{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T06:26:16Z","timestamp":1766298376263,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578802","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:11:25Z","timestamp":1377709885000},"page":"134-136","source":"Crossref","is-referenced-by-count":15,"title":["Gamification of emergency response training: A public health example"],"prefix":"10.1109","author":[{"given":"Irfan E.","family":"Kanat","sequence":"first","affiliation":[]},{"given":"Sathananda","family":"Siloju","sequence":"additional","affiliation":[]},{"given":"T. S.","family":"Raghu","sequence":"additional","affiliation":[]},{"given":"Ajay S.","family":"Vinze","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"HSEEP Overview and Exercise Program Management","year":"2007","key":"3"},{"key":"2","volume":"8","author":"bush","year":"2003","journal-title":"Homeland Security Presidential Directive"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/s11031-006-9051-8"},{"key":"1","volume":"5","author":"bush","year":"2003","journal-title":"Homeland Security Presidential Directive"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.06.002"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1110.0387"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.025"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222220403"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1979742.1979575"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SOLI.2009.5203950"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1400214.1400244"},{"key":"12","doi-asserted-by":"crossref","first-page":"763","DOI":"10.2307\/41703480","article-title":"The roles of theory in canonical action research","volume":"36","author":"davison","year":"2012","journal-title":"MIS Quarterly"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578802.pdf?arnumber=6578802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T09:22:40Z","timestamp":1563787360000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578802\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578802","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}