{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,26]],"date-time":"2025-12-26T13:05:58Z","timestamp":1766754358868,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T00:00:00Z","timestamp":1620432000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,8]]},"DOI":"10.1145\/3411763.3451781","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T00:22:11Z","timestamp":1620433331000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["PERMARUN- A Persuasive Game to Improve User Awareness and Self-Efficacy Towards Secure Smartphone Behaviour"],"prefix":"10.1145","author":[{"given":"Anirudh","family":"Ganesh","sequence":"first","affiliation":[{"name":"Faculty of Computer Science Dalhousie University, Canada"}]},{"given":"Chinenye","family":"Ndulue","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science Dalhousie University, Canada, Canada"}]},{"given":"Rita","family":"Orji","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science Dalhousie University, Canada"}]}],"member":"320","published-online":{"date-parts":[[2021,5,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312914"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340764.3340775"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376385"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Frank Breitinger Ryan Tully-Doyle and Courtney Hassenfeldt. 2020. A survey on smartphone user's security choices awareness and education. Computers and Security 88. https:\/\/doi.org\/10.1016\/j.cose.2019.101647","DOI":"10.1016\/j.cose.2019.101647"},{"key":"e_1_3_2_1_5_1","volume-title":"ACIS 2015 Proceedings - 26th Australasian Conference on Information Systems, Hong 2012: 1\u201310","author":"Butavicius Marcus","year":"2015","unstructured":"Marcus Butavicius, Kathryn Parsons, Malcolm Pattinson, and Agata McCormac. 2015. Breaching the human firewall: Social engineering in phishing and spear-phishing emails. ACIS 2015 Proceedings - 26th Australasian Conference on Information Systems, Hong 2012: 1\u201310."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05198-3_7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312935"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/985921.986102"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3270316.3273042"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_10_1","unstructured":"Google. Permissions on Android \u00a0|\u00a0 Android Developers. Retrieved November 29, 2020 from https:\/\/developer.android.com\/guide\/topics\/permissions\/overview"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_11_1","unstructured":"Google. App permissions best practices \u00a0|\u00a0 Android Developers. Retrieved November 29, 2020 from https:\/\/developer.android.com\/training\/permissions\/usage-notes"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123750"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2019.8847953"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019"},{"key":"e_1_3_2_1_15_1","volume-title":"Game Thinking and Motivational Design. Game Thinking. Even Ninja Monkeys Like to Play: Gamification, Game Thinking and Motivational Design","author":"Marczewski Andrzej","year":"2015","unstructured":"Andrzej Marczewski. 2015. Gamification, Game Thinking and Motivational Design. Game Thinking. Even Ninja Monkeys Like to Play: Gamification, Game Thinking and Motivational Design 1st Ed., October 2015: 15. Retrieved from https:\/\/www.gamified.uk\/wp-content\/uploads\/2016\/01\/Loyalty.pdf","edition":"1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcom.2013.06.002"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3283458.3283463"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","unstructured":"Chinenye Ndulue Oladapo Oyebode and Rita Orji. 2020. PHISHER CRUSH: A Mobile Persuasive Game for Promoting Online Security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 223\u2013233. https:\/\/doi.org\/10.1007\/978-3-030-45712-9","DOI":"10.1007\/978-3-030-45712-9"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/97243.97281"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.17705\/1cais.02428"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55134-0_20"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/2055207618797554"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3119929"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/1460458218766570"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0590-6"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SeGAH49190.2020.9201637"},{"key":"e_1_3_2_1_27_1","volume-title":"Retrieved","author":"Proto IO.","year":"2020","unstructured":"Proto.IO. Proto.io - Prototypes that feel real. Retrieved December 4, 2020 from https:\/\/proto.io\/"},{"key":"e_1_3_2_1_28_1","volume-title":"CONF-IRM 2016 Proceedings.","author":"Renaud Karen","year":"2016","unstructured":"Karen Renaud. 2016. 60 . Smartphone Owners Need Security Advice . How Can We Ensure They Get It? In CONF-IRM 2016 Proceedings."},{"key":"e_1_3_2_1_29_1","series-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2019) 11594 LNCS 191-203.","volume-title":"Gamification Techniques for Raising Cyber Security Awareness","author":"Scholefield Sam","unstructured":"Sam Scholefield and Lynsay A Shepherd. 2019. Gamification Techniques for Raising Cyber Security Awareness. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2019) 11594 LNCS 191-203."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2019-0041"},{"key":"e_1_3_2_1_31_1","volume-title":"Proceedings of 1st International Joint Conference of DiGRA and FDG: 1\u201316","author":"To Alexandra","year":"2016","unstructured":"Alexandra To, Safinah Ali, Geoff Kaufman, and Jessica Hammer. 2016. Integrating Curiosity and Uncertainty in Game Design. Proceedings of 1st International Joint Conference of DiGRA and FDG: 1\u201316."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125659.3125669"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300338"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1037\/ppm0000208"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341215.3356273"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1108\/EL-09-2016-0183"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1155\/2018"},{"key":"e_1_3_2_1_38_1","unstructured":"Unity Real-Time Development Platform | 3D 2D VR & AR Engine. Retrieved February 20 2021 from https:\/\/unity.com\/"},{"key":"e_1_3_2_1_39_1","unstructured":"Purple Planet Royalty Free Music. Retrieved February 19 2021 from https:\/\/www.purple-planet.com\/"},{"key":"e_1_3_2_1_40_1","volume-title":"Retrieved","author":"Axe Demon Pixel Art Imp","year":"2021","unstructured":"Imp & Axe Demon Pixel Art Character by sanctumpixel. Retrieved February 19, 2021 from https:\/\/sanctumpixel.itch.io\/imp-axe-demon-pixel-art-character"},{"key":"e_1_3_2_1_41_1","unstructured":"Pixel Heart Animation 32x32 16x16 (Freebie) by NicoleMarieT. Retrieved February 19 2021 from https:\/\/nicolemariet.itch.io\/pixel-heart-animation-32x32-16x16-freebie"},{"key":"e_1_3_2_1_42_1","unstructured":"Sunny Land | 2D Characters | Unity Asset Store. Retrieved February 19 2021 from https:\/\/assetstore.unity.com\/packages\/2d\/characters\/sunny-land-103349#description"},{"key":"e_1_3_2_1_43_1","unstructured":"2D Game Dev Tutorial - Melee Attacking in Unity (Sprites included) - YouTube. Retrieved February 19 2021 from https:\/\/www.youtube.com\/watch?v=KamdeKs6eKo&t=102s"},{"key":"e_1_3_2_1_44_1","volume-title":"Retrieved","author":"The","year":"2021","unstructured":"The official home of Super MarioTM \u2013 Home. Retrieved January 11, 2021 from https:\/\/mario.nintendo.com\/"}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Yokohama Japan","acronym":"CHI '21"},"container-title":["Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411763.3451781","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411763.3451781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:21Z","timestamp":1750195701000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411763.3451781"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,8]]},"references-count":44,"alternative-id":["10.1145\/3411763.3451781","10.1145\/3411763"],"URL":"https:\/\/doi.org\/10.1145\/3411763.3451781","relation":{},"subject":[],"published":{"date-parts":[[2021,5,8]]},"assertion":[{"value":"2021-05-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}