{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T02:41:27Z","timestamp":1778121687088,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":156,"publisher":"ACM","funder":[{"name":"CIty University of Hong Kong Teaching Development Grant","award":["6000901"],"award-info":[{"award-number":["6000901"]}]},{"name":"Hong Kong Research Grants Council TRS","award":["8779030"],"award-info":[{"award-number":["8779030"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,5]]},"DOI":"10.1145\/3715336.3735812","type":"proceedings-article","created":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T10:12:29Z","timestamp":1751623949000},"page":"639-662","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Cracking Aegis: An Adversarial LLM-based Game for Raising Awareness of Vulnerabilities in Privacy Protection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-8902-3939","authenticated-orcid":false,"given":"Jiaying","family":"Fu","sequence":"first","affiliation":[{"name":"School of Future Design, Beijing Normal University, Zhuhai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4505-9980","authenticated-orcid":false,"given":"Yiyang","family":"Lu","sequence":"additional","affiliation":[{"name":"University of the Arts London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6906-9934","authenticated-orcid":false,"given":"Zehua","family":"Yang","sequence":"additional","affiliation":[{"name":"Graduate School of Information, Production and Systems, Waseda University, Kitakyushu, Fukuoka, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5505-7843","authenticated-orcid":false,"given":"Fiona","family":"Nah","sequence":"additional","affiliation":[{"name":"School of Computing and Information Systems, Singapore Management University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7310-8790","authenticated-orcid":false,"given":"RAY","family":"LC","sequence":"additional","affiliation":[{"name":"School of Creative Media, City University of Hong Kong, Hong Kong, Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2025,7,4]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"2023. OpenAI says a bug leaked sensitive ChatGPT user data. https:\/\/www.engadget.com\/openai-says-a-bug-leaked-sensitive-chatgpt-user-data-165439848.html"},{"key":"e_1_3_3_1_3_2","unstructured":"A Week with Wanda. 2024. A Week with Wanda. https:\/\/weekwithwanda.wordpress.com\/ Accessed: 2024-09-06."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"Alessandro Acquisti Curtis Taylor and Liad Wagman. 2016. The Economics of Privacy. Journal of Economic Literature 54 2 (June 2016) 442\u2013492. 10.1257\/jel.54.2.442","DOI":"10.1257\/jel.54.2.442"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","unstructured":"Bengi Agcal Ines\u00a0Ziyou Yin Marty Miller and RAY LC. 2025. Bricolage: aligning with climate action through playful participatory design in speculative scenarios. International Journal of Play (Jan. 2025). 10.1080\/21594937.2025.2464324 Publisher: Routledge.","DOI":"10.1080\/21594937.2025.2464324"},{"key":"e_1_3_3_1_6_2","unstructured":"Fionna Agomuoh. 2023. Great hackers are now using ChatGPT to generate malware. https:\/\/www.digitaltrends.com\/computing\/chatgpt-hack-allows-chatbot-to-generate-malware\/ Section: Computing."},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICETSIS61505.2024.10459698"},{"key":"e_1_3_3_1_8_2","volume-title":"Exploring the Applications and Limitations of Large Language Models: A Focus on ChatGPT in Virtual NPC Interactions","author":"Anand Ayaan","year":"2023","unstructured":"Ayaan Anand. 2023. Exploring the Applications and Limitations of Large Language Models: A Focus on ChatGPT in Virtual NPC Interactions. Drexel University."},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"Leonard\u00a0A Annetta. 2010. The \u201cI\u2019s\u201d have it: A framework for serious educational game design. Review of general psychology 14 2 (2010) 105\u2013113.","DOI":"10.1037\/a0018985"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422719"},{"key":"e_1_3_3_1_11_2","unstructured":"Maria Bada Angela\u00a0M Sasse and Jason\u00a0RC Nurse. 2019. Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/1901.02672 (2019)."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Albert Bandura. 2004. Health promotion by social cognitive means. Health education & behavior 31 2 (2004) 143\u2013164.","DOI":"10.1177\/1090198104263660"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"Albert Bandura. 2006. Toward a psychology of human agency. Perspectives on psychological science 1 2 (2006) 164\u2013180.","DOI":"10.1111\/j.1745-6916.2006.00011.x"},{"key":"e_1_3_3_1_14_2","volume-title":"Social learning theory","author":"Bandura Albert","year":"1977","unstructured":"Albert Bandura and Richard\u00a0H Walters. 1977. Social learning theory. Vol.