{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T02:47:25Z","timestamp":1769827645377,"version":"3.49.0"},"reference-count":99,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T00:00:00Z","timestamp":1741046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"name":"Engineering and Physical Sciences Research Council (EPSRC) with EPSRC Reference","award":["EP\/T017511\/1"],"award-info":[{"award-number":["EP\/T017511\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Games"],"published-print":{"date-parts":[[2025,3,31]]},"abstract":"<jats:p>We present a first evaluation of a Serious Slow Game Jam (SSGJ) methodology as a mechanism for co-designing serious games in the application domain of cybersecurity to assess how the SSGJ contributed to improving the understanding of cybersecurity. To this end, we engaged 13 participants with no experience in cybersecurity in a multidisciplinary SSGJ involving domain-specific, pedagogical and game design knowledge and encouraged engagement in between scheduled days of the SSGJ. Findings show improved confidence of participants in their knowledge of cybersecurity (from 12.5% to 62.5%) after undertaking the SSGJ, with free-text answers specifically indicating an improved understanding in terms of vulnerabilities, attacks and defences for three-quarters of the participants. Also, confidence in knowledge of game design improved (12.5% to 75%), and the SSGJ successfully engaged participants in between scheduled days. Finally, a serious game is presented that was co-designed with participants during our SSGJ and produced as an output of the SSGJ methodology.<\/jats:p>","DOI":"10.1145\/3709745","type":"journal-article","created":{"date-parts":[[2025,1,18]],"date-time":"2025-01-18T11:07:37Z","timestamp":1737198457000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Evaluating Serious Slow Game Jams as a Mechanism for Co-Designing Serious Games to Improve Understanding of Cybersecurity"],"prefix":"10.1145","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0450-2417","authenticated-orcid":false,"given":"Shenando","family":"Stals","sequence":"first","affiliation":[{"name":"Heriot-Watt University, Edinburgh, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2514-5981","authenticated-orcid":false,"given":"Lynne","family":"Baillie","sequence":"additional","affiliation":[{"name":"Heriot-Watt University, Edinburgh, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5437-9181","authenticated-orcid":false,"given":"Jamie Iona","family":"Ferguson","sequence":"additional","affiliation":[{"name":"School of Simulation and Visualisation, The Glasgow School of Art, Glasgow, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6870-8481","authenticated-orcid":false,"given":"Daisy","family":"Abbott","sequence":"additional","affiliation":[{"name":"School of Simulation and Visualisation, The Glasgow School of Art, Glasgow, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6233-6341","authenticated-orcid":false,"given":"Manuel","family":"Maarek","sequence":"additional","affiliation":[{"name":"Heriot-Watt University, Edinburgh, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1348-8423","authenticated-orcid":false,"given":"Ryan","family":"Shah","sequence":"additional","affiliation":[{"name":"Heriot-Watt University, Edinburgh, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4831-3746","authenticated-orcid":false,"given":"Sandy","family":"Louchart","sequence":"additional","affiliation":[{"name":"School of Simulation and Visualisation, The Glasgow School of Art, Glasgow, United Kingdom of Great Britain and Northern Ireland"}]}],"member":"320","published-online":{"date-parts":[[2025,3,4]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/978-3-030-92182-8_22","volume-title":"Proceedings of the 10th International Conference on Games and Learning Alliance, (GALA\u201921)","author":"Abbott Daisy","year":"2021","unstructured":"Daisy Abbott, Olga Chatzifoti, and Joanne Craven. 2021. Serious game rapid online co-design to facilitate change within education. In Proceedings of the 10th International Conference on Games and Learning Alliance, (GALA\u201921). Springer, 233\u2013238."},{"key":"e_1_3_2_3_2","volume-title":"16th European Conference on Game-based Learning (ECGBL\u201922)","author":"Abbott Daisy","year":"2022","unstructured":"Daisy Abbott, Olga Chatzifoti, and Sandy Louchart. 2022. Provocative games to encourage critical reflection. In 16th European Conference on Game-based Learning (ECGBL\u201922). Academic Conferences and Publishing Limited."