Next Article in Journal
In-Vitro Investigation of Fatigue and Fracture Behavior of Transmucosal versus Submerged Bone Level Implants Used in Fixed Prosthesis
Next Article in Special Issue
Privacy Preservation and Analytical Utility of E-Learning Data Mashups in the Web of Data
Previous Article in Journal
Design of a Distributed Wireless Sensor Platform for Monitoring and Real-Time Communication of the Environmental Variables during the Supply Chain of Perishable Commodities
Previous Article in Special Issue
A Predictive Analytics Infrastructure to Support a Trustworthy Early Warning System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Study on the Design and Application of Fictional Storytelling in Online Learning of Computer Security

by
Joan Arnedo-Moreno
1 and
Victor Garcia-Font
2,*,†
1
Estudis d’Informàtica, Multimèdia i Telecomunicació, Universitat Oberta de Catalunya (UOC), Rambla del Poblenou 156, 08018 Barcelona, Spain
2
Department of Computer Engineering and Mathematics, Universitat Rovira i Virgili (URV), Av. Països Catalans 26, 43007 Tarragona, Spain
*
Author to whom correspondence should be addressed.
CYBERCAT—Center for Cybersecurity Research of Catalonia.
Appl. Sci. 2021, 11(13), 6185; https://doi.org/10.3390/app11136185
Submission received: 3 June 2021 / Revised: 23 June 2021 / Accepted: 1 July 2021 / Published: 3 July 2021
(This article belongs to the Collection The Application and Development of E-learning)

Abstract

:
Computer security is an important part of the computer science (CS) curriculum in all kinds of universities. Although the educational approach tends to be highly technical and practical, it cannot be avoided that some understanding and memorizing of the core concepts is necessary beforehand. One method that has been found to work in favor of human psychology, and of special interest in the case of online learning, where student motivation is at a higher stake, would be to present such content as memorable and relatable situations to the reader, using some form of fictional storytelling. However, this approach must always serve its educational purpose first, following a set of sound design principles. This paper presents a study including 111 participants to evaluate the convenience of using a digital book called the “novelette”, which relies on storytelling, to teach computer security concepts in the CS degree of Universitat Oberta de Catalunya (UOC), a 100% online university. The study involved two questionnaires to gather quantitative and qualitative information about the format, content and students’ perception. This study shows that the validity and usefulness of this approach is on par with traditional ones, but also has a higher impact on student motivation and self-perception of the acquired knowledge.

1. Introduction

Computer security (or cybersecurity) is a very important part of the computer science (CS) curriculum, as its relevance in the successive iterations of the ACM curriculum guidelines for undergraduate degree programs in information technology by [1] testifies. Indeed, in the latest version of the curriculum guidelines, cybersecurity (SCEC) has become a core discipline, added to the body of knowledge “in recognition of the world’s reliance on information technology and its critical role in computer science education”, and “Information Assurance and Security” (CE-SEC) is considered in the list a Computer Science Competencies. Future CS graduates in any sub-field should be aware of the role of computer security and master basic topics, such as how, for instance, they know how to code [2]. As [3] points out, it is very important to address the factors influencing the information security behavior of all IT employees, if not society at large.
On the topic of teaching computer security, even when the subject curriculum is designed as highly practical, focused on the use and application of tools, it is very difficult to fully avoid the situation where it is necessary to justify why this topic is important and to memorize some basic concepts beforehand. On that regard, no matter the course format or subject, reading course materials and defining basic concepts is often one of the main tasks a student must perform during instruction, especially at the beginning. The classic approach in highly technical fields is to present them as a straightforward expository text, that “both describes and explains how something operates” [4], in the appropriate amount of detail. However, it is important that during the first steps of the course students keep their interest in the subject, at the same time that they are actually learning these basics. Another possibly more engaging approach would be to use a fictional story, a “chain of events in cause–effect relationships occurring in time and space”, crafted in a way to interest the audience [5,6].
The use of stories is not new at all to instruction, especially among children [7]. Studies such as the ones by [8] or [9] have shown storytelling to be more powerful in learning, being faster to read and easier to understand and internalize, for both young and adults. According to [10] or [11], human psychology works in favor of this approach, based on presenting memorable situations that the reader can relate to, or even become subject to spontaneous affective reactions. However, as we transition towards course design approaches in higher education, and especially in technical fields, this does not seem to be a very common approach. It is true that, in computer security specifically, there is a broad literature of fiction about “hackers”, where cybersecurity plays an important role in the story. However, and this is very important, in most of them, narrative licences prevail over technical accuracy [12], which goes against any educational purpose.
This paper presents a study on the design and application of a digital book named “the novelette” (or short novel) at Universitat Oberta de Catalunya (UOC), a 100% online university. The design process, and the final product itself, has been crafted from scratch and tested as the introductory educational resource in a computer security subject of a CS Bachelor directed at adult distance learners. However, the “novelette” has a dual nature, depending on the reader. At its core, it is a standalone digital novel, written by a professional of the “thriller” genre and with value as pure entertainment. In fact, it is currently sold in digital book stores to the general public. However, it has been designed by educators as a learning resource from its very inception, first and foremost, with clear learning outcomes. It is worth noting that it is neither expository text wrapped in some story, nor a compilation of examples based in some hypothetical professional situation. The “novelette” is a story of the “invented” type as established by [13], that aims to engage the reader through the mechanisms used by similar fiction (intrigue, a sense of adventure, etc.).
The main contribution of this work is a better understanding of the effectivity of storytelling-based approaches in adult education in distance learning, especially from the student’s point of view, thus testing the hypotheses on this topic by the previously mentioned authors and furthering the research on this topic. This paper also documents the design process of this kind of resource, highlighting the most important aspects that must be taken into account when teaching technical topics through storytelling. Both contributions can be very useful to other educators who want to develop engaging learning resources using this approach, especially in technical fields or at online institutions.
This paper is structured as follows. Section 2 provides an overview of the relevance of engaging students and why resorting to storytelling as an educational approach can be useful. Next, the design methodology and pedagogical background for the “novelette” is presented in Section 3. Section 4 formally defines the research questions and describes the design of the study to evaluate the convenience of employing storytelling in the early stages of learning in computer security with adult students. The results of the study are presented in Section 5 and discussed in Section 6. Finally, Section 8 concludes this paper and provides some insights on present and future work.

