{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:44:59Z","timestamp":1767339899390,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319699035"},{"type":"electronic","value":"9783319699042"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69904-2_18","type":"book-chapter","created":{"date-parts":[[2017,10,20]],"date-time":"2017-10-20T09:18:33Z","timestamp":1508491113000},"page":"223-230","source":"Crossref","is-referenced-by-count":9,"title":["Goal Models for Acceptance Requirements Analysis and Gamification Design"],"prefix":"10.1007","author":[{"given":"Luca","family":"Piras","sequence":"first","affiliation":[]},{"given":"Elda","family":"Paja","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Giorgini","sequence":"additional","affiliation":[]},{"given":"John","family":"Mylopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,21]]},"reference":[{"key":"18_CR1","first-page":"19","volume":"1","author":"R Bartle","year":"1996","unstructured":"Bartle, R.: Hearts, clubs, diamonds, spades: players who suit MUDs. J. MUD Res. 1, 19 (1996)","journal-title":"J. MUD Res."},{"key":"18_CR2","volume-title":"Non-Functional Requirements in Software Engineering","author":"L Chung","year":"2012","unstructured":"Chung, L., Nixon, B., Yu, E., Mylopoulos, J.: Non-Functional Requirements in Software Engineering, vol. 5. Springer, Heidelberg (2012)"},{"key":"18_CR3","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/j.chb.2015.03.036","volume":"71","author":"J Hamari","year":"2015","unstructured":"Hamari, J.: Do badges increase user activity? a field experiment on the effects of gamification. Comput. Hum. Behav. 71, 469\u2013478 (2015)","journal-title":"Comput. Hum. Behav."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Kazhamiakin, R., Marconi, A., Perillo, M., Pistore, M., Valetto, G., Piras, L., Avesani, F., Perri, N.: Using gamification to incentivize sustainable urban mobility. In: 1st International Smart Cities Conference (ISC2). IEEE (2015)","DOI":"10.1109\/ISC2.2015.7366196"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.chb.2014.03.007","volume":"35","author":"J Koivisto","year":"2014","unstructured":"Koivisto, J., Hamari, J.: Demographic differences in perceived benefits from gamification. Comput. Hum. Behav. 35, 179\u2013188 (2014)","journal-title":"Comput. Hum. Behav."},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Li, F.L., Horkoff, J., Mylopoulos, J., Guizzardi, R., Guizzardi, G., Borgida, A., Liu, L.: Non-functional requirements as qualities, with a spice of ontology. In: 22nd International Requirements Engineering Conference (RE), pp. 293\u2013302. IEEE (2014)","DOI":"10.1109\/RE.2014.6912271"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Nguyen, C.M., Sebastiani, R., Giorgini, P., Mylopoulos, J.: Multi-objective reasoning with constrained goal models. Requir. Eng. J. p. 1\u201337 (2016)","DOI":"10.1007\/s00766-016-0263-5"},{"key":"18_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-642-24206-9_13","volume-title":"Datalog Reloaded","author":"G Orsi","year":"2011","unstructured":"Orsi, G., Tanca, L.: Context modelling and context-aware querying. In: Moor, O., Gottlob, G., Furche, T., Sellers, A. (eds.) Datalog 2.0 2010. LNCS, vol. 6702, pp. 225\u2013244. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-24206-9_13"},{"key":"18_CR9","unstructured":"Piras, L., Giorgini, P., Mylopoulos, J.: Models, case studies and the glossary of Agon (an Acceptance Requirements Framework). https:\/\/pirasluca.wordpress.com\/home\/acceptance\/"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Piras, L., Giorgini, P., Mylopoulos, J.: Acceptance requirements and their gamification solutions. In: 24th IEEE International Requirements Engineering Conference (RE). IEEE (2016)","DOI":"10.1109\/RE.2016.43"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Piras, L., Paja, E., Cuel, R., Ponte, D., Giorgini, P., Mylopoulos, J.: Gamification solutions for software acceptance: a comparative study of requirements engineering and organizational behavior techniques. In: 11th IEEE International Conference on Research Challenges in Information Science (RCIS). IEEE (2017)","DOI":"10.1109\/RCIS.2017.7956544"},{"key":"18_CR12","doi-asserted-by":"publisher","DOI":"10.1201\/b17723","volume-title":"The Art of Game Design: A Book of Lenses","author":"J Schell","year":"2014","unstructured":"Schell, J.: The Art of Game Design: A Book of Lenses. CRC Press, Boca Raton (2014)"},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"125","DOI":"10.2307\/249443","volume":"15","author":"R Thompson","year":"1991","unstructured":"Thompson, R., Higgins, C., Howell, J.: Personal computing: toward a conceptual model of utilization. MIS Q. 15, 125\u2013143 (1991)","journal-title":"MIS Q."},{"key":"18_CR14","doi-asserted-by":"publisher","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M., Davis, G., Davis, F.: User acceptance of information technology: toward a unified view. MIS Q. 27, 425\u2013478 (2003)","journal-title":"MIS Q."},{"key":"18_CR15","volume-title":"Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps","author":"G Zichermann","year":"2011","unstructured":"Zichermann, G., Cunningham, C.: Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps. O\u2019Reilly Media Inc, Sebastopol (2011)"}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69904-2_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T23:16:46Z","timestamp":1659655006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69904-2_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319699035","9783319699042"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69904-2_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}