L. Ablon, M. C. Libicki, and A. A. Golay, Markets for cybercrime tools and stolen data: Hackers' bazaar, 2014.

, Curriculum Guidelines for Undergraduate Degree Programs in Computer Science, ACM: Computer Science Curricula, 2013.

A. Bardoel, E. Haslett, and T. , Success to the successful: The use of systems thinking tools in teaching ob, Organization Management Journal, vol.1, issue.2, pp.112-124, 2004.

J. Bologna, Momm's (motivations, opportunities, methods, means)-a taxonomy for computer related employee theft, Assets Protection, vol.6, issue.3, pp.33-36, 1981.

S. Brahima, Global cybersecurity index 2017, pp.1-77, 2017.

J. S. Goodwin and S. G. Franklin, The beer distribution game: using simulation to teach systems thinking, Journal of Management Development, vol.13, issue.8, pp.7-15, 1994.

S. T. Hamman, K. M. Hopkinson, R. L. Markham, A. M. Chaplik, and G. E. Metzler, Teaching game theory to improve adversarial thinking in cybersecurity students, IEEE Transactions on Education, vol.60, issue.3, pp.205-211, 2017.

, Joint Task Force on Cybersecurity Education: Cybersecurity curricula 2017 -curriculum guidelines for post-secondary degree programs in cybersecurity -csec2017 v. 0.95 draft, Tech. rep, 2017.

V. Pastor, G. Díaz, and M. Castro, State-of-the-art simulation systems for information security education, training and awareness, Education Engineering (EDUCON), pp.1907-1916, 2010.

, Ponemon Institute: Flipping the economics of attacks, 2016.

R. W. Rogers, A protection motivation theory of fear appeals and attitude change1, The journal of psychology, vol.91, issue.1, pp.93-114, 1975.

F. B. Schneider, Cybersecurity education in universities, IEEE Security & Privacy, vol.11, issue.4, pp.3-4, 2013.

, Please tell us your gender: -Female -Male -Prefer not to answer

, What is the rationale behind your selection above?