{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:50Z","timestamp":1750306790630,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,9,30]],"date-time":"2013-09-30T00:00:00Z","timestamp":1380499200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,9,30]]},"DOI":"10.1145\/2513002.2513019","type":"proceedings-article","created":{"date-parts":[[2013,9,17]],"date-time":"2013-09-17T19:57:05Z","timestamp":1379447825000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Understanding player threat responses in FPS games"],"prefix":"10.1145","author":[{"given":"David","family":"Conroy","sequence":"first","affiliation":[{"name":"QLD University of Technology, Brisbane, QLD, AU"}]},{"given":"Peta","family":"Wyeth","sequence":"additional","affiliation":[{"name":"QLD University of Technology, Brisbane, QLD, AU"}]},{"given":"Daniel","family":"Johnson","sequence":"additional","affiliation":[{"name":"QLD University of Technology, Brisbane, QLD, AU"}]}],"member":"320","published-online":{"date-parts":[[2013,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146816.1146827"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33542-6_10"},{"key":"e_1_3_2_1_3_1","volume-title":"Evolutionary Computation (CEC), 2010 IEEE Congress on","author":"Esparcia-Alcazar A.","year":"2010","unstructured":"Esparcia-Alcazar , A. et al. 2010. Controlling bots in a First Person Shooter game using genetic algorithms . Evolutionary Computation (CEC), 2010 IEEE Congress on ( 2010 ), 1--8. Esparcia-Alcazar, A. et al. 2010. Controlling bots in a First Person Shooter game using genetic algorithms. Evolutionary Computation (CEC), 2010 IEEE Congress on (2010), 1--8."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGAMES.2011.6000358"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/375735.376343"},{"key":"e_1_3_2_1_6_1","volume-title":"COSIGN 2004 Proceedings.","author":"Perron B.","year":"2004","unstructured":"Perron , B. 2004 . Sign of a threat: The effects of warning systems in survival horror games . COSIGN 2004 Proceedings. September (2004). Perron, B. 2004. Sign of a threat: The effects of warning systems in survival horror games. COSIGN 2004 Proceedings. September (2004)."},{"key":"e_1_3_2_1_7_1","volume-title":"et al","author":"Schrum J.","year":"2012","unstructured":"Schrum , J. et al . 2012 . Human-Like Combat Behaviour via Multiobjective Neuroevolution. Believable Bots SE - 5. P. Hingston, ed. Springer Berlin Heidelberg . 119--150. Schrum, J. et al. 2012. Human-Like Combat Behaviour via Multiobjective Neuroevolution. Believable Bots SE - 5. P. Hingston, ed. Springer Berlin Heidelberg. 119--150."},{"key":"e_1_3_2_1_8_1","volume-title":"Can computers play like people?","author":"The","year":"2012","unstructured":"The 2k BotPrize : Can computers play like people? : 2012 . http:\/\/botprize.org\/. The 2k BotPrize: Can computers play like people?: 2012. http:\/\/botprize.org\/."}],"event":{"name":"IE'2013: The 9th Australasian Conference on Interactive Entertainment -","sponsor":["Macquarie University-Sydney"],"location":"Melbourne Australia","acronym":"IE'2013"},"container-title":["Proceedings of The 9th Australasian Conference on Interactive Entertainment: Matters of Life and Death"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2513002.2513019","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2513002.2513019","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:34:24Z","timestamp":1750232064000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2513002.2513019"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,30]]},"references-count":8,"alternative-id":["10.1145\/2513002.2513019","10.1145\/2513002"],"URL":"https:\/\/doi.org\/10.1145\/2513002.2513019","relation":{},"subject":[],"published":{"date-parts":[[2013,9,30]]},"assertion":[{"value":"2013-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}