The Role of Gamification in Privacy Protection and User Engagement

[1]  Juho Hamari,et al.  How to Gamify? A Method For Designing Gamification , 2017, HICSS.

[2]  Joan Hash,et al.  Building an Information Technology Security Awareness and Training Program , 2003 .

[3]  Haralambos Mouratidis,et al.  A security requirements modelling language for cloud computing environments , 2019, Software and Systems Modeling.

[4]  Eyvind Garder B Gjertsen,et al.  Use of Gamification in Security Awareness and Training Programs , 2016 .

[5]  Stefanos Gritzalis,et al.  Towards the Design of Usable Privacy by Design Methodologies , 2018, 2018 IEEE 5th International Workshop on Evolving Security & Privacy Requirements Engineering (ESPRE).

[6]  T. Vanhala,et al.  Mobile Mental Wellness Training for Stress Management: Feasibility and Design Implications Based on a One-Month Field Study , 2013, JMIR mHealth and uHealth.

[7]  Stoyan R. Stoyanov,et al.  Gamification for health and wellbeing: A systematic review of the literature , 2016, Internet interventions.

[8]  Paul Denny,et al.  The effect of virtual achievements on student engagement , 2013, CHI.

[9]  N. Sever,et al.  The Evaluation of Potentials of Gamification in Tourism Marketing Communication , 2015 .

[10]  Nan Jiang,et al.  Gamified Culture-Aware Feedback Acquisition , 2014, 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing.

[11]  Haralambos Mouratidis,et al.  Incorporating privacy patterns into semi-automatic business process derivation , 2016, 2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS).

[12]  Christopher Cheong,et al.  Quick Quiz: A Gamified Approach for Enhancing Learning , 2013, PACIS.

[13]  Aikaterini-Georgia Mavroeidi,et al.  The Interrelation of Game Elements and Privacy Requirements for the Design of a System: A Metamodel , 2019, TrustBus.

[14]  Robb Lindgren,et al.  Using badges for shaping interactions in online learning environments , 2012, 2012 IEEE International Professional Communication Conference.

[15]  Dimitrios Buhalis,et al.  Gamification in Tourism , 2014, ENTER.

[16]  Haralambos Mouratidis,et al.  Model Based Process to Support Security and Privacy Requirements Engineering , 2012, Int. J. Secur. Softw. Eng..

[17]  Lennart E. Nacke,et al.  From game design elements to gamefulness: defining "gamification" , 2011, MindTrek.

[18]  Ronald Azuma,et al.  A Survey of Augmented Reality , 1997, Presence: Teleoperators & Virtual Environments.

[19]  Cécile Paris,et al.  Engagement and Cooperation in Social Networks: Do Benefits and Rewards Help? , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[20]  Jun Sato,et al.  Effect of security education using KIPS and gamification theory at KOSEN , 2018, 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE).

[21]  Wouter Joosen,et al.  A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements , 2011, Requirements Engineering.

[22]  John Mylopoulos,et al.  Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..

[23]  Evangelia Kavakli,et al.  Pris Tool: A Case Tool For Privacy-Oriented Requirements Engineering , 2009, MCIS.

[24]  Zachary H Morford,et al.  Gamification: The Intersection between Behavior Analysis and Game Design Technologies , 2014, The Behavior Analyst.

[25]  Henriette Cramer,et al.  Performing a check-in: emerging practices, norms and 'conflicts' in location-sharing using foursquare , 2011, Mobile HCI.

[26]  S. Jansen,et al.  Gamification in Consumer Marketing - Future or Fallacy? , 2014 .

[27]  Giordano Tamburrelli,et al.  Understanding gamification mechanisms for software development , 2013, ESEC/FSE 2013.

[28]  Juho Hamari,et al.  Defining gamification: a service marketing perspective , 2012, MindTrek.

[29]  H. Raghav Rao,et al.  Effects of Leaderboards in Games on Consumer Engagement , 2018, SIGMIS-CPR.

[30]  Giacomo Verticale,et al.  Enabling privacy in a gaming framework for smart electricity and water grids , 2016, 2016 International Workshop on Cyber-physical Systems for Smart Water Networks (CySWater).

