{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T18:29:12Z","timestamp":1726079352956},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030457112"},{"type":"electronic","value":"9783030457129"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45712-9_17","type":"book-chapter","created":{"date-parts":[[2020,4,7]],"date-time":"2020-04-07T11:03:32Z","timestamp":1586257412000},"page":"223-233","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["PHISHER CRUSH: A Mobile Persuasive Game for Promoting Online Security"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-7050-0612","authenticated-orcid":false,"given":"Chinenye","family":"Ndulue","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5797-7790","authenticated-orcid":false,"given":"Oladapo","family":"Oyebode","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6152-8034","authenticated-orcid":false,"given":"Rita","family":"Orji","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,8]]},"reference":[{"unstructured":"Brinol, P., et al.: Ease and persuasion: multiple processes, meanings, and effects (2013)","key":"17_CR1"},{"key":"17_CR2","doi-asserted-by":"publisher","DOI":"10.3109\/14639239709089835","author":"SJ Brown","year":"1997","unstructured":"Brown, S.J., et al.: Educational video game for juvenile diabetes: results of a controlled trial. Med. Inform. (1997). \nhttps:\/\/doi.org\/10.3109\/14639239709089835","journal-title":"Med. Informatics."},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science (LNAI)","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-319-07127-5_3","volume-title":"Persuasive Technology","author":"Y-X Chen","year":"2014","unstructured":"Chen, Y.-X., et al.: Opportunities for persuasive technology to motivate heavy computer users for stretching exercise. In: Spagnolli, A., Chittaro, L., Gamberini, L. (eds.) PERSUASIVE 2014. LNCS (LNAI), vol. 8462, pp. 25\u201330. Springer, Cham (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-07127-5_3"},{"key":"17_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-642-31037-9_4","volume-title":"Persuasive Technology. Design for Health and Safety","author":"L Chittaro","year":"2012","unstructured":"Chittaro, L., Sioni, R.: Turning the classic snake mobile game into a location\u2013based exergame that encourages walking. In: Bang, M., Ragnemalm, E.L. (eds.) PERSUASIVE 2012. LNCS, vol. 7284, pp. 43\u201354. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-31037-9_4"},{"unstructured":"CISCO: Cyber Attack - What Are Common Cyberthreats? \u2013 Cisco. \nhttps:\/\/www.cisco.com\/c\/en\/us\/products\/security\/common-cyberattacks.html#~types-of-cyber-attacks\n\n. Accessed 31 Oct 2019","key":"17_CR5"},{"doi-asserted-by":"publisher","unstructured":"Desurvire, H., et al.: Using heuristics to evaluate the playability of games. In: Extended Abstracts of the 2004 Conference on Human Factors and Computing Systems - CHI 2004 (2004). \nhttps:\/\/doi.org\/10.1145\/985921.986102","key":"17_CR6","DOI":"10.1145\/985921.986102"},{"doi-asserted-by":"publisher","unstructured":"Dickinson, A., et al.: UKKO: enriching persuasive location based games with environmental sensor data. In: CHI PLAY 2015 Proceedings of the 2015 Annual Symposium on Computer-Human Interaction in Play (2015). \nhttps:\/\/doi.org\/10.1145\/2793107.2810324","key":"17_CR7","DOI":"10.1145\/2793107.2810324"},{"unstructured":"Dreamy Dingo: Matching games Memory games Pairs: Remembery. \nhttps:\/\/play.google.com\/store\/apps\/details?id=ua.krou.remembery&hl=en\n\n. Accessed 21 Oct 2019","key":"17_CR8"},{"doi-asserted-by":"publisher","unstructured":"Fogg, B.: Creating persuasive technologies: an eight-step design process. In: Proceedings of the 4th International Conference on Persuasive Technology \u2013 Persuasive 2009 (2009). \nhttps:\/\/doi.org\/10.1145\/1541948.1542005","key":"17_CR9","DOI":"10.1145\/1541948.1542005"},{"unstructured":"Webroot Inc.: Nearly 1.5 Million New Phishing Sites Created Each Month | Webroot. \nhttps:\/\/www.webroot.com\/us\/en\/about\/press-room\/releases\/nearly-15-million-new-phishing-sites\n\n. Accessed 01 Nov 2019","key":"17_CR10"},{"key":"17_CR11","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968","author":"TN Jagatic","year":"2007","unstructured":"Jagatic, T.N., et al.: Social phishing. Commun. ACM (2007). \nhttps:\/\/doi.org\/10.1145\/1290958.1290968","journal-title":"Commun. ACM"},{"unstructured":"Jakobsson, M.: The human factor in phishing. Priv. Secur. Consum. Inf. (2007). https:\/\/cofense.com\/wp-content\/uploads\/2017\/11\/Enterprise-Phishing-Resiliency-and-Defense-Report-2017.pdf","key":"17_CR12"},{"doi-asserted-by":"publisher","unstructured":"Kadomura, A., et al.: Sensing fork and persuasive game for improving eating behavior (2013). \nhttps:\/\/doi.org\/10.1145\/2494091.2494112","key":"17_CR13","DOI":"10.1145\/2494091.2494112"},{"doi-asserted-by":"publisher","unstructured":"Kumaraguru, P., et al.: School of phish: a real-world evaluation of anti-phishing training categories and subject descriptors. In: Proceedings of the 5th Symposium Usable Privacy Security - SOUPS 2009, p. 12 (2009). \nhttps:\/\/doi.org\/10.1145\/1572532.1572536","key":"17_CR14","DOI":"10.1145\/1572532.1572536"},{"unstructured":"Lin, T., et al.: A persuasive game to encourage healthy dietary behaviors of kindergarten children. In: Adjunct Proceedings of the 8th International Conference on Ubiquitous Computing (2006)","key":"17_CR15"},{"unstructured":"Magma Mobile: MatchUp: Exercise your Memory. \nhttps:\/\/play.google.com\/store\/apps\/details?id=com.magmamobile.game.MatchUp&hl=en\n\n. Accessed 12 Oct 2019","key":"17_CR16"},{"unstructured":"Misra, G., et al.: Phish phinder: a game design approach to enhance user confidence in mitigating phishing attacks (2017)","key":"17_CR17"},{"doi-asserted-by":"crossref","unstructured":"Ndulue, C., Orji, R.: STD PONG: an African-centric persuasive game for risky sexual. In: Adjunct Proceedings of the Persuasive Technology Conference (2018)","key":"17_CR18","DOI":"10.1145\/3283458.3283463"},{"doi-asserted-by":"publisher","unstructured":"Nielsen, J., Molich, R.: Heuristic evaluation of user interfaces. In: CHI 1990 Proceedings of the SIGCHI Conference on Human Factors in Computing System (1990). \nhttps:\/\/doi.org\/10.1145\/97243.97281","key":"17_CR19","DOI":"10.1145\/97243.97281"},{"issue":"1","key":"17_CR20","first-page":"485","volume":"24","author":"H Oinas-Kukkonen","year":"2009","unstructured":"Oinas-Kukkonen, H., Harjumaa, M.: Persuasive systems design: key issues, process model, and system features. Commun. Assoc. Inf. Syst. 24(1), 485\u2013500 (2009)","journal-title":"Commun. Assoc. Inf. Syst."},{"issue":"6","key":"17_CR21","doi-asserted-by":"publisher","first-page":"1211","DOI":"10.1007\/s00779-012-0590-6","volume":"17","author":"R Orji","year":"2013","unstructured":"Orji, R., et al.: LunchTime: a slow-casual game for long-term dietary behavior change. Pers. Ubiquit. Comput. 17(6), 1211\u20131221 (2013). \nhttps:\/\/doi.org\/10.1007\/s00779-012-0590-6","journal-title":"Pers. Ubiquit. Comput."},{"unstructured":"PhishFindR: Phishing Database. \nhttps:\/\/github.com\/mitchellkrogza\/Phishing.Database\n\n. Accessed 30 Sept 2019","key":"17_CR22"},{"unstructured":"PhishMe Inc.: Analysis of Susceptibility, Resiliency and Defense Against Simulated and Real Phishing Attacks (2017)","key":"17_CR23"},{"unstructured":"Samudrala, R.: List of spammers\u2019 e-mail addresses. \nhttp:\/\/www.ram.org\/ramblings\/philosophy\/spam\/spammers.html\n\n. Accessed 30 Sept 2019","key":"17_CR24"},{"doi-asserted-by":"publisher","unstructured":"Sheng, S., et al.: Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In: ACM International Conference Proceeding Series (2007). \nhttps:\/\/doi.org\/10.1145\/1280680.1280692","key":"17_CR25","DOI":"10.1145\/1280680.1280692"},{"unstructured":"Symantec: ISTR Internet Security Threat Report Volume 23 (2018)","key":"17_CR26"},{"unstructured":"Yoon, S., Godwin, A.: Enhancing self-management in children with sickle cell disease through playing a CD-ROM educational game: a pilot study. J. Pediatr. Nurs. 33, 60\u201363, 72 (2007)","key":"17_CR27"},{"doi-asserted-by":"publisher","unstructured":"Yu, W.D., et al.: A phishing vulnerability analysis of web based systems. In: Proceedings - IEEE Symposium on Computers and Communications, pp. 326\u2013331 (2008). \nhttps:\/\/doi.org\/10.1109\/ISCC.2008.4625681","key":"17_CR28","DOI":"10.1109\/ISCC.2008.4625681"}],"container-title":["Lecture Notes in Computer Science","Persuasive Technology. Designing for Future Change"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45712-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,7]],"date-time":"2020-04-07T11:06:08Z","timestamp":1586257568000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-45712-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030457112","9783030457129"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45712-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"8 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PERSUASIVE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Persuasive Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Aalborg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"persuasive2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/persuasive2020.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}