107 14 157-70 1 1 2 2 2 2 1 2 imonsters Trend Micro Incorporated 2015 2012 35 2013 2 140 2014 Android 400 2012 10 2015 800 imonsters
58 imonsters All, Castellar, & Van Looy, 2016 Piaget 1962 Vygotsky 1978 2014 Admiraala, Huizenga, Akkerman, & Ten Dam, 2011 Roberts, & Chen, 2015 McCombs, & Whisler, 1997 Kumaraguru, Sheng, Acquisti, Cranor, & Hong, 2010 2014 2015
59 imonsters 2016 Subject-Oriented Integrated Non-Volatile Time-Variant OLAP Data Miming imonsters imonsters 1 2
60 1 START 2 2 3
61 3 ASP.NET SQL Server User Interface IIS Server.NET (C#) 3 4 4
62 1 1 e e e (2013/03/25) 1.
63 2. 3. 5 5 1. 2. Dimensions Model Snow Schema
64 Snow Schema 6 PK _Key PK _Key PK _Key PK FK1 FK2 FK3 FK4 _Key _Key _Key _Key _Key PK, FK1 PK, FK3 PK, FK5 PK, FK4 PK, FK6 _Key _Key _Key _Key _Key _ _ PK _Key PK _Key PK _Key 6 ETL ETL Extract-Transform-Load : 1. Extract 2. Transform 3. Load 7 8
65 7 8
66 9 9 8 7 6 5 4 3 2 1 0 9 9
67
68 2014Game-based Digital Learning 2016 7 imonsters-go APP CCBDA2016 2014 11 2015 11 Admiraal, W., Huizenga, J., Akkerman, S., & Ten Dam, G. (2011). The concept of flow in collaborative game-based learning. Computers in Human Behavior, 27(3), 1185-1194. doi: 10.1016/j.chb.2010.12.013 All, A., Castellar, E. P. N., & Van Looy, J. (2016). Assessing the effectiveness of digital gamebased learning: Best practices. Computers & Education, 92, 90-103. doi: 10.1016/j. compedu.2015.10.007 Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L. F. & Hong, J. (2010). Teaching Johnny not to fall for phish. ACM Transaction on Internet Technology (TOIT), 10(2), 1-31. doi: 10.1145/1754393.1754396 McCombs, B. L., & Whisler, J. S. (1997). The learner-centered classroom and school: Strategies for increasing student motivation and achievement. San Francisco, CA: Jossey-Bass Inc. Piaget, J. (1962). Play dreams and imitation in childhood. New York, NY: Norton & Company. Roberts, J., & Chen, K. (2015). Learning-based procedural content generation. IEEE Transactions on Computational Intelligence and AI in Games, 7(1), 88-101. doi: 10.1109/ TCIAIG.2014.2335273 Trend Micro Incorporated. (2015, October 27). 2016 Trend Micro Security predictions: The fine line [Web blog message]. Retrieved from http://www.trendmicro.com.au/vinfo/au/security/ research-and-analysis/predictions/2016 Vygotsky, L. S. (1978). Mind in society: The development of higher mental processes. Cambridge, MA: Harvard University Press.
69 Yuh-Jye Wang is a graduate Student of Computer Science and Information Engineering, Asia University, Taichung, Taiwan. (Corresponding Author) Tsung-Yu Yang is a graduate Student of Computer Science and Information Engineering, Asia University, Taichung, Taiwan. Shian-Shyong Tseng is a Professor of Department of M-Commerce and Multimedia Applications, Asia University, Taichung, Taiwan. Jui-Feng Weng is a Ph.D of Department of Computer Science, National Chiao Tung University, Hsinchu, Taiwan. Sheng-Jie Syu is a College Student of Department of M-Commerce and Multimedia Applications, Asia University, Taichung, Taiwan. Li-Yu Li is a College Student of Department of M-Commerce and Multimedia Applications, Asia University, Taichung, Taiwan. 106 04 07 106 05 22 106 06 03
National Taiwan University of Science and Technology Journal of Liberal Arts and Social Sciences 2018, 14(1), 57-70 PORTFOLIO-BASED ASSESSMENT BY DATA WAREHOUSING METHODOLOGY Yuh-Jye Wang 1 Tsung-Yu Yang 1 Shian-Shyong Tseng 2 Jui-Feng Weng 1 Sheng-Jie Syu 2 Li-Yu Li 1 1 Computer Science and Information Engineering, Asia University 2 Department of M-Commerce and Multimedia Applications, Asia University ABSTRACT In this paper, we developed the prototype system of the imonsters network security game. Based upon the prototype system the users gaming portfolio can be collected and then be analyzed by data warehousing methodology. Therefore, the misconceptions of network security can be found. Besides, the users frequent pattern of offensive and defensive strategies can be also mined and used to create the learning scaffolding. The behavior patterns and learning scaffolding will be used to enhance the users network security concept. Keywords: imonsters game system, Game-based Learning, Portfolio, OLAP