Journal articles on the topic 'Threats from computer games'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Threats from computer games.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Palilingan, Verry Ronny, Reski M. Rorong, Undap E. B. Yeremia, and Gerry T. Tambaani. "A Survey Student Behaviors Computer Security: Evidence from University." International Journal of Information Technology and Education 1, no. 2 (2022): 99–102. http://dx.doi.org/10.62711/ijite.v1i2.47.
Full textGundry, David, and Sebastian Deterding. "Validity Threats in Quantitative Data Collection With Games: A Narrative Survey." Simulation & Gaming 50, no. 3 (2018): 302–28. http://dx.doi.org/10.1177/1046878118805515.
Full textHuhtinen, Aki-Mauri. "From Military Threats to Everyday Fear." International Journal of Cyber Warfare and Terrorism 2, no. 2 (2012): 1–10. http://dx.doi.org/10.4018/ijcwt.2012040101.
Full textKao, Chun-Chieh, Chun-Chin Liao, and Yu-Jy Luo. "Threats Posed by Social Media and Computer and Video Games from the Perspective of Sport Education." International Journal of Emerging Technologies in Learning (iJET) 17, no. 06 (2022): 57–72. http://dx.doi.org/10.3991/ijet.v17i06.18989.
Full textTrinkle, Brad S., Robert E. Crossler, and Merrill Warkentin. "I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks." Journal of Information Systems 28, no. 2 (2014): 307–27. http://dx.doi.org/10.2308/isys-50776.
Full textAdam, Adamski*, and Adamska Julia. "Education through Art in the World of Games Computer for Children and Teenagers." International Journal of Clinical and Medical Cases (ISSN:2517-7346) 5, no. 2 (2022): 1–5. https://doi.org/10.31021/IJCMC20225176.
Full textKaradimce, Aleksandar, and Marija Bukalevska. "Threats Targeting Children on Online Social Networks." WSEAS TRANSACTIONS ON COMPUTERS 22 (December 31, 2022): 13–19. http://dx.doi.org/10.37394/23205.2023.22.3.
Full textOrak, Dilan, Merve Bakırtaş, and Umay Hasançebi Önder. "Case analysis of the effects of digital violence on children in Turkish Penal Law perspective." JOURNAL OF AWARENESS 9, Özel 2 (2024): 69–85. https://doi.org/10.26809/joa.2519.
Full textMikolajewska, Izabela, and Agata Mikolajewska. "(Un)safe screen time? Critical theoretical-empirical analysis." International Journal of Pedagogy, Innovation and New Technologies 3, no. 2 (2016): 47–52. http://dx.doi.org/10.5604/01.3001.0009.5099.
Full textŽegunienė, Vaida, and Małgorzata Karczewska. "GLOBAL AND INNOVATIVE TOOLS IN ENGLISH LANGUAGE LEARNING: STRENGTHS OR THREATS?" SOCIETY. INTEGRATION. EDUCATION. Proceedings of the International Scientific Conference 3 (May 25, 2018): 580–93. http://dx.doi.org/10.17770/sie2018vol1.3131.
Full textSemchuk, Svetlana. "USE OF INFORMATION TECHNOLOGIES IN THE SPIRITUAL FORMATION OF THE YOUNG GENERATION." Problems of Modern Teacher Training, no. 1(23) (April 29, 2021): 35–41. http://dx.doi.org/10.31499/2307-4914.1(23).2021.232748.
Full textPowell, Anna. "True stories: Storytelling and empathy in None in Three’s digital game narratives." Book 2.0 10, no. 1 (2020): 99–115. http://dx.doi.org/10.1386/btwo_00022_1.
Full textZhang, Jing, Shifei Shen, and Rui Yang. "The impacts of adaptive attacking and defending strategies on mitigation of intentional threats." Kybernetes 39, no. 5 (2010): 825–37. http://dx.doi.org/10.1108/03684921011043279.
Full textRavishankar, Monica, D. Vijay Rao, and C. R. S. Kumar. "A Game Theoretic Software Test-bed for Cyber Security Analysis of Critical Infrastructure." Defence Science Journal 68, no. 1 (2017): 54. http://dx.doi.org/10.14429/dsj.68.11402.
Full textJenson, Jennifer, and Suzanne de Castell. "“The Entrepreneurial Gamer”: Regendering the Order of Play." Games and Culture 13, no. 7 (2018): 728–46. http://dx.doi.org/10.1177/1555412018755913.
Full textLukyanets, G. N., L. V. Makarova, M. C. Schibalova, and K. V. Orlov. "Features of the use of CT and other types of outside school hours activities in students of grades 4-5." Novye issledovania, no. 2(74) (October 26, 2023): 15–22. http://dx.doi.org/10.46742/2072-8840-2023-74-2-14-21.
Full textWysokińska-Senkus, Aneta. "The Concept of Safety and Security Education in the Context of Sustainability." Sustainability 12, no. 12 (2020): 5022. http://dx.doi.org/10.3390/su12125022.
