{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:07:07Z","timestamp":1730322427449,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,2]]},"DOI":"10.1145\/3383668.3419887","type":"proceedings-article","created":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T07:27:32Z","timestamp":1604388452000},"page":"182-187","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Good vs. Evil"],"prefix":"10.1145","author":[{"given":"Mehrdad","family":"Bahrini","sequence":"first","affiliation":[{"name":"University of Bremen, Bremen, Germany"}]},{"given":"Nima","family":"Zargham","sequence":"additional","affiliation":[{"name":"University of Bremen, Bremen, Germany"}]},{"given":"Johannes","family":"Pfau","sequence":"additional","affiliation":[{"name":"University of Bremen, Bremen, Bremen, Germany"}]},{"given":"Stella","family":"Lemke","sequence":"additional","affiliation":[{"name":"University of Bremen, Bremen, Germany"}]},{"given":"Karsten","family":"Sohr","sequence":"additional","affiliation":[{"name":"University of Bremen, Bremen, Germany"}]},{"given":"Rainer","family":"Malaka","sequence":"additional","affiliation":[{"name":"University of Bremen, Bremen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,11,3]]},"reference":[{"volume-title":"The concept of flow in collaborative game-based learning.computers in Human Behavior 27 (05","year":"2011","author":"Admiraal Wilfried","key":"e_1_3_2_2_1_1","unstructured":"Wilfried Admiraal , Jantina Huizenga , Sanne Akkerman , and Geert Dam . 2011. The concept of flow in collaborative game-based learning.computers in Human Behavior 27 (05 2011 ), 1185--1194. https:\/\/doi.org\/10.1016\/j.chb.2010.12.013 10.1016\/j.chb.2010.12.013 Wilfried Admiraal, Jantina Huizenga, Sanne Akkerman, and Geert Dam. 2011. The concept of flow in collaborative game-based learning.computers in Human Behavior 27 (05 2011), 1185--1194. https:\/\/doi.org\/10.1016\/j.chb.2010.12.013"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.23919\/IConAC.2017.8082057"},{"volume-title":"Elena Patricia Nu\u00f1ez Castellar, and Jan Van Looy","year":"2016","author":"All Anissa","key":"e_1_3_2_2_3_1","unstructured":"Anissa All , Elena Patricia Nu\u00f1ez Castellar, and Jan Van Looy . 2016 . Assessing the effectiveness of digital game-based learning: Best practices.computers & Education 92 (2016), 90--103. Anissa All, Elena Patricia Nu\u00f1ez Castellar, and Jan Van Looy. 2016. Assessing the effectiveness of digital game-based learning: Best practices.computers & Education 92 (2016), 90--103."},{"volume-title":"International Journal for Information Security Research 6 (06","year":"2016","author":"Alotaibi Faisal","key":"e_1_3_2_2_4_1","unstructured":"Faisal Alotaibi , Steven Furnell , Ingo Stengel , and Maria Papadaki . 2016. A Review of Using Gaming Technology for Cyber-Security Awareness . International Journal for Information Security Research 6 (06 2016 ). https:\/\/doi.org\/10.20533\/ijisr.2042. 4639.2016.0076 10.20533\/ijisr.2042 Faisal Alotaibi, Steven Furnell, Ingo Stengel, and Maria Papadaki. 2016. A Review of Using Gaming Technology for Cyber-Security Awareness. International Journal for Information Security Research 6 (06 2016). https:\/\/doi.org\/10.20533\/ijisr.2042. 4639.2016.0076"},{"volume-title":"Phishing threat avoidance behaviour: An empirical investigation.computers in Human Behavior 60","year":"2016","author":"Gamagedara Arachchilage Nalin Asanka","key":"e_1_3_2_2_5_1","unstructured":"Nalin Asanka Gamagedara Arachchilage , Steve Love , and Konstantin Beznosov . 2016. Phishing threat avoidance behaviour: An empirical investigation.computers in Human Behavior 60 ( 2016 ), 185--197. Nalin Asanka Gamagedara Arachchilage, Steve Love, and Konstantin Beznosov. 2016. Phishing threat avoidance behaviour: An empirical investigation.computers in Human Behavior 60 (2016), 185--197."