{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T15:58:25Z","timestamp":1774972705740,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030115470","type":"print"},{"value":"9783030115487","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11548-7_21","type":"book-chapter","created":{"date-parts":[[2019,1,20]],"date-time":"2019-01-20T21:53:52Z","timestamp":1548021232000},"page":"221-231","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Co-created Design of a Serious Game Investigation into Developer-Centred Security"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6233-6341","authenticated-orcid":false,"given":"Manuel","family":"Maarek","sequence":"first","affiliation":[]},{"given":"Sandy","family":"Louchart","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4550-8292","authenticated-orcid":false,"given":"L\u00e9on","family":"McGregor","sequence":"additional","affiliation":[]},{"given":"Ross","family":"McMenemy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,22]]},"reference":[{"key":"21_CR1","unstructured":"Acar, Y., Stransky, C., Wermke, D., Mazurek, M.L., Fahl, S.: Security developer studies with GitHub users: exploring a convenience sample. In: Symposium on Usable Privacy and Security (SOUPS) (2017)"},{"key":"21_CR2","doi-asserted-by":"publisher","unstructured":"Tioh, J.N., Mina, M., Jacobson, D.W.: Cyber security training a survey of serious games in cyber security. In: IEEE Frontiers in Education Conference (FIE), pp. 1\u20135 (2017). \n                      https:\/\/doi.org\/10.1109\/FIE.2017.8190712","DOI":"10.1109\/FIE.2017.8190712"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"53","DOI":"10.17083\/ijsg.v3i1.107","volume":"3","author":"M Hendrix","year":"2016","unstructured":"Hendrix, M., Al-Sherbaz, A., Bloom, V.: Game based cyber security training: are serious games suitable for cyber security training? Int. J. Serious Games 3, 53\u201361 (2016)","journal-title":"Int. J. Serious Games"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-642-34210-3_4","volume-title":"Secure IT Systems","author":"T Sommestad","year":"2012","unstructured":"Sommestad, T., Hallberg, J.: Cyber security exercises and competitions as a platform for cyber security experiments. In: J\u00f8sang, A., Carlsson, B. (eds.) NordSec 2012. LNCS, vol. 7617, pp. 47\u201360. Springer, Heidelberg (2012). \n                      https:\/\/doi.org\/10.1007\/978-3-642-34210-3_4"},{"key":"21_CR5","doi-asserted-by":"publisher","unstructured":"Frey, S., Rashid, A., Anthonysamy, P., Pinto-Albuquerque, M., Naqvi, S.A.: The good, the bad and the ugly: a study of security decisions in a cyber-physical systems game. IEEE Trans. Softw. Eng. (2018). \n                      https:\/\/doi.org\/10.1109\/TSE.2017.2782813","DOI":"10.1109\/TSE.2017.2782813"},{"key":"21_CR6","doi-asserted-by":"publisher","unstructured":"Xie, T., Bishop, J., Tillmann, N., de Halleux, J.: Gamifying software security education and training via secure coding duels in code hunt. In: Symposium and Bootcamp on the Science of Security, pp. 26:1\u201326:2. ACM (2015). \n                      https:\/\/doi.org\/10.1145\/2746194.2746220","DOI":"10.1145\/2746194.2746220"},{"key":"21_CR7","doi-asserted-by":"publisher","unstructured":"Ruef, A., Hicks, M., Parker, J., Levin, D., Mazurek, M.L., Mardziel, P.: Build it, break it, fix it: contesting secure development. In: ACM SIGSAC Conference on Computer and Communications Security, pp. 690\u2013703 (2016). \n                      https:\/\/doi.org\/10.1145\/2976749.2978382","DOI":"10.1145\/2976749.2978382"},{"key":"21_CR8","doi-asserted-by":"publisher","unstructured":"Rojas, J.M., White, T.D., Clegg, B.S., Fraser, G.: Code defenders: crowdsourcing effective tests and subtle mutants with a mutation testing game. In: International Conference on Software Engineering, pp. 677\u2013688. IEEE (2017). \n                      https:\/\/doi.org\/10.1109\/ICSE.2017.68","DOI":"10.1109\/ICSE.2017.68"},{"key":"21_CR9","doi-asserted-by":"publisher","unstructured":"Rojas, J.M., Fraser, G.: Code defenders: a mutation testing game. In: International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pp. 162\u2013167 (2016). \n                      https:\/\/doi.org\/10.1109\/ICSTW.2016.43","DOI":"10.1109\/ICSTW.2016.43"},{"key":"21_CR10","doi-asserted-by":"publisher","unstructured":"Weir, C., Rashid, A., Noble, J.: Reaching the masses: a new subdiscipline of app programmer education. In: ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 936\u2013939 (2016). \n                      https:\/\/doi.org\/10.1145\/2950290.2983981","DOI":"10.1145\/2950290.2983981"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Weir, C., Rashid, A., Noble, J.: I\u2019d like to have an argument, please\u202f: using dialectic for effective app security. In: European Workshop on Usable Security (EuroUSEC) (2017)","DOI":"10.14722\/eurousec.2017.23002"},{"key":"21_CR12","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/j.infsof.2014.08.007","volume":"57","author":"O Pedreira","year":"2015","unstructured":"Pedreira, O., Garc\u00eda, F., Brisaboa, N., Piattini, M.: Gamification in software engineering \u2013 a systematic mapping. Inf. Softw. Technol. 