},{"key":"e_1_3_2_4_2","doi-asserted-by":"crossref","DOI":"10.1145\/3610602.3610604","article-title":"Serious \u2018slow\u2019 game jam: A game jam model for serious game design","author":"Abbott Daisy","year":"2023","unstructured":"Daisy Abbott, Olga Chatzifoti, Sandy Louchart, Jamie Ferguson, and Shenando Stals. 2023. Serious \u2018slow\u2019 game jam: A game jam model for serious game design. In Proceedings of the International Conference on Game Jams, Hackathons and Game Creation Events (ICGJ\u201923).","journal-title":"Proceedings of the International Conference on Game Jams, Hackathons and Game Creation Events (ICGJ\u201923)"},{"key":"e_1_3_2_5_2","first-page":"81","volume-title":"13th Symposium on Usable Privacy and Security","author":"Acar Yasemin","year":"2017","unstructured":"Yasemin Acar, Christian Stransky, Dominik Wermke, Michelle L. Mazurek, and Sascha Fahl. 2017. Security developer studies with github users: Exploring a convenience sample. In 13th Symposium on Usable Privacy and Security. 81\u201395."},{"key":"e_1_3_2_6_2","unstructured":"Adobe. 2022. Adobe Forms. https:\/\/www.adobe.com\/sign\/how-to\/create-online-forms.html"},{"key":"e_1_3_2_7_2","unstructured":"Megumi Aibara Satoru Kawakami and Masakazu Furuichi. 2020. Lessons Learned from Serious Game Jams Organized by DiGRA JAPAN. In Abstract Proceedings of DiGRA 2020 Conference: Play Everywhere DiGRA Tampere. Retrieved from https:\/\/dl.digra.org\/index.php\/dl\/article\/view\/1229"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12113"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.4018\/ijgbl.2013100103"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2021.100274"},{"key":"e_1_3_2_11_2","article-title":"Assessment in and of serious games: An overview","volume":"2013","author":"Bellotti Francesco","year":"2013","unstructured":"Francesco Bellotti, Bill Kapralos, Kiju Lee, Pablo Moreno-Ger, and Riccardo Berta. 2013. Assessment in and of serious games: An overview. Advances in Human-Computer Interaction 2013 (2013), 399--411.","journal-title":"Advances in Human-Computer Interaction"},{"issue":"10","key":"e_1_3_2_12_2","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/971564.971590","article-title":"Game development: Harder than you think: Ten or twenty years ago it was all fun and games. Now it\u2019s blood, sweat, and code.","volume":"1","author":"Blow Jonathan","year":"2004","unstructured":"Jonathan Blow. 2004. Game development: Harder than you think: Ten or twenty years ago it was all fun and games. Now it\u2019s blood, sweat, and code. Queue 1, 10 (2004), 28\u201337.","journal-title":"Queue"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/VS-GAMES.2009.12"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tsc.2020.100700"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3472688.3472698"},{"key":"e_1_3_2_16_2","first-page":"1","volume-title":"Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems","author":"Chinh Bonnie","year":"2019","unstructured":"Bonnie Chinh, Himanshu Zade, Abbas Ganji, and Cecilia Aragon. 2019. Ways of qualitative coding: A case study of four strategies for resolving disagreements. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems. 1\u20136."},{"issue":"7","key":"e_1_3_2_17_2","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.ijmedinf.2015.03.003","article-title":"Cognitive workload changes for nurses transitioning from a legacy system with paper documentation to a commercial electronic health record","volume":"84","author":"Colligan Lacey","year":"2015","unstructured":"Lacey Colligan, Henry W. W. Potts, Chelsea T. Finn, and Robert A. Sinkin. 2015. Cognitive workload changes for nurses transitioning from a legacy system with paper documentation to a commercial electronic health record. International Journal of Medical Informatics 84, 7 (2015), 469\u2013476.","journal-title":"International Journal of Medical Informatics"},{"key":"e_1_3_2_18_2","first-page":"135","volume-title":"Anais Estendidos do XV Simp\u00f3sio Brasileiro de Sistemas Colaborativos","author":"Melo Leandro de Almeida","year":"2019","unstructured":"Leandro de Almeida Melo, Tiago H. S. Leite, F\u00e1bio Freire, Marcelo G. Perin, Fernando Figueira Filho, Cleidson R. B. de Souza, and Any Caroliny D. Batista. 2019. What motivates different people to participate in game jams? In Anais Estendidos do XV Simp\u00f3sio Brasileiro de Sistemas Colaborativos. SBC, 135\u2013140."