{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T19:17:08Z","timestamp":1761765428769},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2011,6,24]],"date-time":"2011-06-24T00:00:00Z","timestamp":1308873600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1007\/s00779-011-0423-z","type":"journal-article","created":{"date-parts":[[2011,6,23]],"date-time":"2011-06-23T01:08:47Z","timestamp":1308791327000},"page":"767-775","source":"Crossref","is-referenced-by-count":20,"title":["Blowtooth: a provocative pervasive game for smuggling virtual drugs through real airport security"],"prefix":"10.1007","volume":"16","author":[{"given":"Ben","family":"Kirman","sequence":"first","affiliation":[]},{"given":"Conor","family":"Linehan","sequence":"additional","affiliation":[]},{"given":"Shaun","family":"Lawson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,24]]},"reference":[{"issue":"2","key":"423_CR1","first-page":"216","volume":"3","author":"A Albrechtslund","year":"2005","unstructured":"Albrechtslund A, Dubbeld L (2005) The plays and arts of surveillance: Studying surveillance as entertainment. Surveillance & Society 3(2):216\u2013221","journal-title":"Surveillance & Society"},{"key":"423_CR2","volume-title":"Non-places: An Introduction to an Anthropology of Supermodernity","author":"M Auge","year":"1995","unstructured":"Auge M (1995) Non-places: An Introduction to an Anthropology of Supermodernity. Verso, London"},{"key":"423_CR3","unstructured":"Benford S, Flintham M, Drozd A, Anastasi R, Rowland D et al (2004) Uncle Roy all around you. In: Proceedings of the advances in computer entertainment, ACM"},{"issue":"2","key":"423_CR4","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s00779-004-0267-x","volume":"8","author":"A Cheok","year":"2004","unstructured":"Cheok A, Goh K, Farbiz F, Fong S, Teo S, Li Y, Yang X (2004) Human Pacman: a mobile, wide-area entertainment system based on physical, social and ubiquitous computing. Pers Ubiquitous Comput 8(2):71\u201381","journal-title":"Pers Ubiquitous Comput"},{"key":"423_CR5","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1068\/a34154","volume":"34","author":"M Crang","year":"2002","unstructured":"Crang M (2002) Between places: producing hubs, flows and networks. Environ Plan A 34:569\u2013574","journal-title":"Environ Plan A"},{"key":"423_CR6","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7678.001.0001","volume-title":"Critical play: radical game design","author":"M Flanagan","year":"2009","unstructured":"Flanagan M (2009) Critical play: radical game design. MIT Press, Boston"},{"issue":"10","key":"423_CR7","doi-asserted-by":"crossref","first-page":"9","DOI":"10.5821\/ace.v4i10.2469","volume":"4","author":"AP Gentile","year":"2009","unstructured":"Gentile AP (2009) Reinventing airspace: spectatorship, fluidity, intimacy at PEK T3. J Archit City Environ 4(10):9\u201319","journal-title":"J Archit City Environ"},{"issue":"1","key":"423_CR8","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1080\/17450100701797406","volume":"3","author":"A Kellerman","year":"2008","unstructured":"Kellerman A (2008) International airports: passengers in an environment of authorities. Mobilities 3(1):161\u2013178","journal-title":"Mobilities"},{"key":"423_CR9","doi-asserted-by":"crossref","DOI":"10.1201\/9780080889795","volume-title":"Pervasive games: theory and design","author":"M Montola","year":"2009","unstructured":"Montola M, Stenros J, Waern A (2009) Pervasive games: theory and design. Morgan Kaufmann, Boston"},{"key":"423_CR10","unstructured":"Montola M (2005) Exploring the edge of the magic circle: defining pervasive games. In: Proceedings of DAC conference"},{"key":"423_CR11","doi-asserted-by":"crossref","unstructured":"Niemi J, Sawano S, Waern A (2005) Involving nonplayers in pervasive games. In: Proceedings of the 4th conference on critical computing","DOI":"10.1145\/1094562.1094583"},{"key":"423_CR12","unstructured":"Poels K, deKort YAW, Ijsselstein WA (2007) Game experience questionnaire. Project deliverable for the EU IST project the fun of gaming"},{"key":"423_CR13","doi-asserted-by":"crossref","unstructured":"Reid J (2008) Design for coincidence: incorporating real world artifacts in location based games. In: DIMEA \u201808: proceedings of the 3rd international conference on digital interactive media in entertainment and Arts, pp 18\u201325","DOI":"10.1145\/1413634.1413643"},{"key":"423_CR14","volume-title":"Rules of play: game design fundamentals","author":"K Salen","year":"2003","unstructured":"Salen K, Zimmerman E (2003) Rules of play: game design fundamentals. MIT Press, Cambridge"},{"key":"423_CR15","volume-title":"All the world\u2019s a botfighter stage: notes on location-based multi-user gaming","author":"O Sotamaa","year":"2002","unstructured":"Sotamaa O (2002) All the world\u2019s a botfighter stage: notes on location-based multi-user gaming. Tampere University Press, Tampere"},{"key":"423_CR16","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1080\/10576100490262160","volume":"27","author":"JS Szyliowicz","year":"2004","unstructured":"Szyliowicz JS (2004) Aviation security: promise or reality? Stud Conf Terror 27:47\u201363","journal-title":"Stud Conf Terror"},{"issue":"5","key":"423_CR17","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/MIS.2002.1039828","volume":"17","author":"R Wales","year":"2002","unstructured":"Wales R, O\u2019Neill J, Mirmalek Z (2002) Ethnography, customers, and negotiated interactions at the airport. IEEE Intell Syst 17(5):15\u201323","journal-title":"IEEE Intell Syst"},{"key":"423_CR18","volume-title":"A report on the surveillance society","year":"2006","unstructured":"Wood DM (ed) (2006) A report on the surveillance society. Information Commissioner\u2019s Office, London"},{"key":"423_CR19","doi-asserted-by":"crossref","unstructured":"Yoneki E, Crowcroft J (2008) Wireless epidemic spread in dynamic human networks. Bio-inspired computing and communication, LNCS 5151. Springer","DOI":"10.1007\/978-3-540-92191-2_11"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0423-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-011-0423-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-011-0423-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T16:03:39Z","timestamp":1686153819000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-011-0423-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,24]]},"references-count":19,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2012,8]]}},"alternative-id":["423"],"URL":"https:\/\/doi.org\/10.1007\/s00779-011-0423-z","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6,24]]}}}