2. Background

Difficulties in student motivation are recognized as an important concern in diverse environments. Engagement has become increasingly relevant, since high-motivated people have better odds of achieving better performances and overcoming daily challenges. Indeed, motivation is even at a higher stake in some complex educational contexts, such as fully online institutions, where students may feel isolated, or in adult learning, where students must reconcile their scarce study time with their taxing day-to-day obligations. To achieve this state of engagement, many variables are involved, but a very popular solution in the recent years is the use of ludic or playful approaches. On that regard, the application of techniques such as gamification or the creation of “serious games” as an educational resource [14] has specially proliferated in the scientific literature, as shown by the different reviews on the topic, such as the ones by [15] or [16], among others. Generally speaking about the education of computer security, advances in recent years heavily tend towards the use of games or virtual laboratories, according to [17].
However, inspecting studies on the different existing frameworks to design ludic approaches, such as the one from [18], also shows that this is not trivial. Even though the end results of the experiences tend to be positive, as shown in literature reviews and meta-studies, great effort is required. Instructors report that the costs of design and implementation, the time needed, and the difficulties in the process may be too great in relation to the expected benefits [19]. The risk of incurring a high cost is especially acute when there is an over-reliance in creating complex digital products (i.e., video games or similar), which also may create the burden of additional technological requirements as a side-effect. Moreover, educators are not necessarily professional game designers, much less developers. Maybe a simpler conceptualization of a proven learning resource, still taking into account this ludic experience approach, could be provide a better return of investment in some cases.
When looking for this much simpler approach, one can consider that, at their very core, one of the main motivating factors behind these games are their stories. A key aspect of stories, and what makes them truly memorable, are the emotions and the cognitive aspects they evoke in the audience [20]. On that regard, ref. [21] explicitly considers “narrative”, a story that is being slowly unfolded, as one of its 52 “Gamification Mechanics and Elements”, at the same level as more straightforward, and less nuanced, game elements such as “points” or “leaderboards”. Nevertheless, narrative is not exclusive to games or other interactive media, despite their current popularity. For instance, a simple novel’s ability to engage the reader is purely based on narrative, with the added advantage that it does not require any additional additional competence beforehand, beyond being able to read, and the technological requirements can be very low.
Focusing on a purely narrative approach and its application in learning, it can be found that, similar to the concept of “serious game” exists, the concept of “serious storytelling” is also defined, by [22]: “storytelling outside the context of entertainment, where the narration progresses as a sequence of patterns impressive in quality, relates to a serious context, and is a matter of thoughtful process”. Serious storytelling is concerned with narration in a particular context beyond entertainment. Therefore, in the context of learning, the story is grounded in the pedagogical rules and goals: design learning, learning experiences and outcomes, etc. The concept of serious storytelling is also very close to digital storytelling [23], which takes full advantage of technology, but also becomes absolutely dependent on it in the process. A survey from [24] provides an overview, emphasizing its potential as a knowledge translation tool and relevance in the field of education, training and professional development, providing examples in the field of professional development such as [25] or [26].
On the effectiveness of this approach, according to the work of [27], existing research suggests that it can improve affective and utility reactions to learning. The former represents the emotional response, or enjoyment, whereas the latter is related to the cognitive response, or evaluation of usefulness of the fiction. Different studies also suggest that using storytelling usually has a larger effect than expository text (such as [10] or [28]). However, research is still ongoing, since it is also true that a study by [29] found no significant difference in either kind of reaction (all were positive in both cases).
Taking a look at the application of storytelling in higher education settings, and not aimed at school-age students, several specific examples can be found. However, beyond media studies, which are directly related to interpreting the fiction itself, this approach is more easily found in fields related to social fields, such as history, management, business or law, to name a few ([30,31,32,33]). In fact, ref. [34] studied the acceptance of short novels in the context of a criminology degree, although in complete isolation. The results provided no frame of reference or comparison to the use of direct expository text, nor assessed its impact on learning outcomes. Nevertheless, and despite these few cases, the literature suggests that storytelling is seldom used to teach highly technical concepts, such as those typical of a computer science curriculum.

3. Novelette Design Methodology

A novelette is understood as a short story with a word count below a novella or novel. Currently, there is a vast library of resources based on fictional stories that incorporate aspects of computer security in their plot. As stated by [35], stories about hackers have become part of the popular culture for decades. However, ref. [36] also points out that one must be very careful when taking these kind of existing resources into consideration, since they often contain factually inaccurate content, when not pure fantasy, making them a potent vehicle for learning misinformation about the world. An egregious example, among many, could be the popular fictional situation when passwords are quickly cracked character-by-character, with a progress bar included, in a highly graphical and interactive user interface. Special care must be taken in this regard when designing and incorporating an educational resource based on storytelling, and especially on a topic that has gained relevance in the popular media, but also created strong misconceptions on how things actually work.
Some previous work exists on methods to facilitate the integration of storytelling as a learning resource, with the help of templates [37]. However, this work presents a design methodology that allows starting from scratch, in accordance with the serious storytelling model introduced in Section 2. The novelette at its core is designed according to the model’s four components, applied to the context of education:
  • Context of application, a relevant setting for understanding the knowledge.
  • Course, as the sum of the plot and how the content evolves in a cause–effect relationship, but constrained by the requirement of the creation of knowledge (i.e., learning). It is important to note that, according to the model, the triggering of emotions is still considered one of its main features. Being able to engage the audience and turning the narrative into an emotional experience becomes the key to mental stimulation, and thus, to the “thoughtful process”.
  • Content of the narrative, the elements that can be perceived by the consumer, or the student in this scenario.
  • Channel of distribution, a written novel in this case.
The design process was steered to guarantee that these four components would be taken into account.

3.1. Design Process

Three roles collaborated during the development process, helping define components (a)–(c): a professional writer, a computer security instructor, and a pedagogy expert who acted as project leader and mediator between the writer and the instructor. The overall process is summarized in Figure 1.
In the first step of the design process, the instructor and the mediator identified the key concepts of the learning outcomes. Among the different effective strategies to represent and summarize the body of knowledge, a conceptual map was chosen [38]. Starting from a purely pedagogical perspective, and relegating the design of storytelling to a later stage, guaranteed the constraint expressed in component (c). Further, the application of a visual representation eases the visualization of key concepts from an holistic point of view [39].
Then, each key concept was further developed, providing a precise definition by educational standards, akin to a classical expository text representation. During this process, the instructor would add a short description of several fictional situation in which the concept was important, taking into account which actors participated and their roles in the situation. These would help the writer later in the design process, not being a scholar on the topic, to better understand the key concepts as well as providing examples on how to transition the text to a storytelling approach.
The conceptual map and the key concept definition became the starting point for the professional writer to develop the fiction. Even though the educational guidelines had to be followed, the writer had full control of the narrative fiction and how the story should develop to better trigger the emotional response in the reader. On that regard, there are several methodologies to structure the creation of novels that were carefully considered ([40,41,42]).
Starting from a one-sentence summary of the plot, the initial concept was further expanded by the writer to a full paragraph describing the story setup, major setbacks, and the ending. Then, the characters were defined, presenting their names, a short summary of their roles, and their goals and motivations in the story, as well as point of conflict (i.e., what would prevent them from succeeding). This short document was considered the novelette overarching plot, and agreed by all parts. Even though it focused on the narrative fiction, the writer took into account opportunities to include fictional situations similar to the ones defined by the instructor. On that regard, any doubts the writer had about the computer security key concepts would also be clarified by the instructor. Further, any topic in the narrative that could be considered controversial (e.g., depiction of adult-only content) was discussed at this stage.
Once the main components of the story were defined, the chapters of the story would be slowly developed, on by one, in an iterative process. The requisite was that all key concepts should be represented at least once along the full story, using a fictional situation different from the examples, and at least one such situation would appear in each chapter. Each chapter would be validated to ensure that the situations aligned with the educational outcomes before moving forward. The mediator’s role was especially relevant during this stage, since very often there would be clashes between narrative licenses for the sake of a good story (the writer) and how computer security actually works in the real work (the instructor); however, given the story’s purpose, very special care had to be given to the latter.
Once the story was complete, a final revision was performed, as well as a small audience testing with volunteers. This helped fine tune the story and make sure the key concepts were properly explained within the narrative. With the final manuscript, the novelette was edited and published. The whole process amounted to about 3 months, taking into account that the novelette was not the main project of the professional writer.