\u00a01. Prentice hall Englewood Cliffs, NJ."},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-11932-4_82"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33759-9_23"},{"key":"e_1_3_3_1_17_2","unstructured":"Christopher\u00a0C Blakesley. 2012. The role of narrative in the design of an educational game. Ph.\u00a0D. Dissertation. The University of Wisconsin-Madison."},{"key":"e_1_3_3_1_18_2","unstructured":"Steph Buongiorno Lawrence\u00a0Jake Klinkert Tanishq Chawla Zixin Zhuang and Corey Clark. 2024. PANGeA: Procedural Artificial Narrative using Generative AI for Turn-Based Video Games. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2404.19721 (2024)."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/2696454.2696484"},{"key":"e_1_3_3_1_20_2","unstructured":"Carole Cadwalladr and Emma Graham-Harrison. [n. d.]. Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach | Cambridge Analytica | The Guardian. https:\/\/www.theguardian.com\/news\/2018\/mar\/17\/cambridge-analytica-facebook-influence-us-election"},{"key":"e_1_3_3_1_21_2","first-page":"267","volume-title":"28th USENIX security symposium (USENIX security 19)","author":"Carlini Nicholas","year":"2019","unstructured":"Nicholas Carlini, Chang Liu, \u00dalfar Erlingsson, Jernej Kos, and Dawn Song. 2019. The secret sharer: Evaluating and testing unintended memorization in neural networks. In 28th USENIX security symposium (USENIX security 19). 267\u2013284."},{"key":"e_1_3_3_1_22_2","first-page":"2633","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Carlini Nicholas","year":"2021","unstructured":"Nicholas Carlini, Florian Tramer, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom Brown, Dawn Song, Ulfar Erlingsson, et\u00a0al. 2021. Extracting training data from large language models. In 30th USENIX Security Symposium (USENIX Security 21). 2633\u20132650."},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","unstructured":"Alexandra Cetto Michael Netter G\u00fcnther Pernul Christian Richthammer Moritz Riesner Christian Roth and Johannes S\u00e4nger. 2014. Friend Inspector: A Serious Game to Enhance Privacy Awareness in Social Networks. 10.48550\/arXiv.1402.5878arXiv:https:\/\/arXiv.org\/abs\/1402.5878 [cs].","DOI":"10.48550\/arXiv.1402.5878"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","unstructured":"Shi-Cho Cha Tzu-Yang Hsu Yang Xiang and Kuo-Hui Yeh. 2019. Privacy Enhancing Technologies in the Internet of Things: Perspectives and Challenges. IEEE Internet of Things Journal 6 2 (2019) 2159\u20132187. 10.1109\/JIOT.2018.2878658","DOI":"10.1109\/JIOT.2018.2878658"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395522"},{"key":"e_1_3_3_1_26_2","volume-title":"Influence: Science and Practice (4th ed.)","author":"Cialdini Robert\u00a0B.","year":"2001","unstructured":"Robert\u00a0B. Cialdini. 2001. Influence: Science and Practice (4th ed.). Allyn & Bacon, Boston, MA."},{"key":"e_1_3_3_1_27_2","unstructured":"Robert\u00a0B Cialdini. 2001. Weapons of influence. Influence Science and Practice. Allyn and Bacon: MA (2001)."},{"key":"e_1_3_3_1_28_2","unstructured":"Cisco. [n. d.]. Cisco Consumer Privacy Survey - Cisco. https:\/\/www.cisco.com\/c\/en\/us\/about\/trust-center\/consumer-privacy-survey.html"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174030"},{"key":"e_1_3_3_1_30_2","first-page":"167","volume-title":"International Workshop on Chatbot Research and Design","author":"Cox Samuel\u00a0Rhys","year":"2023","unstructured":"Samuel\u00a0Rhys Cox and Wei\u00a0Tsang Ooi. 2023. Conversational Interactions with NPCs in LLM-Driven Gaming: Guidelines from a Content Analysis of Player Feedback. In International Workshop on Chatbot Research and Design. Springer, 167\u2013184."},{"key":"e_1_3_3_1_31_2","unstructured":"Maria Cutumisu. 2009. Using behaviour patterns to generate scripts for computer role-playing games. (2009)."},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"crossref","unstructured":"Sara\u00a0I De\u00a0Freitas. 2006. Using games and simulations for supporting learning. Learning media and technology 31 4 (2006) 343\u2013358.","DOI":"10.1080\/17439880601021967"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"crossref","unstructured":"H\u00e9ctor\u00a0Rub\u00e9n D\u00edaz\u00a0Ojeda Francisco P\u00e9rez-Arribas and Julio P\u00e9rez-S\u00e1nchez. 2023. Student\u2013Teacher Role Reversal at University Level\u2014An experience in Naval Engineering Education. Education Sciences 13 4 (2023) 352.","DOI":"10.3390\/educsci13040352"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"crossref","unstructured":"Tamara Dinev and Paul Hart. 2006. An extended privacy calculus model for e-commerce transactions. Information systems research 17 1 (2006) 61\u201380.","DOI":"10.1287\/isre.1060.0080"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","unstructured":"Cynthia Dwork and Aaron Roth. 2014. The Algorithmic Foundations of Differential Privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9 3\u20134 (Aug. 2014) 211\u2013407. 