{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:37:21Z","timestamp":1773329841431,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,12,23]],"date-time":"2017-12-23T00:00:00Z","timestamp":1513987200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007065","name":"Nvidia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007065","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004586","name":"Funda\u00e7\u00e3o Carlos Chagas Filho de Amparo \u00e0 Pesquisa do Estado do Rio de Janeiro","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004586","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004809","name":"Financiadora de Estudos e Projetos","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s00779-017-1107-0","type":"journal-article","created":{"date-parts":[[2017,12,23]],"date-time":"2017-12-23T22:39:18Z","timestamp":1514068758000},"page":"647-670","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A method to assess pervasive qualities in mobile games"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8264-953X","authenticated-orcid":false,"given":"Luis","family":"Valente","sequence":"first","affiliation":[]},{"given":"Bruno","family":"Feij\u00f3","sequence":"additional","affiliation":[]},{"given":"Julio Cesar Sampaio do Prado","family":"Leite","sequence":"additional","affiliation":[]},{"given":"Esteban","family":"Clua","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,23]]},"reference":[{"key":"1107_CR1","doi-asserted-by":"crossref","unstructured":"Valente L, Feij\u00f3 B, Ribeiro A, Clua E (2016) The concept of pervasive virtuality and its application in digital entertainment systems. In: Wallner G, Kriglstein S, Hlavacs H, Malaka R, Lugmayr A, and Yang H-S (eds) Entertainment computing - ICEC 2016. Springer International Publishing, pp 187\u2013198","DOI":"10.1007\/978-3-319-46100-7_16"},{"key":"1107_CR2","doi-asserted-by":"crossref","unstructured":"Callele D, Neufeld E, Schneider K (2005) Requirements engineering and the creative process in the video game industry. In: 13th IEEE International Conference on Requirements Engineering, 2005. Proceedings, pp 240\u2013250","DOI":"10.1109\/RE.2005.58"},{"key":"1107_CR3","doi-asserted-by":"crossref","unstructured":"Alves C, Ramalho G, Damasceno A (2007) Challenges in requirements engineering for mobile games development: the meantime case study. In: Requirements Engineering Conference, 2007. RE \u201807. 15th IEEE International, pp 275\u2013280","DOI":"10.1109\/RE.2007.53"},{"key":"1107_CR4","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/978-3-642-15579-6_22","volume-title":"Software product lines: going beyond","author":"AWB Furtado","year":"2010","unstructured":"Furtado AWB, Santos ALM, Ramalho GL (2010) Streamlining domain analysis for digital games product lines. In: Bosch J, Lee J (eds) Software product lines: going beyond. Springer, Berlin Heidelberg, pp 316\u2013330. https:\/\/doi.org\/10.1007\/978-3-642-15579-6_22"},{"key":"1107_CR5","unstructured":"Bentley T, Johnston L, von Baggo K (2002) Putting some emotion into requirements engineering. In: Proceedings of the 7th Australian Workshop on Requirements Engineering"},{"key":"1107_CR6","doi-asserted-by":"crossref","unstructured":"Callele D, Neufeld E, Schneider K (2010) An introduction to experience requirements. In: Requirements engineering conference (RE), 2010 18th IEEE international, pp 395\u2013396","DOI":"10.1109\/RE.2010.55"},{"key":"1107_CR7","unstructured":"Bj\u00f6rk S, Falk J, Hansson R, Ljungstrand P (2001) Pirates! Using the physical world as a game board. In: Proceedings of Interact 2001. IOS Press, pp 9\u201313"},{"key":"1107_CR8","unstructured":"Struppek M, Willis KS (2007) Botfighters. In: Borries F, Walz SP, and B\u00f6ttger M (eds) Space time play. Birkh\u00e4user Basel, pp 226\u2013227"},{"key":"1107_CR9","first-page":"4","volume":"4","author":"O Rashid","year":"2006","unstructured":"Rashid O, Bamford W, Coulton P, Edwards R, Scheible J (2006) PAC-LAN: mixed-reality gaming with RFID-enabled mobile phones. Comput Entertain CIE 