{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T06:51:22Z","timestamp":1768546282494,"version":"3.49.0"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030115470","type":"print"},{"value":"9783030115487","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11548-7_25","type":"book-chapter","created":{"date-parts":[[2019,1,20]],"date-time":"2019-01-20T21:53:52Z","timestamp":1548021232000},"page":"267-276","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Analyzing and Predicting Player Performance in a Quantum Cryptography Serious Game"],"prefix":"10.1007","author":[{"given":"Dilanga","family":"Abeyrathna","sequence":"first","affiliation":[]},{"given":"Srikanth","family":"Vadla","sequence":"additional","affiliation":[]},{"given":"Vidya","family":"Bommanapally","sequence":"additional","affiliation":[]},{"given":"Mahadevan","family":"Subramaniam","sequence":"additional","affiliation":[]},{"given":"Parvathi","family":"Chundi","sequence":"additional","affiliation":[]},{"given":"Abhishek","family":"Parakh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,22]]},"reference":[{"issue":"2","key":"25_CR1","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1111\/bjet.12113","volume":"46","author":"S Arnab","year":"2015","unstructured":"Arnab, S., et al.: Mapping learning and game mechanics for serious games analysis. Br. J. Edu. Technol. 46(2), 391\u2013411 (2015)","journal-title":"Br. J. Edu. Technol."},{"issue":"3","key":"25_CR2","doi-asserted-by":"publisher","first-page":"030301","DOI":"10.1103\/PhysRevA.64.030301","volume":"64","author":"SC Benjamin","year":"2001","unstructured":"Benjamin, S.C., Hayden, P.M.: Multiplayer quantum games. Phys. Rev. A 64(3), 030301 (2001)","journal-title":"Phys. Rev. A"},{"key":"25_CR3","unstructured":"Bommanapally, V., Subramaniam, M., Chundi, P.: Navigation hints in serious games. In: Beck, D., et al. (eds.) Online Proceedings from Fourth Immersive Learning Research Network Conference, Technischen Universitat Graz, Missoula, Montana (2018)"},{"issue":"7","key":"25_CR4","doi-asserted-by":"publisher","first-page":"642","DOI":"10.17485\/ijst\/2015\/v8i7\/67760","volume":"8","author":"K Boopathi","year":"2015","unstructured":"Boopathi, K., Sreejith, S., Bithin, A.: Learning cyber security through gamification. Indian J. Sci. Technol. 8(7), 642\u2013649 (2015)","journal-title":"Indian J. Sci. Technol."},{"issue":"1","key":"25_CR5","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.cose.2006.10.005","volume":"26","author":"BD Cone","year":"2007","unstructured":"Cone, B.D., Irvine, C.E., Thompson, M.F., Nguyen, T.D.: A video game for cybersecurity training and awareness. Comput. Secur. 26(1), 63\u201372 (2007)","journal-title":"Comput. Secur."},{"key":"25_CR6","series-title":"IFIP International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/0-387-33406-8_37","volume-title":"Security and Privacy in Dynamic Environments","author":"BD Cone","year":"2006","unstructured":"Cone, B.D., Thompson, M.F., Irvine, C.E., Nguyen, T.D.: Cyber security training and awareness through game play. In: Fischer-H\u00fcbner, S., Rannenberg, K., Yngstr\u00f6m, L., Lindskog, S. (eds.) SEC 2006. IIFIP, vol. 201, pp. 431\u2013436. Springer, Boston, MA (2006). \n                      https:\/\/doi.org\/10.1007\/0-387-33406-8_37"},{"issue":"3","key":"25_CR7","first-page":"75","volume":"18","author":"D Dicheva","year":"2015","unstructured":"Dicheva, D., Dichev, C., Agre, G., Angelova, G.: Gamification in education: a systematic mapping study. J. Educ. Technol. Soc. 18(3), 75\u201388 (2015)","journal-title":"J. Educ. Technol. Soc."},{"issue":"2","key":"25_CR8","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TCIAIG.2015.2512592","volume":"9","author":"M Frutos-Pascual","year":"2017","unstructured":"Frutos-Pascual, M., Zapirain, B.G.: Review of the use of AI techniques in serious games: decision making and machine learning. IEEE Trans. Comput. Intell. AI Games 9(2), 133\u2013152 (2017)","journal-title":"IEEE Trans. Comput. Intell. AI Games"},{"issue":"3","key":"25_CR9","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/2716262","volume":"47","author":"E Gibaja","year":"2015","unstructured":"Gibaja, E., Ventura, S.: A tutorial on multilabel learning. ACM Comput. Surv. (CSUR) 47(3), 52 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"25_CR10","unstructured":"Hall, G.: Pearsons correlation coefficient. Other Words 1(9) (2015)"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Labuschagne, W., Veerasamy, N., Burke, I., Eloff, M.: Design of cyber security awareness game utilizing a social media framework. In: Information Security South Africa (ISSA), pp. 1\u20139. IEEE (2011)","DOI":"10.1109\/ISSA.2011.6027538"},{"issue":"3","key":"25_CR12","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/s11128-013-0675-9","volume":"13","author":"H Situ","year":"2014","unstructured":"Situ, H.: A quantum approach to play asymmetric coordination games. Quantum Inf. Process. 13(3), 591\u2013599 (2014)","journal-title":"Quantum Inf. Process."},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Smith, K., Shull, J., Shen, Y., Dean, A., Michaeli, J.: Overcoming challenges in educational stem game design and development. In: 2017 Winter Simulation Conference (WSC), pp. 849\u2013859. IEEE (2017)","DOI":"10.1109\/WSC.2017.8247837"},{"issue":"3","key":"25_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdwm.2007070101","volume":"3","author":"G Tsoumakas","year":"2007","unstructured":"Tsoumakas, G., Katakis, I.: Multi-label classification: an overview. Int. J. Data Warehouse. Min. (IJDWM) 3(3), 1\u201313 (2007)","journal-title":"Int. J. Data Warehouse. Min. (IJDWM)"},{"key":"25_CR15","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1007\/978-3-540-74958-5_38","volume-title":"Machine Learning: ECML 2007","author":"G Tsoumakas","year":"2007","unstructured":"Tsoumakas, G., Vlahavas, I.: Random k-labelsets: an ensemble method for multilabel classification. In: Kok, J.N., Koronacki, J., de Mantaras, R.L., Matwin, S., Mladeni\u010d, D., Skowron, A. (eds.) ECML 2007. LNCS (LNAI), vol. 4701, pp. 406\u2013417. Springer, Heidelberg (2007). \n                      https:\/\/doi.org\/10.1007\/978-3-540-74958-5_38"}],"container-title":["Lecture Notes in Computer Science","Games and Learning Alliance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11548-7_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T06:18:05Z","timestamp":1558333085000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-11548-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030115470","9783030115487"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11548-7_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"22 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GALA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Games and Learning Alliance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Palermo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gala2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.seriousgamessociety.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"65","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"9","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"58% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}