{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,20]],"date-time":"2025-09-20T21:50:55Z","timestamp":1758405055028},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030343491"},{"type":"electronic","value":"9783030343507"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-34350-7_22","type":"book-chapter","created":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T00:03:51Z","timestamp":1574208231000},"page":"221-230","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Cyber Chronix, Participatory Research Approach to Develop and Evaluate a\u00a0Storytelling Game on Personal Data Protection Rights and Privacy Risks"],"prefix":"10.1007","author":[{"given":"Rosanna","family":"Di Gioia","sequence":"first","affiliation":[]},{"given":"St\u00e9phane","family":"Chaudron","sequence":"additional","affiliation":[]},{"given":"Monica","family":"Gemo","sequence":"additional","affiliation":[]},{"given":"Ignacio","family":"Sanchez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,1]]},"reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-642-16638-9_44","volume-title":"Interactive Storytelling","author":"N Zagalo","year":"2010","unstructured":"Zagalo, N., Louchart, S., Soto-Sanfiel, M.T.: Users and evaluation of interactive storytelling. In: Aylett, R., Lim, M.Y., Louchart, S., Petta, P., Riedl, M. (eds.) ICIDS 2010. LNCS, vol. 6432, pp. 287\u2013288. Springer, Heidelberg (2010). \n                      https:\/\/doi.org\/10.1007\/978-3-642-16638-9_44"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Rubegni, E., Landoni, M.: Evaluating engagement in reading: comparing children and adult assessors. In: Proceeding of the 2014 conference on Interaction Design and Children, Manchester (2016)","DOI":"10.1145\/2930674.2930696"},{"key":"22_CR3","first-page":"28","volume":"19","author":"M Sailer","year":"2013","unstructured":"Sailer, M., Hense, J., Mandl, H., Klevers, M.: Psychological perspectives on motivation through gamification. Interact. Des. Archit. J. 19, 28\u201337 (2013)","journal-title":"Interact. Des. Archit. J."},{"issue":"4","key":"22_CR4","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1002\/sce.10032","volume":"86","author":"J Novak","year":"2002","unstructured":"Novak, J.: Meaningful learning: the essential factor for conceptual change in limited or inappropriate propositional hierarchies leading to empowerment of learners. Sci. Educ. 86(4), 548\u2013571 (2002). \n                      https:\/\/doi.org\/10.1002\/sce.10032","journal-title":"Sci. Educ."},{"key":"22_CR5","unstructured":"European Parliament and Council: General Data Protection Regulation (EU) 2016\/679. Official Journal of the European Union, Luxembourg (2016)"},{"key":"22_CR6","doi-asserted-by":"publisher","unstructured":"Carretero, S., Vuorikari, R., Punie, Y.: DigComp 2.1: the digital competence framework for citizens with eight proficiency levels and examples of use. Publications Office of the European Union, Luxemburg EUR 28558 EN (2017). \n                      https:\/\/doi.org\/10.2760\/38842","DOI":"10.2760\/38842"},{"key":"22_CR7","doi-asserted-by":"publisher","unstructured":"Ferrari, A., Punie, Y., Bre\u010dko, N.: DIGComp: a framework for developping and understanding digital competences in Europe. Joint Research Centre - European Commission, EUR 26035 EN, Seville (2013). \n                      https:\/\/doi.org\/10.2788\/52966","DOI":"10.2788\/52966"},{"key":"22_CR8","doi-asserted-by":"publisher","unstructured":"Vuorikari, R., Punie, Y., Carretero Gomez S., Van den Brande, G.: DigComp 2.0: the digital competence framework for citizens. update phase 1: the conceptual reference model. Publication Office of the European Union, EUR 27948 EN, Luxembourg (2016). \n                      https:\/\/doi.org\/10.2791\/11517","DOI":"10.2791\/11517"},{"key":"22_CR9","unstructured":"European Commission Science Hub page, Understanding GDPR: new game from the JRC. \n                      https:\/\/ec.europa.eu\/jrc\/en\/news\/understanding-gdpr-new-game-jrc\n                      \n                    . Accessed 05 Sept 2019"},{"key":"22_CR10","unstructured":"European Commission Science Hub page, Cyber Chronix, a game to understand data protection rights and raise awareness on privacy risks. \n                      https:\/\/ec.europa.eu\/jrc\/en\/research-topic\/security-privacy-and-data-protection\/cyber-chronix\n                      \n                    . Accessed 05 Sept 2019"},{"key":"22_CR11","unstructured":"Better Internet for kids web page, Cyber Chronix, a new game from the JRC to better understand the GDPR. \n                      https:\/\/www.betterinternetforkids.eu\/web\/portal\/practice\/awareness\/detail?articleId=3187316\n                      \n                    . Accessed 05 Sept 2019"},{"key":"22_CR12","volume-title":"The Gamification of Learning and Instructions: Game-based Methods and Strategies for Training and Education","author":"KM Kapp","year":"2012","unstructured":"Kapp, K.M.: The Gamification of Learning and Instructions: Game-based Methods and Strategies for Training and Education. Wiley, San Francisco (2012)"},{"key":"22_CR13","doi-asserted-by":"publisher","unstructured":"Di Gioia, R., Gemo, M., Chaudron, S.: Empowering children and adults for a safe and responsible use of ICT, EUR 27702. Publications Office, Luxembourg (2016). \n                      https:\/\/doi.org\/10.2788\/942647","DOI":"10.2788\/942647"}],"container-title":["Lecture Notes in Computer Science","Games and Learning Alliance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34350-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T00:26:26Z","timestamp":1574209586000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-34350-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030343491","9783030343507"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34350-7_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"1 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"GALA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Games and Learning Alliance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"gala2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.seriousgamessociety.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"77","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"74% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19 of the 57 accepted papers were presented as posters.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}