{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T11:25:23Z","timestamp":1777634723333,"version":"3.51.4"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031976629","type":"print"},{"value":"9783031976636","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T00:00:00Z","timestamp":1751068800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T00:00:00Z","timestamp":1751068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-97663-6_13","type":"book-chapter","created":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T01:03:34Z","timestamp":1751591014000},"page":"152-164","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Serious Play for a Safer World: An Analysis of Geogames at the Nexus of Cybersecurity, and Disaster Management"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7086-0300","authenticated-orcid":false,"given":"Zhenhua","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-2887-3520","authenticated-orcid":false,"given":"Ema Odra","family":"Ra\u0161\u010dan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2751-9326","authenticated-orcid":false,"given":"Alenka","family":"Poplin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1675-9535","authenticated-orcid":false,"given":"David I.","family":"Schwartz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,28]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Di Loreto, I., Mora, S., Divitini, M.: Collaborative serious games for crisis management: an overview. In: 2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 352\u2013357. IEEE (2012)","DOI":"10.1109\/WETICE.2012.25"},{"key":"13_CR2","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1016\/j.ijdrr.2018.09.001","volume":"31","author":"A Solinska-Nowak","year":"2018","unstructured":"Solinska-Nowak, A., et al.: An overview of serious games for disaster risk management \u2013 prospects and limitations for informing actions to arrest increasing risk. Int. J. Disaster Risk Reduction 31, 1013\u20131029 (2018)","journal-title":"Int. J. Disaster Risk Reduction"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Alotaibi, F., Furnell, S., Stengel, I., Papadaki, M.: A review of using gaming technology for cyber-security awareness. Int. J. Inf. Secur. Res. 6(2) (2016)","DOI":"10.20533\/ijisr.2042.4639.2016.0076"},{"key":"13_CR4","unstructured":"Hill Jr, W., Fanuel, M., Yuan, X., Zhang, J., Sajad, S.: A Survey of Serious Games for Cybersecurity Education and Training (2020)"},{"key":"13_CR5","unstructured":"Hill, W., Fanuel, M., Yuan, X.: Comparing Serious Games for Cyber Security Education (2020)"},{"key":"13_CR6","unstructured":"Calvano, M., Caruso, F., Curci, A., Piccinno, A., Rossano, V.: A Rapid Review on Serious Games for Cybersecurity Education: Are \u201cSerious\u201d and Gaming Aspects Well Balanced?"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Chattopadhyay, A., Maschinot, C., Nestor, L.: Mirror mirror on the wall - what are cybersecurity educational games offering overall: a research study and gap analysis. In: 2021 IEEE Frontiers in Education Conference (FIE), pp. 1\u20138. IEEE (2021)","DOI":"10.1109\/FIE49875.2021.9637224"},{"key":"13_CR8","doi-asserted-by":"publisher","first-page":"104307","DOI":"10.1016\/j.cose.2024.104307","volume":"150","author":"C Ng","year":"2025","unstructured":"Ng, C., Hasan, M.: Cybersecurity serious games development: a systematic review. Comput. Secur. 150, 104307 (2025)","journal-title":"Comput. Secur."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Tioh, J., Mina, M., Jacobson, D.: Cyber security training a survey of serious games in cyber security. In: 2017 IEEE Frontiers in Education Conference (FIE), pp. 1\u20135. IEEE (2017)","DOI":"10.1109\/FIE.2017.8190712"},{"key":"13_CR10","unstructured":"Geogames Lab. www.geogameslab.net. Accessed 12 Feb 2025"},{"issue":"23","key":"13_CR11","doi-asserted-by":"publisher","first-page":"10296","DOI":"10.3390\/su162310296","volume":"16","author":"D Marahatta","year":"2024","unstructured":"Marahatta, D., Ghimire, J., Poplin, A.: Designing and evaluating games for landslides, earthquakes, and fires: lesson learned from schools in Nepal. Sustainability 16(23), 10296 (2024)","journal-title":"Sustainability"},{"key":"13_CR12","unstructured":"Federal Emergency Management Agency. https:\/\/www.fema.gov\/emergency-managers\/national-preparedness\/exercises\/tools#PrepToolkit. Accessed 07 May 2025"},{"key":"13_CR13","unstructured":"The PHUSICOS NBS Simulation. https:\/\/phusicos.socialsimulations.org\/. Accessed 07 May 2025"},{"key":"13_CR14","unstructured":"LabX Evtreme Event. https:\/\/labx.org\/our-programs\/extreme-event\/. Accessed 07 May 2025"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"Hendrix, M., Al-Sherbaz, A., Bloom, V.: Game based cyber security training: are serious games suitable for cyber security training? Int. J. Serious Games 3(1) (2016)","DOI":"10.17083\/ijsg.v3i1.107"},{"issue":"6","key":"13_CR16","doi-asserted-by":"publisher","first-page":"405","DOI":"10.3390\/ijgi9060405","volume":"9","author":"B Tomaszewski","year":"2020","unstructured":"Tomaszewski, B., et al.: Supporting disaster resilience spatial thinking with serious GeoGames: project lily pad. ISPRS Int. J. Geo Inf. 9(6), 405 (2020)","journal-title":"ISPRS Int. J. Geo Inf."},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Prisilla, G.: The cyber security issues over emergency management. In: ICTCS 2016: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, pp. 1\u20138 (2016)","DOI":"10.1145\/2905055.2905327"},{"issue":"2","key":"13_CR18","doi-asserted-by":"publisher","first-page":"205","DOI":"10.3390\/fi5020205","volume":"5","author":"G Loukas","year":"2013","unstructured":"Loukas, G., Gan, D., Vuong, T.: A review of cyber threats and defence approaches in emergency management. Future Internet 5(2), 205\u2013236 (2013)","journal-title":"Future Internet"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Chaubey, C., Raj, S., Kaswan, S.: Security and privacy issues in location dependent services for mobile communication: a synergistic review. IOP Conf. Ser. Mater. Sci. Eng. 1149(1), Article 012007 (2021)","DOI":"10.1088\/1757-899X\/1149\/1\/012007"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Palleti, V., Adepu, S., Mishra, V.: Cascading effects of cyber-attacks on interconnected critical infrastructure. Cybersecurity 4(1), Article 3 (2021)","DOI":"10.1186\/s42400-021-00071-z"},{"key":"13_CR21","doi-asserted-by":"crossref","unstructured":"Al-Karaki, J., Itradat, A., Mekonen, S.: Immersive cybersecurity teaching\/training using gamification on the metaverse: a hands-on case study. In: 2023 IEEE International Conference on Dependable, Autonomic and Secure Computing, International Conference on Pervasive Intelligence and Computing, International Conference on Cloud and Big Data Computing, International Conference on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech), pp. 0101\u20130108. IEEE (2023)","DOI":"10.1109\/DASC\/PiCom\/CBDCom\/Cy59711.2023.10361297"},{"key":"13_CR22","doi-asserted-by":"publisher","first-page":"102912","DOI":"10.1016\/j.cose.2022.102912","volume":"122","author":"S Hart","year":"2022","unstructured":"Hart, S., Halak, B., Sassone, V.: CIST: a serious game for hardware supply chain. Comput. Secur. 122, 102912 (2022)","journal-title":"Comput. Secur."},{"key":"13_CR23","doi-asserted-by":"publisher","first-page":"102303","DOI":"10.1016\/j.ijdrr.2021.102303","volume":"60","author":"G Delima","year":"2021","unstructured":"Delima, G., et al.: DisCoord: co-creating DRR knowledge in Uganda through interaction in a serious game. Int. J. Disaster Risk Reduction 60, 102303 (2021)","journal-title":"Int. J. Disaster Risk Reduction"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2025 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97663-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T05:15:33Z","timestamp":1777439733000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97663-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,28]]},"ISBN":["9783031976629","9783031976636"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97663-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,28]]},"assertion":[{"value":"28 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Istanbul","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"T\u00fcrkiye","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}