10.1561\/0400000042Publisher: Now Publishers Inc..","DOI":"10.1561\/0400000042"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-95531-1_23"},{"key":"e_1_3_3_1_37_2","unstructured":"Joshua\u00a0AT Fairfield and Christoph Engel. 2015. Privacy as a public good. Duke LJ 65 (2015) 385."},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"crossref","unstructured":"Maddalena Favaretto Eva De\u00a0Clercq and Bernice\u00a0Simone Elger. 2019. Big Data and discrimination: perils promises and solutions. A systematic review. Journal of Big Data 6 1 (2019) 1\u201327.","DOI":"10.1186\/s40537-019-0177-4"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"crossref","unstructured":"Daniel Fern\u00e1ndez\u00a0Galeote and Juho Hamari. 2021. Game-based climate change engagement: analyzing the potential of entertainment and serious games. Proceedings of the ACM on Human-Computer Interaction 5 CHI PLAY (2021) 1\u201321.","DOI":"10.1145\/3474653"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"crossref","unstructured":"Brian\u00a0J Fogg. 2002. Persuasive technology: using computers to change what we think and do. Ubiquity 2002 December (2002) 2.","DOI":"10.1145\/764008.763957"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"crossref","unstructured":"Fiona French David Levi Csaba Maczo Aiste Simonaityte Stefanos Triantafyllidis and Gergo Varda. 2023. Creative use of OpenAI in education: case studies from game development. Multimodal Technologies and Interaction 7 8 (2023) 81.","DOI":"10.3390\/mti7080081"},{"key":"e_1_3_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706599.3721163"},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581464"},{"key":"e_1_3_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3643834.3660711"},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"crossref","unstructured":"Archon Fung. 2013. Infotopia: Unleashing the democratic power of transparency. Politics & society 41 2 (2013) 183\u2013212.","DOI":"10.1177\/0032329213483107"},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"crossref","unstructured":"Kazuaki Furumai Roberto Legaspi Julio Vizcarra Yudai Yamazaki Yasutaka Nishimura Sina\u00a0J Semnani Kazushi Ikeda Weiyan Shi and Monica\u00a0S Lam. 2024. Zero-shot Persuasive Chatbots with LLM-Generated Strategies and Information Retrieval. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2407.03585 (2024).","DOI":"10.18653\/v1\/2024.findings-emnlp.656"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"crossref","unstructured":"Isabel\u00a0O Gallegos Ryan\u00a0A Rossi Joe Barrow Md\u00a0Mehrab Tanjim Sungchul Kim Franck Dernoncourt Tong Yu Ruiyi Zhang and Nesreen\u00a0K Ahmed. 2024. Bias and fairness in large language models: A survey. Computational Linguistics 50 3 (2024) 1097\u20131179.","DOI":"10.1162\/coli_a_00524"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"crossref","unstructured":"Roberto Gallotta Graham Todd Marvin Zammit Sam Earle Antonios Liapis Julian Togelius and Georgios\u00a0N Yannakakis. 2024. Large language models and games: A survey and roadmap. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2402.18659 (2024).","DOI":"10.1109\/TG.2024.3461510"},{"key":"e_1_3_3_1_49_2","doi-asserted-by":"crossref","unstructured":"Ivan Garcia Carla Pacheco Andr\u00e9s Le\u00f3n and Jose\u00a0A Calvo-Manzano. 2020. A serious game for teaching the fundamentals of ISO\/IEC\/IEEE 29148 systems and software engineering\u2013Lifecycle processes\u2013Requirements engineering at undergraduate level. Computer Standards & Interfaces 67 (2020) 103377.","DOI":"10.1016\/j.csi.2019.103377"},{"key":"e_1_3_3_1_50_2","volume-title":"Frames of mind: The theory of multiple intelligences","author":"Gardner Howard\u00a0E","year":"2011","unstructured":"Howard\u00a0E Gardner. 2011. Frames of mind: The theory of multiple intelligences. Basic books."},{"key":"e_1_3_3_1_51_2","unstructured":"GDPR GDPR. 2016. General data protection regulation. Regulation (EU) 679 (2016)."},{"key":"e_1_3_3_1_52_2","doi-asserted-by":"crossref","unstructured":"James\u00a0Paul Gee. 2003. What video games have to teach us about learning and literacy. Computers in entertainment (CIE) 1 1 (2003) 20\u201320.","DOI":"10.1145\/950566.950595"},{"key":"e_1_3_3_1_53_2","doi-asserted-by":"publisher","unstructured":"Kambiz Ghazinour Sean Scarnecchia Jake Rabideau and Blake Pecore. 2020. A Novel Approach to Social Media Privacy Education Through Simulated Role Reversal. Procedia Computer Science 177 (2020) 112\u2013119. 10.1016\/j.procs.2020.10.018","DOI":"10.1016\/j.procs.2020.10.018"},{"key":"e_1_3_3_1_54_2","doi-asserted-by":"crossref","unstructured":"Greg Guest Arwen Bunce and Laura Johnson. 