},{"key":"e_1_3_2_19_2","first-page":"25","volume-title":"Extended Abstracts of the 2014 CHI Conference on Human Factors in Computing Systems","author":"Deen Menno","year":"2014","unstructured":"Menno Deen, Robert Cercos, Alan Chatman, Amani Naseem, Regina Bernhaupt, Allan Fowler, Ben Schouten, and Florian Mueller. 2014. Game jam: [4 research]. In Extended Abstracts of the 2014 CHI Conference on Human Factors in Computing Systems. 25\u201328."},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2494589"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1080\/0144341950150207"},{"key":"e_1_3_2_22_2","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/2897167.2897181","volume-title":"Proceedings of the International Conference on Game Jams, Hackathons, and Game Creation Events","author":"Eberhardt Richard","year":"2016","unstructured":"Richard Eberhardt. 2016. No one way to jam: Game jams for creativity, learning, entertainment, and research. In Proceedings of the International Conference on Game Jams, Hackathons, and Game Creation Events. 34\u201337."},{"key":"e_1_3_2_23_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3361121","article-title":"Jam today, jam tomorrow: Learning in online game jams","volume":"3","author":"Faas Travis","year":"2019","unstructured":"Travis Faas, I.-ching Liu, Lynn Dombrowski, and Andrew D. Miller. 2019. Jam today, jam tomorrow: Learning in online game jams. Proceedings of the ACM on Human-computer Interaction 3, (2019), 1\u201327.","journal-title":"Proceedings of the ACM on Human-computer Interaction"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1080\/08993408.2010.486271"},{"key":"e_1_3_2_25_2","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1109\/SP.2017.31","volume-title":"2017 IEEE Symposium on Security and Privacy (SP\u201917)","author":"Fischer Felix","year":"2017","unstructured":"Felix Fischer, Konstantin B\u00f6ttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, and Sascha Fahl. 2017. Stack overflow considered harmful? The impact of copy&paste on Android application security. In 2017 IEEE Symposium on Security and Privacy (SP\u201917). IEEE, 121\u2013136."},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/2897167.2897179"},{"key":"e_1_3_2_27_2","volume-title":"Proceedings of the Foundations of Digital Games Conference","volume":"2013","author":"Fowler Allan","year":"2013","unstructured":"Allan Fowler, Foaad Khosmood, and Ali Arya. 2013. The evolution and significance of the Global Game Jam. In Proceedings of the Foundations of Digital Games Conference, Vol. 2013."},{"key":"e_1_3_2_28_2","first-page":"28","volume-title":"Proccedings of the 4th Annual Conference on Computing and Information Technology Research and Education New Zealand","author":"Fowler Allan","year":"2013","unstructured":"Allan Fowler, Foaad Khosmood, Ali Arya, and Gorm Lai. 2013. The global game jam for teaching and learning. In Proccedings of the 4th Annual Conference on Computing and Information Technology Research and Education New Zealand. 28\u201334."},{"key":"e_1_3_2_29_2","volume-title":"GJ Workshop. FDG2015","author":"Fowler Allan","year":"2015","unstructured":"Allan Fowler, Gorm Lai, Foaad Khosmood, and Richard Hill. 2015. Trends in organizing philosophies of game jams and game hackathons. In GJ Workshop. FDG2015."},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3241815.3241862"},{"issue":"5","key":"e_1_3_2_31_2","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1109\/TSE.2017.2782813","article-title":"The good, the bad and the ugly: A study of security decisions in a cyber-physical systems game","volume":"45","author":"Frey Sylvain","year":"2017","unstructured":"Sylvain Frey, Awais Rashid, Pauline Anthonysamy, Maria Pinto-Albuquerque, and Syed Asad Naqvi. 2017. The good, the bad and the ugly: A study of security decisions in a cyber-physical systems game. IEEE Transactions on Software Engineering 45, 5 (2017), 521\u2013536.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2022.102930"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2015.01.881"},{"key":"e_1_3_2_34_2","first-page":"1","volume-title":"Proceedings of the 2014 Conference on Interactive Entertainment","author":"Goddard William","year":"2014","unstructured":"William Goddard, Richard Byrne, and Florian\u2019Floyd\u2019 Mueller. 2014. Playful game jams: Guidelines for designed outcomes. In Proceedings of the 2014 Conference on Interactive Entertainment. 1\u201310."},{"key":"e_1_3_2_35_2","unstructured":"Scottish Government. 