{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T04:23:56Z","timestamp":1773548636777,"version":"3.50.1"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030503086","type":"print"},{"value":"9783030503093","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50309-3_2","type":"book-chapter","created":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T23:21:31Z","timestamp":1594336891000},"page":"16-31","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["The Impact of Gamification Factor in the Acceptance of Cybersecurity Awareness Augmented Reality Game (CybAR)"],"prefix":"10.1007","author":[{"given":"Hamed","family":"Alqahtani","sequence":"first","affiliation":[]},{"given":"Manolya","family":"Kavakli-Thorne","sequence":"additional","affiliation":[]},{"given":"Majed","family":"Alrowaily","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Alqahtani, H., Kavakli, M.: iMAP-CampUS (an intelligent mobile augmented reality program on campus as a ubiquitous system): a theoretical framework to measure user\u2019s behavioural intention. In: Proceedings of the 9th International Conference on Computer and Automation Engineering, pp. 36\u201343. ACM (2017)","DOI":"10.1145\/3057039.3057086"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Alqahtani, H., Kavakli, M.: A theoretical model to measure user\u2019s behavioural intention to use iMAP-CampUs app. In: 2017 12th IEEE Conference on Industrial Electronics and Applications (ICIEA), pp. 681\u2013686. IEEE (2017)","DOI":"10.1109\/ICIEA.2017.8282928"},{"issue":"5","key":"2_CR3","doi-asserted-by":"publisher","first-page":"37","DOI":"10.31033\/ijemr.8.5.6","volume":"8","author":"H Alqahtani","year":"2018","unstructured":"Alqahtani, H., Kavakli, M., Sheikh, N.U.: Analysis of the technology acceptance theoretical model in examining users behavioural intention to use an augmented reality app (iMAP-CampUS). Int. J. Eng. Manage. Res. (IJEMR) 8(5), 37\u201349 (2018)","journal-title":"Int. J. Eng. Manage. Res. (IJEMR)"},{"key":"2_CR4","unstructured":"Arth, C., Grasset, R., Gruber, L., Langlotz, T., Mulloni, A., Wagner, D.: The history of mobile augmented reality. arXiv preprint arXiv:1505.01319 (2015)"},{"issue":"4","key":"2_CR5","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1162\/pres.1997.6.4.355","volume":"6","author":"RT Azuma","year":"1997","unstructured":"Azuma, R.T.: A survey of augmented reality. Presence Teleop. Virt. Environ. 6(4), 355\u2013385 (1997)","journal-title":"Presence Teleop. Virt. Environ."},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1016\/j.chb.2015.04.024","volume":"50","author":"G Baptista","year":"2015","unstructured":"Baptista, G., Oliveira, T.: Understanding mobile banking: the unified theory of acceptance and use of technology combined with cultural moderators. Comput. Hum. Behav. 50, 418\u2013430 (2015)","journal-title":"Comput. Hum. Behav."},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1108\/IntR-10-2015-0295","volume":"27","author":"G Baptista","year":"2017","unstructured":"Baptista, G., Oliveira, T.: Why so serious? Gamification impact in the acceptance of mobile banking services. Internet Res. 27, 118\u2013139 (2017)","journal-title":"Internet Res."},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"Bogost, I.: Exploitationware. In: Colby, R., Johnson, M.S.S., Colby R.S. (eds.) Rhetoric\/Composition\/Play through Video Games. Palgrave Macmillan\u2019s Digital Education and Learning, pp. 139\u2013147. Springer, New York (2013). https:\/\/doi.org\/10.1057\/9781137307675_11","DOI":"10.1057\/9781137307675_11"},{"issue":"1","key":"2_CR9","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1080\/13676261.2015.1048200","volume":"19","author":"FM Brooks","year":"2016","unstructured":"Brooks, F.M., Chester, K.L., Smeeton, N.C., Spencer, N.H.: Video gaming in adolescence: factors associated with leisure time use. J. Youth Stud. 19(1), 36\u201354 (2016)","journal-title":"J. Youth Stud."},{"key":"2_CR10","doi-asserted-by":"publisher","DOI":"10.4324\/9780203498187","volume-title":"Quantitative Data Analysis with SPSS 12 and 13: A Guide for Social Scientists","author":"A Bryman","year":"2004","unstructured":"Bryman, A., Cramer, D.: Quantitative Data Analysis with SPSS 12 and 13: A Guide for Social Scientists. Routledge, Abingdon (2004)"},{"issue":"12","key":"2_CR11","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s00371-009-0387-4","volume":"25","author":"JW Burke","year":"2009","unstructured":"Burke, J.W., McNeill, M., Charles, D.K., Morrow, P.J., Crosbie, J.H., McDonough, S.M.: Optimising engagement for stroke rehabilitation using serious games. Vis. Comput. 25(12), 1085 (2009). https:\/\/doi.org\/10.1007\/s00371-009-0387-4","journal-title":"Vis. Comput."