<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JSG</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Serious Games</journal-id>
      <journal-title>JMIR Serious Games</journal-title>
      <issn pub-type="epub">2291-9279</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v10i1e33459</article-id>
      <article-id pub-id-type="pmid">35171103</article-id>
      <article-id pub-id-type="doi">10.2196/33459</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Teaching Students About Plagiarism Using a Serious Game (Plagi-Warfare): Design and Evaluation Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Zary</surname>
            <given-names>Nabil</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Eckert</surname>
            <given-names>Martina</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Verma</surname>
            <given-names>Vipin</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Ade-Ibijola</surname>
            <given-names>Abejide</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Johannesburg Business School</institution>
            <institution>University of Johannesburg</institution>
            <addr-line>Barry Hertzog Ave &#38;, Empire Rd</addr-line>
            <addr-line>Milpark</addr-line>
            <addr-line>Johannesburg, 2092</addr-line>
            <country>South Africa</country>
            <phone>27 11 559 1774</phone>
            <email>abejideai@uj.ac.za</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-9507-0455</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Young</surname>
            <given-names>Keagan</given-names>
          </name>
          <degrees>BCom</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-0568-4443</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Sivparsad</surname>
            <given-names>Nashik</given-names>
          </name>
          <degrees>BCom</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-7287-6349</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Seforo</surname>
            <given-names>Mpho</given-names>
          </name>
          <degrees>BCom</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-9446-2481</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Ally</surname>
            <given-names>Suhail</given-names>
          </name>
          <degrees>BCom</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-2562-0233</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author">
          <name name-style="western">
            <surname>Olowolafe</surname>
            <given-names>Adebola</given-names>
          </name>
          <degrees>BCom</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6170-646X</ext-link>
        </contrib>
        <contrib id="contrib7" contrib-type="author">
          <name name-style="western">
            <surname>Frahm-Arp</surname>
            <given-names>Maria</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-5608-5718</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Johannesburg Business School</institution>
        <institution>University of Johannesburg</institution>
        <addr-line>Johannesburg</addr-line>
        <country>South Africa</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Library and Information Centre</institution>
        <institution>University of Johannesburg</institution>
        <addr-line>Johannesburg</addr-line>
        <country>South Africa</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Abejide Ade-Ibijola <email>abejideai@uj.ac.za</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <season>Jan-Mar</season>
        <year>2022</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>16</day>
        <month>2</month>
        <year>2022</year>
      </pub-date>
      <volume>10</volume>
      <issue>1</issue>
      <elocation-id>e33459</elocation-id>
      <history>
        <date date-type="received">
          <day>8</day>
          <month>9</month>
          <year>2021</year>
        </date>
        <date date-type="rev-request">
          <day>23</day>
          <month>10</month>
          <year>2021</year>
        </date>
        <date date-type="rev-recd">
          <day>14</day>
          <month>11</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>6</day>
          <month>12</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Abejide Ade-Ibijola, Keagan Young, Nashik Sivparsad, Mpho Seforo, Suhail Ally, Adebola Olowolafe, Maria Frahm-Arp. Originally published in JMIR Serious Games (https://games.jmir.org), 16.02.2022.</copyright-statement>
      <copyright-year>2022</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Serious Games, is properly cited. The complete bibliographic information, a link to the original publication on https://games.jmir.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://games.jmir.org/2022/1/e33459" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Educational games have been proven to support the teaching of various concepts across disciplines. Plagiarism is a major problem among undergraduate and postgraduate students at universities.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>In this paper, we propose a game called Plagi-Warfare that attempts to teach students about plagiarism.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>To do this at a level that is beyond quizzes, we proposed a game storyline and mechanics that allow the player (or student) to play as a mafia member or a detective. This either demonstrated their knowledge by plagiarizing within the game as a mafia member or catching plagiarists within the game as a detective. The game plays out in a 3D environment representing the major libraries of the University of Johannesburg, South Africa. In total, 30 students were selected to evaluate the game.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Evaluation of the game mechanics and storyline showed that the student gamers enjoyed the game and learned about plagiarism.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>In this paper, we presented a new educational game that teaches students about plagiarism by using a new crime story and an immersive 3D gaming environment representing the libraries of the University of Johannesburg.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>serious games</kwd>
        <kwd>educational games</kwd>
        <kwd>plagiarism</kwd>
        <kwd>library games</kwd>
        <kwd>game mechanics</kwd>
        <kwd>education</kwd>