3.2. The Computer Security Novelette

The final product was a 150-page long novelette, structured in 21 chapters, which required 3 months of work to finish. Despite its page count, its typesetting allowed it to be read at leisure in a few hours, not much longer than a study session using the equivalent expository text resources. The starting conceptual map is shown in Figure 2, defining the reach of the body of knowledge. An example of further development of each key concept also follows, helping exemplify steps 2–3, by presenting its definition and proposing a useful situation where this concept could be used in fiction.
Key concept:
A Denial-of-Service (or DoS) is the inability to access a resource or service by a legitimate user. That is, exclusive appropriation of a resource or service so that third parties will not be able to make use any of it.
Situation 1:
A mafia gang has thousands of computers spread all over the world. Millions of simultaneous connections to an online shop are initiated by means of a DoS method called “IP Flooding”. The shop ceases to be operational and no customer can connect, so every minute that passes means money lost by the owner. The gang demands a ransom in order to stop the attack.
Situation 2:
You have to stop someone from connecting to the public WiFi network and sending an important e-mail. Using DoS, I degrade the connection and nobody is able to connect to the Internet (not even me!).
From this conceptual map and the full key concept development, the writer proposed the following synopsis that would lead to the final manuscript after the thorough iterative process, chapter by chapter.
Linus, an expert in computer security, with problems with the justice, sees helplessly as his life sinks inevitably. One night, by chance, he bumps into a girl who has been the victim of a phishing attack that has turned into attempted assault. Investigating who is behind this deception, Linus will discover a criminal network much larger than it seemed at the beginning, and consequently, a way to help himself and to redeem himself with the judicial system.
The final product included the story and appendixes including the concept map and a glossary of key concepts, with definitions and page numbers were they were presented in the story. Key concepts were also bold-faced the first time they appeared in the text. Including this information helps better anchor the educational objectives of a fully narrative-based approach, as per [43]. The book also concluded with a list of other interesting media related to computer security, such as books, movies, or video games, to invite readers to explore the topic from a purely ludic, not necessarily educational, standpoint (e.g., The Cuckoo’s Egg, War Games, or Uplink).

4. Research Design

This section describes the study that we carried out in an online course on computer security (CompSec) to evaluate the convenience of employing storytelling in the early stages of learning in cybersecurity with adult students. The following sections describe: the context and participants in the study (Section 4.1), the methodological design and research questions (Section 4.2), and the tools used (Section 4.3).

4.1. Context and Participants

The study was conducted in the online CompSec course, starting from February 2019 to July 2019, held at Universitat Oberta de Catalunya (UOC), which is a fully online university offering graduate and postgraduate programs in different languages, currently amounting to about 75.000 students. The typical students are fully autonomous adult learners, 64% of them are more than 30 years old, and 27% for the 40+ age bracket. Most work full-time and are financially independent (95%), married (73%), or have children (58%), according to internal polls performed during the enrollment process. In general, they chose to study online because they cannot attend classes and need to be fully autonomous in their study time. Therefore, there is an important focus on the use of digital self-study resources that can help them engage with the course content and that can be perceived as immediately useful in a professional field.
The CompSec course is an optional subject in the Computer Science and Telecommunication Engineering bachelor degrees. Students can enroll in the CompSec course after having taken courses on computer network theory and management. Both degrees also include separate courses on cryptography or electronic commerce, which are subjects with concepts related to cybersecurity. For this reason, in the study presented in this paper, participants that had passed one of these two courses before enrolling the CompSec course were considered as having previous theoretical knowledge in cybersecurity.
Regarding the CompSec course contents, the course consists of three thematic blocks. The first block provides a general introduction to cybersecurity. The second block studies basic computer attacks, prevention, and detection mechanisms. The third block presents basic concepts of cryptography, authentication mechanisms, and secure communication applications. Assessment is made from three theoretical assignments (one for each block) and three practical assignments (two related to the contents of the second block and one related to the contents of the third one). This study was performed during the teaching period of the first block. We considered that the theoretical basics of cybersecurity is the topic of the course where storytelling could have a greater impact on learning. In the semester of the CompSec course where the study was undertaken, the course had 134 students, out of which 111 voluntarily participated in the study. The student sample was considered as representative of the student profile enrolled in this subject in the past.

4.2. Methodology

In order to test the hypothesis that employing storytelling may assist in the progress of learning over expository text, even when the subject is eminently technical and with adult students, we set the following research questions:
RQ1: 
What is the resulting student attitude towards this format, in respect to a traditional one (i.e., expository text)?
RQ2: 
What is its influence in the students’ self-perception of their knowledge acquisition?
RQ3: 
What is the real impact on the student’s knowledge acquisition?
To address these research questions, the CompSec course was divided into two different virtual classes. The novelette was deployed in one of them (in the following, we will refer to this group as Narrative group or Ng), whereas the standard curriculum format was used in the other (which will be referred as Expository group or Eg).
Following the recommendations by the ethics committee of the university, students in each group had the option to voluntarily participate in this study. Participation consisted basically of answering two questionnaires. To encourage participation, students that answered the two questionnaires were awarded with 1 extra point out of 10 in the first graded assignment of the course. The Eg group included 63 subjects, out of which 49 participated in the study. The Ng included 71 subjects, out of which 62 participated in the study. Figure 3 shows the main demographic variables of the participants in the study for both groups.
The two questionnaires were designed by two instructors to gather quantitative and qualitative data to mainly evaluate the students’ perception of the learning resources format and content, and their perception on the acquired knowledge. The questionnaires and the grades of the first assignment were also used to assess the actual knowledge acquisition. This approach is aligned with [44], which served as a basis to the methodological design of this study. Table 1 contains a summary of the main variables analyzed in this study using both questionnaires. Variables P1.1 to P1.5 and P2.1 to P2.4 were questions posed directly in the second questionnaire. “Improvement” was a variable computed taking the difference on the security knowledge score obtained in both questionnaires. Finally, “Activity grade” was the score obtained in the first assignment of the course.
The first questionnaire was answered by the participants at the beginning of the course, containing two blocks of questions: a block to obtain student profile information, with questions related to their enrollment in the university and their previous experience in security; and a second block with a pre-test of ten questions to assess security knowledge prior to working on the learning resources under study (e.g., questions about security tools, attacks, vulnerabilities, countermeasures following the conceptual map previously shown in Figure 2). The answers to these questions were used to compute a pre-study security knowledge score.
The second questionnaire was answered by the participants after reading the learning resources and working on the first graded assignment of the course, which was self-paced. This questionnaire contained four blocks of questions: the first block with five questions to evaluate the impression of the students about the format of the learning resource under study (questions P1.1 to P1.5 in Table 1); the second block with four questions for the student to self-assess their acquired knowledge (questions P2.1 to P2.4 in Table 1); the third block with ten questions to evaluate the actual knowledge acquired after reading the resources and working on the assignment. These questions were similar to the questions in the second block of the first questionnaire and served to compute a post-study security knowledge score. The “Improvement” variable was calculated taking the difference between the post-study and the pre-study scores. Finally, the second questionnaire contained a fourth block with a single open question, where participants could leave any type of comment. Questions P1.1 to P1.4 and P2.1 to P2.4 were graded using a Likert scale from 1 ( “Strongly disagree”) to 5 (“Strongly agree”). Question P1.5 could be answered selecting among several time interval from 0 to 20 h, in multiples of 5, and an option for those students that needed more than 20 h to finish the course assignment.