},{"key":"2_CR12","first-page":"7","volume":"22","author":"WW Chin","year":"1998","unstructured":"Chin, W.W.: Commentary: issues and opinion on structural equation modeling. MIS Q. 22, 7\u201316 (1998)","journal-title":"MIS Q."},{"key":"2_CR13","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.sbspro.2012.05.132","volume":"46","author":"TL Chou","year":"2012","unstructured":"Chou, T.L., ChanLin, L.J.: Augmented reality smartphone environment orientation application: a case study of the fu-jen university mobile campus touring system. Procedia Soc. Behav. Sci. 46, 410\u2013416 (2012)","journal-title":"Procedia Soc. Behav. Sci."},{"key":"2_CR14","volume-title":"Security Awareness: Applying Practical Security in Your World","author":"M Ciampa","year":"2013","unstructured":"Ciampa, M.: Security Awareness: Applying Practical Security in Your World. Cengage Learning, Boston (2013)"},{"issue":"2","key":"2_CR15","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1016\/j.compedu.2012.03.004","volume":"59","author":"TM Connolly","year":"2012","unstructured":"Connolly, T.M., Boyle, E.A., MacArthur, E., Hainey, T., Boyle, J.M.: A systematic literature review of empirical evidence on computer games and serious games. Comput. Educ. 59(2), 661\u2013686 (2012)","journal-title":"Comput. Educ."},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13, 319\u2013340 (1989)","journal-title":"MIS Q."},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"744","DOI":"10.3389\/fpsyg.2018.00744","volume":"9","author":"J Dawson","year":"2018","unstructured":"Dawson, J., Thomson, R.: The future cybersecurity workforce: going beyond technical skills for successful cyber performance. Front. Psychol. 9, 744 (2018)","journal-title":"Front. Psychol."},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 581\u2013590. ACM (2006)","DOI":"10.1145\/1124772.1124861"},{"issue":"1","key":"2_CR19","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1177\/002224378101800104","volume":"18","author":"C Fornell","year":"1981","unstructured":"Fornell, C., Larcker, D.F.: Evaluating structural equation models with unobservable variables and measurement error. J. Mark. Res. 18(1), 39\u201350 (1981)","journal-title":"J. Mark. Res."},{"issue":"1","key":"2_CR20","first-page":"7","volume":"4","author":"D Gefen","year":"2000","unstructured":"Gefen, D., Straub, D., Boudreau, M.C.: Structural equation modeling and regression: Guidelines for research practice. Commun. Assoc. Inf. Syst. 4(1), 7 (2000)","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"4","key":"2_CR21","first-page":"15","volume":"10","author":"G Hofstede","year":"1980","unstructured":"Hofstede, G.: Culture and organizations. Int. Stud. Manage. Organ. 10(4), 15\u201341 (1980)","journal-title":"Int. Stud. Manage. Organ."},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Jin, G., Tu, M., Kim, T.H., Heffron, J., White, J.: Game based cybersecurity training for high school students. In: Proceedings of the 49th ACM Technical Symposium on Computer Science Education, pp. 68\u201373. ACM (2018)","DOI":"10.1145\/3159450.3159591"},{"key":"2_CR23","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.cose.2014.03.003","volume":"43","author":"M Kajzer","year":"2014","unstructured":"Kajzer, M., D\u2019Arcy, J., Crowell, C.R., Striegel, A., Van Bruggen, D.: An exploratory investigation of message-person congruence in information security awareness campaigns. Comput. Secur. 43, 64\u201376 (2014)","journal-title":"Comput. Secur."},{"issue":"1","key":"2_CR24","doi-asserted-by":"publisher","first-page":"43","DOI":"10.4018\/JGIM.2017010103","volume":"25","author":"IU Khan","year":"2017","unstructured":"Khan, I.U., Hameed, Z., Khan, S.U.: Understanding online banking adoption in a developing country: UTAUT2 with cultural moderators. J. Glob. Inf. Manag. (JGIM) 25(1), 43\u201365 (2017)","journal-title":"J. Glob. Inf. Manag. (JGIM)"},{"issue":"2","key":"2_CR25","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1754393.1754396","volume":"10","author":"P Kumaraguru","year":"2010","unstructured":"Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., Hong, J.: Teaching johnny not to fall for phish. ACM Trans. Internet Technol. (TOIT) 10(2), 7 (2010)","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Lee, G.A., Dunser, A., Kim, S., Billinghurst, M.: CityViewAR: a mobile outdoor AR application for city visualization. In: 2012 IEEE International Symposium on Mixed and Augmented Reality-Arts, Media, and Humanities (ISMAR-AMH), pp. 57\u201364. IEEE (2012)","DOI":"10.1109\/ISMAR-AMH.2012.6483989"},{"key":"2_CR27","unstructured":"Li, C.Y., Ku, Y.C.: The effects of persuasive messages on system acceptance. In: PACIS, p. 110. Citeseer (2011)"},{"issue":"4","key":"2_CR28","doi-asserted-by":"publisher","first-page":"705","DOI":"10.2307\/25148817","volume":"31","author":"M Limayem","year":"2007","unstructured":"Limayem, M., Hirt, S.G., Cheung, C.M.: How habit limits the predictive power of intention: the case of information systems continuance. MIS Q. 31(4), 705\u2013737 (2007)","journal-title":"MIS Q."