Academic literature on the topic 'Threats from computer games'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Threats from computer games.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Threats from computer games"
Palilingan, Verry Ronny, Reski M. Rorong, Undap E. B. Yeremia, and Gerry T. Tambaani. "A Survey Student Behaviors Computer Security: Evidence from University." International Journal of Information Technology and Education 1, no. 2 (2022): 99–102. http://dx.doi.org/10.62711/ijite.v1i2.47.
Full textGundry, David, and Sebastian Deterding. "Validity Threats in Quantitative Data Collection With Games: A Narrative Survey." Simulation & Gaming 50, no. 3 (2018): 302–28. http://dx.doi.org/10.1177/1046878118805515.
Full textHuhtinen, Aki-Mauri. "From Military Threats to Everyday Fear." International Journal of Cyber Warfare and Terrorism 2, no. 2 (2012): 1–10. http://dx.doi.org/10.4018/ijcwt.2012040101.
Full textKao, Chun-Chieh, Chun-Chin Liao, and Yu-Jy Luo. "Threats Posed by Social Media and Computer and Video Games from the Perspective of Sport Education." International Journal of Emerging Technologies in Learning (iJET) 17, no. 06 (2022): 57–72. http://dx.doi.org/10.3991/ijet.v17i06.18989.
Full textTrinkle, Brad S., Robert E. Crossler, and Merrill Warkentin. "I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks." Journal of Information Systems 28, no. 2 (2014): 307–27. http://dx.doi.org/10.2308/isys-50776.
Full textAdam, Adamski*, and Adamska Julia. "Education through Art in the World of Games Computer for Children and Teenagers." International Journal of Clinical and Medical Cases (ISSN:2517-7346) 5, no. 2 (2022): 1–5. https://doi.org/10.31021/IJCMC20225176.
Full textKaradimce, Aleksandar, and Marija Bukalevska. "Threats Targeting Children on Online Social Networks." WSEAS TRANSACTIONS ON COMPUTERS 22 (December 31, 2022): 13–19. http://dx.doi.org/10.37394/23205.2023.22.3.
Full textOrak, Dilan, Merve Bakırtaş, and Umay Hasançebi Önder. "Case analysis of the effects of digital violence on children in Turkish Penal Law perspective." JOURNAL OF AWARENESS 9, Özel 2 (2024): 69–85. https://doi.org/10.26809/joa.2519.
Full textMikolajewska, Izabela, and Agata Mikolajewska. "(Un)safe screen time? Critical theoretical-empirical analysis." International Journal of Pedagogy, Innovation and New Technologies 3, no. 2 (2016): 47–52. http://dx.doi.org/10.5604/01.3001.0009.5099.
Full textŽegunienė, Vaida, and Małgorzata Karczewska. "GLOBAL AND INNOVATIVE TOOLS IN ENGLISH LANGUAGE LEARNING: STRENGTHS OR THREATS?" SOCIETY. INTEGRATION. EDUCATION. Proceedings of the International Scientific Conference 3 (May 25, 2018): 580–93. http://dx.doi.org/10.17770/sie2018vol1.3131.
Full textDissertations / Theses on the topic "Threats from computer games"
Kubik, Erica. "From girlfriend to gamer negotiating place in the hardcore/casual divide of online video game communities /." Bowling Green, Ohio : Bowling Green State University, 2010. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=bgsu1260391480.
Full textBoawn, Daniel L. "Cyber counterintelligence, defending the United States' information technology and communications critical infrastructure from Chinese threats." Thesis, Utica College, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1555786.
Full textWoodiss-Field, Ashley C. "Evaluating traditional botnet detection applied to contemporary threats from the internet of things." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2023. https://ro.ecu.edu.au/theses/2719.
Full textDeprette, Manon. "Estimation of player trajectories from context in football games using autoencoders." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280698.
Full textSongar, Poonam. "Learning Assessment Data Collection from Educational Game Applications." Kent State University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=kent1353900797.
Full textXu, Yushi Ph D. Massachusetts Institute of Technology. "Language technologies in speech-enabled second language learning games : from reading to dialogue." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/75652.
Full textLeitch, Mitchell R. "One-Handed, Two-Handed, Wii-Handed? The Effects of Different Types of Interfaces on the Ability of Middle-School Students to Learn from Educational Video Games." Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1219441254.
Full textPerdomo, Patrick. "Grinding from a Player’s and Game Designer’s Point of View." Thesis, Malmö universitet, Institutionen för datavetenskap och medieteknik (DVMT), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-43306.
Full textFurtner, Anita Lynn. "ENTERTAINING CRISIS: WHAT 21ST CENTURY CORPORATIONS CAN LEARN FROM THE RHETORIC OF CRISIS IN FILM AND COMPUTER GAMES." Diss., The University of Arizona, 2011. http://hdl.handle.net/10150/145449.
Full textMunir, Sundas, and Mirza Sanam Iqbal Baig. "Challenges and Security Aspects of Blockchain Based Online Multiplayer Games." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-38771.
Full textBooks on the topic "Threats from computer games"
1960-, Cassell Justine, and Jenkins Henry 1958-, eds. From Barbie to Mortal Kombat: Gender and computer games. MIT Press, 2000.
Find full textJenkins, Henry, and Justine Cassell, eds. From Barbie to Mortal Kombat: Gender and Computer Games. MIT Press, 1998.
Find full textTerry, Borst, ed. Story and simulations for serious games: Tales from the trenches. Elsevier, 2006.
Find full textRick, Barba, ed. Grand theft auto: Episodes from Liberty City. 3rd ed. DK/BradyGAMES, 2009.