[31]  Scott Thiebes,et al.  Users' Game Design Element Preferences in Health Behavior Change Support Systems for Physical Activity: A Best-Worst-Scaling Approach , 2019, ICIS.

[32]  Juho Hamari,et al.  Does Gamification Work? -- A Literature Review of Empirical Studies on Gamification , 2014, 2014 47th Hawaii International Conference on System Sciences.

[33]  Stefanos Gritzalis,et al.  Gamification vs. Privacy: Identifying and Analysing the Major Concerns , 2019, Future Internet.

[34]  Ana María Moreno,et al.  Gamification in software engineering education: A systematic mapping , 2018, J. Syst. Softw..

[35]  Bernd Becker,et al.  SMILE Goes Gaming: Gamification in a Classroom Response System for Academic Teaching , 2019, CSEDU.

[36]  Gráinne Conole,et al.  What are the affordances of information and communication technologies , 2004 .

[37]  Jun Sato,et al.  Practical security education on operational technology using gamification method , 2017, 2017 7th IEEE International Conference on Control System, Computing and Engineering (ICCSCE).

[38]  Bashar Nuseibeh,et al.  Engineering adaptive privacy: On the role of privacy awareness requirements , 2013, 2013 35th International Conference on Software Engineering (ICSE).

[39]  K. Werbach,et al.  For the Win: How Game Thinking Can Revolutionize Your Business , 2012 .

[40]  Stefanos Gritzalis,et al.  THE ROLE OF GAMIFICATION IN CULTURAL INFORMATICS , 2018 .

[41]  Stefanos Gritzalis,et al.  A soft computing approach for privacy requirements engineering: The PriS framework , 2011, Appl. Soft Comput..

[42]  Jo Bryce,et al.  Young people, disclosure of personal information and online privacy: Control, choice and consequences , 2009, Inf. Secur. Tech. Rep..

[43]  I FelsDeborah,et al.  Gamification in theory and action , 2015 .

[44]  Ara Darzi,et al.  ‘Gamification’: Influencing health behaviours with games , 2013, Journal of the Royal Society of Medicine.

[45]  R. Walton,et al.  Gamification for health promotion: systematic review of behaviour change techniques in smartphone apps , 2016, BMJ Open.

[46]  Pearl Pu,et al.  HealthyTogether: exploring social incentives for mobile fitness applications , 2014, Chinese CHI '14.

[47]  Deborah I. Fels,et al.  Gamification in theory and action: A survey , 2015, Int. J. Hum. Comput. Stud..

[48]  Judy M. Vance,et al.  Virtual reality for assembly methods prototyping: a review , 2011, Virtual Reality.

[49]  Mario Piattini,et al.  Gamification in software engineering - A systematic mapping , 2015, Inf. Softw. Technol..

[50]  Erlend Andreas Gjære,et al.  Gamification of Information Security Awareness and Training , 2017, ICISSP.

[51]  Seiya Miyazaki,et al.  Computer-Aided Privacy Requirements Elicitation Technique , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[52]  J. Cafazzo,et al.  Design of an mHealth App for the Self-management of Adolescent Type 1 Diabetes: A Pilot Study , 2012, Journal of medical Internet research.

[53]  Alexander Schill,et al.  A Generic Platform for Enterprise Gamification , 2012, 2012 Joint Working IEEE/IFIP Conference on Software Architecture and European Conference on Software Architecture.

[54]  Lorrie Faith Cranor,et al.  Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish , 2007, SOUPS '07.

[55]  Alimohammad Shahri,et al.  Towards a Code of Ethics for Gamification at Enterprise , 2014, PoEM.

[56]  Christa R. Nevin,et al.  Gamification as a tool for enhancing graduate medical education , 2014, Postgraduate Medical Journal.

[57]  Elizabeth D. Mynatt,et al.  STRAP: A Structured Analysis Framework for Privacy , 2005 .

[58]  Helmut Hlavacs,et al.  mHealth Stakeholder Integration: A gamification-based Framework-approach towards behavioural change , 2015, MoMM.