{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T05:44:05Z","timestamp":1749879845941,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031048180"},{"type":"electronic","value":"9783031048197"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-04819-7_55","type":"book-chapter","created":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T10:02:41Z","timestamp":1652695361000},"page":"573-580","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Personalized Narrative Method to Improve Serious Games"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5835-8588","authenticated-orcid":false,"given":"Tatianna","family":"Rosal","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5383-9884","authenticated-orcid":false,"given":"Henrique S\u00e3o","family":"Mamede","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0489-4465","authenticated-orcid":false,"given":"Miguel Mira","family":"da Silva","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,17]]},"reference":[{"issue":"3","key":"55_CR1","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1080\/0144929x.2012.708787","volume":"33","author":"J Abawajy","year":"2012","unstructured":"Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237\u2013248 (2012). https:\/\/doi.org\/10.1080\/0144929x.2012.708787","journal-title":"Behav. Inf. Technol."},{"key":"55_CR2","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-08-2019-0435","author":"A Alexiou","year":"2020","unstructured":"Alexiou, A., Schippers, M.C., Oshri, I., Angelopoulos, S.: Narrative and aesthetics as antecedents of perceived learning in serious games. Emerald Insight. Inf. Technol. People (2020). https:\/\/doi.org\/10.1108\/ITP-08-2019-0435","journal-title":"Emerald Insight. Inf. Technol. People"},{"key":"55_CR3","doi-asserted-by":"publisher","unstructured":"Busch, M., et al.: Personalization in serious and persuasive games and gamified interactions. Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play - CHI Play 2015 (2015). https:\/\/doi.org\/10.1145\/2793107.2810260","DOI":"10.1145\/2793107.2810260"},{"key":"55_CR4","doi-asserted-by":"publisher","unstructured":"Carvalho, M.B., et al.: An activity theory-based model for serious games analysis and conceptual design. Comput. Educ. 87, 166\u2013181 (2015). https:\/\/doi.org\/10.1016\/j.compedu.2015.03.023","DOI":"10.1016\/j.compedu.2015.03.023"},{"key":"55_CR5","doi-asserted-by":"publisher","unstructured":"Cooke, L., Dusenberry, L., Robinson, J.: Gaming design thinking: wicked problems, sufficient solutions, and the possibility space of games. Tech. Commun. Q. 327\u2013340 (2020). https:\/\/doi.org\/10.1080\/10572252.2020.1738555. Taylor & Francis","DOI":"10.1080\/10572252.2020.1738555"},{"key":"55_CR6","doi-asserted-by":"publisher","unstructured":"Ferro, L.S., Walz, S.P., Greuter, S.: Towards personalised, gamified systems. In: Proceedings of the 9th Australasian Conference on Interactive Entertainment Matters of Life and Death - IE 2013 (2013). https:\/\/doi.org\/10.1145\/2513002.2513024","DOI":"10.1145\/2513002.2513024"},{"key":"55_CR7","doi-asserted-by":"publisher","unstructured":"Furuichi, M., Aibara, M., Yanagisawa, K.: Design and implementation of serious games for training and education. In: 2014 UKACC International Conference on Control (CONTROL) (2014). https:\/\/doi.org\/10.1109\/control.2014.6915223","DOI":"10.1109\/control.2014.6915223"},{"key":"55_CR8","unstructured":"Jost, P.: The quest game-frame: balancing serious games for investigating privacy decisions. In: AIS Electronic Library. 11th Scandinavian Conference on Information Systems (2020). https:\/\/aisel.aisnet.org\/scis2020\/5"},{"issue":"3","key":"55_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.17083\/ijsg.v8i3.437","volume":"8","author":"M Katsantonis","year":"2021","unstructured":"Katsantonis, M., Mavridis, I.: Evaluation of HackLearn COFELET game user experience for cybersecurity education. Int. J. Ser. Games 8(3), 3\u201324 (2021). https:\/\/doi.org\/10.17083\/ijsg.v8i3.437","journal-title":"Int. J. Ser. Games"},{"issue":"2","key":"55_CR10","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s11528-019-00446-7","volume":"64","author":"K Larson","year":"2019","unstructured":"Larson, K.: Serious games and gamification in the corporate training environment: a literature review. TechTrends 64(2), 319\u2013328 (2019). https:\/\/doi.org\/10.1007\/s11528-019-00446-7","journal-title":"TechTrends"},{"key":"55_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/978-3-319-05972-3_4","volume-title":"GameDays 2014","author":"T Lim","year":"2014","unstructured":"Lim, T., et al.: Narrative serious game mechanics (NSGM) \u2013 insights into the narrative-pedagogical mechanism. In: G\u00f6bel, S., Wiemeyer, J. (eds.) GameDays 2014. LNCS, vol. 8395, pp. 23\u201334. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-05972-3_4"},{"key":"55_CR12","doi-asserted-by":"publisher","unstructured":"Liu, Z., Wang, L.: FlipIt game model-based defense strategy against cyberattacks on SCADA systems considering insider assistance. IEEE Trans. Inf. Forensics Secur. 16, 2791\u20132804 (2021). https:\/\/doi.org\/10.1109\/tifs.2021.3065504","DOI":"10.1109\/tifs.2021.3065504"},{"key":"55_CR13","unstructured":"Marczewski, A.: User types. In: Even Ninja Monkeys Like to Play: Gamification, Game Thinking & Motivational Design. Create Space Independent Publishing Platform, pp. 69\u201384 (2015)"},{"key":"55_CR14","doi-asserted-by":"publisher","unstructured":"Mora, A., Tondello, G.F., Nacke, L.E., Arnedo-Moreno, J.: Effect of personalized gameful design on student engagement. In: 2018 IEEE Global Engineering Education Conference (EDUCON) (2018). https:\/\/doi.org\/10.1109\/educon.2018.8363471","DOI":"10.1109\/educon.2018.8363471"},{"key":"55_CR15","doi-asserted-by":"publisher","unstructured":"Naul, E., Liu, M.: Why story matters: a review of narrative in serious games. SAGE J. Educ. Comput. Res. 58, 687\u2013707 (2019). https:\/\/doi.org\/10.1177\/0735633119859904","DOI":"10.1177\/0735633119859904"},{"key":"55_CR16","unstructured":"Nicho, M.: Modelling serous games for enhancing end user cyber security awareness. IADIS Int. J. Comput. Sci. Inf. Syst. 15(2), 91\u2013106 (2017). ISSN 1646-3692"},{"key":"55_CR17","doi-asserted-by":"publisher","unstructured":"O\u2019Connor, S., et al.: SCIPS: a serious game using a guidance mechanic to scaffold effective training for cyber security. Inf. Sci. 580, 524\u2013540 (2021). https:\/\/doi.org\/10.1016\/j.ins.2021.08.098","DOI":"10.1016\/j.ins.2021.08.098"},{"key":"55_CR18","doi-asserted-by":"publisher","unstructured":"Olejniczak, K., Newcomer, K.E., Meijer, S.A.: Advancing evaluation practice with serious games. Am. J. Eval. 41(3) (2020). https:\/\/doi.org\/10.1177\/1098214020905897","DOI":"10.1177\/1098214020905897"},{"key":"55_CR19","doi-asserted-by":"publisher","unstructured":"Rieb, A., Lechner, U.: Operation digital chameleon. In: Proceedings of the 12th International Symposium on Open Collaboration-OpenSym 2016 (2016). https:\/\/doi.org\/10.1145\/2957792.2957800","DOI":"10.1145\/2957792.2957800"},{"key":"55_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-319-27036-4_2","volume-title":"ICIDS 2015","author":"JO Ryan","year":"2015","unstructured":"Ryan, J.O., Mateas, M., Wardrip-Fruin, N.: Open design challenges for interactive emergent narrative. In: SchoenauFog, H., Bruni, L.E., Louchart, S., Baceviciute, S. (eds.) ICIDS 2015. LNCS, vol. 9445, pp. 14\u201326. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-27036-4_2"},{"key":"55_CR21","doi-asserted-by":"publisher","unstructured":"Schell, J.: Tenth Anniversary: The Art of Game Design, 3rd edn. A Book of Lenses, Boca Raton (2019). https:\/\/doi.org\/10.1201\/b22101","DOI":"10.1201\/b22101"},{"key":"55_CR22","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/mcg.2018.2889218","volume":"39","author":"D Schmalstieg","year":"2019","unstructured":"Schmalstieg, D., Stork, A.: Unified patterns for realtime interactive simulation in games and digital storytelling. IEEE Comput. Graph. Appl. 39, 100\u2013106 (2019). https:\/\/doi.org\/10.1109\/mcg.2018.2889218","journal-title":"IEEE Comput. Graph. Appl."},{"issue":"1","key":"55_CR23","doi-asserted-by":"publisher","first-page":"59","DOI":"10.2307\/26558828","volume":"22","author":"W Westera","year":"2019","unstructured":"Westera, W.: Why and how serious games can become far more effective: accommodating productive learning experiences, learner motivation and the monitoring of learning gains. J. Educ. Technol. Soc. 22(1), 59\u201369 (2019). https:\/\/doi.org\/10.2307\/26558828","journal-title":"J. Educ. Technol. Soc."}],"container-title":["Lecture Notes in Networks and Systems","Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-04819-7_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T10:10:23Z","timestamp":1652695823000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-04819-7_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031048180","9783031048197"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-04819-7_55","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"17 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WorldCIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Budva","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montenegro","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"worldcist2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/worldcist.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}