions from international figures in the field of games and simulations.
The eighth volume in the "Simulation and Gaming Research Yearbook" series brings together topical and authoritative contributions from international professionals involved in the use of games and simulations. There are examples drawn from a wide range of countries.
This book provides the state of the art in the simulation and gaming study field by systematically collecting excellent papers presented at the 46th International Simulation and Gaming Association annual conference held in Kyoto 17–25 July 2015. Simulation and gaming has been used in a wide variety of areas ranging from early childhood education and school-age children, universities, and professional education, to policy exploration and social problem solving. Moreover, it now been drastically changing its features in the Internet Of Things (IOT) society while taking over a wide variety of aliases, such as serious games and gamification. Most of the papers on which this book’s chapters are based were written by academic researchers, both up-and-coming and well known. In addition, simulation and gaming is a translational system science going from theory to clinical cross-disciplinary topics. With this book, therefore, graduate students and higher-level researchers, educators, and practitioners can become familiar with the state-of-the-art academic research on simulation and gaming in the network society of the twenty-first century.
"This book proposes simulation games supported by the most recent discoveries and advances in theories of learning research, and gears operational decisions toward the development of an integrated system for the teaching of mathematics in primary schools"--Provided by publisher.
This book constitutes the refereed post-conference proceedings of the 21st Annual Simulation Technology and Training Conference, SimTecT 2016, and the 47th International Simulation and Gaming Association Conference, ISAGA 2016, Held as Part of the First Australasian Simulation Congress, ASC 2016, held in Melbourne, VIC, Australia, in September 2016. The 28 revised full papers included in the volume were carefully reviewed and selected from 55 submissions. They are organized in the following topical sections: Making the grade; Come to think of it; From here to fidelity; The name of the game; and Ahead of the game.
This book constitutes the refereed post-conference proceedings of the 44th International Simulation and Gaming Association Conference, ISAGA 2013, and the IFIP WG 5.7 Workshop on Experimental Interactive Learning in Industrial Management, held in Stockholm, Sweden, in June 2013 The 30 revised full papers were carefully reviewed and selected for inclusion in the book. The papers are organized in topical sections on frontiers in gaming simulation for education; frontiers in gaming simulation for design and experimentation; frontiers in gaming simulation for transportation and logistics; and professionalism and business in gaming simulation.
Focusing on countermeasures against orchestrated cyber-attacks, Cyber Security Culture is research-based and reinforced with insights from experts who do not normally release information into the public arena. It will enable managers of organizations across different industrial sectors and government agencies to better understand how organizational learning and training can be utilized to develop a culture that ultimately protects an organization from attacks. Peter Trim and David Upton believe that the speed and complexity of cyber-attacks demand a different approach to security management, including scenario-based planning and training, to supplement security policies and technical protection systems. The authors provide in-depth understanding of how organizational learning can produce cultural change addressing the behaviour of individuals, as well as machines. They provide information to help managers form policy to prevent cyber intrusions, to put robust security systems and procedures in place and to arrange appropriate training interventions such as table top exercises. Guidance embracing current and future threats and addressing issues such as social engineering is included. Although the work is embedded in a theoretical framework, non-technical staff will find the book of practical use because it renders highly technical subjects accessible and links firmly with areas beyond ICT, such as human resource management - in relation to bridging the education/training divide and allowing organizational learning to be embraced. This book will interest Government officials, policy advisors, law enforcement officers and senior managers within companies, as well as academics and students in a range of disciplines including management and computer science.