4.3. Tools

To carry out this study, we mainly used: Qualtrics [45] and Python. Qualtrics was used to create the questionnaires, collect data, and for an exploratory analysis. Subsequently, data were exported and processed with Python, mainly using the SciPy library [46] to compute the statistical tests mentioned below.

5. Results

In order to answer the research questions listed above, we compared the responses to the questionnaires of the two groups, i.e., Eg and Ng. This section describes the techniques used to extract information from the responses to the questionnaires and presents the main results. The next section discusses the results and answers the research questions.
In order to filter the results and evaluate the suitability of the learning resources, taking into account some important characteristics of the students in our institution, we segmented the subjects into several categories depending on their age and their previous theoretical knowledge in cybersecurity. In the first segmentation, we divided participants into three age categories: a first category with subjects under 30 years old, a second category with subjects older than 29 years and younger than 40, and a third category with the subjects 40 years old and above. In the second segmentation, we divided the subjects into two categories. We labeled subjects as having previous theoretical knowledge in cybersecurity if they had passed the courses Cryptography or Electronic Commerce, or achieved a high score in the first questionnaire pre-test.
In this study, it is highly relevant to evaluate the participants’ responses considering these criteria. Knowing the motivation behind the most common computer attacks is of utmost importance to understand their risks and be able to prevent them. A mere technical description of vulnerabilities and attacks may be useful for experienced subjects, but may not give enough context for more inexperienced ones. On the other hand, narrative texts may not provide the level of technical details required by some students with some cybersecurity experience. It is also important to study if young students, accustomed to a great variety of learning resources, or more senior students have different perceptions towards the narrative text.
For each of these categories, we computed the mean and the standard deviation for all the variables described in Table 1. These results are shown in Table 2, Table 3 and Table 4. In order to compare the results from the Eg and the Ng, first we performed a Shapiro–Wilk test of normality [47]. This test indicated that most of the gathered data did not follow a Gaussian distribution. Hence, taking this into account and, also, that samples are independent, we performed non-parametric Mann–Whitney U tests [48] to evaluate the statistical significance of the differences between the Eg and the Ng. The results of these tests are also shown in Table 2, Table 3 and Table 4. In these tables, the first column indicates the ID of the analyzed variable listed in Table 1; the second column shows the filter applied to the data (i.e., analyzing all data without a filter, segmenting participants according to their previous theoretical cybersecurity knowledge, segmenting participants according to their age); columns 3 to 8 show the number of subjects, the mean and the standard deviation for the Eg and the Ng; and the last three columns show the results of the Mann–Whitney U tests, where the “Significance?” column is set to True if the null hypothesis can be rejected (p-value ≤ 0.05) and, therefore, consider that the samples from the two groups come from different distributions.

6. Discussion

This section addresses the research questions posed above and discusses the results of the study.

6.1. RQ1: What Is the Resulting Student Attitude towards this Format, in Respect to a Traditional One (i.e., Expository)?

To answer this research question we evaluated the subjects’ answers in questions P1.1 to P1.5. In general, the Ng participants value the use of storytelling positively, even though, as it can be seen in Table 2, the differences between the two groups are not statistically significant for most of the variables. The only variable where the difference can be considered statistically significant is P1.3 (“The contents are useful to start working on the graded assignment”). It is possible to observe that the main difference in this case comes from the subject group older than 40, where the subjects that used the novelette think that its content is less useful to start solving the graded activity than the subjects from the Eg (Eg: mean = 4.11, std = 0.66; Ng: mean = 3.52, std = 0.79).
However, if we also consider the answers of P1.5 (“How long did you take to study the learning resources and resolve the graded assignment?”), it can be observed that there is no statistical difference between the two groups, and therefore, it can be concluded that students in the Ng, regardless of their age, did not actually have to invest an extra effort to solve the first mandatory graded activity of the course.
Hence, we can consider that the students’ attitude towards the narrative format is good and comparable to their attitude towards the conventional learning resources, thus validating the novelette and its design methodology as a valid learning resource on equal footing to expository text. On that regard, it is worth noting the high value of P1.4 (“The content is relevant in the real world”) for students both with or without previous knowledge in computer security in the Ng group.
Furthermore, here it is pertinent to analyze the answers given by the participants in the open question included at the end of the second questionnaire. It is important to highlight that the participants belonging to the Eg valued the expository learning resource positively, but, in general, they mentioned that there is a lack of practical examples on how the computer attacks are performed and how to use the detection and prevention mechanisms.
Regarding the comments of the participants belonging to the Ng, the majority of participants responded very positively, expressing that they liked the novelette a lot, that they were delighted, and they highlighted the fact that a novelette is a different and motivating learning method. On the other hand, one participant evaluated the narrative aspects and the used language negatively. Nevertheless, it could be concluded that the novelette elicited more enthusiasm and was considered motivating for most of the students. However, students that do not like reading novels or expect a conventional resource that goes straight to the point may not be satisfied with it.
In broad terms, and especially when taking into consideration the remarks previously cited in Section 2, the conclusions of this research question are in line with the rest of the literature, thus reinforcing the idea that the use of fiction helps spark the interest of students. However, it is difficult to more closely contrast our results, beyond the general idea that using fiction produces a positive attitude. The main reason is that many studies (e.g., [32], [33] or [49]), do not present the results in much detail, basically moving to the discussion straightaway and agreeing with the premise. Further, in the literature in general (including these studies), there is a lack of testing where the use of fiction is contrasted to the use of a classical approach with expository text only. The motivational aspects of fiction in class are often studied in an isolated manner. Further, fiction is mostly used as a complementary resource, a motivational extra, instead of completely replacing expository text resources, such as in our approach. Nevertheless, the general conclusions stand.
Taking a look at studies that provide much more detailed information, the quantitative results in student motivation in [34] are quite similar to ours. This work includes the analysis of an additional dimension, “degree of transportation” [50], or the immersive impact of the fiction. However, again, it lacks any comparison with students that did not use fiction. Nevertheless, a study that actually compares the two different approaches can be found in [30]. Even though the positive reaction of students in this study (measured as the “fondness” quality) could be considered just above average the metrics related to engagement were much higher in study group based on fictional resources than the expository ones. This aspect differs from our study, were the positive reactions of students in the narrative group did not have this strange contrast, especially when considering the open questions.
Therefore, in comparison with the previous literature, we consider that our results provide an additional level of detail, with the addition of specific subquestions (i.e., P1.x) and the use of a control group based on expository text only. They also add an extra facet to the current literature, by providing results on a case where only fiction is used as a study resource, instead of just being complementary.

