Entry Greitzer:2007:CSI from jeric.bib
Last update: Sun Oct 15 02:29:09 MDT 2017
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
Y |
Z
BibTeX entry
@Article{Greitzer:2007:CSI,
author = "Frank L. Greitzer and Olga Anna Kuchar and Kristy
Huston",
title = "Cognitive science implications for enhancing training
effectiveness in a serious gaming context",
journal = j-JERIC,
volume = "7",
number = "3",
pages = "2:1--2:??",
month = nov,
year = "2007",
CODEN = "????",
DOI = "https://doi.org/10.1145/1281320.1281322",
ISSN = "1531-4278",
bibdate = "Fri Jun 20 10:12:56 MDT 2008",
bibsource = "http://www.acm.org/pubs/contents/journals/jeric/;
http://www.math.utah.edu/pub/tex/bib/jeric.bib",
abstract = "Serious games use entertainment principles,
creativity, and technology to meet government or
corporate training objectives, but these principles
alone will not guarantee that the intended learning
will occur. To be effective, serious games must
incorporate sound cognitive, learning, and pedagogical
principles into their design and structure. In this
paper, we review cognitive principles that can be
applied to improve the training effectiveness in
serious games and we describe a process we used to
design improvements for an existing game-based training
application in the domain of cyber security
education.",
acknowledgement = ack-nhfb,
articleno = "2",
keywords = "cognitive principles; computer-based training; cyber
security education; serious gaming; training
effectiveness",
}
Related entries
- 1-2es-z-z-4,
2(4)1,
5(4)1,
5(4)2,
5(4)3,
6(1)2,
6(1)3,
6(2)1,
6(3)2,
6(4)2,
6(4)4,
6(4)5,
7(1)1,
7(1)3,
7(4)1,
7(4)3,
7(4)6,
8(1)3,
8(2)4,
8(3)8
- application,
6(3)3,
6(3)4,
6(4)4,
7(4)3,
8(3)9
- context,
6(3)1,
6(3)2,
6(3)3,
7(2)1,
7(4)6,
8(1)2,
8(2)4,
8(3)7,
8(3)8,
8(4)11
- describe,
6(1)2,
6(2)2,
6(3)6,
6(4)5,
8(2)5,
8(2)6,
8(3)9
- design,
2(1)5,
5(1)1,
5(4)1,
5(4)2,
6(1)1,
6(1)2,
6(1)3,
6(4)2,
7(1)2,
7(1)3,
7(4)6,
8(1)2,
8(2)6,
8(3)8,
8(3)9
- domain,
7(4)3
- education, 1-1es-z-z-6, 1-2es-z-z-2,
2(4)1,
4(1)1,
4(2)1,
4(2)2,
4(2)3,
4(2)4,
4(3)1,
5(4)1,
6(1)2,
6(1)3,
6(3)1,
6(3)2,
6(4)1,
6(4)2,
6(4)3,
6(4)5,
7(1)1,
7(1)2,
7(1)3,
7(2)1,
7(3)1,
7(4)1,
7(4)2,
8(1)2,
8(1)3,
8(2)5,
8(2)6,
8(3)9
- effective,
2(2)4,
6(3)3,
6(4)3,
8(1)3
- effectiveness,
5(4)2,
6(3)2,
7(3)1
- enhancing,
5(4)1,
6(4)4
- existing,
6(4)2
- game,
8(1)2
- gaming,
8(3)8
- government,
6(3)2
- guarantee,
6(4)5
- implication,
7(4)1,
8(4)12
- improve,
3(1)1-1,
5(4)2,
6(2)1,
6(3)5,
7(1)2
- improvement,
6(1)2,
6(1)3,
7(4)1
- incorporate,
6(3)2
- intended,
7(1)2
- meet,
6(1)1,
7(4)1
- must,
6(3)3,
6(4)2,
8(1)3
- not,
5(4)1,
5(4)2,
6(4)6,
7(1)2,
7(4)3,
7(4)6
- objective,
6(1)1
- paper,
6(4)5,
7(4)1,
7(4)5
- pedagogical,
3(1)1,
5(4)3,
8(2)5,
8(3)8
- principle,
6(3)3,
6(4)3,
8(1)3
- process,
6(1)1,
6(1)2,
6(2)2,
6(3)3,
6(3)6,
7(2)1,
7(4)5,
8(2)5,
8(2)6,
8(3)9
- review,
3(1)1-1,
5(3)z-2,
7(1)1,
8(1)1
- science, 1-2es-z-z,
1(4)31,
2(4)1,
3(3)1,
4(1)1,
4(1)1-1,
4(2)3,
4(2)4,
5(2)1,
5(4)1,
5(4)2,
6(3)3,
6(4)4,
7(2)1,
7(2)2,
7(4)2,
7(4)5,
7(4)6,
8(1)3,
8(2)5,
8(2)6,
8(4)11
- security,
6(3)1,
6(3)2,
6(3)3,
6(3)4,
6(3)5,
6(4)1,
6(4)2,
6(4)3,
6(4)4,
6(4)5,
6(4)6,
8(1)3
- sound,
6(1)2,
7(4)6
- structure,
6(2)1,
7(4)6,
8(2)6
- technology,
5(4)3,
6(4)6,
7(2)1,
8(3)9
- training,
5(4)1,
6(3)2
- use,
2(1)17,
3(1)1-1,
5(4)1,
5(4)3,
6(1)2,
6(3)4,
6(3)6,
6(4)2,
6(4)5,
7(1)1,
7(1)2,
7(1)3,
7(4)3,
7(4)5,
7(4)6,
8(2)4,
8(2)5,
8(3)9,
8(4)11
- used,
2(1)17,
5(4)1,
6(2)1,
6(2)2,
6(3)2,
6(3)4,
6(3)5,
6(4)2,
6(4)3,
7(4)1,
7(4)3,
7(4)4,
7(4)5,
8(1)2,
8(3)8
- will,
6(4)3,
6(4)6,
7(1)1