2006. How many interviews are enough? An experiment with data saturation and variability. Field methods 18 1 (2006) 59\u201382.","DOI":"10.1177\/1525822X05279903"},{"key":"e_1_3_3_1_55_2","first-page":"3910","volume-title":"International conference on machine learning","author":"Guo Wenbo","year":"2021","unstructured":"Wenbo Guo, Xian Wu, Sui Huang, and Xinyu Xing. 2021. Adversarial policy learning in two-player competitive games. In International conference on machine learning. PMLR, 3910\u20133919."},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813778"},{"key":"e_1_3_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605005"},{"key":"e_1_3_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642133"},{"key":"e_1_3_3_1_59_2","doi-asserted-by":"crossref","unstructured":"Andreas Hannig Nicole Kuth Monika \u00d6zman Stephan Jonas and Cord Spreckelsen. 2012. eMedOffice: A web-based collaborative serious game for teaching optimal design of a medical practice. BMC medical education 12 (2012) 1\u201315.","DOI":"10.1186\/1472-6920-12-104"},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"crossref","unstructured":"Joseph\u00a0M Hatfield. 2018. Social engineering in cybersecurity: The evolution of a concept. Computers & Security 73 (2018) 102\u2013113.","DOI":"10.1016\/j.cose.2017.10.008"},{"key":"e_1_3_3_1_61_2","doi-asserted-by":"publisher","unstructured":"Julian Hazell. 2023. Spear Phishing With Large Language Models. 10.48550\/arXiv.2305.06972arXiv:https:\/\/arXiv.org\/abs\/2305.06972 [cs].","DOI":"10.48550\/arXiv.2305.06972"},{"key":"e_1_3_3_1_62_2","unstructured":"Feng He Tianqing Zhu Dayong Ye Bo Liu Wanlei Zhou and Philip\u00a0S Yu. 2024. The Emerged Security and Privacy of LLM Agent: A Survey with Case Studies. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2407.19354 (2024)."},{"key":"e_1_3_3_1_63_2","doi-asserted-by":"publisher","unstructured":"Zhiting He Jiayi Su Li Chen Tianqi Wang and RAY LC. 2025. \"I Recall the Past\": Exploring How People Collaborate with Generative AI to Create Cultural Heritage Narratives. Proceedings of the ACM on Human-Computer Interaction 9 CSCW 108 (April 2025) 30. 10.1145\/3711006","DOI":"10.1145\/3711006"},{"key":"e_1_3_3_1_64_2","volume-title":"Qualitative research methods","author":"Hennink Monique","year":"2020","unstructured":"Monique Hennink, Inge Hutter, and Ajay Bailey. 2020. Qualitative research methods. Sage."},{"key":"e_1_3_3_1_65_2","unstructured":"Sihao Hu Tiansheng Huang Fatih Ilhan Selim Tekin Gaowen Liu Ramana Kompella and Ling Liu. 2024. A survey on large language model-based game agents. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2404.02039 (2024)."},{"key":"e_1_3_3_1_66_2","doi-asserted-by":"crossref","unstructured":"Lei Huang Weijiang Yu Weitao Ma Weihong Zhong Zhangyin Feng Haotian Wang Qianglong Chen Weihua Peng Xiaocheng Feng Bing Qin et\u00a0al. 2025. A survey on hallucination in large language models: Principles taxonomy challenges and open questions. ACM Transactions on Information Systems 43 2 (2025) 1\u201355.","DOI":"10.1145\/3703155"},{"key":"e_1_3_3_1_67_2","unstructured":"IBM. [n. d.]. Cost of a data breach 2024 | IBM. https:\/\/www.ibm.com\/reports\/data-breach"},{"key":"e_1_3_3_1_68_2","doi-asserted-by":"crossref","unstructured":"Hakeemat Ijaiya and Israel\u00a0Adekunle Adeniyi. 2024. AI AND PERSONAL DATA PRIVACY IN THE US: BALANCING CUSTOMER CONVENIENCE WITH PRIVACY COMPLIANCE. ABUAD Law Journal 12 1 (2024) 41\u201364.","DOI":"10.53982\/alj.2024.1201.03-j"},{"key":"e_1_3_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88272-3_1"},{"key":"e_1_3_3_1_70_2","unstructured":"Sidney\u00a0M Jourard. 1971. Self-disclosure: An experimental analysis of the transparent self."},{"key":"e_1_3_3_1_71_2","doi-asserted-by":"crossref","unstructured":"Endris Kerga Monica Rossi Marco Taisch and Sergio Terzi. 2014. A serious game for introducing set-based concurrent engineering in industrial practices. Concurrent Engineering 22 4 (2014) 333\u2013346.","DOI":"10.1177\/1063293X14550104"},{"key":"e_1_3_3_1_72_2","doi-asserted-by":"crossref","unstructured":"Alison King. 1993. From sage on the stage to guide on the side. College teaching 41 1 (1993) 30\u201335.","DOI":"10.1080\/87567555.1993.9926781"},{"key":"e_1_3_3_1_73_2","volume-title":"Experiential learning: Experience as the source of learning and development","author":"Kolb David\u00a0A","year":"2014","unstructured":"David\u00a0A Kolb. 2014. Experiential learning: Experience as the source of learning and development. FT press."},{"key":"e_1_3_3_1_74_2","first-page":"195","volume-title":"International Conference on Entrepreneurship, Innovation, and Leadership","author":"Kumar Tajinder","year":"2023","unstructured":"Tajinder Kumar, Ramesh Kait, Ankita, and Anu Malik. 