6.2. RQ2: What Is Its Influence in the Students’ Self-Perception of Their Knowledge Acquisition?

To answer this research question, we evaluated the subjects’ answers to questions P2.1 to P2.4. As it can be seen in Table 3, in general, the subjects using the novelette show a better self-perception of their knowledge acquisition than the Eg, or there is no statistical significance between the results of the two groups.
Analyzing the differences between the two groups globally (i.e., applying no filter), the novelette tends to be graded better overall. More specifically, the differences in P2.2 (“I know what kind of tools I should use to start exploring a system.”) and P2.3 (“I know what kind of tools I should use to protect my systems.”) can be considered as statistically significant. Regarding P2.2, the Eg has a significantly lower mean and higher variance than the Ng (Eg: mean = 3.80, std = 0.79; Ng: mean = 4.08, std = 0.61). These differences are even more remarkable in the category of subjects older than 40 (Eg: mean = 3.58, std = 0.77; Ng: mean = 4.04, std = 0.47). Regarding P2.3, globally, the Ng subjects show a greater self-perceived knowledge on protection tools than the Eg (Eg: mean = 3.43, std = 0.87; Ng: mean = 3.90, std = 0.74). Differences are also particularly meaningful in the category of subjects younger than 30 (Eg: mean = 3.00, std = 1.00; Ng: mean = 4.00, std = 0.89) and the ones older than 40 (Eg: mean = 3.42, std = 0.77; Ng: mean = 3.91, std = 0.67).
It is also noteworthy to see that approaching basic cybersecurity topics in a narrative manner is more effective for inexperienced students than for experienced ones. We can observe significant statistical differences between subjects without previous cybersecurity knowledge; meanwhile, the differences between the Eg and the Ng are not relevant for those that already know the theoretical basis on the area. The differences can be seen for those without previous knowledge in P2.2 (Eg: mean = 3.71, std = 0.80; Ng: mean = 4.11, std = 0.57), P2.3 (Eg: mean = 3.47, std = 0.80; Ng: mean = 3.93, std = 0.71) and P2.4 (“I would be able to put into practice what I have learned.”) (Eg: mean = 3.53, std = 0.80; Ng: mean = 3.85, std = 0.92).
Hence, the self-perception of knowledge acquisition is similar between the two groups. Nonetheless, the results show that the novelette can be a better tool as a starting point in the cybersecurity area. In this regard, the subjects without previous knowledge from the Ng sample answer more positively about being able to put into practice the learned concepts and their understanding on the tools described in the learning resources. This is particularly interesting considering that both learning resources (i.e., the novelette and the conventional expository learning resource) are written focusing on inexperienced technical readers, the general public, and also taking into account that cybersecurity is an eminently practical subject and the CompSec course is mainly taught and graded through practical assignments. From this point of view, storytelling can be considered a better approach to start studying this subject.
Again, the conclusions of this research question can be considered aligned with the previous literature, further justifying the introduction of fiction as study materials, when the educational design is sound. Many studies consider that a study of the motivational aspect also requires an assessment of student perception of acquired knowledge. Nevertheless, some of them stop at the attitudinal aspect, or just treat self-perception in very broad terms, such as “prompting critical reflection” (e.g., [31]). Even when this aspect is taken into account, it must be reminded that only a few make extra effort to compare it with classic learning methods, and qualitative results are seldom fine-grained or grounded on asking about very specific key topics in the curriculum, such as in our case. They mostly rely on a single generic question of the style “Do you think the fiction helped you learn?”.
Nevertheless, comparing our results to some previous studies, ref. [33] found a much stronger positive reaction in students than ours, whereas the results in [30,34] could be considered similar to ours, broadly speaking. Recent work on psychology courses [51] especially focused on reflection in self-knowledge, and again considered it positive, but added a very interesting additional dimension beyond the acquisition of pure information: the understanding of the emotions of others.

6.3. RQ3: What Is the Real Impact on the Student’s Knowledge Acquisition?

In order to answer this research question, we compared the results between the Eg and the Ng in the improvement questions and in the grade of the first course assignment. As Table 4 shows, there is no noticeable statistical difference between the two groups. Thus, we can conclude that the real impact on the student’s knowledge acquisition of using the novelette is the same than of using a conventional learning resource, again, reinforcing the soundness of its instructional design.
Interestingly, most of the literature stops at student self-perception (see RQ2) and do not actually make any effort to assess the students to test whether their knowledge has actually improved (or at least, is on par with an expository text approach). From the aforementioned studies, only [30] does, from a high level qualitative point of view. However, there are other studies that, in fact, only focus on knowledge acquisition, disregarding the motivational analysis, such as [28] (mostly based on infotainment, however, and not pure fiction), and can thus provide us some ability to compare our results. In this case, the subjects of the infotainment content performed significantly better than those using the expository version, whereas in our case performance, was similar. Therefore, even though the instructional design of the novelette may be considered sound, there is room for improvement.

7. Limitations

This section briefly discusses some notable limitations of this study in the use of storytelling as learning resource in a CompSec course.
First and foremost, the scope of the study is limited to its application in a 100% online institution with mostly adult learners (30 years or older), who have their own idiosyncrasies and learning styles [52], and bound to a single academic semester. It is also very important to note that the subject demographics are overwhelmingly skewed towards a male population. For a long time, and still to this day, this has been an endemic circumstance across all technical studies, not only at our institution, but at a cross-national level [53].
Additionally, even though the use of fiction or storytelling is not an uncommon occurrence in the academic literature, previous research in the creation of ad hoc learning resources using a simple fictional linear structure is lacking. Most cases use existing literature resources already created by other authors (e.g., existing novels, movies, etc.) or create more complex structures such as digital games (which is what this paper proposes to avoid in some circumstances). This makes the process of disputing or contrasting previous work on the topic with our study somewhat limited.
Finally, the analysis presented in this paper also shows that some subjects did not have a good perception towards the narrative format. This fact may be due to several reasons that could not be demonstrated from the study that we carried out. Among others, some of the possible reasons for dissatisfaction with this type of resource are: low interest in reading fiction texts, low interest in the plot of the novelette, preference for descriptive texts, lack of depth in certain technical details, perception of storytelling not being appropriate as a university learning resource, and so on. Knowing the exact reasons for the dissatisfaction could help create narrative texts with wider acceptance. Similarly, better understanding the reasons behind the greater dissatisfaction among older subjects would allow the writers to adapt the text to typical student profiles of the different courses. However, the study in its current form cannot provide a conclusive answer to this.

