{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:35:53Z","timestamp":1729665353574,"version":"3.28.0"},"reference-count":42,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/mere.2008.5","type":"proceedings-article","created":{"date-parts":[[2009,3,9]],"date-time":"2009-03-09T19:05:33Z","timestamp":1236625533000},"page":"12-21","source":"Crossref","is-referenced-by-count":1,"title":["Requirements in Conflict: Player vs. Designer vs. Cheater"],"prefix":"10.1109","author":[{"given":"David","family":"Callele","sequence":"first","affiliation":[]},{"given":"Eric","family":"Neufeld","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Schneider","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"19"},{"journal-title":"Derek Sanderson","year":"0","key":"35"},{"key":"17","article-title":"exploiting online games: cheating massively distributed systems","author":"hoglund","year":"2007","journal-title":"Addison- Wesley Software Security Series"},{"key":"36","first-page":"120","article-title":"eliciting security requirements by misuse cases","volume":"37","author":"sindre","year":"2000","journal-title":"Tools"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.17"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2004.09.014"},{"year":"0","key":"15"},{"journal-title":"Playing a good","year":"2002","author":"reynolds","key":"34"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1178477.1178522"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1108\/02640470210424455"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2003.2.1.c6"},{"year":"0","key":"14"},{"year":"0","key":"37"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.1109\/ICRE.2002.1048527","article-title":"security requirements engineering: when antirequirements hit the fan","author":"crook","year":"2002","journal-title":"Proceedings of IEEE International Requirements Engineering Conference (RE 2002)"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254333"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1177\/1063293X9400200307"},{"journal-title":"Andy Kuo A (very) brief history of cheating","year":"2001","key":"21"},{"year":"0","key":"20"},{"journal-title":"Motivations of Play in MMORPGs Results from a Factor Analytic Approach","year":"0","key":"42"},{"key":"41","article-title":"unmasking the avatar: the demographics of mmo player motivations, in-game preferences, and attrition","author":"yee","year":"2004","journal-title":"Gamasutra"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1145\/1103599.1103606"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/EURCON.2005.1630206"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816013"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1083200.1083214"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/ISRE.1999.777990"},{"year":"0","key":"26"},{"year":"0","key":"27"},{"year":"0","key":"28"},{"key":"29","first-page":"133","article-title":"what's good about bad play?","author":"myers","year":"2005","journal-title":"IE2005 Proceedings of the second Australasian conference on Interactive entertainment"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.53"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1159030"},{"key":"10","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1802.001.0001","author":"consalvo","year":"2007","journal-title":"Cheating Gaining Advantage in Videogames"},{"journal-title":"The No Twinkie Database","year":"0","author":"adams","key":"1"},{"journal-title":"Build security in Setting a higher standard for software assurance Accessed","year":"2008","key":"30"},{"journal-title":"Gaming Hacks","year":"2004","author":"carless","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.5"},{"key":"32","article-title":"how to hurt the hackers: the scoop on internet cheating and how you can combat it","author":"pritchard","year":"2000","journal-title":"Gamasutra"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.19"},{"key":"31","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1145\/225434.225462","article-title":"using schematic scenarios to understand user needs","author":"potts","year":"1995","journal-title":"DIS '95 Proceedings of the 1st conference on Designing interactive systems"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.58"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1108\/10748120510608124"},{"year":"0","key":"8"}],"event":{"name":"2008 Third International Workshop on Multimedia and Enjoyable Requirements Engineering - Beyond Mere Descriptions and with More Fun and Games","start":{"date-parts":[[2008,9,9]]},"location":"Barcelona, Spain","end":{"date-parts":[[2008,9,9]]}},"container-title":["2008 Third International Workshop on Multimedia and Enjoyable Requirements Engineering - Beyond Mere Descriptions and with More Fun and Games"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4797442\/4797443\/04797447.pdf?arnumber=4797447","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T13:46:35Z","timestamp":1589636795000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4797447\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/mere.2008.5","relation":{},"subject":[],"published":{"date-parts":[[2008,9]]}}}