{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T21:15:40Z","timestamp":1775078140321,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T00:00:00Z","timestamp":1585785600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,2]]},"DOI":"10.1145\/3374135.3385276","type":"proceedings-article","created":{"date-parts":[[2020,5,26]],"date-time":"2020-05-26T00:12:43Z","timestamp":1590451963000},"page":"149-153","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Analysis of Player Behavior and EEG Readings in a Cybersecurity Game"],"prefix":"10.1145","author":[{"given":"David","family":"Thornton","sequence":"first","affiliation":[{"name":"Jacksonville State University, MCIS Department, Jacksonville, AL, USA"}]},{"given":"Falynn","family":"Turley","sequence":"additional","affiliation":[{"name":"Jacksonville State University Finance, Economics &amp; Accounting, Jacksonville, AL, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,5,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557230"},{"key":"e_1_3_2_1_2_1","first-page":"7","volume-title":"Proceedings of the Workshop on Reasoning, Representation, and Learning in Computer Games, 19th International Joint Conference on Artificial Intelligence (IJCAI)","author":"Andrade G.","year":"2005","unstructured":"G. Andrade, G. Ramalho, H. Santana, and V. Corruble. Extending Reinforcement Learning to Provide Dynamic Game Balancing. In Proceedings of the Workshop on Reasoning, Representation, and Learning in Computer Games, 19th International Joint Conference on Artificial Intelligence (IJCAI), pages 7--12, Edinburgh, Scotland, 2005."},{"key":"e_1_3_2_1_3_1","volume-title":"Finding flow: The Psychology of Engagement with Everyday Life","author":"Cs\u00edkszentmih\u00e1lyi M.","year":"1997","unstructured":"M. Cs\u00edkszentmih\u00e1lyi. Finding flow: The Psychology of Engagement with Everyday Life. Basic Books, 1997."},{"issue":"2","key":"e_1_3_2_1_4_1","article-title":"On-line Coevolution for Action Games","volume":"2","author":"Demasi P.","year":"2003","unstructured":"P. Demasi and J. de O Adriano. On-line Coevolution for Action Games. International Journal of Intelligent Games & Simulation, 2(2), 2003.","journal-title":"International Journal of Intelligent Games & Simulation"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-1864-0"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1093\/iwc\/iwt003"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.3726\/978-1-4539-1162-4"},{"key":"e_1_3_2_1_8_1","unstructured":"C. Heunis. Export and Analysis of Emotiv Insight EEG Data via EEGLab."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1178477.1178573"},{"key":"e_1_3_2_1_10_1","first-page":"21","author":"McCormac A.","year":"2017","unstructured":"A. McCormac, D. Calic, M. Butavicius, K. Parsons, T. Zwaans, and M. Pattinson. A Reliable Measure of Information Security Awareness and the Identification of Bias in Responses. Australasian Journal of Information Systems, 21, 2017.","journal-title":"Australasian Journal of Information Systems"},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"Nicograph International (NicoInt), 2017","author":"Mikami K.","year":"2017","unstructured":"K. Mikami, K. Kondo, et al. Adaptable Game Experience based on Player's Performance and EEG. In Nicograph International (NicoInt), 2017, pages 1--8. IEEE, Kyoto, Japan, 2017."},{"key":"e_1_3_2_1_12_1","volume-title":"What the Public Knows about Cybersecurity","author":"Smith A.","year":"2017","unstructured":"A. Smith. What the Public Knows about Cybersecurity. Pew Research Center on Internet and American Life March, 22, 2017."},{"key":"e_1_3_2_1_13_1","volume-title":"Dropbox Tech Blog","author":"Wheeler D.","year":"2012","unstructured":"D. Wheeler. zxcvbn: Realistic Password Strength Estimation. Dropbox Tech Blog, 2012."}],"event":{"name":"ACM SE '20: 2020 ACM Southeast Conference","location":"Tampa FL USA","acronym":"ACM SE '20","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2020 ACM Southeast Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374135.3385276","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3374135.3385276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:47Z","timestamp":1750200107000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3374135.3385276"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,2]]},"references-count":13,"alternative-id":["10.1145\/3374135.3385276","10.1145\/3374135"],"URL":"https:\/\/doi.org\/10.1145\/3374135.3385276","relation":{},"subject":[],"published":{"date-parts":[[2020,4,2]]},"assertion":[{"value":"2020-05-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}