{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T02:58:10Z","timestamp":1730343490759,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T00:00:00Z","timestamp":1651017600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T00:00:00Z","timestamp":1651017600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,27]]},"DOI":"10.23919\/fruct54823.2022.9770896","type":"proceedings-article","created":{"date-parts":[[2022,5,11]],"date-time":"2022-05-11T16:32:27Z","timestamp":1652286747000},"page":"253-258","source":"Crossref","is-referenced-by-count":0,"title":["Active Learning to Find the Key to Unlock Your Laptop"],"prefix":"10.23919","author":[{"given":"Marian","family":"Queiruga-Dios","sequence":"first","affiliation":[{"name":"Universidad Francisco de Vitoria,Pozuelo de Alarcón,Madrid,Spain"}]},{"given":"Farrah Kristel","family":"Battista","sequence":"additional","affiliation":[{"name":"Universidad de Salamanca,Salamanca,Spain"}]},{"given":"Maria Jesus Santos","family":"Sanchez","sequence":"additional","affiliation":[{"name":"Universidad de Salamanca,Salamanca,Spain"}]},{"given":"Araceli","family":"Queiruga-Dios","sequence":"additional","affiliation":[{"name":"Universidad de Salamanca,Salamanca,Spain"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766903"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-90443-6"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-1599-8_12"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(97)81323-4"},{"key":"ref35","first-page":"55","article-title":"Escape room games","volume":"55","author":"wiemker","year":"2015","journal-title":"Game Based Learning"},{"journal-title":"Status report on the second round of the NIST postquantum cryptography standardization process","year":"2020","author":"alagic","key":"ref34"},{"key":"ref10","first-page":"1608el628","article-title":"Exploring interrelationships among high school students' engagement factors in introductory programming courses via a 3D multi-user serious game created in open sim","volume":"20","author":"pellas","year":"2014","journal-title":"J Univers Comput Sci"},{"key":"ref11","first-page":"235","article-title":"Escape rooms for learning: A systematic review","author":"fotaris","year":"2019","journal-title":"Proc European Conf on Games Based Learning"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3390\/encyclopedia1010004"},{"key":"ref13","first-page":"190","article-title":"Bachillerato de Excelencia, Criptografía y Seguridad de la Información: una oportunidad","author":"hern\u00e1ndez encinas","year":"2015","journal-title":"Proc IJNIC2U15 Conf"},{"key":"ref14","first-page":"216","article-title":"Aspects of game-based learning","author":"pivec","year":"2003","journal-title":"Proc 3rd International Conf on Knowledge Management"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1097\/NND.0000000000000433"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jsurg.2018.06.030"},{"key":"ref17","first-page":"3172331737","article-title":"Examining the Use of an Educational Escape Room for Teaching Programming in a Higher Education Setting","volume":"7","author":"l\u00f3pez-pemas","year":"2019","journal-title":"IEEE Access"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/math8020166"},{"key":"ref19","first-page":"217","article-title":"Looking for the Antidote for Contaminated Water: Learning Through an Escape Game","author":"santos","year":"2019","journal-title":"Proc International Joint Conference 12th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2019) and 10th International Conference on EUropean Transnational Education (ICEUTE 2019)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21936-3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/104687819903000409"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-18500-2_13"},{"journal-title":"Experience-based learning understanding adult education and training","year":"2000","author":"andresen","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1152\/advan.00053.2006"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.04.583"},{"journal-title":"Game-based learning Handbook of research on educational communications and technology","year":"2014","author":"tobias","key":"ref5"},{"key":"ref8","first-page":"45","article-title":"Constructivism in computer science education","volume":"20","author":"ben-ari","year":"2001","journal-title":"J Comput Math Sci Teach"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/BF02504526"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1108\/13665620110388406"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.07.045"},{"key":"ref1","article-title":"Effectiveness of self-regulation and serious games for learning STEM knowledge in Primary Education","author":"s\u00e1iz manzanares","year":"2020","journal-title":"Psicothema"},{"key":"ref20","first-page":"65","article-title":"Importance of Cryptography in Information Security","volume":"21","author":"gen\u00e7o?lu","year":"2019","journal-title":"IOSR Journal of Computer Engineering"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3926\/jotse.247"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FIE43999.2019.9028549"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/math8111993"},{"key":"ref23","first-page":"1","article-title":"Quasim: A multi-dimensional quantum cryptography game for cyber security","volume":"6","author":"vadla","year":"2019","journal-title":"Journal for the Colloquium for Information Systems Security Education"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22321-6"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81111-2_4"}],"event":{"name":"2022 31st Conference of Open Innovations Association (FRUCT)","start":{"date-parts":[[2022,4,27]]},"location":"Helsinki, Finland","end":{"date-parts":[[2022,4,29]]}},"container-title":["2022 31st Conference of Open Innovations Association (FRUCT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9770852\/9770880\/09770896.pdf?arnumber=9770896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,4]],"date-time":"2022-07-04T16:09:43Z","timestamp":1656950983000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9770896\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,27]]},"references-count":35,"URL":"https:\/\/doi.org\/10.23919\/fruct54823.2022.9770896","relation":{},"subject":[],"published":{"date-parts":[[2022,4,27]]}}}