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447310802205776"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2016.7503293"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"crossref","unstructured":"Francesco Bellotti Bill Kapralos Kiju Lee and Pablo Moreno-Ger. 2013. User assessment in serious games and technology-enhanced learning. Francesco Bellotti Bill Kapralos Kiju Lee and Pablo Moreno-Ger. 2013. User assessment in serious games and technology-enhanced learning.","DOI":"10.1155\/2013\/120791"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2817912.2817913"},{"key":"#cr-split#-e_1_3_2_2_10_1.1","doi-asserted-by":"crossref","unstructured":"Joseph Bugeja Andreas Jacobsson and Paul Davidsson. 2016. On Privacy and Security Challenges in Smart Connected Homes. 172--175. https:\/\/doi.org\/10.1109\/EISIC.2016.044 10.1109\/EISIC.2016.044","DOI":"10.1109\/EISIC.2016.044"},{"key":"#cr-split#-e_1_3_2_2_10_1.2","doi-asserted-by":"crossref","unstructured":"Joseph Bugeja Andreas Jacobsson and Paul Davidsson. 2016. On Privacy and Security Challenges in Smart Connected Homes. 172--175. https:\/\/doi.org\/10.1109\/EISIC.2016.044","DOI":"10.1109\/EISIC.2016.044"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312935"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.4236\/wsn.2016.84006"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327825MCS0403_01"},{"volume-title":"Flow: The psychology of optimal experience.","year":"1990","author":"Csikszentmihalyi Mihaly","key":"e_1_3_2_2_14_1","unstructured":"Mihaly Csikszentmihalyi and Mihaly Csikzentmihaly . 1990 . Flow: The psychology of optimal experience. Vol. 1990 . Harper & Row New York . Mihaly Csikszentmihalyi and Mihaly Csikzentmihaly. 1990. Flow: The psychology of optimal experience. Vol. 1990. Harper & Row New York."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"A. Demeure S. Caffiau E. Elias and C. Roux. 2015. Building and Using Home Automation Systems: A Field Study. In End-User Development Paloma D\u00edaz Volkmar Pipek Carmelo Ardito Carlos Jensen Ignacio Aedo and Alexander Boden (Eds.). Springer International Publishing Cham 125--140. A. Demeure S. Caffiau E. Elias and C. Roux. 2015. Building and Using Home Automation Systems: A Field Study. In End-User Development Paloma D\u00edaz Volkmar Pipek Carmelo Ardito Carlos Jensen Ignacio Aedo and Alexander Boden (Eds.). Springer International Publishing Cham 125--140.","DOI":"10.1007\/978-3-319-18425-8_9"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516753"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2181037.2181040"},{"volume-title":"Nalin Asanka Gamagedara Arachchilage, and James Nicholson","year":"2019","author":"Dixon Matt","key":"e_1_3_2_2_18_1","unstructured":"Matt Dixon , Nalin Asanka Gamagedara Arachchilage, and James Nicholson . 2019 . Engaging Users with Educational Games : The Case of Phishing. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI EA '19). Association for Computing Machinery , New York, NY, USA, Article LBW0265. https:\/\/doi.org\/10.1145\/3290607.3313026 10.1145\/3290607.3313026 Matt Dixon, Nalin Asanka Gamagedara Arachchilage, and James Nicholson. 2019. Engaging Users with Educational Games: The Case of Phishing. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (Glasgow, Scotland Uk) (CHI EA '19). Association for Computing Machinery, New York, NY, USA, Article LBW0265. https:\/\/doi.org\/10.1145\/3290607.3313026"},{"key":"e_1_3_2_2_19_1","unstructured":"Mathias Fuchs Sonia Fizek Paolo Ruffino and Niklas Schrape. 2015. Rethinking gamification. meson press. Mathias Fuchs Sonia Fizek Paolo Ruffino and Niklas Schrape. 2015. Rethinking gamification. meson press."},{"volume-title":"Game Design Workshop: A Playcentric Approach to Creating Innovative Games. CRC Press, Taylor & Francis Group.","year":"2019","author":"Fullerton T.","key":"e_1_3_2_2_20_1","unstructured":"T. Fullerton . 2019 . Game Design Workshop: A Playcentric Approach to Creating Innovative Games. CRC Press, Taylor & Francis Group. T. Fullerton. 2019. Game Design Workshop: A Playcentric Approach to Creating Innovative Games. CRC Press, Taylor & Francis Group."