        <kwd>teaching</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <p>Plagiarism is the reuse of another person’s ideas, work, or words as one’s own, without sufficient credit being given to the original creator [<xref ref-type="bibr" rid="ref1">1</xref>]. Reasons people plagiarize are that the benefits outweigh the drawbacks, while a student’s motivation to plagiarize could be the goal of good grades and the ability to measure up with their peers [<xref ref-type="bibr" rid="ref2">2</xref>]. Another noteworthy reason is that with the flood of online information, several researchers have noted that students are more likely to ignore the ethics behind plagiarizing [<xref ref-type="bibr" rid="ref3">3</xref>].</p>
      <p>Beyond concerns in the student realm is a slight, less rampant concern with academics who also plagiarize in their own academic writings [<xref ref-type="bibr" rid="ref4">4</xref>]. This is because certain research institutions offer financial incentives/subsidies (sponsored by the government of the country) for research outputs, making academics in such institutions more desperate to produce more research [<xref ref-type="bibr" rid="ref4">4</xref>]. Although most academics do not plagiarize, they sometimes look the other way when their students do. One, because of the concerned modules [<xref ref-type="bibr" rid="ref5">5</xref>], and sometimes because of the stressful red tape that goes into reporting these transgressions to the institution, as this leads to many meetings and validation processes [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref7">7</xref>]. If students are trained well, and taught what is and is not plagiarism, they often avoid it [<xref ref-type="bibr" rid="ref8">8</xref>,<xref ref-type="bibr" rid="ref9">9</xref>]. Many of the incidences reported are attributed to ignorance on the part of the student, the incapability to write original content, the pressure on postgraduate students to publish, or simply the lack of realization and understanding of what is implied by plagiarism [<xref ref-type="bibr" rid="ref8">8</xref>]. In this paper, we propose a game called Plagi-Warfare (a video exhibition of Plagi-Warfare has been created earlier [<xref ref-type="bibr" rid="ref10">10</xref>]) that attempts to teach students about plagiarism.</p>
      <p>A number of software tools or technological solutions have been proposed to assist in the fight against plagiarism. Popular paid tools (such as those listed in Tripathi et al [<xref ref-type="bibr" rid="ref11">11</xref>]) include Turnitin, CopyCatch Gold, and EVE2: Essay Verification Engine, while some free online tools include Dupli Checker, Copyleaks, and PaperRater. Particularly, games have also been created to engage students or players with plagiarism educational contents. Here, we briefly mention 3 of these games. The first is Goblin Threat [<xref ref-type="bibr" rid="ref12">12</xref>]. Goblin Threat is played by finding and clicking on goblins, who ask questions about different aspects of plagiarism. Sound and engaging design are used to keep the players’ attention. The second is Cheats and Geeks [<xref ref-type="bibr" rid="ref13">13</xref>], a board game where players race against a rival to display their research. Players are enticed by a chance to move faster by committing wrongdoings. Finally, Planet in Peril [<xref ref-type="bibr" rid="ref14">14</xref>] is a game where the player navigates through a 3D campus environment and learns about plagiarism through exchange with aliens. There are several opportunities to improve existing educational games for teaching plagiarism or other subjects/contents. First, it is helpful to look at the limitations of existing games and attempt to address those limitations in creating more effective games for teaching a topic such as plagiarism. Some of such limitations are as follows:</p>
      <list list-type="bullet">
        <list-item>
          <p>Some of these games are especially relating to students in certain academic fields [<xref ref-type="bibr" rid="ref14">14</xref>]. This makes the audience restricted. A game that will teach students about plagiarism should be playable by students who are not gamers.</p>
        </list-item>
        <list-item>
          <p>According to Broussard [<xref ref-type="bibr" rid="ref14">14</xref>], many educational games are not engaging enough to allow players to select their own in-game visual representations (or avatars), stating that this could improve the player’s compassion for their virtual self.</p>
        </list-item>
        <list-item>
          <p>Kazimoglu et al [<xref ref-type="bibr" rid="ref15">15</xref>] raised a similar concern about games not having multiple gameplay paths, forcing the player to make similar choices every time, hence leading to boredom for the player.</p>
        </list-item>
        <list-item>
          <p>As far as we know, no library plagiarism game takes place in a virtual environment that its students are familiar with, within the context of South African university libraries.</p>
        </list-item>
        <list-item>
          <p>The levels of complexity of gameplay are not well defined (and mostly absent) in these educational or plagiarism-teaching games [<xref ref-type="bibr" rid="ref16">16</xref>].</p>
        </list-item>
        <list-item>
          <p>Due to the static nature of the contents of plagiarism and the challenge of presenting this content using the vehicle of games, previous games lack the replayability factor—gamers quickly get used to what challenges pop up in the game and where—leading to boredom after a few iterations of playing the game [<xref ref-type="bibr" rid="ref17">17</xref>-<xref ref-type="bibr" rid="ref19">19</xref>].</p>
        </list-item>
        <list-item>
          <p>The storyline of some of the previous games is mostly unrelatable to the students, for example, having aliens on campus in the game Planet in Peril [<xref ref-type="bibr" rid="ref14">14</xref>]. We have evidence to show that games having realistic stories are more relatable to students [<xref ref-type="bibr" rid="ref20">20</xref>].</p>
        </list-item>
      </list>
