{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:43:57Z","timestamp":1730292237842,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/re.2017.67","type":"proceedings-article","created":{"date-parts":[[2017,9,25]],"date-time":"2017-09-25T20:22:47Z","timestamp":1506370967000},"page":"418-423","source":"Crossref","is-referenced-by-count":10,"title":["A Gamified Tutorial for Learning About Security Requirements Engineering"],"prefix":"10.1109","author":[{"given":"Daniel","family":"Alami","sequence":"first","affiliation":[]},{"given":"Fabiano","family":"Dalpiaz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"For the win How game thinking can revolutionize your business Philadelphia Wharton","year":"2012","author":"werbach","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345830"},{"journal-title":"The Gamification of Learning and Instruction Game-based Methods and Strategies for Training and Education","year":"2012","author":"kapp","key":"ref31"},{"key":"ref30","first-page":"323","article-title":"Raising Engagement in e-Learning through Gamification","author":"muntean","year":"2011","journal-title":"International Conference on Virtual Learning (ICVL)"},{"key":"ref37","article-title":"iStar 2.0 Language Guide","author":"dalpiaz","year":"2016","journal-title":"CoRR abs\/1605 07767"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.55.1.68"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1123\/jsep.30.5.561"},{"journal-title":"Teaching for Quality Learning at University","year":"2011","author":"biggs","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2014.06.014"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2004.12.004"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1319030111"},{"key":"ref14","first-page":"305","article-title":"Eudaimonic Design, or: Six Invitations to Rethink Gam-ification","author":"deterding","year":"2014","journal-title":"Rethinking gamification"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2015.07.007"},{"key":"ref16","first-page":"11","article-title":"ImProject: Improving RE Training by Combining it with Improvisation Theatre Sessions","author":"hoffmann","year":"2014","journal-title":"Proceedings of the International Workshop on Requirements Engineering Education and Training (REET)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2003.1232754"},{"key":"ref18","first-page":"1","article-title":"Experiences of Using Role Playing and Wiki in Requirements Engineering Course Projects","author":"liang","year":"2010","journal-title":"Proceedings of the International Workshop on Requirements Engineering Education and Training (REET)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134391"},{"key":"ref28","article-title":"Gradequest-Evaluating the Impact of Using Game Design Techniques in an Undergraduate Course","author":"de schutter","year":"2014","journal-title":"International Conference on the Foundations of Digital Games (FDG"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.21236\/ADA443493"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2513456.2513469"},{"journal-title":"Computer Security","year":"2008","author":"stallings","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-009-0094-8"},{"key":"ref29","first-page":"75","article-title":"Gamification in Education: A Systematic Mapping Study","volume":"18","author":"dicheva","year":"2015","journal-title":"Educational Technology and Society"},{"journal-title":"Software Security Building Security In","year":"2006","author":"mcgraw","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.05.011"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9236(94)00043-6"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/336512.336559"},{"journal-title":"Security Requirements Engineering Designing Secure Socio-Technical Systems","year":"2016","author":"dalpiaz","key":"ref9"},{"journal-title":"Requirements Engineering Fundamentals Principles and Techniques","year":"2010","author":"pohl","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/REET.2011.6046272"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/BF02297358"},{"key":"ref21","first-page":"20","article-title":"Teaching Requirements Analysis: A Student Project Framework to Bridge the Gap between Business Analysis and Software Engineering","author":"mich","year":"2014","journal-title":"Proceedings of the International Workshop on Requirements Engineering Education and Training (REET)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2005.57"},{"key":"ref23","first-page":"243","article-title":"Principles and Heuristics for Designing Minimalist Instruction","volume":"42","author":"van der meij","year":"1995","journal-title":"Technical Communication"},{"journal-title":"Actionable gamification Beyond points badges and leaderboards","year":"2016","author":"chou","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753552"}],"event":{"name":"2017 IEEE 25th International Requirements Engineering Conference (RE)","start":{"date-parts":[[2017,9,4]]},"location":"Lisbon, Portugal","end":{"date-parts":[[2017,9,8]]}},"container-title":["2017 IEEE 25th International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8048783\/8048874\/08049150.pdf?arnumber=8049150","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T19:43:21Z","timestamp":1513194201000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8049150\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/re.2017.67","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}