Find full textYounger, Marshal. Escape from the forbidden matrix. Tyndale House Publishers, 2001.
Find full textLobão, Alexandre Santos. Beginning XNA 2.0 game programming: From novice to professional. Apress, 2008.
Find full textSaltzman, Marc. Game creation and careers: Insider secrets from industry experts. New Riders, 2004.
Find full textA, Bustamante Sergio, and Park Tae Joon, eds. Producing games: From business and budgets to creativity and design. Focal Press, 2010.
Find full textBook chapters on the topic "Threats from computer games"
Cansever, Derya. "Security Games with Insider Threats." In Lecture Notes in Computer Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-64793-3_28.
Full textWalukiewicz, Igor. "From Logic to Games." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11590156_5.
Full textLevy, David. "Games from the ACM Tournaments." In Computer Chess Compendium. Springer New York, 1988. http://dx.doi.org/10.1007/978-1-4757-1968-0_32.
Full textLevy, David. "Games from the World Computer Championships." In Computer Chess Compendium. Springer New York, 1988. http://dx.doi.org/10.1007/978-1-4757-1968-0_33.
Full textMadej, Krystina S. "Children’s Games, from Turtle to Squirtle." In Encyclopedia of Computer Graphics and Games. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-08234-9_103-1.
Full textMadej, Krystina S. "Children’s Games, from Turtle to Squirtle." In Encyclopedia of Computer Graphics and Games. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-08234-9_103-2.
Full textMadej, Krystina S. "Children’s Games, from Turtle to Squirtle." In Encyclopedia of Computer Graphics and Games. Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-23161-2_103.
Full textBerger, Bernhard J., Karsten Sohr, and Rainer Koschke. "Automatically Extracting Threats from Extended Data Flow Diagrams." In Lecture Notes in Computer Science. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30806-7_4.
Full textRichter, Stephan R., Vibhav Vineet, Stefan Roth, and Vladlen Koltun. "Playing for Data: Ground Truth from Computer Games." In Computer Vision – ECCV 2016. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46475-6_7.
Full textTobias, Sigmund, and Dexter Fletcher. "Learning from Computer Games: A Research Review." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-33814-4_2.
Full textConference papers on the topic "Threats from computer games"
Peck, Andrew George, Iain Phillips, and Tim Watson. "Shadow Users: Cyber-Physical Threats from a Human-Computer Interaction Perspective." In 2025 7th International Congress on Human-Computer Interaction, Optimization and Robotic Applications (ICHORA). IEEE, 2025. https://doi.org/10.1109/ichora65333.2025.11017158.
Full textMetger, Tony, Anand Natarajan, and Tina Zhang. "Succinct Arguments for QMA from Standard Assumptions via Compiled Nonlocal Games." In 2024 IEEE 65th Annual Symposium on Foundations of Computer Science (FOCS). IEEE, 2024. http://dx.doi.org/10.1109/focs61266.2024.00078.
Full textHoffmann, Michael, Jan Fillies, Silvio Peikert, and Adrian Paschke. "From Text to Text Game: A Novel RAG Approach to Gamifying Anthropological Literature and Build Thick Games." In 17th International Conference on Computer Supported Education. SCITEPRESS - Science and Technology Publications, 2025. https://doi.org/10.5220/0013215400003932.
Full textVaduva, Janalexandru, Raduemanuel Chiscariu, Ioana Culic, Iuliamaria Florea, and Razvan Rughinis. "ADREM: SYSTEM CALL BASED INTRUSION DETECTION FRAMEWORK." In eLSE 2019. Carol I National Defence University Publishing House, 2019. http://dx.doi.org/10.12753/2066-026x-19-021.
Full textBerg, Vanessa, Jerome H. Stofleth, Dale S. Preece, and Venner Saul. "Analysis of Dynamic Loading of a Simple Structure to a Blast Wave." In ASME 2002 Pressure Vessels and Piping Conference. ASMEDC, 2002. http://dx.doi.org/10.1115/pvp2002-1148.
Full textKrahenbuhl, Philipp. "Free Supervision from Video Games." In 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2018. http://dx.doi.org/10.1109/cvpr.2018.00312.
Full textFernandez, Eduardo B., and Sergio Mujica. "Building Secure Systems: From Threats to Security Patterns." In 2010 XXIX International Conference of the Chilean Computer Science Society (SCCC). IEEE, 2010. http://dx.doi.org/10.1109/sccc.2010.36.
Full textVolkovas, Rokas, Michael Fairbank, John R. Woodward, and Simon Lucas. "Extracting Learning Curves From Puzzle Games." In 2019 11th Computer Science and Electronic Engineering (CEEC). IEEE, 2019. http://dx.doi.org/10.1109/ceec47804.2019.8974318.
Full textChiou, Wen-Bin, Chin-Sheng Wan, and Ya-Ling Chang. "Attitude Change toward Online Gaming among Adolescent Players Based on Dissonance Theory: The Role of Threats and Justification of Effort." In Annual International Conferences on Computer Games, Multimedia and Allied Technology. Global Science & Technology Forum (GSTF), 2008. http://dx.doi.org/10.5176/978-981-08-8227-3_cgat08-37.
Full textStamos, Alex. "Realistic Threats and Realistic Users: Lessons from the Election." In CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2020. http://dx.doi.org/10.1145/3372297.3424553.
Full textReports on the topic "Threats from computer games"
Friedrich, Jörg. Response II: How Much Have We Really Moved On From Those Earlier Days When Holocaust Computer Games Were Forbidden? Landecker Digital Memory Lab, 2025. https://doi.org/10.20919/oyhd7385.
Full text