4:4","journal-title":"Comput Entertain CIE"},{"key":"1107_CR10","doi-asserted-by":"crossref","unstructured":"Ballagas R, Kratz SG, Borchers J, Yu E, Walz SP, Fuhr CO, Hovestadt L, Tann M (2007) REXplorer: a mobile, pervasive spell-casting game for tourists. CHI 07 Ext. Abstr. Hum. Factors Comput Syst 1929\u20131934","DOI":"10.1145\/1240866.1240927"},{"key":"1107_CR11","unstructured":"S.T. Start: Zombies, Run!, https:\/\/zombiesrungame.com\/"},{"issue":"3-4","key":"1107_CR12","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/s00779-015-0845-0","volume":"19","author":"M Sra","year":"2015","unstructured":"Sra M, Schmandt C (2015) Expanding social mobile games beyond the device screen. Pers Ubiquitous Comput 19(3-4):495\u2013508. https:\/\/doi.org\/10.1007\/s00779-015-0845-0","journal-title":"Pers Ubiquitous Comput"},{"key":"1107_CR13","unstructured":"Niantic Inc: Ingress, https:\/\/www.ingress.com\/"},{"key":"1107_CR14","unstructured":"Niantic Inc: Pok\u00e9mon Go, http:\/\/www.pokemongo.com\/"},{"key":"1107_CR15","unstructured":"Valente L, Feij\u00f3 B, Leite JCS (2015) do P.: mapping quality requirements for pervasive mobile games. Requir Eng 1\u201329"},{"issue":"1","key":"1107_CR16","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1002\/j.2334-5837.2014.tb03131.x","volume":"24","author":"MJ Ryan","year":"2014","unstructured":"Ryan MJ (2014) The role of stakeholders in requirements elicitation. INCOSE Int Symp 24(1):16\u201326. https:\/\/doi.org\/10.1002\/j.2334-5837.2014.tb03131.x","journal-title":"INCOSE Int Symp"},{"key":"1107_CR17","volume-title":"Software perspectives: the system is the message","author":"P Freeman","year":"1987","unstructured":"Freeman P (1987) Software perspectives: the system is the message. Addison-Wesley Longman Publishing Co., Inc., Boston"},{"key":"1107_CR18","unstructured":"Boehm BW, Brown JR, Lipow M (1976) Quantitative evaluation of software quality. In: Proceedings of the 2Nd International Conference on Software Engineering. IEEE Computer Society Press, Los Alamitos, CA, USA, pp 592\u2013605"},{"issue":"2","key":"1107_CR19","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/52.506460","volume":"13","author":"B Boehm","year":"1996","unstructured":"Boehm B, In H (1996) Identifying quality-requirement conflicts. IEEE Softw 13(2):25\u201335. https:\/\/doi.org\/10.1109\/52.506460","journal-title":"IEEE Softw"},{"issue":"5","key":"1107_CR20","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1109\/32.815326","volume":"25","author":"NE Fenton","year":"1999","unstructured":"Fenton NE, Neil M (1999) A critique of software defect prediction models. IEEE Trans Softw Eng 25(5):675\u2013689. https:\/\/doi.org\/10.1109\/32.815326","journal-title":"IEEE Trans Softw Eng"},{"key":"1107_CR21","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1145\/336512.336588","volume-title":"Proceedings of the Conference on The Future of Software Engineering","author":"NE Fenton","year":"2000","unstructured":"Fenton NE, Neil M (2000) Software metrics: roadmap. In: Proceedings of the Conference on The Future of Software Engineering. ACM, New York, pp 357\u2013370"},{"key":"1107_CR22","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1145\/1370788.1370793","volume-title":"Proceedings of the 4th International Workshop on Predictor Models in Software Engineering","author":"Y Jiang","year":"2008","unstructured":"Jiang Y, Cuki B, Menzies T, Bartlow N (2008) Comparing design and code metrics for software quality prediction. In: Proceedings of the 4th International Workshop on Predictor Models in Software Engineering. ACM, New York, pp 11\u201318"},{"key":"1107_CR23","doi-asserted-by":"crossref","unstructured":"Chung L, Nixon BA, Yu E, Mylopoulos J (1999) Non-functional requirements in software engineering. Spring","DOI":"10.1007\/978-1-4615-5269-7"},{"key":"1107_CR24","unstructured":"Leite JCSP, de Moraes EA, de Castro CEPS (2007) A strategy for information source identification. In: Anais do WER07 - Workshop em Engenharia de Requisitos, Toronto, pp 25\u201334"},{"key":"1107_CR25","volume-title":"A