57, 157\u2013168 (2015). \n                      https:\/\/doi.org\/10.1016\/j.infsof.2014.08.007","journal-title":"Inf. Softw. Technol."},{"key":"21_CR13","doi-asserted-by":"publisher","unstructured":"Arai, S., Sakamoto, K., Washizaki, H., Fukazawa, Y.: A gamified tool for motivating developers to remove warnings of bug pattern tools. In: International Workshop on Empirical Software Engineering in Practice, pp. 37\u201342. IEEE (2014). \n                      https:\/\/doi.org\/10.1109\/IWESEP.2014.17","DOI":"10.1109\/IWESEP.2014.17"},{"key":"21_CR14","doi-asserted-by":"publisher","unstructured":"Barik, T., Murphy-Hill, E., Zimmermann, T.: A perspective on blending programming environments and games: Beyond points, badges, and leaderboards. In: IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC), pp. 134\u2013142 (2016). \n                      https:\/\/doi.org\/10.1109\/VLHCC.2016.7739676","DOI":"10.1109\/VLHCC.2016.7739676"},{"key":"21_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-319-22960-7_17","volume-title":"Games and Learning Alliance","author":"T Lim","year":"2015","unstructured":"Lim, T., et al.: Serious game mechanics, workshop on the ludo-pedagogical mechanism. In: De Gloria, A. (ed.) GALA 2014. LNCS, vol. 9221, pp. 174\u2013183. Springer, Cham (2015). \n                      https:\/\/doi.org\/10.1007\/978-3-319-22960-7_17"},{"key":"21_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84996-157-8","volume-title":"Triadic Game Design: Balancing Reality, Meaning and Play","author":"C Harteveld","year":"2011","unstructured":"Harteveld, C.: Triadic Game Design: Balancing Reality, Meaning and Play. Springer, London (2011). \n                      https:\/\/doi.org\/10.1007\/978-1-84996-157-8"},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1111\/bjet.12113","volume":"46","author":"S Arnab","year":"2014","unstructured":"Arnab, S., et al.: Mapping learning and game mechanics for serious games analysis. Br. J. Educ. Technol. 46, 391\u2013411 (2014)","journal-title":"Br. J. Educ. Technol."},{"key":"21_CR18","unstructured":"Schonfeld, E.: SCVNGR\u2019s Secret Game Mechanics Playdeck (2010). \n                      http:\/\/social.techcrunch.com\/2010\/08\/25\/scvngr-game-mechanics\/"},{"key":"21_CR19","doi-asserted-by":"publisher","first-page":"4:1","DOI":"10.1155\/2008\/470350","volume":"2008","author":"D Djaouti","year":"2008","unstructured":"Djaouti, D., Alvarez, J., Jessel, J.-P., Methel, G., Molinier, P.: A gameplay definition through videogame classification. Int. J. Comput. Games Technol. 2008, 4:1\u20134:7 (2008). \n                      https:\/\/doi.org\/10.1155\/2008\/470350","journal-title":"Int. J. Comput. Games Technol."},{"key":"21_CR20","doi-asserted-by":"publisher","unstructured":"Guardiola, E.: The gameplay loop: a player activity model for game design and analysis. In: ACM International Conference on Advances in Computer Entertainment Technology (2016). \n                      https:\/\/doi.org\/10.1145\/3001773.3001791","DOI":"10.1145\/3001773.3001791"},{"key":"21_CR21","doi-asserted-by":"publisher","DOI":"10.1201\/b16671","volume-title":"Game Design Workshop: A Playcentric Approach to Creating Innovative Games","author":"T Fullerton","year":"2014","unstructured":"Fullerton, T.: Game Design Workshop: A Playcentric Approach to Creating Innovative Games, 3rd edn. A K Peters\/CRC Press, Natick (2014)","edition":"3"},{"key":"21_CR22","unstructured":"IJsselsteijn, W.A., de Kort, Y.A.W., Poels, K.: The Game Experience Questionnaire. Technische Universiteit Eindhoven, European Community - New and Emerging Science and Technology (NEST) Programme (2013)"}],"container-title":["Lecture Notes in Computer Science","Games and Learning Alliance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11548-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T06:18:18Z","timestamp":1558333098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-11548-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030115470","9783030115487"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11548-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"22 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GALA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Games and Learning Alliance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Palermo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gala2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.seriousgamessociety.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"65","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"9","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"58% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}