2023. The role of Generative Artificial Intelligence (GAI) in education: a detailed review for enhanced learning experiences. In International Conference on Entrepreneurship, Innovation, and Leadership. Springer, 195\u2013207."},{"key":"e_1_3_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3591196.3593341"},{"key":"e_1_3_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563703.3596805"},{"key":"e_1_3_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3635636.3672190"},{"key":"e_1_3_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/3581783.3613791"},{"key":"e_1_3_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3450373"},{"key":"e_1_3_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/3490149.3507784"},{"key":"e_1_3_3_1_81_2","doi-asserted-by":"publisher","unstructured":"RAY LC Zijing Song Yating Sun and Cheng Yang. 2022. Designing narratives and data visuals in comic form for social influence in climate action. Frontiers in Psychology 13 (2022). 10.3389\/fpsyg.2022.893181","DOI":"10.3389\/fpsyg.2022.893181"},{"key":"e_1_3_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/3632776.3632827"},{"key":"e_1_3_3_1_83_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-60441-6_5"},{"key":"e_1_3_3_1_84_2","doi-asserted-by":"publisher","unstructured":"Youling Li Di Chen and Xinxia Deng. 2024. The impact of digital educational games on student\u2019s motivation for learning: The mediating effect of learning engagement and the moderating effect of the digital environment. PLOS ONE 19 1 (01 2024) 1\u201321. 10.1371\/journal.pone.0294350","DOI":"10.1371\/journal.pone.0294350"},{"key":"e_1_3_3_1_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/2658537.2658695"},{"key":"e_1_3_3_1_86_2","doi-asserted-by":"publisher","unstructured":"Long Ling Xinyi Chen Ruoyu Wen Toby Jia-Jun Li and RAY LC. 2024. Sketchar: Supporting Character Design and Illustration Prototyping Using Generative AI. Proc. ACM Hum.-Comput. Interact. 8 CHI PLAY (Oct. 2024) 337:1\u2013337:28. 10.1145\/3677102","DOI":"10.1145\/3677102"},{"key":"e_1_3_3_1_87_2","doi-asserted-by":"publisher","unstructured":"Bingjie Liu and S.\u00a0Shyam Sundar. 2018. Should Machines Express Sympathy and Empathy? Experiments with a Health Advice Chatbot. Cyberpsychology Behavior and Social Networking 21 10 (2018) 625\u2013636. 10.1089\/cyber.2018.0110 arXiv:10.1089\/cyber.2018.0110 PMID: 30334655.","DOI":"10.1089\/cyber.2018.0110"},{"key":"e_1_3_3_1_88_2","unstructured":"Jiangfeng Liu Ziyi Wang Jing Xie and Lei Pei. 2024. From ChatGPT DALL-E 3 to Sora: How has Generative AI Changed Digital Humanities Research and Services? arxiv:https:\/\/arXiv.org\/abs\/2404.18518\u00a0[cs.DL] https:\/\/arxiv.org\/abs\/2404.18518"},{"key":"e_1_3_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/3698061.3726917"},{"key":"e_1_3_3_1_90_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISCS61804.2024.10581181"},{"key":"e_1_3_3_1_91_2","doi-asserted-by":"crossref","unstructured":"Sana Maqsood and Sonia Chiasson. 2021. Design development and evaluation of a cybersecurity privacy and digital literacy game for tweens. ACM Transactions on Privacy and Security (TOPS) 24 4 (2021) 1\u201337.","DOI":"10.1145\/3469821"},{"key":"e_1_3_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580985"},{"key":"e_1_3_3_1_93_2","doi-asserted-by":"crossref","unstructured":"Jennifer\u00a0L Mathews Amy\u00a0L Parkhill Deirdre\u00a0A Schlehofer Matthew\u00a0J Starr and Steven Barnett. 2011. Role-reversal exercise with deaf strong hospital to teach communication competency and cultural awareness. American Journal of Pharmaceutical Education 75 3 (2011) 53.","DOI":"10.5688\/ajpe75353"},{"key":"e_1_3_3_1_94_2","doi-asserted-by":"publisher","unstructured":"Kathryn\u00a0E. Merrick. 2010. An Empirical Evaluation of Puzzle-Based Learning as an Interest Approach for Teaching Introductory Computer Science. IEEE Transactions on Education 53 4 (Nov. 2010) 677\u2013680. 10.1109\/TE.2009.2039217","DOI":"10.1109\/TE.2009.2039217"},{"key":"e_1_3_3_1_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/1231047.1231056"},{"key":"e_1_3_3_1_96_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2022.emnlp-main.119"},{"key":"e_1_3_3_1_97_2","unstructured":"Jewoong Moon Unggi Lee Junbo Koh Yeil Jeong Yunseo Lee Gyuri Byun and Ji\u00a0Eun Lim. [n. d.]. Generative Artificial Intelligence in Educational Game Design: Nuanced Challenges Design Implications and Future Research. ([n. d.])."},{"key":"e_1_3_3_1_98_2","doi-asserted-by":"crossref","unstructured":"Lisa Muirhead Barbara Kaplan Jennifer Childs Indira Brevick Anne Cadet YaQutullah Ibraheem\u00a0Muhammad LaWanda Kemp Karla Coffee-Dunning and Katharina\u00a0V Echt. 2022. Role reversal: in-situ simulation to enhance the value of interprofessional team-based care. Journal of Nursing Education 61 10 (2022) 595\u2013598.","DOI":"10.3928\/01484834-20220417-01"},{"key":"e_1_3_3_1_99_2","unstructured":"Jingping Nie Hanya Shao Yuang Fan Qijia Shao Haoxuan You Matthias Preindl and Xiaofan Jiang. 