survey on pervasive mobile games","author":"L Valente","year":"2013","unstructured":"Valente L, Feij\u00f3 B (2013) A survey on pervasive mobile games. Departamento de Inform\u00e1tica, PUC-Rio, Rio de Janeiro"},{"issue":"1","key":"1107_CR26","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1145\/1236224.1236237","volume":"5","author":"I Lindt","year":"2007","unstructured":"Lindt I, Ohlenburg J, Pankoke-Babatz U, Ghellal S (2007) A report on the crossmedia game epidemic menace. Comput Entertain CIE 5(1):8. https:\/\/doi.org\/10.1145\/1236224.1236237","journal-title":"Comput Entertain CIE"},{"key":"1107_CR27","first-page":"903","volume-title":"UbiComp 2005: ubiquitous computing","author":"L Barkhuus","year":"2005","unstructured":"Barkhuus L, Chalmers M, Tennent P, Hall M, Bell M, Sherwood S, Brown B (2005) Picking pockets on the lawn: the development of tactics and strategies in a mobile game. In: Beigl M, Intille S, Rekimoto J, Tokuda H (eds) UbiComp 2005: ubiquitous computing. Springer, Berlin, p 903"},{"key":"1107_CR28","doi-asserted-by":"crossref","unstructured":"Benford S, Anastasi R, Flintham M, Drozd A, Crabtree A, Greenhalgh C, Tandavanitj N, Adams M, Row-Farr J (2003) Coping with uncertainty in a location-based game","DOI":"10.1109\/MPRV.2003.1228525"},{"key":"1107_CR29","doi-asserted-by":"crossref","unstructured":"Bell M, Chalmers M, Barkhuus L, Hall M, Sherwood S, Tennent P, Brown B, Rowland D, Benford S, Capra M, Hampshire A (2006) Interweaving mobile games with everyday life. Proc SIGCHI Conf Hum Factors Comput Syst:417\u2013426","DOI":"10.1145\/1124772.1124835"},{"issue":"1","key":"1107_CR30","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1145\/1143518.1143522","volume":"13","author":"S Benford","year":"2006","unstructured":"Benford S, Crabtree A, Flintham M, Drozd A, Anastasi R, Paxton M, Tandavanitj N, Adams M, Row-Farr J (2006) Can you see me now? ACM Trans Comput Hum Interact TOCHI 13(1):100\u2013133. https:\/\/doi.org\/10.1145\/1143518.1143522","journal-title":"ACM Trans Comput Hum Interact TOCHI"},{"key":"1107_CR31","doi-asserted-by":"crossref","unstructured":"Montola M, Stenros J, W\u00e6rn A (2009) Pervasive games: theory and design. Morgan Kaufmann","DOI":"10.1201\/9780080889795"},{"issue":"1678","key":"1107_CR32","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1098\/rspa.1977.0069","volume":"354","author":"IJ Good","year":"1977","unstructured":"Good IJ (1977) Explicativity: a mathematical theory of explanation with statistical applications. Proc R Soc Lond Ser Math Phys Sci 354(1678):303\u2013330. https:\/\/doi.org\/10.1098\/rspa.1977.0069","journal-title":"Proc R Soc Lond Ser Math Phys Sci"},{"key":"1107_CR33","doi-asserted-by":"crossref","unstructured":"Chatzidimitris T, Gavalas D, Kasapakis V (2015) PacMap: Transferring PacMan to the physical realm. In: Giaffreda R, Vieriu R-L, Pasher E, Bendersky G, Jara AJ, Rodrigues JJPC, Dekel E, and Mandler B (eds) Internet of things. User-centric IoT. Springer International Publishing, pp 139\u2013144","DOI":"10.1007\/978-3-319-19656-5_20"},{"key":"1107_CR34","doi-asserted-by":"crossref","unstructured":"Flintham M, Greenhalgh C, Lodge T, Chamberlain A, Paxton M, Jacobs R, Watkins M, Shackford R (2011) A case study of exploding places, a mobile location-based game. In: Proceedings of the 8th International Conference on Advances in Computer Entertainment Technology. ACM, New York, NY, USA, pp 30:1\u201330:8","DOI":"10.1145\/2071423.2071460"},{"key":"1107_CR35","doi-asserted-by":"crossref","unstructured":"Broll W, Ohlenburg J, Lindt I, Herbst I, Braun A-K (2006) Meeting technology challenges of pervasive augmented reality games. In: Proceedings of 5th ACM SIGCOMM Workshop on Network and System Support for Games. ACM, New York, NY, USA","DOI":"10.1145\/1230040.1230097"},{"key":"1107_CR36","doi-asserted-by":"crossref","unstructured":"Jegers K (2007) Pervasive game flow: understanding player enjoyment in pervasive gaming. Comput Entertain CIE 5","DOI":"10.1145\/1236224.1236238"},{"issue":"3","key":"1107_CR37","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1077246.1077253","volume":"3","author":"P