{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:03:26Z","timestamp":1730325806953,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":114,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2018-05265"],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3581038","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:27:55Z","timestamp":1681964875000},"page":"1-18","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Tailoring a Persuasive Game to Promote Secure Smartphone Behaviour"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8182-1075","authenticated-orcid":false,"given":"Anirudh","family":"Ganesh","sequence":"first","affiliation":[{"name":"Faculty of Computer Science, Dalhousie University, Canada"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7050-0612","authenticated-orcid":false,"given":"Chinenye","family":"Ndulue","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science, Dalhousie University, Canada"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6152-8034","authenticated-orcid":false,"given":"Rita","family":"Orji","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science, Dalhousie University, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CITA.2013.6637558"},{"key":"e_1_3_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCCAIS.2014.6916629"},{"key":"e_1_3_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.79.1.5"},{"key":"e_1_3_3_2_4_1","doi-asserted-by":"publisher","unstructured":"Felwah Alqahtani Sandra Meier and Rita Orji. 2021. Personality-based approach for tailoring persuasive mental health applications. User Modeling and User-Adapted Interaction: 1\u201343. https:\/\/doi.org\/10.1007\/s11257-021-09289-5","DOI":"10.1007\/s11257-021-09289-5"},{"key":"e_1_3_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.040"},{"key":"e_1_3_3_2_6_1","volume-title":"International Conference on Cyber Security for Sustainable Society, 2015","author":"Bada Maria","year":"2021","unstructured":"Maria Bada, Angela M. Sasse, and Jason R.C. Nurse. 2015. Cyber Security Awareness Campaigns: Why do they fail to change behaviour? In International Conference on Cyber Security for Sustainable Society, 2015. Retrieved March 6, 2021 from http:\/\/arxiv.org\/abs\/1901.02672"},{"key":"e_1_3_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312914"},{"key":"e_1_3_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3340764.3340775"},{"key":"e_1_3_3_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.11.003"},{"key":"e_1_3_3_2_10_1","doi-asserted-by":"publisher","unstructured":"Max V Birk Cheralyn Atkins Jason T Bowey and Regan L Mandryk. 2016. Fostering Intrinsic Motivation through Avatar Identification in Digital Games. https:\/\/doi.org\/10.1145\/2858036.2858062","DOI":"10.1145\/2858036.2858062"},{"key":"e_1_3_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376385"},{"key":"e_1_3_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.015"},{"key":"e_1_3_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376801"},{"key":"e_1_3_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188496"},{"key":"e_1_3_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053004"},{"key":"e_1_3_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706QP063OA"},{"key":"e_1_3_3_2_17_1","doi-asserted-by":"publisher","unstructured":"Frank Breitinger Ryan Tully-Doyle and Courtney Hassenfeldt. 2020. A survey on smartphone user's security choices awareness and education. Computers and Security 88. https:\/\/doi.org\/10.1016\/j.cose.2019.101647","DOI":"10.1016\/j.cose.2019.101647"},{"key":"e_1_3_3_2_18_1","volume-title":"ACIS 2015 Proceedings - 26th Australasian Conference on Information Systems, 1\u201310","author":"Butavicius Marcus","year":"2015","unstructured":"Marcus Butavicius, Kathryn Parsons, Malcolm Pattinson, and Agata McCormac. 2015. Breaching the human firewall: Social engineering in phishing and spear-phishing emails. In ACIS 2015 Proceedings - 26th Australasian Conference on Information Systems, 1\u201310."