2022. Coronavirus (COVID-19): Staying Well and Protecting Others. https:\/\/www.gov.scot\/publications\/coronavirus-covid-19-staying-safe-and-protecting-others\/"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/2897167.2897175"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1023\/A:1005614228250"},{"key":"e_1_3_2_38_2","first-page":"1","volume-title":"CHI Conference on Human Factors in Computing Systems","author":"Gundry David","year":"2022","unstructured":"David Gundry and Sebastian Deterding. 2022. Trading accuracy for enjoyment? Data quality and player experience in data collection games. In CHI Conference on Human Factors in Computing Systems. 1\u201314."},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1177\/154193120605000909"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-4115(08)62386-9"},{"key":"e_1_3_2_41_2","volume-title":"Workshop of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems","author":"Harteveld Casper","year":"2010","unstructured":"Casper Harteveld. 2010. Triadic game evaluation: A framework for assessing games with a serious purpose. In Workshop of the ACM SIGCHI Symposium on Engineering Interactive Computing Systems."},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84996-157-8"},{"key":"e_1_3_2_43_2","volume-title":"Making Sense of Virtual Risks: A Quasi-experimental Investigation into Game-based Training","author":"Harteveld Casper","year":"2012","unstructured":"Casper Harteveld. 2012. Making Sense of Virtual Risks: A Quasi-experimental Investigation into Game-based Training. Vol. 11. IOS Press."},{"key":"e_1_3_2_44_2","unstructured":"Chris Hecker and Jonathan Blow. 2012. The Depth Jam. https:\/\/www.chrishecker.com\/The_Depth_Jam"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3488026"},{"key":"e_1_3_2_46_2","volume-title":"Imagine a Place","author":"Inc Discord","year":"2023","unstructured":"Discord Inc. 2023. Imagine a Place. http:\/\/discord.com"},{"key":"e_1_3_2_47_2","first-page":"1","volume-title":"CHI Conference on Human Factors in Computing Systems","author":"Kao Dominic","year":"2022","unstructured":"Dominic Kao, Rabindra Ratan, Christos Mousas, Amogh Joshi, and Edward F. Melcer. 2022. Audio matters too: How audial avatar customization enhances visual avatar customization. In CHI Conference on Human Factors in Computing Systems. 1\u201327."},{"key":"e_1_3_2_48_2","doi-asserted-by":"crossref","first-page":"872","DOI":"10.1109\/EDUCON.2019.8725061","volume-title":"2019 IEEE Global Engineering Education Conference (EDUCON\u201919)","author":"Katsantonis Menelaos","year":"2019","unstructured":"Menelaos Katsantonis, Isavella Kotini, Panayotis Fouliras, and Ioannis Mavridis. 2019. Conceptual framework for developing cyber security serious games. In 2019 IEEE Global Engineering Education Conference (EDUCON\u201919). IEEE, 872\u2013881."},{"key":"e_1_3_2_49_2","volume-title":"Proceedings of the 10th International Conference on the Foundations of Digital Games (FDG\u201915)","author":"Kultima Annakaisa","year":"2015","unstructured":"Annakaisa Kultima. 2015. Defining game jam.. In Proceedings of the 10th International Conference on the Foundations of Digital Games (FDG\u201915)."},{"key":"e_1_3_2_50_2","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1145\/3472688.3472691","volume-title":"6th Annual International Conference on Game Jams, Hackathons, and Game Creation Events","author":"Kultima Annakaisa","year":"2021","unstructured":"Annakaisa Kultima. 2021. Game jam natives? The rise of the game jam era in game development cultures. In 6th Annual International Conference on Game Jams, Hackathons, and Game Creation Events. 22\u201328."},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3464327.3464349"},{"key":"e_1_3_2_52_2","first-page":"1","volume-title":"Game Jams\u2013History, Technology, and Organisation","author":"Lai Gorm","year":"2022","unstructured":"Gorm Lai and Foaad Khosmood. 2022. What is a game jam? In Game Jams\u2013History, Technology, and Organisation, Allan Fowler and Foaad Khosmood (Eds.). Springer, 1\u201320."},{"key":"e_1_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3472688.3472689"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3116595.3116630"},{"key":"e_1_3_2_55_2","first-page":"168","volume-title":"Cases on Digital Game-based Learning: Methods, Models, and Strategies","author":"Lim Theodore","year":"2013","unstructured":"Theodore Lim, Sandy Louchart, Neil Suttie, James Ritchie, Ruth Aylett, Ioana Stanescu, Ion Roceanu, Ivan Martinez-Ortiz, and Pablo Moreno-Ger. 2013. Strategies for effective digital games development and implementation. In Cases on Digital Game-based Learning: Methods, Models, and Strategies. IGI Global, 168\u2013198."