{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:18:51Z","timestamp":1764937131142,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338498.3358647","type":"proceedings-article","created":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T18:15:00Z","timestamp":1573496100000},"page":"162-174","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Digital-PASS"],"prefix":"10.1145","author":[{"given":"Kambiz","family":"Ghazinour","sequence":"first","affiliation":[{"name":"State University of New York, Canton, NY, USA"}]},{"given":"Ken","family":"Messner","sequence":"additional","affiliation":[{"name":"Kent State University, Kent, OH, USA"}]},{"given":"Sean","family":"Scarnecchia","sequence":"additional","affiliation":[{"name":"Kent State University, Kent, OH, USA"}]},{"given":"David","family":"Selinger","sequence":"additional","affiliation":[{"name":"Kent State University, Kent, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1007\/978-3-642-02843-4_7","volume-title":"dataspace: the final frontier (BNCOD 26)","author":"Barker K","year":"2009","unstructured":"Barker K , Askari M , Banerjee M , Ghazinour K , Mackas B , Majedi M , Pun S , Williams A \"A data privacy taxonomy.\" Proceedings of the 26th British national conference on databases : dataspace: the final frontier (BNCOD 26) , pp 42 -- 54 . Birmingham , 2009 . Barker K, Askari M, Banerjee M, Ghazinour K, Mackas B, Majedi M, Pun S, Williams A \"A data privacy taxonomy.\" Proceedings of the 26th British national conference on databases: dataspace: the final frontier (BNCOD 26), pp 42--54. Birmingham, 2009."},{"key":"e_1_3_2_1_2_1","unstructured":"Borges S. Durelli V. Reis H. & Isotani S. \"A systematic mapping on gamification applied to education.\" In SAC '14 Conference (p 216--222). 2014.  Borges S. Durelli V. Reis H. & Isotani S. \"A systematic mapping on gamification applied to education.\" In SAC '14 Conference (p 216--222). 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"a literature review","author":"Caponetto I.","year":"2014","unstructured":"Caponetto , I. , Earp , J. , & Ott , M. \" Gamification and education : a literature review \". Genova : ITD-CNR. 2014 Caponetto, I., Earp, J., & Ott, M. \"Gamification and education: a literature review\". Genova: ITD-CNR. 2014"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASI.2016.7539807"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Cone B.D. Thompson M.F Irvine C.E. Nguyen T.D. \"Cyber Security Training and Awareness through Game Play \" IFIP International Federation for Information Processing Vol. 201 2006  Cone B.D. Thompson M.F Irvine C.E. Nguyen T.D. \"Cyber Security Training and Awareness through Game Play \" IFIP International Federation for Information Processing Vol. 201 2006","DOI":"10.1007\/0-387-33406-8_37"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2014.01.012"},{"key":"e_1_3_2_1_7_1","volume-title":"Changing Perspectives (p. 763--772)","author":"Denny P.","year":"2013","unstructured":"Denny , P. \" The effect of virtual achievements on student engagement.\" In Proceedings of CHI 2013 : Changing Perspectives (p. 763--772) , Paris . 2013 Denny, P. \"The effect of virtual achievements on student engagement.\" In Proceedings of CHI 2013: Changing Perspectives (p. 763--772), Paris. 2013"},{"key":"e_1_3_2_1_8_1","volume-title":"Toward a definition.\" In CHI 2011 Gamification Workshop Proceedings (pp. 12--15)","author":"Deterding S.","year":"2011","unstructured":"Deterding , S. , Khaled , R. , Nacke , N. & Dixon , D. \" Gamification : Toward a definition.\" In CHI 2011 Gamification Workshop Proceedings (pp. 12--15) 2011 . Deterding, S., Khaled, R., Nacke, N. & Dixon, D. \"Gamification: Toward a definition.\" In CHI 2011 Gamification Workshop Proceedings (pp. 12--15) 2011."