},{"key":"e_1_3_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05198-3_7"},{"key":"e_1_3_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.86.3.388"},{"key":"e_1_3_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.2008.02102.x"},{"key":"e_1_3_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1751-9004.2007.00055.x"},{"key":"e_1_3_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540121.2016.1164289"},{"key":"e_1_3_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125795"},{"key":"e_1_3_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11423-019-09670-7"},{"key":"e_1_3_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312935"},{"key":"e_1_3_3_2_27_1","first-page":"186","article-title":"Using Narrative-based Contextual Games to Enhance Language Learning: A Case Study","volume":"21","author":"Chen Zhi-Hong","year":"2018","unstructured":"Zhi-Hong Chen, Howard Hao, Jan Chen, and Wan-Jhen Dai. 2018. Using Narrative-based Contextual Games to Enhance Language Learning: A Case Study. Source: Journal of Educational Technology & Society 21, 3: 186\u2013198.","journal-title":"Source: Journal of Educational Technology & Society"},{"key":"e_1_3_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.03.074"},{"key":"e_1_3_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2021.0043"},{"key":"e_1_3_3_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445486"},{"key":"e_1_3_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2071423.2071443"},{"key":"e_1_3_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451781"},{"key":"e_1_3_3_2_33_1","volume-title":"CEUR Workshop Proceedings, 73\u201387","author":"Ganesh Anirudh","year":"2021","unstructured":"Anirudh Ganesh, Chinenye Ndulue, and Rita Orji. 2021. The design and development of mobile game to promote secure smartphone behaviour. In CEUR Workshop Proceedings, 73\u201387."},{"key":"e_1_3_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98438-0_7"},{"key":"e_1_3_3_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3270316.3273042"},{"key":"e_1_3_3_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.69"},{"key":"e_1_3_3_2_37_1","doi-asserted-by":"publisher","unstructured":"Jihae Han. ChemCraf: A Ludic Approach to Educational Game Design Figure 1: Title screen of ChemCraf an adventure game for higher-level chemistry KEYWORDS Game Design Educational Games User Experience Human-Computer Interaction. https:\/\/doi.org\/10.1145\/3411763.3451854","DOI":"10.1145\/3411763.3451854"},{"key":"e_1_3_3_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753464"},{"key":"e_1_3_3_2_39_1","volume-title":"Regulatory Focus and Serious Games: A Quasi-Experimental Study. Retrieved","author":"Heeter Carrie","year":"2022","unstructured":"Carrie Heeter, Yu-Hao Lee, Brian Magerko, Carrie Cole, and Ben Medler. 2012. Regulatory Focus and Serious Games: A Quasi-Experimental Study. Retrieved March 3, 2022 from http:\/\/gel.msu.edu\/playertypes"},{"key":"e_1_3_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2601(08)60381-0"},{"key":"e_1_3_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2601(08)60381-0"},{"key":"e_1_3_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.27"},{"key":"e_1_3_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.1002\/arcp.1052"},{"key":"e_1_3_3_2_44_1","first-page":"194","article-title":"May I continue or should I stop? The effects of regulatory focus and message framings on video game players\u2019 self control","volume":"2","author":"Ho Shu-Hsun","year":"2011","unstructured":"Shu-Hsun Ho, Chutinon Putthiwanit, and Chia-Ying Lin. 2011. May I continue or should I stop? The effects of regulatory focus and message framings on video game players\u2019 self control. International Journal of Business and Social Science 2, 12: 194\u2013200. Retrieved March 3, 2022 from www.ijbssnet.com","journal-title":"International Journal of Business and Social Science"},{"key":"e_1_3_3_2_45_1","volume-title":"Soteris Demetriou, Carl A Gunter, Rini Banerjee, and Masooda Bashir.","author":"Huang Hsiao Ying","year":"2020","unstructured":"Hsiao Ying Huang, G\u00fcliz Seray Tuncay, Soteris Demetriou, Carl A Gunter, Rini Banerjee, and Masooda Bashir. 2020. Smartphone Security Behavioral Scale: A New Psychometric Measurement for Smartphone Security. arXiv."},{"key":"e_1_3_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445269"},{"key":"e_1_3_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2209310.2209313"},{"key":"e_1_3_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2485760.2485871"},{"key":"e_1_3_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIG.2019.8847953"},{"key":"e_1_3_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1089\/CYBER.2020.0599"},{"key":"e_1_3_3_2_51_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019"},{"key":"e_1_3_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.86.2.205"},{"key":"e_1_3_3_2_53_1","doi-asserted-by":"publisher","DOI":"10.1177\/1555412013498818"},{"key":"e_1_3_3_2_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4696-5_15"},{"key":"e_1_3_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-1031(83)90023-9"},{"key":"e_1_3_3_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3400806.3400810"},{"key":"e_1_3_3_2_57_1","volume-title":"Retrieved","author":"Misra Gaurav","year":"2017","unstructured":"Gaurav Misra, Nalin Asanka Gamagedara Arachchilage, and Shlomo Berkovsky. 2017. Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks. Retrieved December 12, 2021 from http:\/\/arxiv.org\/abs\/1710.06064"},{"key":"e_1_3_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2015.123"},{"key":"e_1_3_3_2_59_1","volume-title":"Design and Evaluation of COVID Pacman\u2013A Persuasive Game to Promote the Awareness and Adoption of COVID-19 Precautionary Measures Tailored to the Stages of Change","author":"Mulchandani Dinesh","year":"2022","unstructured":"Dinesh Mulchandani. 2021. Design and Evaluation of COVID Pacman\u2013A Persuasive Game to Promote the Awareness and Adoption of COVID-19 Precautionary Measures Tailored to the Stages of Change. Dalhousie University. Retrieved March 4, 2022 from https:\/\/dalspace.library.dal.ca\/handle\/10222\/80525"},{"key":"e_1_3_3_2_60_1","doi-asserted-by":"publisher","unstructured":"Dinesh Mulchandani Alaa Alslaity and Rita Orji. 2022. Exploring the effectiveness of persuasive games for disease prevention and awareness and the impact of tailoring to the stages of change. Human\u2013Computer Interaction 37 4: 1\u201335. https:\/\/doi.org\/10.1080\/07370024.2022.2057858","DOI":"10.1080\/07370024.2022.2057858"},{"key":"e_1_3_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3450614.3461678"},{"key":"e_1_3_3_2_62_1","unstructured":"Florence Mwaka Mwagwabi. 2015. A Protection Motivation Theory Approach to Improving Compliance with Password Guidelines."},{"key":"e_1_3_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcom.2013.06.002"},{"key":"e_1_3_3_2_64_1","doi-asserted-by":"publisher","DOI":"10.1177\/0735633119859904"},{"key":"e_1_3_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3283458.3283463"},{"key":"e_1_3_3_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448696.3448706"},{"key":"e_1_3_3_2_67_1","doi-asserted-by":"publisher","unstructured":"Chinenye Ndulue Oladapo Oyebode and Rita Orji. 2020. PHISHER CRUSH: A Mobile Persuasive Game for Promoting Online Security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 223\u2013233. https:\/\/doi.org\/10.1007\/978-3-030-45712-9","DOI":"10.1007\/978-3-030-45712-9"},{"key":"e_1_3_3_2_68_1","doi-asserted-by":"publisher","unstructured":"Chinenye Ndulue Oladapo Oyebode and Rita Orji. 2020. PHISHER CRUSH: A Mobile Persuasive Game for Promoting Online Security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 223\u2013233. https:\/\/doi.org\/10.1007\/978-3-030-45712-9_17","DOI":"10.1007\/978-3-030-45712-9_17"},{"key":"e_1_3_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.1186\/1743-0003-11-64"},{"key":"e_1_3_3_2_70_1","doi-asserted-by":"publisher","DOI":"10.1108\/ILS-04-2018-0029"},{"key":"e_1_3_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.17705\/1cais.02428"},{"key":"e_1_3_3_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3119929"},{"key":"e_1_3_3_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481341"},{"key":"e_1_3_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0590-6"},{"key":"e_1_3_3_2_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.enbuild.2014.01.036"},{"key":"e_1_3_3_2_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/CoG52621.2021.9619035"},{"key":"e_1_3_3_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445619"},{"key":"e_1_3_3_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445619"},{"key":"e_1_3_3_2_79_1","doi-asserted-by":"publisher","unstructured":"Y. S. Poong S. Yamaguchi and J. Takada. 