{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:41:24Z","timestamp":1726036884251},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030223502"},{"type":"electronic","value":"9783030223519"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22351-9_7","type":"book-chapter","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T23:33:30Z","timestamp":1562715210000},"page":"99-114","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["From Cyber-Security Deception to Manipulation and Gratification Through Gamification"],"prefix":"10.1007","author":[{"given":"Xavier","family":"Bellekens","sequence":"first","affiliation":[]},{"given":"Gayan","family":"Jayasekara","sequence":"additional","affiliation":[]},{"given":"Hanan","family":"Hindy","sequence":"additional","affiliation":[]},{"given":"Miroslav","family":"Bures","sequence":"additional","affiliation":[]},{"given":"David","family":"Brosset","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Tachtatzis","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Atkinson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,12]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Almeshekah, M.H., Spafford, E.H.: Planning and integrating deception into computer security defenses. In: Proceedings of the 2014 New Security Paradigms Workshop, pp. 127\u2013138. ACM (2014)","DOI":"10.1145\/2683467.2683482"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-319-32699-3_2","volume-title":"Cyber Deception","author":"MH Almeshekah","year":"2016","unstructured":"Almeshekah, M.H., Spafford, E.H.: Cyber security deception. In: Jajodia, S., Subrahmanian, V.S.S., Swarup, V., Wang, C. (eds.) Cyber Deception, pp. 25\u201352. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-32699-3_2"},{"issue":"1","key":"7_CR3","doi-asserted-by":"publisher","first-page":"31","DOI":"10.3366\/olr.1979.005","volume":"4","author":"R Barthes","year":"1979","unstructured":"Barthes, R.: Lecture in inauguration of the chair of literary semiology, coll\u00e8ge de france, January 7, 1977. Oxford Literary Rev. 4(1), 31\u201344 (1979)","journal-title":"Oxford Literary Rev."},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Bellekens, X.J., Tachtatzis, C., Atkinson, R.C., Renfrew, C., Kirkham, T.: GLoP: enabling massively parallel incident response through GPU log processing. In: Proceedings of the 7th International Conference on Security of Information and Networks, p. 295. ACM (2014)","DOI":"10.1145\/2659651.2659700"},{"issue":"4","key":"7_CR5","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s12599-013-0273-5","volume":"5","author":"I Blohm","year":"2013","unstructured":"Blohm, I., Leimeister, J.M.: Gamification. Bus. Inf. Sys. Eng. 5(4), 275\u2013278 (2013)","journal-title":"Bus. Inf. Sys. Eng."},{"issue":"2","key":"7_CR6","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1111\/j.1467-6494.1992.tb00981.x","volume":"60","author":"DM Buss","year":"1992","unstructured":"Buss, D.M.: Manipulation in close relationships: five personality factors in interactional context. J. Pers. 60(2), 477\u2013499 (1992)","journal-title":"J. Pers."},{"key":"7_CR7","unstructured":"Desolda, G., Ardito, C., Matera, M., Piccinno, A.: Mashing-up smart things: a meta-design approach. In: Proceedings of Workshop on End User Development in the Internet of Things Era, CHI 2015 EA, pp. 33\u201336 (2015)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Deterding, S., Dixon, D., Khaled, R., Nacke, L.: From game design elements to gamefulness: defining gamification. In: Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, pp. 9\u201315. ACM (2011)","DOI":"10.1145\/2181037.2181040"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-75493-2_1","volume-title":"Designing Usable and Secure Software with IRIS and CAIRIS","author":"S Faily","year":"2018","unstructured":"Faily, S.: Why designing for usability and security is hard. In: Faily, S. (ed.) Designing Usable and Secure Software with IRIS and CAIRIS, pp. 3\u20138. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75493-2_1"},{"issue":"4","key":"7_CR10","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/3214305","volume":"51","author":"X Han","year":"2018","unstructured":"Han, X., Kheir, N., Balzarotti, D.: Deception techniques in computer security: a research perspective. ACM Comput. Surv. (CSUR) 51(4), 80 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.cose.2013.03.015","volume":"37","author":"KE Heckman","year":"2013","unstructured":"Heckman, K.E., Walsh, M.J., Stech, F.J., O\u2019boyle, T.A., DiCato, S.R., Herber, A.F.: Active cyber defense with denial and deception: a cyber-wargame experiment. Comput. Secur. 37, 72\u201377 (2013)","journal-title":"Comput. Secur."},{"issue":"9","key":"7_CR12","doi-asserted-by":"publisher","first-page":"231","DOI":"10.3390\/info9090231","volume":"9","author":"G Hill","year":"2018","unstructured":"Hill, G., Bellekens, X.: Cryptoknight: generating and modelling compiled cryptographic primitives. Information 9(9), 231 (2018)","journal-title":"Information"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"McQueen, M.A., Boyer, W.F.: Deception used for cyber defense of control systems. In: 2nd Conference on Human System Interactions, HSI 2009, pp. 624\u2013631. IEEE (2009)","DOI":"10.1109\/HSI.2009.5091050"},{"key":"7_CR14","doi-asserted-by":"publisher","unstructured":"Merien, T., Brosset, D., Bellekens, X., Claramunt, C.: A human-centred model for network flow analysis. In: 2018 2nd Cyber Security in Networking Conference (CSNet), pp. 1\u20136, October 2018. https:\/\/doi.org\/10.1109\/CSNET.2018.8602913","DOI":"10.1109\/CSNET.2018.8602913"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"M\u00e9rien, T., Bellekens, X., Brosset, D., Claramunt, C.: A spatio-temporal entropy-based approach for the analysis of cyber attacks (demo paper). In: Proceedings of the 26th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 564\u2013567. ACM (2018)","DOI":"10.1145\/3274895.3274921"},{"key":"7_CR16","unstructured":"Nawrocki, M., W\u00e4hlisch, M., Schmidt, T.C., Keil, C., Sch\u00f6nfelder, J.: A survey on honeypot software and data analysis. arXiv preprint arXiv:1608.06249 (2016)"},{"key":"7_CR17","unstructured":"Stech, F., Heckman, K.E., Hilliard, P., Ballo, J.R.: Scientometrics of deception, counter-deception, and deception detection in cyber-space. PsychNology J. 9(2) (2011)"},{"key":"7_CR18","unstructured":"Yuill, J.J., et al.: Defensive computer-security deception operations: processes, principles and techniques (2007)"},{"key":"7_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/978-3-319-91716-0_34","volume-title":"HCI in Business, Government, and Organizations","author":"X Zhan","year":"2018","unstructured":"Zhan, X., Nah, F.F.-H., Cheng, M.X.: An assessment of users\u2019 cyber security risk tolerance in reward-based exchange. In: Nah, F.F.-H., Xiao, B.S. (eds.) HCIBGO 2018. LNCS, vol. 10923, pp. 431\u2013441. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91716-0_34"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22351-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T00:24:09Z","timestamp":1689726249000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22351-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030223502","9783030223519"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22351-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"12 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}