},{"volume-title":"That cloud game: dreaming (and doing) innovative game design. (07","year":"2006","author":"Fullerton Tracy","key":"e_1_3_2_2_21_1","unstructured":"Tracy Fullerton , Jenova Chen , Kellee Santiago , Erik Nelson , Vincent Diamante , Aaron Meyers , Glenn Song , and John Deweese . 2006. That cloud game: dreaming (and doing) innovative game design. (07 2006 ), 51--59. https:\/\/doi.org\/10.1145\/1183316.1183324 10.1145\/1183316.1183324 Tracy Fullerton, Jenova Chen, Kellee Santiago, Erik Nelson, Vincent Diamante, Aaron Meyers, Glenn Song, and John Deweese. 2006. That cloud game: dreaming (and doing) innovative game design. (07 2006), 51--59. https:\/\/doi.org\/10.1145\/1183316.1183324"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/950566.950595"},{"volume-title":"2015 International Conference on Interactive Mobile Communication Technologies and Learning (IMCL). 54--58","author":"Giannakas F.","key":"e_1_3_2_2_23_1","unstructured":"F. Giannakas , G. Kambourakis , and S. Gritzalis . 2015. CyberAware: A mobile game-based app for cybersecurity education and awareness . In 2015 International Conference on Interactive Mobile Communication Technologies and Learning (IMCL). 54--58 . F. Giannakas, G. Kambourakis, and S. Gritzalis. 2015. CyberAware: A mobile game-based app for cybersecurity education and awareness. In 2015 International Conference on Interactive Mobile Communication Technologies and Learning (IMCL). 54--58."},{"volume-title":"Exploring the Effect of Game Premise in Cooperative Digital Board Games. In Joint International Conference on Entertainment Computing and Serious Games. Springer, 214--227","year":"2019","author":"Grudpan Supara","key":"e_1_3_2_2_24_1","unstructured":"Supara Grudpan , Dmitry Alexandrovky , Jannicke Baalsrud Hauge , and Rainer Malaka . 2019 . Exploring the Effect of Game Premise in Cooperative Digital Board Games. In Joint International Conference on Entertainment Computing and Serious Games. Springer, 214--227 . Supara Grudpan, Dmitry Alexandrovky, Jannicke Baalsrud Hauge, and Rainer Malaka. 2019. Exploring the Effect of Game Premise in Cooperative Digital Board Games. In Joint International Conference on Entertainment Computing and Serious Games. Springer, 214--227."},{"volume-title":"Challenging games help students learn: An empirical study on engagement, flow and immersion in game-based learning.computers in human behavior 54","year":"2016","author":"Hamari Juho","key":"e_1_3_2_2_25_1","unstructured":"Juho Hamari , David J Shernoff , Elizabeth Rowe , Brianno Coller , Jodi AsbellClarke , and Teon Edwards . 2016. Challenging games help students learn: An empirical study on engagement, flow and immersion in game-based learning.computers in human behavior 54 ( 2016 ), 170--179. Juho Hamari, David J Shernoff, Elizabeth Rowe, Brianno Coller, Jodi AsbellClarke, and Teon Edwards. 2016. Challenging games help students learn: An empirical study on engagement, flow and immersion in game-based learning.computers in human behavior 54 (2016), 170--179."},{"volume-title":"-C. Law","year":"2018","author":"Heintz Stephanie","key":"e_1_3_2_2_26_1","unstructured":"Stephanie Heintz and Effie L . -C. Law . 2018 . Digital Educational Games: Methodologies for Evaluating the Impact of Game Type. ACM Trans.comput.-Hum. Interact. 25, 2, Article 8 (April 2018), 47 pages. https:\/\/doi.org\/10.1145\/3177881 10.1145\/3177881 Stephanie Heintz and Effie L.-C. Law. 2018. Digital Educational Games: Methodologies for Evaluating the Impact of Game Type. ACM Trans.comput.-Hum. Interact. 25, 2, Article 8 (April 2018), 47 pages. https:\/\/doi.org\/10.1145\/3177881"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.17083\/ijsg.v3i1.107"},{"key":"#cr-split#-e_1_3_2_2_28_1.1","doi-asserted-by":"crossref","unstructured":"Andreas Jacobsson and Paul Davidsson. 2015. Towards a model of privacy and security for smart homes. 