8. Conclusions and Future Work

This research has studied the relevance of using an instructional approach based on fictional storytelling, even when the target subject is highly technical or a context where this kind of approach is seldom used. The study presented the instructional design methodology of a digital book, the novelette, and its application in a computer security course in a CS bachelor degree aimed at adult learners, in a 100% online university. From the results of the study, it can be stated that the design process was sound and the resulting resource is perfectly on par with a classical approach based in expository text only: in format, usefulness, and its ability to achieve the learning outcomes in an appropriate amount of self-study time, as standalone content.
Going back to the Introduction of this work, the goal of a narrative approach is mainly directed at presenting a memorable experience that will help the reader, increasing also student engagement and self-fulfillment from a psychological standpoint. The results show evidence that this initial hypothesis is confirmed up to some point. This is especially shown in students with no previous knowledge in computer security, in their self-perception on how to apply the acquired knowledge. The narrative approach was also valued even by experienced students, who already knew about the topic because of their professional or academic background. After the experiment, students also expressed a high amount of satisfaction and encouraged us to use this kind of resource in other subjects.
The design and implementation also showed some limitations in this approach. For instance, and a result worth further study, would be that older students are more resistant and express their preference for a traditional expository approach. Further, after the whole design and implementation process of the novelette was finished, it was made evident that the cost of this approach is much higher, in time and resources (personnel, cost) than expository materials. Further, given its design process, updating the content is much more complicated, something very important in fields with constant advancements, such as technological ones. Nevertheless, this cost, in time and personnel, is still much lower than other game-based approaches, such as a professionally developed serious game. Still, it should not be used systematically, but surgically in subjects where changes are not expected in the short term, and obvious problems in student engagement and self-perception have been detected; however, not when the goal is exclusively knowledge or competence acquisition.
After this experience, new novelettes have been designed and successfully implemented in additional subjects at our institution, such as psychology, crisis management, social education, or youth crime. However, this study leads us to believe that storytelling could be continued to be applied to content related to other technological fields in engineering subjects. Further research should move in that direction, in order to collect more evidence, and especially focusing on how this approach affects on student perception of self-efficacy, and how or why age impacts its acceptance by adult learners. Moreover, in future evaluations of this type of learning resource, we will explore using the Kruskal–Wallis H test [54], a rank-based non-parametric test extending the Mann–Whitney U test that allows comparing more than two independent groups. It would also be interesting to dedicate further work on assessing the effectiveness of the novelette out of a formal Computer Science curriculum, in readers that acquired it from the digital book store, mostly interested in its narrative aspect as a standalone thriller story.

Author Contributions

J.A.-M. created the novelette and conceived the idea of this study. All authors designed the questionnaires. V.G.-F. performed the data analysis. All authors analyzed and discussed the results and wrote the paper. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

The study was conducted according to the guidelines of the UOC’s Code of Good Practice in Research and Innovation and the European code of Conduct for Research Integrity, and approved by the Institutional Review Board (or Ethics Committee) of Universitat Oberta de Catalunya (UOC) (protocol code “20181204_vgarciafo” and date of approval 29 January 2019).

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Acknowledgments

We would like to thank all the support provided by the eLearn Center during the Novelette conceptualization and development, and to the KISON research group for its help during the paper submission process.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
CSComputer Science
DoSDenial-of-Service
CompSecComputer Security
NgNarrative group
EgExpository group

