Psychological interventions of virtual gamification within academic intrinsic motivation: A systematic review

J Xu, A Lio, H Dhaliwal, S Andrei… - Journal of Affective …, 2021 - Elsevier
BACKGROUND: Students constantly seek ways to improve productivity within academia.
With the advancement of technology in the recent decade, virtual implementations may …

How has design thinking being used and integrated into software development activities? A systematic mapping

R Parizi, M Prestes, S Marczak, T Conte - Journal of Systems and Software, 2022 - Elsevier
Software companies have been using Design Thinking (DT) as a user-centered design
approach, putting the user at the center of the software development process. In this article …

DEFeND architecture: a privacy by design platform for GDPR compliance

L Piras, MG Al-Obeidallah, A Praitano… - Trust, Privacy and …, 2019 - Springer
The advent of the European General Data Protection Regulation (GDPR) imposes
organizations to cope with radical changes concerning user data protection paradigms …

Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform

A Tsohou, E Magkos, H Mouratidis… - … & Computer Security, 2020 - emerald.com
Purpose General data protection regulation (GDPR) entered into force in May 2018 for
enhancing personal data protection. Even though GDPR leads toward many advantages for …

Privacy, security, legal and technology acceptance requirements for a GDPR compliance platform

A Tsohou, M Magkos, H Mouratidis… - … Security: ESORICS 2019 …, 2020 - Springer
GDPR entered into force in May 2018 for enhancing user data protection. Even though
GDPR leads towards a radical change with many advantages for the data subjects it turned …

DEFeND DSM: A data scope management service for model-based privacy by design GDPR compliance

L Piras, MG Al-Obeidallah, M Pavlidis… - Trust, Privacy and …, 2020 - Springer
The introduction of the European General Data Protection Regulation (GDPR) has brought
significant benefits to citizens, but it has also created challenges for organisations, which are …

Knowledge transfer in software development teams using gamification: A systematic literature review

S Galeano-Ospino, L Machuca-Villegas… - New Perspectives in …, 2021 - Springer
One of the objectives of knowledge management is knowledge transfer. In software
development projects, collaborative work is the key to teamwork. These projects are …

The supply chain of a Living Lab: Modelling security, privacy, and vulnerability issues alongside with their impact and potential mitigation strategies

K Kioskli, D Dellagiacoma, T Fotis… - Journal of Wireless …, 2022 - repository.essex.ac.uk
Worldwide, vulnerabilities and weak security strategies are exploited everyday by
adversaries in healthcare organizations. Healthcare is targeted because these crimes are …

Reducing Requirements Ambiguity via Gamification: Comparison with Traditional Techniques

HS Dar, S Imtiaz, MIU Lali - Computational Intelligence and …, 2022 - Wiley Online Library
Requirements elicitation is one of the most significant activities of requirements engineering
(RE) process. Poorly specified requirements can lead to a failed project. Various elicitation …

Design Thinking Testing of AR/VR Application for Bali's Lontar Prasi Preservation

CP Yanti, IGI Sudipa… - Jurnal Multidisiplin …, 2023 - journal.formosapublisher.org
This study investigates the use of Design Thinking in the creation of Augmented Reality (AR)
and Virtual Reality (VR) applications for the preservation of Bali's Lontar Prasi cultural …