},{"key":"e_1_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445245"},{"key":"e_1_3_2_57_2","volume-title":"2015 Workshop on Game Jams, Hackathons and Game Creation Events (Co-located with FDG\u201915)","author":"Locke Ryan","year":"2015","unstructured":"Ryan Locke, Lynn Parker, Dayna Galloway, and Robin J. S. Sloan. 2015. The game jam movement: Disruption, performance and artwork. In 2015 Workshop on Game Jams, Hackathons and Game Creation Events (Co-located with FDG\u201915)."},{"key":"e_1_3_2_58_2","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1007\/978-3-030-11548-7_21","volume-title":"International Conference on Games and Learning Alliance","author":"Maarek Manuel","year":"2019","unstructured":"Manuel Maarek, Sandy Louchart, L\u00e9on McGregor, and Ross McMenemy. 2019. Co-created design of a serious game investigation into developer-centred security. In International Conference on Games and Learning Alliance. Springer, 221\u2013231."},{"key":"e_1_3_2_59_2","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1109\/EuroSPW.2019.00022","volume-title":"2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW\u201919)","author":"Maarek Manuel","year":"2019","unstructured":"Manuel Maarek, L\u00e9on McGregor, Sandy Louchart, and Ross McMenemy. 2019. How could serious games support secure programming? Designing a study replication and intervention. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW\u201919). IEEE, 139\u2013148."},{"key":"e_1_3_2_60_2","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1016\/j.infsof.2017.09.014","article-title":"A systematic mapping study on game-related methods for software engineering education","volume":"95","author":"Maur\u00edcio R. de A.","year":"2018","unstructured":"R. de A. Maur\u00edcio, Lucas Veado, Renata Teles Moreira, Eduardo Figueiredo, and Heitor Costa. 2018. A systematic mapping study on game-related methods for software engineering education. Information and Software Technology 95 (2018), 201\u2013218.","journal-title":"Information and Software Technology"},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1080\/02701367.1989.10607413"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3416465.3416474"},{"key":"e_1_3_2_63_2","first-page":"414","volume-title":"Proceedings of the 12th European Conference on Games Based Learning","author":"Meril\u00e4inen Mikko","year":"2018","unstructured":"Mikko Meril\u00e4inen and Riikka Aurava. 2018. Internal barriers to entry for first-time participants in the Global Game Jam. In Proceedings of the 12th European Conference on Games Based Learning. 414\u2013421."},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.4018\/IJGBL.2020040104"},{"key":"e_1_3_2_65_2","volume-title":"Serious Games: Games That Educate, Train, and Inform","author":"Michael David R.","year":"2005","unstructured":"David R. Michael and Sandra L. Chen. 2005. Serious Games: Games That Educate, Train, and Inform. Muska & Lipman\/Premier-Trade."},{"key":"e_1_3_2_66_2","volume-title":"Microsoft Forms - Easily Create Surveys, Quizzes and Polls","year":"2022","unstructured":"Microsoft. 2022. Microsoft Forms - Easily Create Surveys, Quizzes and Polls. http:\/\/forms.office.com"},{"key":"e_1_3_2_67_2","volume-title":"Take Ideas from Better to Best","year":"2023","unstructured":"Miro. 2023. Take Ideas from Better to Best. https:\/\/miro.com"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/2971485.2971494"},{"key":"e_1_3_2_69_2","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1145\/1810295.1810325","volume-title":"Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering, Volume 2","author":"Musil Juergen","year":"2010","unstructured":"Juergen Musil, Angelika Schweda, Dietmar Winkler, and Stefan Biffl. 2010. Synthesized essence: What game jams teach about prototyping of new software products. In Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering, Volume 2. 183\u2013186."},{"key":"e_1_3_2_70_2","unstructured":"University of Bristol Bristol Cyber Security Group. 