References

  1. Clear, A.; Parrish, A.; Impagliazzo, J.; Wang, P. Computing Curricula 2020-CC2020-Paradigms for Global Computing Education; ACM: New York, NY, USA, 2020. [Google Scholar]
  2. Taylor, B.; Kaza, S. Security Injections@Towson: Integrating Secure Coding into Introductory Computer Science Courses. ACM Trans. Comput. Educ. 2016, 16, 1–20. [Google Scholar] [CrossRef]
  3. Hooper, V.; Blunt, C. Factors influencing the information security behaviour of IT employees. Behav. Inf. Technol. 2020, 39, 862–874. [Google Scholar] [CrossRef]
  4. Graesser, A.C.; Hauft-Smith, K.; Cohen, A.D.; Pyles, L.D. Advanced outlines, familiarity, and text genre on retention of prose. J. Exp. Educ. 1980, 48, 281–290. [Google Scholar] [CrossRef]
  5. Bernard, S.C. Documentary Storytelling: Creative Nonfiction on Screen; Taylor & Francis: Abingdon, UK, 2011. [Google Scholar]
  6. Bordwell, D.; Thompson, K. Film Art; McGraw-Hill Higher Education: New York, NY, USA, 2012. [Google Scholar]
  7. Wright, A. Storytelling with Children; Oxford University: Oxford, UK, 1995. [Google Scholar]
  8. Thorndyke, P.W. Cognitive structures in comprehension and memory of narrative discourse. Cogn. Psychol. 1977, 9, 77–110. [Google Scholar] [CrossRef]
  9. Moore, K.M.Z.D.W. Influence of text genre on adults’monitoring of understanding and recall. Educ. Gerontol. 1999, 25, 691–710. [Google Scholar] [CrossRef]
  10. Kopfman, J.E.; Smith, S.W.; Ah Yun, J.K.; Hodges, A. Affective and Cognitive Reactions to Narrative Versus Statistical Evidence Organ Donation Messages; Taylor & Francis: Abingdon, UK, 1998. [Google Scholar]
  11. Norris, S.P.; Guilbert, S.M.; Smith, M.L.; Hakimelahi, S.; Phillips, L.M. A theoretical framework for narrative explanation in science. Sci. Educ. 2005, 89, 535–563. [Google Scholar] [CrossRef] [Green Version]
  12. Shires, J. Cyber-noir: Cybersecurity and popular culture. Contemp. Secur. Policy 2020, 41, 82–107. [Google Scholar] [CrossRef] [Green Version]
  13. Schank, R.C.; Berman, T.R. The pervasive role of stories in knowledge and action. In Narrative Impact: Social and Cognitive Foundations; Lawrence Erlbaum Associates Publishers: Mahwah, NJ, USA, 2002; pp. 287–313. [Google Scholar]
  14. Abt, C.C. Serious Games; University Press of America: Lanham, MD, USA, 1987. [Google Scholar]
  15. Majuri, J.; Koivisto, J.; Hamari, J. Gamification of education and learning: A review of empirical literature. In Proceedings of the 2nd International GamiFIN Conference, Pori, Finland, 21–23 May 2018; pp. 11–19. [Google Scholar]
  16. Dichev, C.; Dicheva, D. Gamifying education: What is known, what is believed and what remains uncertain: A critical review. Int. J. Educ. Technol. High. Educ. 2017, 14, 9. [Google Scholar] [CrossRef] [Green Version]
  17. Dewey, C.M.; Shaffer, C. Advances in information security education. In Proceedings of the IEEE International Conference on Electro Information Technology (EIT), Grand Forks, ND, USA, 19–21 May 2016; pp. 133–138. [Google Scholar]
  18. Mora, A.; Riera, D.; González, C.; Arnedo-Moreno, J. Gamification: A systematic review of design frameworks. J. Comput. High. Educ. 2017, 29, 516–548. [Google Scholar] [CrossRef]
  19. O’Donovan, S.; Gain, J.; Marais, P. A case study in the gamification of a university-level games development course. In Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference, East London, South Africa, 7–9 October 2013; pp. 242–251. [Google Scholar]
  20. Adams, D.M.; Mayer, R.E.; MacNamara, A.; Koenig, A.; Wainess, R. Narrative games for learning: Testing the discovery and narrative hypotheses. J. Educ. Psychol. 2012, 104, 235. [Google Scholar] [CrossRef]
  21. Marczewski, A. Even Ninja Monkeys Like to Play; Blurb Inc.: London, UK, 2015. [Google Scholar]
  22. Lugmayr, A.; Sutinen, E.; Suhonen, J.; Sedano, C.I.; Hlavacs, H.; Montero, C.S. Serious storytelling—A first definition and review. Multimed. Tools Appl. 2017, 76, 15707–15733. [Google Scholar] [CrossRef]
  23. Robin, B.R. Digital storytelling: A powerful technology tool for the 21st century classroom. Theory Into Pract. 2008, 47, 220–228. [Google Scholar] [CrossRef]
  24. De Jager, A.; Fogarty, A.; Tewson, A.; Lenette, C.; Boydell, K.M. Digital storytelling in research: A systematic review. Qual. Rep. 2017, 22, 2548–2582. [Google Scholar]
  25. Gachago, D.; Cronje, F.; Ivala, E.; Condy, J.; Chigona, A. Stories of resistance: Digital counterstories among South African pre-service student educators. In Proceedings of the 8th International Conference on e-Learning, Kuala Lumpur, Malaysia, 5–7 January 2013; p. 149. [Google Scholar]
  26. Stacey, G.; Hardy, P. Challenging the shock of reality through digital storytelling. Nurse Educ. Pract. 2011, 11, 159–164. [Google Scholar] [CrossRef] [PubMed]
  27. Armstrong, M.B.; Landers, R.N. An evaluation of gamified training: Using narrative to improve reactions and learning. Simul. Gaming 2017, 48, 513–538. [Google Scholar] [CrossRef]
  28. Davis, L.S.; León, B.; Bourk, M.J.; Finkler, W. Transformation of the media landscape: Infotainment versus expository narrations for communicating science in online videos. Public Underst. Sci. 2020, 29, 688–701. [Google Scholar] [CrossRef]
  29. Feeley, T.H.; Marshall, H.M.; Reinhart, A.M. Reactions to narrative and statistical written messages promoting organ donation. Commun. Rep. 2006, 19, 89–100. [Google Scholar] [CrossRef]
  30. Marcus, A.S.; Paxton, R.J.; Meyerson, P. “The reality of it all”: History students read the movies. Theory Res. Soc. Educ. 2006, 34, 516–552. [Google Scholar] [CrossRef]
  31. Hoggan, C.; Cranton, P. Promoting transformative learning through reading fiction. J. Transform. Educ. 2015, 13, 6–25. [Google Scholar] [CrossRef]
  32. Fontaine, M. Integrating Narrative Fiction with Business Ethics to Enhance Moral Reasoning Applying an Ethical Framework and Case Discussion Instructional Model. Rev. Contemp. Bus. Res. 2012, 1, 1–14. [Google Scholar]
  33. Dorocak, J.R.; Purvis, S. Using fiction in courses: Why not admit it? Law Lit. 2004, 16, 65–91. [Google Scholar] [CrossRef]
  34. Pastor Pérez, L.; Linde, A.; Molas-Castells, N.; Fuertes-Alpiste, M. The use of novelettes for learning in a Criminology degree course. Stud. High. Educ. 2019, 44, 1874–1888. [Google Scholar] [CrossRef]
  35. Gordon, D. Forty years of movie hacking: Considering the potential implications of the popular media representation of computer hackers from 1968 to 2008. Int. J. Internet Technol. Secur. Trans. 2010, 2, 59–87. [Google Scholar] [CrossRef] [Green Version]
  36. Marsh, E.J.; Butler, A.C.; Umanath, S. Using fictional sources in the classroom: Applications from cognitive psychology. Educ. Psychol. Rev. 2012, 24, 449–469. [Google Scholar] [CrossRef]
  37. Helmut, H.; Moser, A. Story Templates-Serious Storytelling to Support Learning. In Proceedings of the IEEE 18th International Conference on Advanced Learning Technologies (ICALT), Mumbai, India, 9–13 July 2018; pp. 405–407. [Google Scholar]
  38. Chang, K.E.; Sung, Y.T.; Chen, I.D. The effect of concept mapping to enhance text comprehension and summarization. J. Exp. Educ. 2002, 71, 5–23. [Google Scholar] [CrossRef]
  39. Robinson, D.H.; Katayama, A.D.; Beth, A.; Odom, S.; Hsieh, Y.P.; Vanderveen, A. Increasing text comprehension and graphic note taking using a partial graphic organizer. J. Educ. Res. 2006, 100, 103–111. [Google Scholar] [CrossRef]
  40. Ingermanson, R.S. How to Write a Novel Using the Snowflake Method; DitDat Incorporated: Bellevue, WA, USA, 2014. [Google Scholar]
  41. Wiesner, K.; Month, N.W. First Draft in 30 Days; Writer’s Digest Books: Cincinnati, OH, USA, 2005. [Google Scholar]
  42. Lamb, N. The Art and Craft of Storytelling: A Comprehensive Guide to Classic Writing Techniques; Penguin: London, UK, 2008. [Google Scholar]
  43. Pilegard, C.; Mayer, R.E. Improving academic learning from computer-based narrative games. Contemp. Educ. Psychol. 2016, 44, 12–20. [Google Scholar] [CrossRef] [Green Version]
  44. Kirkpatrick, D.; Kirkpatrick, J. Evaluating Training Programs: The Four Levels; Berrett-Koehler: Oakland, CA, USA, 2006. [Google Scholar]
  45. Qualtrics, Provo, UT. Qualtrics. 2020. Available online: https://www.qualtrics.com/ (accessed on 15 December 2020).