2024. LLM-based Conversational AI Therapist for Daily Functioning Screening and Psychotherapeutic Intervention via Smart Devices. arxiv:https:\/\/arXiv.org\/abs\/2403.10779\u00a0[cs.CL] https:\/\/arxiv.org\/abs\/2403.10779"},{"key":"e_1_3_3_1_100_2","unstructured":"State of\u00a0California Department of Justice Office of\u00a0the Attorney\u00a0General. [n. d.]. California Consumer Privacy Act (CCPA) | State of California - Department of Justice - Office of the Attorney General. https:\/\/oag.ca.gov\/privacy\/ccpa"},{"key":"e_1_3_3_1_101_2","doi-asserted-by":"crossref","unstructured":"Aleksandra\u00a0E Olszewski and Traci\u00a0A Wolbrink. 2017. Serious gaming in medical education: a proposed structured framework for game development. Simulation in Healthcare 12 4 (2017) 240\u2013253.","DOI":"10.1097\/SIH.0000000000000212"},{"key":"e_1_3_3_1_102_2","doi-asserted-by":"crossref","unstructured":"Mariya\u00a0Y Omelicheva and Olga Avdeyeva. 2008. Teaching with lecture or debate? Testing the effectiveness of traditional versus active learning methods of instruction. PS: Political Science & Politics 41 3 (2008) 603\u2013607.","DOI":"10.1017\/S1049096508080815"},{"key":"e_1_3_3_1_103_2","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2017.8393226"},{"key":"e_1_3_3_1_104_2","doi-asserted-by":"publisher","unstructured":"Weiping Pei Yanina Likhtenshteyn and Chuan Yue. 2023. A Tale of Two Communities: Privacy of Third Party App Users in Crowdsourcing - The Case of Receipt Transcription. Proc. ACM Hum.-Comput. Interact. 7 CSCW2 Article 253 (oct 2023) 43\u00a0pages. 10.1145\/3610044","DOI":"10.1145\/3610044"},{"key":"e_1_3_3_1_105_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642105"},{"key":"e_1_3_3_1_106_2","unstructured":"Sayak\u00a0Saha Roy Poojitha Thota Krishna\u00a0Vamsi Naragam and Shirin Nilizadeh. 2023. From Chatbots to PhishBots?\u2013Preventing Phishing scams created using ChatGPT Google Bard and Claude. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2310.19181 (2023)."},{"key":"e_1_3_3_1_107_2","doi-asserted-by":"crossref","unstructured":"Pejman Sajjadi Mahda\u00a0M Bagher Jessica\u00a0G Myrick Joseph\u00a0G Guerriero Timothy\u00a0S White Alexander Klippel and Janet\u00a0K Swim. 2022. Promoting systems thinking and pro-environmental policy support through serious games. Frontiers in Environmental Science 10 (2022) 957204.","DOI":"10.3389\/fenvs.2022.957204"},{"key":"e_1_3_3_1_108_2","volume-title":"The Coding Manual for Qualitative Researchers (4th ed.)","author":"Salda\u00f1a Johnny","year":"2021","unstructured":"Johnny Salda\u00f1a. 2021. The Coding Manual for Qualitative Researchers (4th ed.). SAGE Publications, Thousand Oaks, CA. 1\u2013440 pages."},{"key":"e_1_3_3_1_109_2","doi-asserted-by":"publisher","unstructured":"Shruti Sannon Brett Stoll Dominic DiFranzo Malte\u00a0F. Jung and Natalya\u00a0N. Bazarova. 2020. \u201cI just shared your responses\u201d: Extending Communication Privacy Management Theory to Interactions with Conversational Agents. Proc. ACM Hum.-Comput. Interact. 4 GROUP Article 08 (jan 2020) 18\u00a0pages. 10.1145\/3375188","DOI":"10.1145\/3375188"},{"key":"e_1_3_3_1_110_2","unstructured":"Ashish\u00a0K Saxena. 2020. Balancing privacy personalization and human rights in the digital age. Eigenpub Review of Science and Technology 4 1 (2020) 24\u201337."},{"key":"e_1_3_3_1_111_2","doi-asserted-by":"publisher","unstructured":"Christopher Scherb Luc\u00a0Bryan Heitz Frank Grimberg Hermann Grieder and Marcel Maurer. 2023. A Serious Game for Simulating Cyberattacks to Teach Cybersecurity. 10.48550\/arXiv.2305.03062arXiv:https:\/\/arXiv.org\/abs\/2305.03062 [cs].","DOI":"10.48550\/arXiv.2305.03062"},{"key":"e_1_3_3_1_112_2","unstructured":"M Seren\u00a0Smith Sarah Warnes and Anne Vanhoestenberghe. 2018. Scenario-based learning. UCL IOE Press."},{"key":"e_1_3_3_1_113_2","unstructured":"Sergeyshy. 2023. OPWNAI : Cybercriminals Starting to Use ChatGPT. https:\/\/research.checkpoint.com\/2023\/opwnai-cybercriminals-starting-to-use-chatgpt\/"},{"key":"e_1_3_3_1_114_2","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0J Solove. 2005. A taxonomy of privacy. U. Pa. l. Rev. 154 (2005) 477.","DOI":"10.2307\/40041279"},{"key":"e_1_3_3_1_115_2","volume-title":"Drizzle (1st ed.)","author":"Song Zijing","year":"2021","unstructured":"Zijing Song, Yating Sun, and RAY LC. 2021. Drizzle (1st ed.). Floating Projects Press, Hong Kong. https:\/\/recfro.github.io\/drizzle\/"},{"key":"e_1_3_3_1_116_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92300-6_42"},{"key":"e_1_3_3_1_117_2","doi-asserted-by":"crossref","unstructured":"Katryna Starks. 