727--732. https:\/\/doi.org\/10.1109\/WF-IoT.2015.7389144 10.1109\/WF-IoT.2015.7389144","DOI":"10.1109\/WF-IoT.2015.7389144"},{"key":"#cr-split#-e_1_3_2_2_28_1.2","doi-asserted-by":"crossref","unstructured":"Andreas Jacobsson and Paul Davidsson. 2015. Towards a model of privacy and security for smart homes. 727--732. https:\/\/doi.org\/10.1109\/WF-IoT.2015.7389144","DOI":"10.1109\/WF-IoT.2015.7389144"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159591"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2705045"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136907.3136923"},{"volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","year":"2009","author":"Klasnja Predrag","key":"e_1_3_2_2_32_1","unstructured":"Predrag Klasnja , Sunny Consolvo , Jaeyeon Jung , Benjamin M. Greenstein , Louis LeGrand , Pauline Powledge , and David Wetherall . 2009 . \" When I Am on Wi-Fi, I Am Fearless\": Privacy Concerns & Practices in Eeryday Wi-Fi Use . In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems ( Boston, MA, USA) (CHI '09). ACM, New York, NY, USA , 1993--2002. https:\/\/doi.org\/10.1145\/1518701.1519004 10.1145\/1518701.1519004 Predrag Klasnja, Sunny Consolvo, Jaeyeon Jung, Benjamin M. Greenstein, Louis LeGrand, Pauline Powledge, and David Wetherall. 2009. \"When I Am on Wi-Fi, I Am Fearless\": Privacy Concerns & Practices in Eeryday Wi-Fi Use. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Boston, MA, USA) (CHI '09). ACM, New York, NY, USA, 1993--2002. https:\/\/doi.org\/10.1145\/1518701.1519004"},{"volume-title":"Article 23 (Aug.","year":"2014","author":"Laszka Aron","key":"e_1_3_2_2_33_1","unstructured":"Aron Laszka , Mark Felegyhazi , and Levente Buttyan . 2014. A Survey of Interdependent Information Security Games. ACM Comput. Surv. 47, 2 , Article 23 (Aug. 2014 ), 38 pages. https:\/\/doi.org\/10.1145\/2635673 10.1145\/2635673 Aron Laszka, Mark Felegyhazi, and Levente Buttyan. 2014. A Survey of Interdependent Information Security Games. ACM Comput. Surv. 47, 2, Article 23 (Aug. 2014), 38 pages. https:\/\/doi.org\/10.1145\/2635673"},{"volume-title":"A renewed approach to serious games for cyber security. 203--216. https:\/\/doi.org\/10.1109\/CYCON","year":"2015","author":"Compte Alexis Le","key":"e_1_3_2_2_34_1","unstructured":"Alexis Le Compte , David Elizondo , and Tim Watson . 2015. A renewed approach to serious games for cyber security. 203--216. https:\/\/doi.org\/10.1109\/CYCON . 2015 .7158478 10.1109\/CYCON Alexis Le Compte, David Elizondo, and Tim Watson. 2015. A renewed approach to serious games for cyber security. 203--216. https:\/\/doi.org\/10.1109\/CYCON. 2015.7158478"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.3390\/info7030044"},{"volume-title":"Psychometric properties of the Intrinsic Motivation Inventory in a competitive sport setting: A confirmatory factor analysis. Research quarterly for exercise and sport 60, 1","year":"1989","author":"McAuley Edward","key":"e_1_3_2_2_36_1","unstructured":"Edward McAuley , Terry Duncan , and Vance V Tammen . 1989. Psychometric properties of the Intrinsic Motivation Inventory in a competitive sport setting: A confirmatory factor analysis. Research quarterly for exercise and sport 60, 1 ( 1989 ), 48--58. Edward McAuley, Terry Duncan, and Vance V Tammen. 1989. Psychometric properties of the Intrinsic Motivation Inventory in a competitive sport setting: A confirmatory factor analysis. Research quarterly for exercise and sport 60, 1 (1989), 48--58."},{"key":"e_1_3_2_2_37_1","unstructured":"Oxford. 2020. Definition of premise. https:\/\/www.oxfordlearnersdictionaries.com\/definition\/english\/premise?q=premise. Oxford. 2020. Definition of premise. https:\/\/www.oxfordlearnersdictionaries.com\/definition\/english\/premise?q=premise."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2991561.2991566"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2729.2005.00128.x"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"volume-title":"Number of Smart Homes forecast worldwide from 2017 to","year":"2024","key":"e_1_3_2_2_41_1","unstructured":"Statista. 2020. Number of Smart Homes forecast worldwide from 2017 to 2024 . https:\/\/www.statista.com\/forecasts\/887613\/number-of-smart-homes-inthe-smart-home-market-worldwide. Statista. 2020. Number of Smart Homes forecast worldwide from 2017 to 2024. https:\/\/www.statista.com\/forecasts\/887613\/number-of-smart-homes-inthe-smart-home-market-worldwide."},{"volume-title":"Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing","year":"2015","author":"Lim Woo","key":"e_1_3_2_2_42_1","unstructured":"Jong-bum Woo and Youn-kyung Lim . 2015 . User Experience in Do-it-yourselfstyle Smart Homes . In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing ( Osaka, Japan) (UbiComp '15). ACM, New York, NY, USA, 779--790. https:\/\/doi.org\/10.1145\/2750858.2806063 10.1145\/2750858.2806063 Jong-bum Woo and Youn-kyung Lim. 2015. User Experience in Do-it-yourselfstyle Smart Homes. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (Osaka, Japan) (UbiComp '15). ACM, New York, NY, USA, 779--790. https:\/\/doi.org\/10.1145\/2750858.2806063"},{"volume-title":"November 2-4","year":"2020","author":"Zargham Nima","key":"e_1_3_2_2_43_1","unstructured":"Nima Zargham , Mehrdad Bahrini , Georg Volkmar , Dirk Wenig , Karsten Sohr , and Rainer Malaka . 2019. What Could Go Wrong? Raising Mobile Privacy CHI PLAY '20 EA , November 2-4 , 2020 , Virtual Event, Canada Bahrini , et al. and Security Awareness Through a Decision-Making Game. In Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts (Barcelona, Spain) (CHI PLAY '19 Extended Abstracts). Association for Computing Machinery , New York, NY, USA, 805--812. https:\/\/doi.org\/10.1145\/3341215.3356273 10.1145\/3341215.3356273 Nima Zargham, Mehrdad Bahrini, Georg Volkmar, Dirk Wenig, Karsten Sohr, and Rainer Malaka. 2019. What Could Go Wrong? Raising Mobile Privacy CHI PLAY '20 EA, November 2-4, 2020, Virtual Event, Canada Bahrini, et al. and Security Awareness Through a Decision-Making Game. In Extended Abstracts of the Annual Symposium on Computer-Human Interaction in Play Companion Extended Abstracts (Barcelona, Spain) (CHI PLAY '19 Extended Abstracts). Association for Computing Machinery, New York, NY, USA, 805--812. https:\/\/doi.org\/10.1145\/3341215.3356273"},{"key":"e_1_3_2_2_44_1","first-page":"1","article-title":"Security and Privacy in Smart City Applications: Challenges and Solutions","volume":"55","author":"Zhang K.","year":"2017","unstructured":"K. Zhang , J. Ni , K. Yang , X. Liang , J. Ren , and X. S. Shen . 2017 . Security and Privacy in Smart City Applications: Challenges and Solutions . IEEE Communications Magazine 55 , 1 (January 2017), 122--129. https:\/\/doi.org\/10.1109\/MCOM.2017.1600267CM 10.1109\/MCOM.2017.1600267CM K. Zhang, J. Ni, K. Yang, X. Liang, J. Ren, and X. S. Shen. 2017. Security and Privacy in Smart City Applications: Challenges and Solutions. IEEE Communications Magazine 55, 1 (January 2017), 122--129. https:\/\/doi.org\/10.1109\/MCOM.2017.1600267CM","journal-title":"IEEE Communications Magazine"}],"event":{"name":"CHI PLAY '20: The Annual Symposium on Computer-Human Interaction in Play","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Virtual Event Canada","acronym":"CHI PLAY '20"},"container-title":["Extended Abstracts of the 2020 Annual Symposium on Computer-Human Interaction in Play"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3383668.3419887","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T11:09:39Z","timestamp":1673003379000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3383668.3419887"}},"subtitle":["Investigating the Effect of Game Premise in a Smart Home Security Educational Game"],"short-title":[],"issued":{"date-parts":[[2020,11,2]]},"references-count":46,"alternative-id":["10.1145\/3383668.3419887","10.1145\/3383668"],"URL":"https:\/\/doi.org\/10.1145\/3383668.3419887","relation":{},"subject":[],"published":{"date-parts":[[2020,11,2]]},"assertion":[{"value":"2020-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}