  46. Virtanen, P.; Gommers, R.; Oliphant, T.E.; Haberland, M.; Reddy, T.; Cournapeau, D.; Burovski, E.; Peterson, P.; Weckesser, W.; Bright, J.; et al. SciPy 1.0: Fundamental Algorithms for Scientific Computing in Python. Nat. Methods 2020, 17, 261–272. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  47. Shapiro, S.S.; Wilk, M.B. An analysis of variance test for normality (complete samples). Biometrika 1965, 52, 591–611. [Google Scholar] [CrossRef]
  48. Mann, H.B.; Whitney, D.R. On a test of whether one of two random variables is stochastically larger than the other. Ann. Math. Stat. 1947, 18, 50–60. [Google Scholar] [CrossRef]
  49. Harris, A. Shape-Shifting and Stories: Professionalism and Education with Doctor Who. In Professional Education with Fiction Media; Springer: Berlin/Heidelberg, Germany, 2019; pp. 205–228. [Google Scholar]
  50. Green, M.C.; Clark, J.L. Transportation into narrative worlds: Implications for entertainment media influences on tobacco use. Addiction 2013, 108, 477–484. [Google Scholar] [CrossRef]
  51. Erikson, M.; Erikson, M.G.; Punzi, E. Reading Fiction as a Learning Activity in Clinical Psychology Education: Students’ Perspectives. Int. J. Teach. Learn. High. Educ. 2020, 32, 171–179. [Google Scholar]
  52. Honigsfeld, A.; Dunn, R. Learning-Style Characteristics of Adult Learners. Delta Kappa Gamma Bull. 2006, 72, 14–31. [Google Scholar]
  53. Buccheri, G.; Gürber, N.A.; Brühwiler, C. The impact of gender on interest in science topics and the choice of scientific and technical vocations. Int. J. Sci. Educ. 2011, 33, 159–178. [Google Scholar] [CrossRef]
  54. Kruskal, W.H.; Wallis, W.A. Use of ranks in one-criterion variance analysis. J. Am. Stat. Assoc. 1952, 47, 583–621. [Google Scholar] [CrossRef]
Figure 1. Novelette design process summary.
Figure 1. Novelette design process summary.
Applsci 11 06185 g001
Figure 2. Novelette conceptual map.
Figure 2. Novelette conceptual map.
Applsci 11 06185 g002
Figure 3. Demographics of the subjects participating in the study.
Figure 3. Demographics of the subjects participating in the study.
Applsci 11 06185 g003
Table 1. Variables included included in this study.
Table 1. Variables included included in this study.
Variable TypeIDQuestion/Description
Format of the learning resourcesP1.1The resource’s format is satisfactory.
P1.2The resource is motivating to continue learning about security.
P1.3The contents are useful to start working on the graded assignment.
P1.4The content is relevant in the real world.
P1.5How long did you take to study the learning resources and resolve the graded assignment?
Self-evaluation questionsP2.1I know the different types of attack on TCP/IP networks.
P2.2I know what kind of tools I should use to start exploring a system.
P2.3I know what kind of tools I should use to protect my systems.
P2.4I would be able to put into practice what I have learned.
Improvement questionsImprovementQuestionnaires 1 and 2 included 10 general questions to evaluate the actual knowledge of the students on cybersecurity. Grades range from 0 to 10.
Course assignmentActivity gradeThe first graded assignment of the course included 12 questions related to the content of the learning resources. Grades range from 0 to 10.
Table 2. Results of the Mann–Whitney U test of the variables related to the format of the learning resources.
Table 2. Results of the Mann–Whitney U test of the variables related to the format of the learning resources.
Expository Group (Eg)Narrative Group (Ng)
FilterVariableCountMeanStdCountMeanStdStatisticp-ValueSignificance?
No filterP1.1494.120.56623.900.741301.50.067False
No filterP1.2494.310.68624.210.731423.00.27False
No filterP1.3494.040.61623.650.831100.00.0035True
No filterP1.4494.220.62624.270.681433.50.29False
No filterP1.5492.961.04622.971.041485.50.42False
No Prev. knowledgeP1.1384.110.56463.870.75745.00.085False
No Prev. knowledgeP1.2384.290.65464.150.76803.00.24False
No Prev. knowledgeP1.3383.950.61463.610.91671.00.025True
No Prev. knowledgeP1.4384.240.59464.240.71850.00.41False
No Prev. knowledgeP1.5382.871.04462.981.00803.50.26False
Prev. knowledgeP1.1114.180.60164.000.7376.00.26False
Prev. knowledgeP1.2114.360.81164.380.6285.00.45False
Prev. knowledgeP1.3114.360.50163.750.5844.00.0063True
Prev. knowledgeP1.4114.180.75164.380.6276.00.27False
Prev. knowledgeP1.5113.271.01162.941.1874.50.25False
Age < 30P1.194.110.60114.090.7049.00.5False
Age < 30P1.294.220.83114.180.8749.00.5False
Age < 30P1.393.890.60113.450.9333.00.096False
Age < 30P1.494.000.71114.450.5232.00.073False
Age < 30P1.592.560.88112.180.8739.00.21False
Age ≥ 30 and < 40P1.1214.140.65284.000.54258.00.2False
Age ≥ 30 and < 40P1.2214.290.64284.180.55263.50.24False
Age ≥ 30 and < 40P1.3214.050.59283.820.82247.50.15False
Age ≥ 30 and < 40P1.4214.330.58284.250.75286.00.43False
Age ≥ 30 and < 40P1.5213.191.03283.000.94271.50.32False
Age ≥ 40P1.1194.110.46233.700.93166.00.065False
Age ≥ 40P1.2194.370.68234.260.86210.50.42False
Age ≥ 40P1.3194.110.66233.520.79131.50.0088True
Age ≥ 40P1.4194.210.63234.220.67216.00.48False
Age ≥ 40P1.5192.891.10233.301.06172.00.11False
Table 3. Results of the Mann–Whitney U test of the variables related to the self-evaluation questions.
Table 3. Results of the Mann–Whitney U test of the variables related to the self-evaluation questions.
Expository Group (Eg)Narrative group (Ng)
FilterVariableCountMeanStdCountMeanStdStatisticp-ValueSignificance?
No filterP2.1494.000.61624.110.521398.00.18False
No filterP2.2493.800.79624.080.611235.00.029True
No filterP2.3493.430.87623.900.741086.00.0025True
No filterP2.4493.570.82623.740.971305.50.089False
No Prev. knowledgeP2.1384.000.66464.150.51782.00.16False
No Prev. knowledgeP2.2383.710.80464.110.57640.00.0082True
No Prev. knowledgeP2.3383.470.80463.930.71613.50.0051True
No Prev. knowledgeP2.4383.530.80463.850.92659.50.02True
Prev. knowledgeP2.1114.000.45164.000.5288.00.49False
Prev. knowledgeP2.2114.090.70164.000.7382.00.38False
Prev. knowledgeP2.3113.271.10163.810.8364.50.11False
Prev. knowledgeP2.4113.730.90163.441.0974.00.24False
Age < 30P2.193.890.93114.450.5232.00.073False
Age < 30P2.293.671.00114.180.6036.50.13False
Age < 30P2.393.001.00114.000.8923.50.018True
Age < 30P2.493.440.88113.641.2139.50.22False
Age ≥ 30 and < 40P2.1214.050.50284.040.58291.50.48False
Age ≥ 30 and < 40P2.2214.050.67284.070.72288.00.45False
Age ≥ 30 and < 40P2.3213.620.86283.860.76256.50.2False
Age ≥ 30 and < 40P2.4213.710.78283.821.02265.50.27False
Age ≥ 40P2.1194.000.58234.040.37210.50.4False
Age ≥ 40P2.2193.580.77234.040.47139.00.01True
Age ≥ 40P2.3193.420.77233.910.67145.00.022True
Age ≥ 40P2.4193.470.84233.700.82183.00.17False
Table 4. Results of the Mann–Whitney U test of the variables related to knowledge acquisition.
Table 4. Results of the Mann–Whitney U test of the variables related to knowledge acquisition.
Expository Group (Eg)Narrative Group (Ng)
FilterVariableCountMeanStdCountMeanStdStatisticp-ValueSignificance?
No filterImprovement493.292.10623.231.761492.00.44False
No filterActivity Grade499.260.78629.240.921511.00.47False
No Prev. knowledgeImprovement383.052.13463.241.88821.00.32False
No Prev. knowledgeActivity Grade389.240.83469.151.06852.50.37False
Prev. knowledgeImprovement114.091.87163.191.4259.50.079False
Prev. knowledgeActivity Grade119.320.60169.500.0080.00.13False
Age < 30Improvement93.221.86114.001.9038.00.2False
Age < 30Activity Grade98.831.00119.320.6037.50.1False
Age ≥ 30 and < 40Improvement213.052.42282.931.46278.50.38False
Age ≥ 30 and < 40Activity Grade219.210.96289.141.22290.50.45False
Age ≥ 40Improvement193.581.89233.221.98202.50.35False
Age ≥ 40Activity Grade199.500.00239.330.58199.50.1False
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Arnedo-Moreno, J.; Garcia-Font, V. A Study on the Design and Application of Fictional Storytelling in Online Learning of Computer Security. Appl. Sci. 2021, 11, 6185. https://doi.org/10.3390/app11136185

AMA Style

Arnedo-Moreno J, Garcia-Font V. A Study on the Design and Application of Fictional Storytelling in Online Learning of Computer Security. Applied Sciences. 2021; 11(13):6185. https://doi.org/10.3390/app11136185

Chicago/Turabian Style

Arnedo-Moreno, Joan, and Victor Garcia-Font. 2021. "A Study on the Design and Application of Fictional Storytelling in Online Learning of Computer Security" Applied Sciences 11, no. 13: 6185. https://doi.org/10.3390/app11136185

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop