{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:08:04Z","timestamp":1730207284066,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/cig.2019.8848055","type":"proceedings-article","created":{"date-parts":[[2019,9,27]],"date-time":"2019-09-27T01:49:14Z","timestamp":1569548954000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["An Approach Towards Designing Problem Networks in Serious Games"],"prefix":"10.1109","author":[{"given":"A.","family":"Parakh","sequence":"first","affiliation":[]},{"given":"P.","family":"Chundi","sequence":"additional","affiliation":[]},{"given":"M.","family":"Subramaniam","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1800744115"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2017.2727442"},{"journal-title":"Meqanic The amazing quantum computer puzzle game Laboratory for Physical Sciences (LPS)","year":"0","author":"tahan","key":"ref12"},{"journal-title":"Quantum chess","year":"0","author":"akl","key":"ref13"},{"journal-title":"NCCR QSIT","year":"0","key":"ref14"},{"journal-title":"The Institute for Quantum Computing (IQC)","year":"0","key":"ref15"},{"key":"ref16","first-page":"59","article-title":"Development of an interactive tutorial on quantum key distribution","author":"devore","year":"2014","journal-title":"Physics Education Research Conference 2014"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12113"},{"key":"ref18","first-page":"75","article-title":"Gamification in education: A systematic mapping study","volume":"18","author":"dicheva","year":"2015","journal-title":"Journal of Educational Technology & Society"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/j.chb.2015.07.045","article-title":"Challenging games help students learn","volume":"54","author":"hamari","year":"2016","journal-title":"Comput Hum Behav"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/IIAI-AAI.2017.224"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11548-7_25"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2015.03.017"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2015\/v8i7\/67760"},{"key":"ref6","article-title":"Quasim: A multidimensional quantum cryptography game for cybersecurity","author":"vadla","year":"2018","journal-title":"Journal of The Colloquium of Information Systems Security Education (CISSE)"},{"article-title":"Knowledge Spaces and Learning Spaces","year":"2015","author":"doignon","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2017.8053434"},{"journal-title":"Qcraft Quantum games Institute for Quantum Information and Matter","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1021\/ed400432y"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-33406-8_37"},{"journal-title":"Quantum game with photons","year":"0","author":"migda","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2011.6027538"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3177881"},{"key":"ref22","first-page":"130","article-title":"Improving serious game design through a descriptive classification: A comparation of methodologies","volume":"92","author":"slimani","year":"2016","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3102\/0013189X15621307"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39112-5_18"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BF01099821"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2017.8247837"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3057889"}],"event":{"name":"2019 IEEE Conference on Games (CoG)","start":{"date-parts":[[2019,8,20]]},"location":"London, United Kingdom","end":{"date-parts":[[2019,8,23]]}},"container-title":["2019 IEEE Conference on Games (CoG)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8844551\/8847948\/08848055.pdf?arnumber=8848055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:50:49Z","timestamp":1658155849000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8848055\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cig.2019.8848055","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}