2020. CyBOK. https:\/\/www.cybok.org\/"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3275116.3275132"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/3383773"},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.08.007"},{"key":"e_1_3_2_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/3270316.3271536"},{"key":"e_1_3_2_75_2","first-page":"012018","volume-title":"IOP Conference Series: Materials Science and Engineering","volume":"528","author":"Prabaswari Atyanti Dyah","year":"2019","unstructured":"Atyanti Dyah Prabaswari, Chancard Basumerda, and Bagus Wahyu Utomo. 2019. The mental workload analysis of staff in study program of private educational organization. In IOP Conference Series: Materials Science and Engineering, Vol. 528. IOP Publishing, 012018."},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.4018\/ijgbl.2012070104"},{"key":"e_1_3_2_77_2","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/2656719.2656721","volume-title":"Proceedings of the 2014 ACM International Workshop on Serious Games","author":"Preston Jon A.","year":"2014","unstructured":"Jon A. Preston. 2014. Serious game development: Case study of the 2013 CDC games for health game jam. In Proceedings of the 2014 ACM International Workshop on Serious Games. 39\u201343."},{"key":"e_1_3_2_78_2","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1145\/3410404.3414240","volume-title":"Proceedings of the Annual Symposium on Computer-human Interaction in Play","author":"Gomez Argenis Ramirez","year":"2020","unstructured":"Argenis Ramirez Gomez and Hans Gellersen. 2020. More than looking: Using eye movements behind the eyelids as a new game mechanic. In Proceedings of the Annual Symposium on Computer-human Interaction in Play. 362\u2013373."},{"issue":"1","key":"e_1_3_2_79_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/meet.14505001164","article-title":"Learning by game design: Exploring its potential in undergraduate information literacy instruction","volume":"50","author":"Ramnarine-Rieks Angela","year":"2013","unstructured":"Angela Ramnarine-Rieks. 2013. Learning by game design: Exploring its potential in undergraduate information literacy instruction. Proceedings of the American Society for Information Science and Technology 50, 1 (2013), 1\u20134.","journal-title":"Proceedings of the American Society for Information Science and Technology"},{"key":"e_1_3_2_80_2","first-page":"538","volume-title":"10th European Conference on Games Based Learning (ECGBL\u201916)","author":"Ramzan Romana","year":"2016","unstructured":"Romana Ramzan and Andrew Reid. 2016. The importance of game jams in serious games. In 10th European Conference on Games Based Learning (ECGBL\u201916). Academic Conferences and Publishing International Ltd. (ACPI), 538\u2013546."},{"key":"e_1_3_2_81_2","article-title":"A theoretical framework for game jams in applied contexts","author":"Reid Andrew J.","year":"2020","unstructured":"Andrew J. Reid, Phillip Smy, and Iain Donald. 2020. A theoretical framework for game jams in applied contexts. In 2020 DiGRA International Conference: Play Everywhere.","journal-title":"2020 DiGRA International Conference: Play Everywhere"},{"key":"e_1_3_2_82_2","first-page":"185","volume-title":"Advances in Psychology","author":"Reid Gary","year":"1988","unstructured":"Gary Reid and Thomas Nygren. 1988. The subjective workload assessment technique: A scaling procedure for measuring mental workload. In Advances in Psychology, Peter A. Hancock and Najmedin Meshkati (Eds.). Vol. 52. Elsevier, 185\u2013218."},{"issue":"2","key":"e_1_3_2_83_2","first-page":"96","article-title":"Jamming the assessment: The viability of a \u2018Twine\u2019 game jam as a learning evaluation tool in higher education","volume":"3","author":"Roinea Hanna-Riikka","year":"2021","unstructured":"Hanna-Riikka Roinea, Mikko Merilainen, and Ville Kankainen. 2021. Jamming the assessment: The viability of a \u2018Twine\u2019 game jam as a learning evaluation tool in higher education. Journal of Play in Adulthood 3, 2 (2021), 96\u2013112.","journal-title":"Journal of Play in Adulthood"},{"key":"e_1_3_2_84_2","first-page":"677","volume-title":"2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE\u201917)","author":"Rojas Jos\u00e9 Miguel","year":"2017","unstructured":"Jos\u00e9 Miguel Rojas, Thomas D. White, Benjamin S. Clegg, and Gordon Fraser. 2017. Code defenders: Crowdsourcing effective tests and subtle mutants with a mutation testing game. In 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE\u201917). IEEE, 677\u2013688."