Full textJohnston, Keith M., and Tom Phillips. "A ‘Step into the Abyss'?" International Journal of Gaming and Computer-Mediated Simulations 8, no. 2 (2016): 43–58. http://dx.doi.org/10.4018/ijgcms.2016040104.
Full textTandoc, Edson, and Seth Seet. "Winning the game against fake news? Using games to inoculate adolescents and young adults in Singapore against fake news." Estudios sobre el Mensaje Periodístico 29, no. 4 (2023): 771–81. http://dx.doi.org/10.5209/esmp.88599.
Full textLiu, Xiao, Zhao Huang, Quan Wang, and Bo Wan. "An Evolutionary Game Theory-Based Method to Mitigate Block Withholding Attack in Blockchain System." Electronics 12, no. 13 (2023): 2808. http://dx.doi.org/10.3390/electronics12132808.
Full textTakeda, K., S. J. Newman, J. Kenny, and M. Zyskowski. "Convergence: Commodity flight simulation and the future." Aeronautical Journal 112, no. 1136 (2008): 599–607. http://dx.doi.org/10.1017/s0001924000002566.
Full textWellington, William J., David B. Hutchinson, and Anthony J. Faria. "Measuring the Impact of a Marketing Simulation Game." Simulation & Gaming 48, no. 1 (2016): 56–80. http://dx.doi.org/10.1177/1046878116675103.
Full textYANG, ZILI. "A PSEUDO "FOLK" THEOREM IN THE STRATEGIC PROVISION OF STOCK EXTERNALITIES." International Game Theory Review 05, no. 04 (2003): 347–59. http://dx.doi.org/10.1142/s0219198903001094.
Full textValentyna, Voronkova, Kapitanenko Nataliia, and Nikitenko Vìtalina. "Legal principles of intellectual property protection in the digital society." ScienceRise: Juridical Science, no. 4(10) (December 30, 2019): 32–37. https://doi.org/10.15587/2523-4153.2019.188163.
Full textDaniluk, Aleksandra Eliza, Joanna Ratajczak, and Marta Stępień-Słodkowska. "Ograniczmy dzieciom internet = Confine children internet." Journal of Education, Health and Sport ISSN 2391-8306 formerly Journal of Health Sciences ISSN 1429-9623 /2300-665X 4, no. 13 (2014): 33–45. https://doi.org/10.5281/zenodo.13134.
Full textPoorolajal, Jalal, Jamal Ahmadpoor, Younes Mohammadi, Ali Reza Soltanian, Seyedeh Zahra Asghari, and Ehsan Mazloumi. "Prevalence of problematic internet use disorder and associated risk factors and complications among Iranian university students: a national survey." Health Promotion Perspectives 9, no. 3 (2019): 207–13. http://dx.doi.org/10.15171/hpp.2019.29.
Full textSchweighauser, Philipp. "Doubly Real: Game Studies and Literary Anthropology; or, Why We Play Games." Eludamos: Journal for Computer Game Culture 3, no. 2 (2009): 115–32. http://dx.doi.org/10.7557/23.6001.
Full textRajadesingan, Ashwin, Daniel Choo, Jessica Zhang, Mia Inakage, Ceren Budak, and Paul Resnick. "GuesSync!: An Online Casual Game To Reduce Affective Polarization." Proceedings of the ACM on Human-Computer Interaction 7, CSCW2 (2023): 1–33. http://dx.doi.org/10.1145/3610190.
Full textDr., V. Srinivasan. "MULTIMEDIA APPLICATIONS IN EDUCATION." International Journal of Interdisciplinary Research in Arts and Humanities (IJIRAH) 1, no. 1 (2016): 204–8. https://doi.org/10.5281/zenodo.7772440.
Full textSzurek, Mateusz. "Computer Games in Speech Therapy – Opportunities and Threats." Irydion. Literatura - Teatr - Kultura 4, no. 1 (2018): 83–92. http://dx.doi.org/10.16926/i.2018.04.06.
Full textPeckham, Jeremy. "Masters or Slaves? AI and the Future of Humanity." Perspectives on Science and Christian Faith 73, no. 4 (2021): 244–45. http://dx.doi.org/10.56315/pscf12-21peckham.
Full textDodig-Crnkovic, Gordana, and Thomas Larsson. "Game Ethics - Homo Ludens as a Computer Game Designer and Consumer." International Review of Information Ethics 4 (December 1, 2005): 19–23. http://dx.doi.org/10.29173/irie164.
Full textSYDORENKO, ANDRIY, ASMATI CHIBALASHVILI, IHOR SHALINSKYI, SVIATOSLAV BERDYNSKIKH, and VIKTORIYA MAZUR. "UKRAINIAN DIGITAL ART DURING THE FULL-SCALE RUSSIAN-UKRAINIAN WAR." AD ALTA: 13/02-XXXVII. 13, no. 2 (2023): 125–30. http://dx.doi.org/10.33543/j.130237.125130.
