{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,8]],"date-time":"2025-05-08T15:03:21Z","timestamp":1746716601139},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319605845"},{"type":"electronic","value":"9783319605852"}],"license":[{"start":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:00:00Z","timestamp":1497571200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-60585-2_17","type":"book-chapter","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T03:20:14Z","timestamp":1497496814000},"page":"173-184","source":"Crossref","is-referenced-by-count":4,"title":["Human Behavior Analytics from Microworlds: The Cyber Security Game"],"prefix":"10.1007","author":[{"given":"Johan","family":"de Heer","sequence":"first","affiliation":[]},{"given":"Paul","family":"Porskamp","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,16]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"De Heer, J.: How do Architects think? A game based microworld for elucidating dynamic decision-making. In: Auvray, G., et al. (eds.) Complex Systems Design and Management, pp. 133\u2013142. Springer International Publishing, Cham (2016). doi: 10.1007\/978-3-319-26109-6_10","key":"17_CR1","DOI":"10.1007\/978-3-319-26109-6_10"},{"key":"17_CR2","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/0747-5632(93)90005-D","volume":"9","author":"B Brehmer","year":"2003","unstructured":"Brehmer, B., Dorner, D.: Experiments with computer simulated microworlds: escaping both the narrow straits of the laboratory and the deep blue sea of the fields study. Comput. Hum. Behav. 9, 171\u2013184 (2003)","journal-title":"Comput. Hum. Behav."},{"key":"17_CR3","doi-asserted-by":"crossref","first-page":"591","DOI":"10.1207\/s15516709cog2704_2","volume":"27","author":"C Gonzalez","year":"2003","unstructured":"Gonzalez, C., Lerch, J.F., Lebiere, C.: Instance-based learning in dynamic decision making. Cogn. Sci. 27, 591\u2013635 (2003)","journal-title":"Cogn. Sci."},{"unstructured":"Th\u00e9ron, P.: Informing business strategists about the cyber threat: why not play serious games? In: Hills, M. (ed.) Why Cyber Security is a Socio-Technical Challenge: New Concepts and Practical Measures to Enhance Detection, pp. 129\u2013158. Northampton Business School, University of Northampton, UK (2016). ISBN 978-1-53610-090-7","key":"17_CR4"},{"key":"17_CR5","doi-asserted-by":"crossref","DOI":"10.1163\/9789087903107","volume-title":"The Magic Circle: Principles of Gaming and Simulation","author":"HG Klabbers","year":"2009","unstructured":"Klabbers, H.G.: The Magic Circle: Principles of Gaming and Simulation, 3rd edn. Sense Publishers, Rotterdam (2009)","edition":"3"},{"key":"17_CR6","doi-asserted-by":"crossref","DOI":"10.1201\/9780080919171","volume-title":"The Art of Game Design: A Book of Lenses","author":"J Schell","year":"2008","unstructured":"Schell, J.: The Art of Game Design: A Book of Lenses, 2nd edn. AK Peters\/CRC Press, Natick (2008)","edition":"2"},{"key":"17_CR7","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1016\/j.entcom.2011.12.001","volume":"3","author":"SCJ Bakkes","year":"2012","unstructured":"Bakkes, S.C.J., Spronck, P.H.M., van Lankveld, G.: Player behavioural modelling for video games. Entertainment Comput. 3, 71\u201379 (2012)","journal-title":"Entertainment Comput."},{"doi-asserted-by":"crossref","unstructured":"Ross, A.M., Fitzgerald, M.E., Rhodes, D.H.: Game-based learning for system engineering concepts. In: Conference on Systems Engineering Research, pp. 1\u201311 (CSER 2014) (2014)","key":"17_CR8","DOI":"10.1016\/j.procs.2014.03.053"},{"doi-asserted-by":"crossref","unstructured":"Kaser, T., Hallinen, N.R., Schwartz, D.L.: Modeling strategies to predict student performance with a learning environment and beyond. In: Proceedings of the Seventh International Learning Analytics and Knowledge Conference, LAK 2017, pp. 31\u201340 (2017). ISBN 978-1-503-4870-6","key":"17_CR9","DOI":"10.1145\/3027385.3027422"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Human Factors in Cybersecurity"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-60585-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,10]],"date-time":"2020-10-10T05:51:34Z","timestamp":1602309094000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-60585-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,16]]},"ISBN":["9783319605845","9783319605852"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-60585-2_17","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,6,16]]}}}