{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T05:49:56Z","timestamp":1746337796192,"version":"3.37.3"},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,8,17]],"date-time":"2021-08-17T00:00:00Z","timestamp":1629158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000038","name":"NSERC","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,17]]},"DOI":"10.1109\/cog52621.2021.9619099","type":"proceedings-article","created":{"date-parts":[[2021,12,7]],"date-time":"2021-12-07T20:53:06Z","timestamp":1638910386000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["Predicting Beliefs from NPC Dialogues"],"prefix":"10.1109","author":[{"given":"Jason T","family":"Bowey","sequence":"first","affiliation":[]},{"given":"Julian","family":"Frommel","sequence":"additional","affiliation":[]},{"given":"Brandon","family":"Piller","sequence":"additional","affiliation":[]},{"given":"Regan L","family":"Mandryk","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1111\/j.1468-2885.2005.tb00334.x"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1007\/978-3-540-74873-1_6"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1007\/s11199-009-9683-8"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1007\/s11199-009-9695-4"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1016\/j.jesp.2008.06.002"},{"key":"ref30","article-title":"Women as background decoration (part 1)","author":"sarkeesian","year":"2011","journal-title":"Feminist Frequency"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1007\/BF01420798"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1037\/0022-3514.70.3.491"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1080\/08838151.2012.705199"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1016\/j.chb.2013.07.014"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1016\/j.chb.2012.12.027"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1007\/s11199-007-9250-0"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1080\/13614568.2012.746740"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1145\/3242671.3242682"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/2556288.2557078"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/978-1-4419-8188-2_6"},{"year":"2007","journal-title":"Bioware","article-title":"Mass Effect","key":"ref22"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/3337722.3337734"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1007\/s11199-009-9637-1"},{"year":"2020","author":"tassi","journal-title":"You'll Be Surprised What Percent Of &#x2018;Mass Effect&#x2019; Players Chose Paragon","key":"ref23"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1177\/1461444809105354"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1207\/s15327825mcs0901_6"},{"year":"1996","journal-title":"Edits Intractive","article-title":"Tomb Raider","key":"ref50"},{"year":"0","author":"meeks","journal-title":"Is Privacy Possible in the Digital Age?","key":"ref51"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1145\/3313831.3376446"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.7551\/mitpress\/9589.001.0001"},{"year":"0","author":"boutilier","article-title":"Video game companies are collecting massive amounts of data about you","key":"ref53"},{"year":"0","author":"stafford","journal-title":"The dangers of in-game data collection","key":"ref52"},{"key":"ref10","first-page":"375","article-title":"i don't fit into a single type&#x201D;: A trait model and scale of game playing preferences","author":"tondello","year":"2019","journal-title":"IFIP Conference on Human-Computer Interaction"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/3472538.3472565"},{"key":"ref40","first-page":"175","article-title":"Narrative persuasion and overcoming resistance","volume":"2","author":"dal cin","year":"2004","journal-title":"Resistance and persuasion"},{"year":"1996","author":"reeves","journal-title":"The Media Equation How People Treat Computers Television and New Media Like Real People and Places","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1111\/0022-4537.00153"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/11558651_45"},{"year":"2010","author":"gibson","journal-title":"Ethics and Game Design","key":"ref15"},{"year":"2010","author":"vikaros","journal-title":"Moral Development through Social Narratives and Game Design","key":"ref16"},{"key":"ref17","article-title":"Commitment to Meaning. A Reframing of Agency in Games","volume":"3","author":"tanenbaum","year":"2009","journal-title":"After Media - Embodiment and Context Digital Arts and Culture 2009 Arts Computation Engineering UC Irvine"},{"key":"ref18","article-title":"A computational model of perceived agency in video games","author":"thue","year":"0","journal-title":"Proceedings of the 7th AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment AIIDE 2011"},{"key":"ref19","article-title":"Integrating Plot, Character and Natural Language Processing in the Interactive Drama Fa&#x00E7;ade","author":"mateas","year":"0","journal-title":"Proceedings of the Technologies for Interactive Digital Storytelling and Entertainment (TIDSE) Conference"},{"key":"ref4","article-title":"Psychology profiling in Silent Hill: Shattered Memories","author":"mountain","year":"0","journal-title":"video Presented at the Paris Game\/Ai Conference"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/3411764.3445411"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.4135\/9781412963947.n537"},{"year":"0","author":"memories","journal-title":"Silent hill Shattered memories - behind the psych profile","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/3025453.3025563"},{"key":"ref7","article-title":"Homo ludens","author":"huizinga","year":"2020","journal-title":"Editora Perspectiva SA"},{"year":"2006","journal-title":"Microsoft game studios","article-title":"Gears of War","key":"ref49"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1145\/2793107.2793130"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1207\/S15327825MCS0403_01"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1080\/15213269.2010.524911"},{"year":"2007","journal-title":"The Witcher Atari","key":"ref48"},{"key":"ref47","article-title":"The Last of Us","author":"dog","year":"2013","journal-title":"Sony Computer Entertainment"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1080\/15213260903287259"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1080\/01463370500270322"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1111\/j.1468-2885.2009.01347.x","article-title":"The video game experience as &#x201C;true&#x201D; identification: A theory of enjoyable alterations of players' self-perception","volume":"19","author":"klimmt","year":"2009","journal-title":"Communication Theory"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1089\/cyber.2012.0235"}],"event":{"name":"2021 IEEE Conference on Games (CoG)","start":{"date-parts":[[2021,8,17]]},"location":"Copenhagen, Denmark","end":{"date-parts":[[2021,8,20]]}},"container-title":["2021 IEEE Conference on Games (CoG)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9618888\/9618891\/09619099.pdf?arnumber=9619099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:53:36Z","timestamp":1652201616000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9619099\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,17]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/cog52621.2021.9619099","relation":{},"subject":[],"published":{"date-parts":[[2021,8,17]]}}}