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2012.12.020"},{"key":"e_1_3_2_1_10_1","volume-title":"A systematic review.\" University of Twente: Master thesis","author":"Ern M.","year":"2014","unstructured":"Ern , M. \" The use of gamification and serious games within interventions for children with autism spectrum disorder. A systematic review.\" University of Twente: Master thesis . 2014 . Ern, M. \"The use of gamification and serious games within interventions for children with autism spectrum disorder. A systematic review.\" University of Twente: Master thesis. 2014."},{"key":"e_1_3_2_1_11_1","first-page":"514","article-title":"The role of gamification and game-based learning","volume":"36","author":"Gibson D.","year":"2013","unstructured":"Gibson , D. , \" The role of gamification and game-based learning .\" Research and Development in Higher Education: The Place of Learning and Teaching , 36 , 514 -- 523 . 2013 . Gibson, D., et al. \"The role of gamification and game-based learning.\" Research and Development in Higher Education: The Place of Learning and Teaching, 36, 514--523. 2013.","journal-title":"Research and Development in Higher Education: The Place of Learning and Teaching"},{"key":"e_1_3_2_1_12_1","first-page":"2013","article-title":"Play as you learn: gamification as a technique for motivating learners","author":"Glover I.","year":"2013","unstructured":"Glover , I. \" Play as you learn: gamification as a technique for motivating learners .\" Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2013 . 2013 . Glover, I. \"Play as you learn: gamification as a technique for motivating learners.\" Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications 2013. 2013.","journal-title":"Proceedings of World Conference on Educational Multimedia, Hypermedia and Telecommunications"},{"key":"e_1_3_2_1_13_1","volume-title":"2014 9th Iberian Conference P. 1--7.","author":"Gomez Alvarez M. C.","year":"2014","unstructured":"Gomez Alvarez , M. C. , Piedad Gasca-Hurtado , G. , Villalon , C. M. , Antonio , J. , San Feliu Guilabert , T. \" Design of a pedagogic instrument for teaching software process improvement: Teaching instrument for university and business environments.\" Information Systems and Technologies (CISTI) , 2014 9th Iberian Conference P. 1--7. 2014 . Gomez Alvarez, M. C., Piedad Gasca-Hurtado, G., Villalon, C. M., Antonio, J., San Feliu Guilabert, T. \"Design of a pedagogic instrument for teaching software process improvement: Teaching instrument for university and business environments.\" Information Systems and Technologies (CISTI), 2014 9th Iberian Conference P. 1--7. 2014."},{"key":"e_1_3_2_1_14_1","unstructured":"Gondree M Flushman T Peterson Z. \"This Is Not A Game: Early Observations on Using Alternate Reality Games for Teaching Security Concepts to First-Year Undergraduates.\" CSET'15 Proceedings of the 8th USENIX Conference on Cyber Security Experimentation and Test 2015  Gondree M Flushman T Peterson Z. \"This Is Not A Game: Early Observations on Using Alternate Reality Games for Teaching Security Concepts to First-Year Undergraduates.\" CSET'15 Proceedings of the 8th USENIX Conference on Cyber Security Experimentation and Test 2015"},{"key":"e_1_3_2_1_15_1","volume-title":"Utrecht.","author":"Hamari J.","year":"2013","unstructured":"Hamari , J. & Koivisto , J. \" Social motivations to use gamification : an empirical study of gamifying exercise.\" Proceedings of the European Conference on Information Systems , Utrecht. 2013 . Hamari, J. & Koivisto, J. \"Social motivations to use gamification: an empirical study of gamifying exercise.\" Proceedings of the European Conference on Information Systems, Utrecht. 2013."},{"key":"e_1_3_2_1_16_1","volume-title":"47th Hawaii International Conference System Science (p. 3025--3034)","author":"Hamari J.","year":"2014","unstructured":"Hamari , J. , Koivisto , J. & Sarsa , H. \" Does gamification work? A literature review of empirical studies on gamification.