2015. Impact of learning content on World Heritage Site preservation awareness in town of Luang Prabang Lao PDR: Application of protection motivation theory. In ISPRS Annals of the Photogrammetry Remote Sensing and Spatial Information Sciences 251\u2013256. https:\/\/doi.org\/10.5194\/isprsannals-II-5-W3-251-2015","DOI":"10.5194\/isprsannals-II-5-W3-251-2015"},{"key":"e_1_3_3_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2581259"},{"key":"e_1_3_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05198-3"},{"key":"e_1_3_3_2_82_1","unstructured":"Raghu Raman Athira Lal and Krishnashree Achuthan. Serious Games based approach to cyber security concept learning: Indian context. 3\u20137."},{"key":"e_1_3_3_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445658"},{"key":"e_1_3_3_2_84_1","volume-title":"Proceedings of the 28th USENIX Security Symposium, 603\u2013620","author":"Reardon Joel","year":"2019","unstructured":"Joel Reardon, \u00c1lvaro Feal, Amit Elazari, Bar On, Narseo Vallina-Rodriguez, and Serge Egelman. 2019. 50 Ways to Leak Your Data: An Exploration of Apps\u2019 Circumvention of the Android Permissions System. In Proceedings of the 28th USENIX Security Symposium, 603\u2013620. Retrieved January 19, 2021 from https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/reardon"},{"key":"e_1_3_3_2_85_1","doi-asserted-by":"publisher","unstructured":"J. Lynn Reynolds. 2006. Measuring intrinsic motivations. Handbook of Research on Electronic Surveys and Measurements Imi: 170\u2013173. https:\/\/doi.org\/10.4018\/978-1-59140-792-8.ch018","DOI":"10.4018\/978-1-59140-792-8.ch018"},{"key":"e_1_3_3_2_86_1","first-page":"153","article-title":"Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation","volume":"2014","author":"R Rogers","year":"1983","unstructured":"R Rogers W. 1983. Cognitive and physiological processes in fear appeals and attitude change: a revised theory of protection motivation. Social Psychophysiology: A Sourcebook, October 2014: 153\u2013177.","journal-title":"Social Psychophysiology: A Sourcebook"},{"key":"e_1_3_3_2_87_1","series-title":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2019) 11594 LNCS 191-203.","volume-title":"Gamification Techniques for Raising Cyber Security Awareness","author":"Scholefield Sam","unstructured":"Sam Scholefield and Lynsay A Shepherd. 2019. Gamification Techniques for Raising Cyber Security Awareness. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2019) 11594 LNCS 191-203."},{"key":"e_1_3_3_2_88_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2019-0041"},{"key":"e_1_3_3_2_89_1","volume-title":"4th Workshop on Cyber Security Experimentation and Test, CSET","author":"Thomps Michael","year":"2011","unstructured":"Michael Thomps and Cynthia Irvine. 2011. Active learning with the CyberCIEGE video game. In 4th Workshop on Cyber Security Experimentation and Test, CSET 2011, 1\u20138."},{"key":"e_1_3_3_2_90_1","volume-title":"Proceedings of 1st International Joint Conference of DiGRA and FDG: 1\u201316","author":"To Alexandra","year":"2016","unstructured":"Alexandra To, Safinah Ali, Geoff Kaufman, and Jessica Hammer. 2016. Integrating Curiosity and Uncertainty in Game Design. Proceedings of 1st International Joint Conference of DiGRA and FDG: 1\u201316."},{"volume-title":"Unity Real-Time Development Platform | 3D, 2D VR & AR Engine. Retrieved","year":"2020","key":"e_1_3_3_2_91_1","unstructured":"Unity. Unity Real-Time Development Platform | 3D, 2D VR & AR Engine. Retrieved December 4, 2020 from https:\/\/unity.com\/"},{"key":"e_1_3_3_2_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.03.008"},{"key":"e_1_3_3_2_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3125659.3125669"},{"key":"e_1_3_3_2_94_1","volume-title":"BEHAVE 2016 - 4th European Conference on Behaviour and Energy Efficiency, September: 8\u20139.","author":"Wemyss Devon","year":"2016","unstructured":"Devon Wemyss, Roberta Castri, Vanessa De Luca, Francesca Cellina, Evelyn Lobsiger-k\u00e4gi, Pamela Galbani Bianchi, and Christian Hertach. 2016. Keeping up with the Joneses: examining community-level collaborative and competitive game mecha .... BEHAVE 2016 - 4th European Conference on Behaviour and Energy Efficiency, September: 8\u20139. Retrieved from http:\/\/www.zhaw.chhttp\/\/www.supsi.ch"},{"key":"e_1_3_3_2_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300338"},{"key":"e_1_3_3_2_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.51"},{"key":"e_1_3_3_2_97_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.07.012"},{"key":"e_1_3_3_2_98_1","doi-asserted-by":"publisher","DOI":"10.1037\/ppm0000208"},{"key":"e_1_3_3_2_99_1","first-page":"112","article-title":"Development Of Serious Games For Teaching Digital Forensics","volume":"13","author":"Yerby Johnathan","year":"2014","unstructured":"Johnathan Yerby. 2014. Development Of Serious Games For Teaching Digital Forensics. Issues in Information Systems 13, 2: 112\u2013122.","journal-title":"Issues in Information Systems"},{"key":"e_1_3_3_2_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341215.3356273"},{"key":"e_1_3_3_2_101_1","doi-asserted-by":"publisher","DOI":"10.1108\/EL-09-2016-0183"},{"key":"e_1_3_3_2_102_1","volume-title":"Retrieved","author":"Android","year":"2021","unstructured":"Android | The platform pushing what's possible. Retrieved May 19, 2021 from https:\/\/www.android.com\/intl\/en_ca\/"},{"key":"e_1_3_3_2_103_1","volume-title":"Retrieved","author":"Developers Android","year":"2020","unstructured":"Manifest.permission_group \u00a0|\u00a0 Android Developers. Retrieved December 3, 2020 from https:\/\/developer.android.com\/reference\/android\/Manifest.permission_group"},{"key":"e_1_3_3_2_104_1","unstructured":"Request app permissions \u00a0|\u00a0 Android Developers. Retrieved January 2 2021 from https:\/\/developer.android.com\/training\/permissions\/requesting"},{"key":"e_1_3_3_2_105_1","unstructured":"Android 12 Privacy & Security. Retrieved November 5 2021 from https:\/\/www.android.com\/android-12\/#a12-safe"},{"key":"e_1_3_3_2_106_1","unstructured":"Regulatory focus theory \/ Dr Simon Moss \/ -. Retrieved November 27 2022 from https:\/\/www.sicotests.com\/newpsyarticle\/Regulatory-focus-theory"},{"key":"e_1_3_3_2_107_1","unstructured":"Luang Prabang - Wikipedia. Retrieved February 7 2022 from https:\/\/en.wikipedia.org\/wiki\/Luang_Prabang"},{"key":"e_1_3_3_2_108_1","volume-title":"retro game","author":"What","year":"2022","unstructured":"What even is a \u201cretro game\u201d anymore? Retrieved July 1, 2022 from https:\/\/www.inputmag.com\/gaming\/what-even-is-a-retro-game-anymore"},{"key":"e_1_3_3_2_109_1","volume-title":"Retrieved","author":"The","year":"2021","unstructured":"The official home of Super MarioTM \u2013 Home. Retrieved January 11, 2021 from https:\/\/mario.nintendo.com\/"},{"key":"e_1_3_3_2_110_1","unstructured":"Mega Man - Wikipedia. Retrieved November 6 2021 from https:\/\/en.wikipedia.org\/wiki\/Mega_Man"},{"key":"e_1_3_3_2_111_1","unstructured":"Draw Freely | Inkscape. Retrieved November 6 2021 from https:\/\/inkscape.org\/"},{"key":"e_1_3_3_2_112_1","unstructured":"Snowball sampling - Wikipedia. Retrieved July 1 2022 from https:\/\/en.wikipedia.org\/wiki\/Snowball_sampling"},{"key":"e_1_3_3_2_113_1","unstructured":"Miro | Online Whiteboard for Visual Collaboration. Retrieved November 21 2022 from https:\/\/miro.com\/app\/dashboard\/"},{"key":"e_1_3_3_2_114_1","doi-asserted-by":"publisher","unstructured":"2020. NSA Mobile Device Best Practices. https:\/\/doi.org\/10.4324\/9780429269110-11","DOI":"10.4324\/9780429269110-11"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Hamburg Germany","acronym":"CHI '23"},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3581038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T17:10:38Z","timestamp":1723482638000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581038"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":114,"alternative-id":["10.1145\/3544548.3581038","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3581038","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}