},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1464-0597.2004.00161.x"},{"issue":"3","key":"e_1_3_2_86_2","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1037\/0022-3514.43.3.450","article-title":"Control and information in the intrapersonal sphere: An extension of cognitive evaluation theory.","volume":"43","author":"Ryan Richard","year":"1982","unstructured":"Richard Ryan. 1982. Control and information in the intrapersonal sphere: An extension of cognitive evaluation theory. Journal of Personality and Social Psychology 43, 3 (1982), 450.","journal-title":"Journal of Personality and Social Psychology"},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.55.1.68"},{"key":"e_1_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.1207\/s15326977ea1101_1"},{"key":"e_1_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/1094562.1094569"},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","unstructured":"Ryan Shah Manuel Maarek Shenando Stals Lynne Baillie Chan Sheung Chi Robert Stewart Hans-Wolfgang Loidl and Olga Chatzifoti. Introducing and Interfacing Cybersecurity: A Cards Approach. Retrieved June 5 2023 from 10.48550\/arXiv.2307.16535","DOI":"10.48550\/arXiv.2307.16535"},{"key":"e_1_3_2_91_2","first-page":"317","volume-title":"Serious Games","author":"Shute Valerie J.","year":"2009","unstructured":"Valerie J. Shute, Matthew Ventura, Malcolm Bauer, Zapata-Rivera Malcolm, and Diego. 2009. Melding the power of serious games and embedded assessment to monitor and foster learning: Flow and grow. In Serious Games. Routledge, 317\u2013343."},{"key":"e_1_3_2_92_2","first-page":"234","volume-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion\u201919)","author":"Silveira Karina Kohl","year":"2019","unstructured":"Karina Kohl Silveira, Soraia Musse, Isabel H. Manssour, Renata Vieira, and Rafael Prikladnicki. 2019. Confidence in programming skills: Gender insights from StackOverflow developers survey. In 2019 IEEE\/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion\u201919). IEEE, 234\u2013235."},{"key":"e_1_3_2_93_2","doi-asserted-by":"publisher","DOI":"10.17605\/OSF.IO\/2MXDK"},{"key":"e_1_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2024.103924"},{"key":"e_1_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/3402942.3403010"},{"key":"e_1_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1080\/00140139608964470"},{"issue":"4","key":"e_1_3_2_97_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3325280","article-title":"Recov-R: Evaluation of a home-based tailored exergame system to reduce fall risk in seniors","volume":"26","author":"Uzor Stephen","year":"2019","unstructured":"Stephen Uzor and Lynne Baillie. 2019. Recov-R: Evaluation of a home-based tailored exergame system to reduce fall risk in seniors. ACM Transactions on Computer-human Interaction (TOCHI) 26, 4 (2019), 1\u201338.","journal-title":"ACM Transactions on Computer-human Interaction (TOCHI)"},{"key":"e_1_3_2_98_2","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/3270316.3273043","volume-title":"Proceedings of the 2018 Annual Symposium on Computer-human Interaction in Play Companion Extended Abstracts","author":"Yoon Jungpil","year":"2018","unstructured":"Jungpil Yoon, Seungwoo Lee, and Taiwoo Park. 2018. JediFlight: Design and evaluation of wing-based flying experience in virtual reality. In Proceedings of the 2018 Annual Symposium on Computer-human Interaction in Play Companion Extended Abstracts. 309\u2013320."},{"key":"e_1_3_2_99_2","volume-title":"Workshop Proceedings of the 8th International Conference on the Foundations of Digital Games","volume":"5","author":"Zook Alexander","year":"2013","unstructured":"Alexander Zook and Mark O. Riedl. 2013. Game conceptualization and development processes in the global game jam. In Workshop Proceedings of the 8th International Conference on the Foundations of Digital Games, Vol. 5."},{"key":"e_1_3_2_100_2","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.297"}],"container-title":["Games: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3709745","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3709745","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:25Z","timestamp":1750298245000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3709745"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,4]]},"references-count":99,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,3,31]]}},"alternative-id":["10.1145\/3709745"],"URL":"https:\/\/doi.org\/10.1145\/3709745","relation":{},"ISSN":["2832-5516"],"issn-type":[{"value":"2832-5516","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,4]]},"assertion":[{"value":"2023-06-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}