\" System Sciences (HICSS) , 47th Hawaii International Conference System Science (p. 3025--3034) , Hawaii. 2014 . Hamari, J., Koivisto, J. & Sarsa, H. \"Does gamification work? A literature review of empirical studies on gamification.\" System Sciences (HICSS), 47th Hawaii International Conference System Science (p. 3025--3034), Hawaii. 2014."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICALT.2016.37"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAMSE.2016.7840236"},{"key":"e_1_3_2_1_19_1","first-page":"64","volume-title":"International Conference on Educational Innovation through Technology","author":"Hsu W.","year":"2016","unstructured":"Hsu , W. , Lin , H.K. \" Impact of Applying Web GL Technology to Develop a Web Digital Game-Based Learning System for Computer Programming Course in Flipped Classroom\" , International Conference on Educational Innovation through Technology , p 64 -- 69 , 2016 . Hsu, W., Lin, H.K. \"Impact of Applying WebGL Technology to Develop a Web Digital Game-Based Learning System for Computer Programming Course in Flipped Classroom\", International Conference on Educational Innovation through Technology, p64--69, 2016."},{"key":"e_1_3_2_1_20_1","volume-title":"Rotman School of Management","author":"Huang","year":"2013","unstructured":"Huang , Wendy Hsin-Yuan, Soman , Dilip, \"A Practitioner's Guide to Gamification of Education,\" Behavioural Economics in Action Report Series. Rotman School of Management , University of Toronto . Toronto. 2013 Huang, Wendy Hsin-Yuan, Soman, Dilip, \"A Practitioner's Guide to Gamification of Education,\" Behavioural Economics in Action Report Series. Rotman School of Management, University of Toronto. Toronto. 2013"},{"key":"e_1_3_2_1_21_1","volume-title":"game-based methods and strategies for training and education: John Wiley & Sons.\" doi: http:\/\/dx.doi.org\/10.4018\/jgcms.2012100106","author":"Kapp K. M.","year":"2012","unstructured":"Kapp , K. M. \" The gamification of learning and instruction : game-based methods and strategies for training and education: John Wiley & Sons.\" doi: http:\/\/dx.doi.org\/10.4018\/jgcms.2012100106 . 2012 . 10.4018\/jgcms.2012100106 Kapp, K. M. \"The gamification of learning and instruction: game-based methods and strategies for training and education: John Wiley & Sons.\" doi: http:\/\/dx.doi.org\/10.4018\/jgcms.2012100106. 2012."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of 9th International Balkan Education and Science Conference","author":"Kiryakova G.","year":"2014","unstructured":"Kiryakova , G. , Angelova , N. , & Yordanova , N. \" Gamification in education.\" In Proceedings of 9th International Balkan Education and Science Conference . Trakya University, Edirne. 2014 . Kiryakova, G., Angelova, N., & Yordanova, N. \"Gamification in education.\" In Proceedings of 9th International Balkan Education and Science Conference. Trakya University, Edirne. 2014."},{"key":"e_1_3_2_1_23_1","volume-title":"What, how, why bother?\" Academic Exchange Quarterly, 15(2), 146","author":"Lee J. J.","year":"2011","unstructured":"Lee , J. J. , & Hammer , J. \" Gamification in education : What, how, why bother?\" Academic Exchange Quarterly, 15(2), 146 . 2011 . Lee, J. J., & Hammer, J. \"Gamification in education: What, how, why bother?\" Academic Exchange Quarterly, 15(2), 146. 2011."},{"key":"e_1_3_2_1_24_1","first-page":"103","volume-title":"October 7--10","author":"Li W.","year":"2012","unstructured":"Li , W. , Grossman , T. , Fitzmaurice , G. \" Gami CAD : a gamified tutorial system for first time AutoCad users.\" In Proceedings of the 25th annual ACM symposium on User interface software and technology , October 7--10 , 2012 (pp. 103 -- 112 ). Cambridge, Massachusetts, USA : ACM. 2012. Li, W., Grossman, T., Fitzmaurice, G. \"GamiCAD: a gamified tutorial system for first time AutoCad users.