{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:29:12Z","timestamp":1767338952451,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/rcis.2017.7956544","type":"proceedings-article","created":{"date-parts":[[2017,6,26]],"date-time":"2017-06-26T16:35:56Z","timestamp":1498494956000},"page":"255-265","source":"Crossref","is-referenced-by-count":15,"title":["Gamification solutions for software acceptance: A comparative study of Requirements Engineering and Organizational Behavior techniques"],"prefix":"10.1109","author":[{"given":"Luca","family":"Piras","sequence":"first","affiliation":[]},{"given":"Elda","family":"Paja","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Giorgini","sequence":"additional","affiliation":[]},{"given":"John","family":"Mylopoulos","sequence":"additional","affiliation":[]},{"given":"Roberta","family":"Cuel","sequence":"additional","affiliation":[]},{"given":"Diego","family":"Ponte","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-016-0263-5"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1257\/jel.37.1.7"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1037\/h0024127"},{"journal-title":"Task Design An Integrative Approach","year":"1982","author":"griffin","key":"ref30"},{"key":"ref10","article-title":"Gamified Requirements Engineering: Model and Experimentation","author":"lombriser","year":"2016","journal-title":"Int Conf on Requirements Engineering Found for Software Quality"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2181037.2181040"},{"key":"ref12","article-title":"O&#x2019;Reilly","author":"zichermann","year":"2011","journal-title":"Gamification by Design Implementing Game Mechanics in Web and Mobile Apps"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.03.007"},{"key":"ref14","article-title":"Hearts, Clubs, Diamonds, Spades: Players Who Suit MUDs","author":"bartle","year":"0","journal-title":"Journal of MUD Research 1996"},{"key":"ref15","article-title":"User Acceptance of Information Technology: Toward a Unified View","author":"venkatesh","year":"0","journal-title":"MIS Quarterly 2003"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.66"},{"journal-title":"Hawthorne and the Western Electric Company The Social Problems of An Industrial Civilisation","year":"1949","author":"mayo","key":"ref17"},{"journal-title":"Work and Motivation","year":"1982","author":"vroom","key":"ref18"},{"key":"ref19","article-title":"Reinforcement Theory","author":"premack","year":"1965","journal-title":"Symp on Motivation"},{"journal-title":"A Theory of Goal Setting & Task Performance","year":"0","author":"locke","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISC2.2015.7366196"},{"key":"ref27","article-title":"The Realm of Sociality: Notes on the Design of Social Software","author":"bouman","year":"2007","journal-title":"International Conference on Information Systems"},{"journal-title":"The Gamification of Learning and Instruction Game-based Methods and Strategies for Training and Education","year":"2012","author":"kapp","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07788-8_55"},{"journal-title":"The Functions of the Executive","year":"1968","author":"barnard","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.08.007"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA-ECSA.212.33"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2016.43"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2200\/S00460ED1V01Y201212WBE004"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2856636.2856649"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2014.377"},{"journal-title":"Behavioral Game Theory Experiments in Strategic Interaction","year":"2003","author":"camerer","key":"ref20"},{"key":"ref22","volume":"5","author":"chung","year":"2012","journal-title":"Non-Functional Requirements in Software Engineering"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1504\/IJKEDM.2011.040653"},{"journal-title":"Full Models of Agon (an Acceptance Requirements Framework) and related Case Study","year":"0","author":"piras","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24206-9_13"},{"journal-title":"A Course in Game Theory","year":"1994","author":"osborne","key":"ref26"},{"journal-title":"Glossary regarding elements of Agon (an Acceptance Requirements Framework) Models","year":"0","author":"piras","key":"ref25"}],"event":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","start":{"date-parts":[[2017,5,10]]},"location":"Brighton, United Kingdom","end":{"date-parts":[[2017,5,12]]}},"container-title":["2017 11th International Conference on Research Challenges in Information Science (RCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7951529\/7956506\/07956544.pdf?arnumber=7956544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,2]],"date-time":"2017-10-02T21:48:25Z","timestamp":1506980905000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7956544\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/rcis.2017.7956544","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}