Sweetser","year":"2005","unstructured":"Sweetser P, Wyeth P (2005) GameFlow: a model for evaluating player enjoyment in games. Comput Entertain 3(3):3\u20133. https:\/\/doi.org\/10.1145\/1077246.1077253","journal-title":"Comput Entertain"},{"key":"1107_CR38","doi-asserted-by":"crossref","unstructured":"Guo H, Tr\u00e6tteberg H, Wang AI, Zhu M (2010) TeMPS: a conceptual framework for pervasive and social games. In: Digital Game and Intelligent Toy Enhanced Learning, IEEE International Workshop on. IEEE Computer Society, Los Alamitos, CA, USA, pp 31\u201337","DOI":"10.1109\/DIGITEL.2010.40"},{"key":"1107_CR39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17632-1","volume-title":"A survey of characteristic engine features for technology-sustained pervasive games","author":"KJL Nevelsteen","year":"2015","unstructured":"Nevelsteen KJL (2015) A survey of characteristic engine features for technology-sustained pervasive games. Springer International Publishing, Cham. https:\/\/doi.org\/10.1007\/978-3-319-17632-1"},{"key":"1107_CR40","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1080\/01449290500331131","volume":"25","author":"M Blythe","year":"2006","unstructured":"Blythe M, Reid J, Wright P, Geelhoed E (2006) Interdisciplinary criticism: analysing the experience of riot! a location-sensitive digital narrative. Behav Inf Technol 25:127\u2013139","journal-title":"Behav Inf Technol"},{"key":"1107_CR41","unstructured":"Basili V (1992) Software modeling and measurement: the goal\/question\/metric paradigm. University of Maryland"},{"issue":"12","key":"1107_CR42","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1109\/32.106986","volume":"17","author":"JCSP Leite","year":"1991","unstructured":"Leite JCSP, Freeman PA (1991) Requirements validation through viewpoint resolution. IEEE Trans Softw Eng 17(12):1253\u20131269. https:\/\/doi.org\/10.1109\/32.106986","journal-title":"IEEE Trans Softw Eng"},{"issue":"1","key":"1107_CR43","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1049\/sej.1996.0004","volume":"11","author":"S Easterbrrok","year":"1996","unstructured":"Easterbrrok S, Nuseibeh B (1996) Using ViewPoints for inconsistency management. Softw Eng J 11(1):31\u201343. https:\/\/doi.org\/10.1049\/sej.1996.0004","journal-title":"Softw Eng J"},{"key":"1107_CR44","doi-asserted-by":"crossref","first-page":"1033","DOI":"10.1080\/0144929X.2012.710648","volume":"31","author":"JLG S\u00e1nchez","year":"2012","unstructured":"S\u00e1nchez JLG, Vela FLG, Simarro FM, Padilla-Zea N (2012) Playability: analysing user experience in video games. Behav Inf Technol 31:1033\u20131054","journal-title":"Behav Inf Technol"},{"key":"1107_CR45","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/8179.001.0001","volume-title":"Engineering a safer world: systems thinking applied to safety","author":"NG Leveson","year":"2012","unstructured":"Leveson NG (2012) Engineering a safer world: systems thinking applied to safety. The MIT Press, Cambridge"},{"key":"1107_CR46","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/s11469-006-9028-6","volume":"4","author":"D Chappell","year":"2006","unstructured":"Chappell D, Eatough V, Davies MNO, Griffiths M (2006) EverQuest\u2014it\u2019s just a computer game right? An Interpretative Phenomenological Analysis Online Gaming Addiction. Int J Ment Health Addict 4:205\u2013216","journal-title":"Int J Ment Health Addict"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-017-1107-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-017-1107-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-017-1107-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T04:13:58Z","timestamp":1660191238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-017-1107-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,23]]},"references-count":46,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["1107"],"URL":"https:\/\/doi.org\/10.1007\/s00779-017-1107-0","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,23]]}}}