Full textNaidoo, Rennie, Kalley Coleman, and Cordelia Guyo. "Exploring gender discursive struggles about social inclusion in an online gaming community." Information Technology & People 33, no. 2 (2019): 576–601. http://dx.doi.org/10.1108/itp-04-2019-0163.
Full textLohfink, Nicole. "Schule und Spiel – mehr als reine Wissensvermittlung." merz | medien + erziehung 62, no. 1 (2018): 84–87. https://doi.org/10.21240/merz/2018.1.24.
Full textOnischenko, G. G., A. N. Kulichenko, O. V. Maletskaya, G. M. Grizhebovsky, and V. P. Klindukhov. "Ensuring of Protection from Biological Threats During Olympic Games." Problems of Particularly Dangerous Infections, no. 4(106) (August 20, 2010): 5–8. http://dx.doi.org/10.21055/0370-1069-2010-4(106)-5-8.
Full textD Mathews, John, and Richard A Smallwood. "Australian responses to threats of bioterrorism." Microbiology Australia 24, no. 2 (2003): 11. http://dx.doi.org/10.1071/ma03211.
Full textMurzaev, I. O., and A. L. Panishchev. "Human education in the historical space virtual world of a computer game." Voprosy kul'turologii (Issues of Cultural Studies), no. 7 (June 30, 2021): 583 (664)—591 (670). http://dx.doi.org/10.33920/nik-01-2107-01.
Full textJakóbik, Agnieszka, Francesco Palmieri, and Joanna Kołodziej. "Stackelberg games for modeling defense scenarios against cloud security threats." Journal of Network and Computer Applications 110 (May 2018): 99–107. http://dx.doi.org/10.1016/j.jnca.2018.02.015.
Full textTalan, Maria V., Anton E. Shalagin, and Almaz D. Idiyatullov. "Legal regulation of liability for offenses related to inducement to suicide: Domestic and foreign experience." Vestnik of Saint Petersburg University. Law 13, no. 4 (2022): 1078–98. http://dx.doi.org/10.21638/spbu14.2022.415.
Full textNarayanasamy, Viknashvaran, Kok Wai Wong, Chun Che Fung, and Shri Rai. "Distinguishing games and simulation games from simulators." Computers in Entertainment 4, no. 2 (2006): 9. http://dx.doi.org/10.1145/1129006.1129021.
Full textCoyne, Richard. "Mindless repetition: Learning from computer games." Design Studies 24, no. 3 (2003): 199–212. http://dx.doi.org/10.1016/s0142-694x(02)00052-2.
Full textPinheiro, Mateus, Windson Viana, and Ticianne de Gois Ribeiro Darin. "Why Should Red and Green Never Be Seen? Exploring Color Blindness Simulations as Tools to Create Chromatically Accessible Games." Proceedings of the ACM on Human-Computer Interaction 7, CHI PLAY (2023): 165–96. http://dx.doi.org/10.1145/3611026.
Full textCasey, William, Jose Andre Morales, Evan Wright, Quanyan Zhu, and Bud Mishra. "Compliance signaling games: toward modeling the deterrence of insider threats." Computational and Mathematical Organization Theory 22, no. 3 (2016): 318–49. http://dx.doi.org/10.1007/s10588-016-9221-5.
Full textGóra, Dariusz. "Unhealthy nutrition among teenagers in the city of Bielsko-Biała." Pediatria i Medycyna Rodzinna 18, no. 4 (2023): 371–75. http://dx.doi.org/10.15557/pimr.2022.0055.
Full textAnnear, Michael, Tetsuhiro Kidokoro, and Yasuo Shimizu. "Existential threats to the Summer Olympic and Paralympic Games? a review of emerging environmental health risks." Reviews on Environmental Health 36, no. 2 (2021): 159–66. http://dx.doi.org/10.1515/reveh-2020-0141.
Full textXian Guo, Xian Guo, Jianing Yang Xian Guo, Zhanhui Gang Jianing Yang, and An Yang Zhanhui Gang. "Research on Network Security Situation Awareness and Dynamic Game Based on Deep Q Learning Network." 網際網路技術學刊 24, no. 2 (2023): 537–51. http://dx.doi.org/10.53106/160792642023032402030.
Full textBernet, Julien, David Janin, and Igor Walukiewicz. "Permissive strategies: from parity games to safety games." RAIRO - Theoretical Informatics and Applications 36, no. 3 (2002): 261–75. http://dx.doi.org/10.1051/ita:2002013.
Full textLamarche, François. "From Proof Nets to Games." Electronic Notes in Theoretical Computer Science 3 (1996): 107–19. http://dx.doi.org/10.1016/s1571-0661(05)80409-8.
Full textLevy, David. "From Computer Games to a Global Brain." ICGA Journal 35, no. 4 (2012): 220–24. http://dx.doi.org/10.3233/icg-2012-35405.
Full text