2014. Cognitive behavioral game design: a unified model for designing serious games. Frontiers in psychology 5 (2014) 28.","DOI":"10.3389\/fpsyg.2014.00028"},{"key":"e_1_3_3_1_118_2","doi-asserted-by":"publisher","unstructured":"Carolin Stellmacher Jette Ternieten Daria Soroko and Johannes Sch\u00f6ning. 2022. Escaping the Privacy Paradox: Evaluating the Learning Effects of Privacy Policies With Serious Games. Proc. ACM Hum.-Comput. Interact. 6 CHI PLAY Article 232 (oct 2022) 20\u00a0pages. 10.1145\/3549495","DOI":"10.1145\/3549495"},{"key":"e_1_3_3_1_119_2","unstructured":"Rickard Stureborg Dimitris Alikaniotis and Yoshi Suhara. 2024. Large language models are inconsistent and biased evaluators. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2405.01724 (2024)."},{"key":"e_1_3_3_1_120_2","doi-asserted-by":"publisher","unstructured":"Yuqian Sun Zhouyi Li Ke Fang Chang\u00a0Hee Lee and Ali Asadipour. 2023. Language as Reality: A Co-Creative Storytelling Game Experience in 1001 Nights Using Generative AI. Proceedings of the AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment 19 1 (Oct. 2023) 425\u2013434. 10.1609\/aiide.v19i1.27539","DOI":"10.1609\/aiide.v19i1.27539"},{"key":"e_1_3_3_1_121_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22298-6_42"},{"key":"e_1_3_3_1_122_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29381-9_35"},{"key":"e_1_3_3_1_123_2","doi-asserted-by":"publisher","unstructured":"Anne\u00a0C. Tally Jacob Abbott Ashley Bochner Sanchari Das and Christena Nippert-Eng. 2023. What Mid-Career Professionals Think Know and Feel About Phishing: Opportunities for University IT Departments to Better Empower Employees in Their Anti-Phishing Decisions. Proc. ACM Hum.-Comput. Interact. 7 CSCW1 Article 113 (apr 2023) 27\u00a0pages. 10.1145\/3579547","DOI":"10.1145\/3579547"},{"key":"e_1_3_3_1_124_2","doi-asserted-by":"publisher","DOI":"10.4018\/979-8-3693-2418-9.ch009"},{"key":"e_1_3_3_1_125_2","unstructured":"Alexander Troy Matthew Fischer Anthony Duarte Stephen Blanchard and Frederick Ivanov. 2024. Dynamic Language Interaction Mapping for Contextual Adaptation in Large Language Models. Authorea Preprints (2024)."},{"key":"e_1_3_3_1_126_2","unstructured":"Jean\u00a0Marie Tshimula D\u2019Jeff\u00a0K Nkashama Jean\u00a0Tshibangu Muabila Ren\u00e9\u00a0Manass\u00e9 Galekwa Hugues Kanda Maximilien\u00a0V Dialufuma Mbuyi\u00a0Mukendi Didier Kalala Kalonji Serge Mundele Patience\u00a0Kinshie Lenye et\u00a0al. 2024. Psychological Profiling in Cybersecurity: A Look at LLMs and Psycholinguistic Features. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2406.18783 (2024)."},{"key":"e_1_3_3_1_127_2","doi-asserted-by":"publisher","DOI":"10.1145\/3656156.3665432"},{"key":"e_1_3_3_1_128_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858060"},{"key":"e_1_3_3_1_129_2","doi-asserted-by":"publisher","DOI":"10.1093\/oxfordhb\/9780199935383.013.94"},{"key":"e_1_3_3_1_130_2","unstructured":"Bob Violino. 2023. AI tools such as ChatGPT are generating a mammoth increase in malicious phishing emails. https:\/\/www.cnbc.com\/2023\/11\/28\/ai-like-chatgpt-is-creating-huge-increase-in-malicious-phishing-email.html Section: Technology Executive Council."},{"key":"e_1_3_3_1_131_2","unstructured":"Lei Wang Jianxun Lian Yi Huang Yanqi Dai Haoxuan Li Xu Chen Xing Xie and Ji-Rong Wen. 2024. CharacterBox: Evaluating the Role-Playing Capabilities of LLMs in Text-Based Virtual Worlds. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2412.05631 (2024)."},{"key":"e_1_3_3_1_132_2","doi-asserted-by":"crossref","unstructured":"Yilei Wang Jiabao Zhao Deniz\u00a0S Ones Liang He and Xin Xu. 2025. Evaluating the ability of large language models to emulate personality. Scientific reports 15 1 (2025) 519.","DOI":"10.1038\/s41598-024-84109-5"},{"key":"e_1_3_3_1_133_2","unstructured":"Alan\u00a0F Westin. 1968. Privacy and freedom. Washington and Lee Law Review 25 1 (1968) 166."},{"key":"e_1_3_3_1_134_2","doi-asserted-by":"crossref","unstructured":"Piotr Wilczy\u0144ski Wiktoria Mieleszczenko-Kowszewicz and Przemys\u0142aw Biecek. 2024. Resistance Against Manipulative AI: key factors and possible actions. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2404.14230 (2024).","DOI":"10.3233\/FAIA240565"},{"key":"e_1_3_3_1_135_2","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462046"},{"key":"e_1_3_3_1_136_2","volume-title":"International Symposium on Electronic Art","author":"Wu Ruishan","year":"2024","unstructured":"Ruishan Wu, Chunlei Gong, Li Chen, Jiayi Su, and RAY LC. 2024. The Present in the Future is the Past: Applying Generative AI to Visualize and Imagine Cultural Heritage Sites in Both Augmented and Physical Reality. In International Symposium on Electronic Art. Brisbane, QLD, Australia. https:\/\/az659834.vo.msecnd.net\/eventsairseasiaprod\/production-expertevents-public\/a5f209f3a2b24341a34e4aacf0c37742"},{"key":"e_1_3_3_1_137_2","unstructured":"Yuzhuang Xu Shuo Wang Peng Li Fuwen Luo Xiaolong Wang Weidong Liu and Yang Liu. 2023. Exploring large language models for communication games: An empirical study on werewolf. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2309.04658 (2023)."},{"key":"e_1_3_3_1_138_2","first-page":"56","volume-title":"Joint Proceedings of the IUI 2022 Workshops: APEx-UI, HAI-GEN, HEALTHI, HUMANIZE, TExSS, SOCIALIZE","author":"Yang Daijin","year":"2022","unstructured":"Daijin Yang, Yanpeng Zhou, Zhiyuan Zhang, Toby Jia-Jun Li, and RAY LC. 2022. AI as an Active Writer: Interaction strategies with generated text in human-AI collaborative fiction writing. In Joint Proceedings of the IUI 2022 Workshops: APEx-UI, HAI-GEN, HEALTHI, HUMANIZE, TExSS, SOCIALIZE. CEUR-WS Team, 56\u201365. https:\/\/scholars.cityu.edu.hk\/en\/publications\/publication(d901f5a2-0600-422f-b588-db5a59871961).html"},{"key":"e_1_3_3_1_139_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642500"},{"key":"e_1_3_3_1_140_2","doi-asserted-by":"crossref","unstructured":"Dani Yaniv. 2012. Dynamics of creativity and empathy in role reversal: Contributions from neuroscience. Review of general psychology 16 1 (2012) 70\u201377.","DOI":"10.1037\/a0026580"},{"key":"e_1_3_3_1_141_2","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i16.17676"},{"key":"e_1_3_3_1_142_2","unstructured":"Moe Yaziji. 2023. \u2018FraudGPT\u2019 Malicious Chatbot Now for Sale on Dark Web. https:\/\/secureops.com\/blog\/ai-attacks-fraudgpt\/"},{"key":"e_1_3_3_1_143_2","doi-asserted-by":"publisher","unstructured":"Nick Yee and Jeremy Bailenson. 2007. The Proteus Effect: The Effect of Transformed Self-Representation on Behavior. Human Communication Research 33 3 (July 2007) 271\u2013290. 10.1111\/j.1468-2958.2007.00299.x","DOI":"10.1111\/j.1468-2958.2007.00299.x"},{"key":"e_1_3_3_1_144_2","unstructured":"Zihao Yi Jiarui Ouyang Yuwen Liu Tianhao Liao Zhe Xu and Ying Shen. 2024. A Survey on Recent Advances in LLM-Based Multi-turn Dialogue Systems. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2402.18013 (2024)."},{"key":"e_1_3_3_1_145_2","doi-asserted-by":"publisher","DOI":"10.1145\/3629606.3629618"},{"key":"e_1_3_3_1_146_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713829"},{"key":"e_1_3_3_1_147_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713390"},{"key":"e_1_3_3_1_148_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713661"},{"key":"e_1_3_3_1_149_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642385"},{"key":"e_1_3_3_1_150_2","doi-asserted-by":"crossref","unstructured":"Zheng Zhang Yihuai Lan Yangsen Chen Lei Wang Xiang Wang and Hao Wang. 2025. DVM: Towards Controllable LLM Agents in Social Deduction Games. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2501.06695 (2025).","DOI":"10.1109\/ICASSP49660.2025.10888525"},{"key":"e_1_3_3_1_151_2","doi-asserted-by":"publisher","DOI":"10.1145\/3698061.3726920"},{"key":"e_1_3_3_1_152_2","doi-asserted-by":"publisher","DOI":"10.1145\/3678698.3687201"},{"key":"e_1_3_3_1_153_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642850"},{"key":"e_1_3_3_1_154_2","doi-asserted-by":"publisher","unstructured":"Sijie Zhuo Robert Biddle Yun\u00a0Sing Koh Danielle Lottridge and Giovanni Russello. 2023. SoK: Human-centered Phishing Susceptibility. ACM Trans. Priv. Secur. 26 3 Article 24 (apr 2023) 27\u00a0pages. 10.1145\/3575797","DOI":"10.1145\/3575797"},{"key":"e_1_3_3_1_155_2","unstructured":"Philip\u00a0G Zimbardo. 2004. A situationist perspective on the psychology of evil: Understanding how good people are transformed into perpetrators. The social psychology of good and evil (2004) 21\u201350."},{"key":"e_1_3_3_1_156_2","doi-asserted-by":"crossref","unstructured":"Shoshana Zuboff. 2019. The age of surveillance capitalism: The fight for a human future at the new frontier of power edn. PublicAffairs New York (2019).","DOI":"10.1177\/0049085719872928"},{"key":"e_1_3_3_1_157_2","doi-asserted-by":"publisher","DOI":"10.1145\/3197091.3197123"}],"event":{"name":"DIS '25: Designing Interactive Systems Conference","location":"Madeira Portugal","acronym":"DIS '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 ACM Designing Interactive Systems Conference"],"original-title":[],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T11:23:36Z","timestamp":1751628216000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715336.3735812"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,4]]},"references-count":156,"alternative-id":["10.1145\/3715336.3735812","10.1145\/3715336"],"URL":"https:\/\/doi.org\/10.1145\/3715336.3735812","relation":{},"subject":[],"published":{"date-parts":[[2025,7,4]]},"assertion":[{"value":"2025-07-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}