},{"key":"2_CR29","first-page":"169","volume":"12","author":"EA Locke","year":"1987","unstructured":"Locke, E.A.: Social foundations of thought and action: a social-cognitive view. Acad. Manage. Rev. 12, 169\u2013171 (1987)","journal-title":"Acad. Manage. Rev."},{"issue":"1","key":"2_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijinfomgt.2013.06.002","volume":"34","author":"C Martins","year":"2014","unstructured":"Martins, C., Oliveira, T., Popovi\u010d, A.: Understanding the internet banking adoption: a unified theory of acceptance and use of technology and perceived risk application. Int. J. Inf. Manage. 34(1), 1\u201313 (2014)","journal-title":"Int. J. Inf. Manage."},{"key":"2_CR31","unstructured":"Misra, G., Arachchilage, N.A.G., Berkovsky, S.: Phish phinder: a game design approach to enhance user confidence in mitigating phishing attacks. arXiv preprint arXiv:1710.06064 (2017)"},{"key":"2_CR32","doi-asserted-by":"publisher","DOI":"10.1201\/9780429031908","volume-title":"Cybersecurity Awareness Among Students and Faculty","author":"A Moallem","year":"2019","unstructured":"Moallem, A.: Cybersecurity Awareness Among Students and Faculty. CRC Press, Boca Raton (2019)"},{"key":"2_CR33","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.chb.2014.02.020","volume":"35","author":"A Negahban","year":"2014","unstructured":"Negahban, A., Chung, C.H.: Discovering determinants of users perception of mobile device functionality fit. Comput. Hum. Behav. 35, 75\u201384 (2014)","journal-title":"Comput. Hum. Behav."},{"issue":"16","key":"2_CR34","doi-asserted-by":"publisher","first-page":"1704","DOI":"10.1001\/jama.2011.408","volume":"305","author":"JL Read","year":"2011","unstructured":"Read, J.L., Shortell, S.M.: Interactive games to promote behavior change in prevention and treatment. Jama 305(16), 1704\u20131705 (2011)","journal-title":"Jama"},{"issue":"4","key":"2_CR35","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/j.bushor.2015.03.006","volume":"58","author":"K Robson","year":"2015","unstructured":"Robson, K., Plangger, K., Kietzmann, J.H., McCarthy, I., Pitt, L.: Is it all a game? Understanding the principles of gamification. Bus. Horiz. 58(4), 411\u2013420 (2015)","journal-title":"Bus. Horiz."},{"issue":"1","key":"2_CR36","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers, R.W.: A protection motivation theory of fear appeals and attitude change1. J. Psychol. 91(1), 93\u2013114 (1975)","journal-title":"J. Psychol."},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Sheng, S., et al.: Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 88\u201399. ACM (2007)","DOI":"10.1145\/1280680.1280692"},{"key":"2_CR38","doi-asserted-by":"publisher","first-page":"561","DOI":"10.2307\/249633","volume":"19","author":"S Taylor","year":"1995","unstructured":"Taylor, S., Todd, P.: Assessing IT usage: the role of prior experience. MIS Q. 19, 561\u2013570 (1995)","journal-title":"MIS Q."},{"key":"2_CR39","unstructured":"Thompson, M.F., Irvine, C.E.: CyberCIEGE scenario design and implementation. In: 2014 $$\\{$$USENIX$$\\}$$ Summit on Gaming, Games, and Gamification in Security Education (3GSE 2014) (2014)"},{"key":"2_CR40","doi-asserted-by":"publisher","first-page":"125","DOI":"10.2307\/249443","volume":"15","author":"RL Thompson","year":"1991","unstructured":"Thompson, R.L., Higgins, C.A., Howell, J.M.: Personal computing: toward a conceptual model of utilization. MIS Q. 15, 125\u2013143 (1991)","journal-title":"MIS Q."},{"key":"2_CR41","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27, 425\u2013478 (2003)","journal-title":"MIS Q."},{"issue":"1","key":"2_CR42","doi-asserted-by":"publisher","first-page":"157","DOI":"10.2307\/41410412","volume":"36","author":"V Venkatesh","year":"2012","unstructured":"Venkatesh, V., Thong, J.Y., Xu, X.: Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q. 36(1), 157\u2013178 (2012)","journal-title":"MIS Q."},{"key":"2_CR43","doi-asserted-by":"crossref","unstructured":"Wen, Z.A., Lin, Z., Chen, R., Andersen, E.: What. hack: engaging anti-phishing training through a role-playing phishing simulation game. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, p. 108. ACM (2019)","DOI":"10.1145\/3290605.3300338"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50309-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:29:23Z","timestamp":1720571363000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50309-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030503086","9783030503093"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50309-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}