\" In Proceedings of the 25th annual ACM symposium on User interface software and technology, October 7--10, 2012 (pp. 103--112). Cambridge, Massachusetts, USA: ACM. 2012."},{"issue":"607","key":"e_1_3_2_1_25_1","first-page":"1","article-title":"Gaming science: the gamification of scientific thinking","volume":"4","author":"Morris B.","year":"2013","unstructured":"Morris , B. , Croker , S. , Zimmerman , C. , Gill , D. , Romig , C. \" Gaming science: the gamification of scientific thinking .\" Frontiers in Psychology , 4 ( 607 ), 1 -- 17 . 2013 . Morris, B., Croker, S., Zimmerman, C., Gill, D., Romig, C. \"Gaming science: the gamification of scientific thinking.\" Frontiers in Psychology, 4(607), 1--17. 2013.","journal-title":"Frontiers in Psychology"},{"key":"e_1_3_2_1_26_1","unstructured":"Muntean C.I. \"Raising engagement in e-learning through gamification.\" The 6th International Conference on Virtual Learning (p. 323--329). 2011.  Muntean C.I. \"Raising engagement in e-learning through gamification.\" The 6th International Conference on Virtual Learning (p. 323--329). 2011."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1162\/105474699566215"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.12988\/ces.2014.411217"},{"key":"e_1_3_2_1_29_1","volume-title":"USENIX Summit on Gaming, Games, and Gamification in Security Education","author":"Thompson M. F.","year":"2014","unstructured":"Thompson , M. F. , Irvine , C. E. \" Cyber CIEGE Scenario Design and Implementation\" , USENIX Summit on Gaming, Games, and Gamification in Security Education , San Diego , 2014 . Thompson, M. F., Irvine, C. E. \"CyberCIEGE Scenario Design and Implementation\", USENIX Summit on Gaming, Games, and Gamification in Security Education, San Diego, 2014."},{"key":"e_1_3_2_1_30_1","unstructured":"Wang R. \"Demystifying Enterprise Gamification for Business.\" Constellation Research. 2011.  Wang R. \"Demystifying Enterprise Gamification for Business.\" Constellation Research. 2011."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIAI-AAI.2016.152"},{"key":"e_1_3_2_1_32_1","volume-title":"G. \"Requirements Game: Teaching Software Projects Management.\" CLEI Electronic Journal, 1. doi: http:\/\/www.clei.org\/cleiej\/paper.php?id=133 .","author":"Zapata C.","year":"2007","unstructured":"Zapata , C. y. A ., G. \"Requirements Game: Teaching Software Projects Management.\" CLEI Electronic Journal, 1. doi: http:\/\/www.clei.org\/cleiej\/paper.php?id=133 . 2007 . Zapata, C. y. A., G. \"Requirements Game: Teaching Software Projects Management.\" CLEI Electronic Journal, 1. doi: http:\/\/www.clei.org\/cleiej\/paper.php?id=133 . 2007."},{"key":"e_1_3_2_1_33_1","volume-title":"implementing game mechanics in web and mobile apps.\" USA: O'Reilly Media","author":"Zichermann G.","year":"2011","unstructured":"Zichermann , G. , & Cunningham , C. \" Gamification by design : implementing game mechanics in web and mobile apps.\" USA: O'Reilly Media . 2011 . Zichermann, G., & Cunningham, C. \"Gamification by design: implementing game mechanics in web and mobile apps.\" USA: O'Reilly Media. 2011."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338498.3358647","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338498.3358647","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:48Z","timestamp":1750201968000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338498.3358647"}},"subtitle":["A Simulation-based Approach to Privacy Education"],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":33,"alternative-id":["10.1145\/3338498.3358647","10.1145\/3338498"],"URL":"https:\/\/doi.org\/10.1145\/3338498.3358647","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}