{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:31:28Z","timestamp":1743010288893,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031447501"},{"type":"electronic","value":"9783031447518"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-44751-8_5","type":"book-chapter","created":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T04:01:58Z","timestamp":1697169718000},"page":"65-80","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Model for\u00a0Mapping Serious Game Mechanics to\u00a0Pedagogical Patterns"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5437-9181","authenticated-orcid":false,"given":"Jamie","family":"Ferguson","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6870-8481","authenticated-orcid":false,"given":"Daisy","family":"Abbott","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4831-3746","authenticated-orcid":false,"given":"Sandy","family":"Louchart","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,14]]},"reference":[{"key":"5_CR1","unstructured":"LightBot. https:\/\/lightbot.com\/"},{"key":"5_CR2","unstructured":"Abbott, D.: Intentional learning design for educational games: a workflow supporting both novices and experts. Learner and User Experience Research: An Introduction for the Field of Learning Design & Technology (2020)"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Abbott, D., Chatzifoti, O., Ferguson, J., Louchart, S., Stals, S.: Serious \u2018slow\u2019 game jam - a game jam model for serious game. In: Proceedings of International Conference on Game Jams, Hackathons and Game Creation Events. Association for Computing Machinery (2023)","DOI":"10.1145\/3610602.3610604"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Abbott, D., Chatzifoti, O., Louchart, S.: Provocative games to encourage critical reflection. In: ECGBL 2022 16th European Conference on Game-Based Learning. Academic Conferences and Publishing Limited (2022)","DOI":"10.34190\/ecgbl.16.1.486"},{"issue":"2","key":"5_CR5","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1111\/bjet.12113","volume":"46","author":"S Arnab","year":"2015","unstructured":"Arnab, S., et al.: Mapping learning and game mechanics for serious games analysis. Br. J. Edu. Technol. 46(2), 391\u2013411 (2015)","journal-title":"Br. J. Edu. Technol."},{"issue":"1","key":"5_CR6","doi-asserted-by":"publisher","first-page":"20","DOI":"10.3991\/ijac.v15i1.26941","volume":"15","author":"O Arnold","year":"2022","unstructured":"Arnold, O., Franke, R., Jantke, K.P., Wache, H.H.: Professional training for industrial accident prevention with time travel games. Int. J. Adv. Corporate Learn. (iJAC) 15(1), 20\u201334 (2022)","journal-title":"Int. J. Adv. Corporate Learn. (iJAC)"},{"key":"5_CR7","unstructured":"Bergin, J.: Fourteen pedagogical patterns. In: EuroPLoP, pp. 1\u201349 (2000)"},{"key":"5_CR8","unstructured":"Bergin, J., et al. (eds.): Pedagogical Patterns: Advice for Educators. Joseph Bergin Software Tools, Pleasantville, NY, (compact edn.), 2nd (corrected) print.: Aug, 31, 2012 edn. (2012)"},{"key":"5_CR9","unstructured":"Bj\u00f6rk, S., Holopainen, J.: Games and design patterns. The game design reader: a rules of play anthology, pp. 410\u2013437 (2005)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Castronova, E., Knowles, I.: A model of climate policy using board game mechanics. Int. J. Serious Games 2(3) (2015)","DOI":"10.17083\/ijsg.v2i3.77"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Crick, T., Davenport, J.H., Hanna, P., Irons, A., Prickett, T.: Overcoming the challenges of teaching cybersecurity in UK computer science degree programmes. In: 2020 IEEE Frontiers in Education Conference (FIE), Uppsala, Sweden, pp. 1\u20139. IEEE (2020)","DOI":"10.1109\/FIE44824.2020.9274033"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Fioravanti, M.L., Barbosa, E.F.: A catalog of pedagogical patterns for learning applications. In: 2018 IEEE Frontiers in Education Conference (FIE), pp. 1\u20139. IEEE (2018)","DOI":"10.1109\/FIE.2018.8658904"},{"key":"5_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2022.102930","volume":"169","author":"T Georgiou","year":"2023","unstructured":"Georgiou, T., Baillie, L., Chatzifoti, O., Chan, S.C.: Future forums: a methodology for exploring, gamifying, and raising security awareness of code-citizens. Int. J. Hum. Comput. Stud. 169, 102930 (2023)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Guardiola, E.: The gameplay loop: a player activity model for game design and analysis. In: ACM International Conference Proceeding Series (2016)","DOI":"10.1145\/3001773.3001791"},{"key":"5_CR15","unstructured":"Hallett, J., Larson, R., Rashid, A.: Mirror, mirror, on the wall: what are we teaching them all? Characterising the focus of cybersecurity curricular frameworks (2018)"},{"key":"5_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84996-157-8","volume-title":"Triadic Game Design: Balancing Reality, Meaning and Play","author":"C Harteveld","year":"2011","unstructured":"Harteveld, C.: Triadic Game Design: Balancing Reality, Meaning and Play. Springer, Heidelberg (2011)"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Hauge, J.B., et al.: Serious game mechanics and opportunities for re-use. eLearn. Softw. Educ. (2) (2015)","DOI":"10.12753\/2066-026X-15-094"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Jerinic, L.: Teaching introductory programming. Int. J. Adv. Comput. Sci. Appl. 5(6) (2014)","DOI":"10.14569\/IJACSA.2014.050611"},{"issue":"4","key":"5_CR19","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1207\/s15430421tip4104_2","volume":"41","author":"DR Krathwohl","year":"2002","unstructured":"Krathwohl, D.R.: A revision of bloom\u2019s taxonomy: an overview. Theory Pract. 41(4), 212\u2013218 (2002)","journal-title":"Theory Pract."},{"key":"5_CR20","unstructured":"Kultima, A.: Defining game jam. In: 10th International Conference on the Foundations of Digital Games (FDG 2015) (2015)"},{"key":"5_CR21","unstructured":"Lankoski, P., Bj\u00f6rk, S.: Gameplay design patterns for believable non-player characters. In: DiGRA Conference, pp. 416\u2013423 (2007)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Lim, T., et al.: Strategies for effective digital games development and implementation. In: Cases on Digital Game-Based Learning: Methods, Models, and Strategies, pp. 168\u2013198. IGI Global (2013)","DOI":"10.4018\/978-1-4666-2848-9.ch010"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Lopez, T., Sharp, H., Tun, T., Bandara, A., Levine, M., Nuseibeh, B.: Talking about security with professional developers. In: 2019 IEEE\/ACM Joint 7th International Workshop on Conducting Empirical Studies in Industry (CESI) and 6th International Workshop on Software Engineering Research and Industrial Practice (SER &IP), Montreal, QC, Canada, pp. 34\u201340. IEEE (2019)","DOI":"10.1109\/CESSER-IP.2019.00014"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Maarek, M., McGregor, L., Louchart, S., McMenemy, R.: How could serious games support secure programming? Designing a study replication and intervention. In: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), Stockholm, Sweden, pp. 139\u2013148. IEEE (2019)","DOI":"10.1109\/EuroSPW.2019.00022"},{"issue":"1","key":"5_CR25","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1145\/2568195.2568212","volume":"5","author":"D Manson","year":"2014","unstructured":"Manson, D., Pike, R.: The case for depth in cybersecurity education. ACM Inroads 5(1), 47\u201352 (2014)","journal-title":"ACM Inroads"},{"key":"5_CR26","unstructured":"Pan, J.Y.: Fighting fire with fire \u2013 a pre-emptive approach to restore control over IT assets from malware infection. Ph.D. Murdoch University (2012)"},{"key":"5_CR27","unstructured":"Pan, J.Y., Fung, C.C.: Pattern for malware remediation \u2013 a last line of defence tool against Malware in the global communication platform. In: Proceedings of the 19th ITS Biennial Conference. Bangkok, Thailand (2012)"},{"key":"5_CR28","unstructured":"Pargman, D., Hedin, B., Eriksson, E.: Patterns of engagement: using a board game as a tool to address sustainability in engineering educations. In: Mazijn, B. (ed.) Proceedings of the 8th International Conference on Engineering Education for Sustainable Development, pp. 302\u2013310. Instituut v\u00f3\u00f3r Duurzame Ontwikkeling, Bruges (2016)"},{"issue":"2","key":"5_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3383773","volume":"23","author":"J Parker","year":"2020","unstructured":"Parker, J., et al.: Build it, break it, fix it: contesting secure development. ACM Trans. Privacy Secur. 23(2), 1\u201336 (2020)","journal-title":"ACM Trans. Privacy Secur."},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Troiano, G.M., Schouten, D., Cassidy, M., Tucker-Raymond, E., Puttick, G., Harteveld, C.: All good things come in threes: assessing student-designed games via triadic game design. In: Proceedings of the 15th International Conference on the Foundations of Digital Games, pp. 1\u20134 (2020)","DOI":"10.1145\/3402942.3403010"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Waite, J., Franceschini, A., Sentance, S., Patterson, M., Sharkey, J.: An online platform for teaching upper secondary school computer science. In: United Kingdom and Ireland Computing Education Research Conference, Glasgow, UK, pp. 1\u20137. ACM (2021)","DOI":"10.1145\/3481282.3481287"},{"issue":"1","key":"5_CR32","first-page":"59","volume":"22","author":"W Westera","year":"2019","unstructured":"Westera, W.: Why and how serious games can become far more effective: accommodating productive learning experiences, learner motivation and the monitoring of learning gains. J. Educ. Technol. Soc. 22(1), 59\u201369 (2019)","journal-title":"J. Educ. Technol. Soc."}],"container-title":["Lecture Notes in Computer Science","Serious Games"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-44751-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:29:11Z","timestamp":1730316551000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-44751-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031447501","9783031447518"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-44751-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"14 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"JCSG","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint International Conference on Serious Games","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"jcsg2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/jointconference-on-seriousgames.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14 poster papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}