      <p>This paper is organized as follows. The Methods section presents the game design and algorithms for the new game that teaches plagiarism, Plagi-Warfare, as well as the technologies used in the implementation of Plagi-Warfare. Discussed in the Results section is an evaluation on the feedback on Plagi-Warfare. The Discussion section presents the background of the work and an analysis of related works, with the gap that is addressed in this work. Finally, we present the conclusions of this work and future works.</p>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <p>In this section, we present aspects of the game design of Plagi-Warfare. We start with the writing of the game’s story, followed by the description of the world where the story takes place. We end it with the description of the content of the game (plagiarism lessons, quizzes, or facts), levels of the game, scoring in the game, the technological/software design of the system for the game, and the follow of the game. <xref rid="figure1" ref-type="fig">Figure 1</xref> shows the Plagi-Warfare game components.</p>
      <fig id="figure1" position="float">
        <label>Figure 1</label>
        <caption>
          <p>Plagi-Warfare game components.</p>
        </caption>
        <graphic xlink:href="games_v10i1e33459_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
      </fig>
      <sec>
        <title>Story Development</title>
        <p>Here, we present the background story of Plagi-Warfare. In Plagi-Warfare, the player is able to choose whether to play as the bad guy or the good guy, that is, as a <italic>mafia member</italic> or a <italic>detective</italic>. The story of the mafia is that the player is an expelled student who is back to assist students in plagiarizing. The player joins the <italic>plagiarism cartel</italic> as a low-ranking member, completing tasks sent to their virtual phone and avoiding getting caught by detectives. The detective mode allows the player to be hired to investigate plagiarism cases within the library. The player walks around the library, questioning students about their work and assignments, to find more out about the plagiarism mafia. The students found guilty are questioned further and informed about the consequences of their actions. The player then uses what they have found to take down the plagiarism mafia.</p>
      </sec>
      <sec>
        <title>World Design</title>
        <p>In this section, we describe the design of the game world or environment. The environments in Plagi-Warfare were built using Unity Game Engine; it plays out in 3D gaming environments that are modeled after the libraries of the University of Johannesburg, South Africa. The libraries used in the gaming environment include the Auckland Park Bunting Road (APB) campus, the Kingsway Avenue (Auckland Park Kingsway [APK]) campus, and the Doornfontein (DFC) campus libraries. In Plagi-Warfare, there are 27 scenes: 4 of the scenes are used to assist the player to sign into/up for the game; 5 of the scenes are for the navigation for each mode of gameplay (resulting in 10 scenes for the mafia and detective modes)—that is, used to create pages for the user to access the leaderboard, options, profile, level selection, and level failed message; 7 scenes are for quizzes or game challenges; and 6 scenes are library environments, 3 for each game mode, representing the 3 libraries of the university.</p>
      </sec>
      <sec>
        <title>Content Design</title>
        <p>The content of Plagi-Warfare are the questions or challenges in the game. The questions that constitute challenges in the game were supplied by the librarians at the University of Johannesburg. These challenges are meant to test the players’ knowledge about plagiarism through scenario-based questions. The questions are composed with Boolean responses (true or false), identifying the best answer from multiple answers and identifying odd answers, word responses, and short text responses. To make sure that Plagi-Warfare is replayable, we used the seed questions/challenges to create an algorithm for the procedural generation of similar instances of the same questions, allowing the questions to be presented in a slightly different way every time. This has been proven to keep the interest of players in the game [<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref22">22</xref>].</p>
      </sec>
      <sec>
        <title>Level Design</title>
        <p>There are 6 levels in Plagi-Warfare. In the mafia role and in the detective role, there are 3 levels. The mafia levels are divided into 2 types of activities: The first type of activity involves the players exploring the gaming environment (which are virtual libraries) with the controllers and engaging in maneuverings, such as avoiding patrolling detectives (because the detectives are on the lookout for mafia members), while trying to locate hidden objects, such as books. The second type of activity is where the knowledge of the player about plagiarism is tested using scenarios or quizzes. The detective levels are divided into 2 types of activities: The first type of activity requires the player to roam the virtual environment and speak to student nonplayer characters (NPCs) to find potential mafia members. The second type of activity is to interrogate suspicious student NPCs with the use of a quiz. Players have to determine whether the student NPCs’ answers are correct or incorrect. The hardware required to play Plagi-Warfare is a desktop or a personal computer with an attached mouse and keyboard.</p>
        <p>The following mechanics are used to control the level of difficulty in Plagi-Warfare:</p>
        <list list-type="bullet">
          <list-item>
            <p>Each time a level is loaded, the mission objective’s location is randomized. This forces the player to search through the whole environment, still having the risk of being caught by detective NPCs.</p>
          </list-item>
          <list-item>
            <p>The detectives’ alert proximity increases as the levels progress, which increases the chances of the player getting caught.</p>
          </list-item>
          <list-item>
            <p>There is an increase in the difficulty or complexity of questions used in the quizzes.</p>
          </list-item>
          <list-item>
            <p>The number of questions asked increases in the game as the level increases.</p>
          </list-item>
        </list>
        <p>The average range of completion time for each level of Plagi-Warfare is 5-10 minutes.</p>
      </sec>
      <sec>
        <title>Scoring Design</title>
        <p>Plagi-Warfare is scored in South African Rands (symbolically noted as ZAR or simply R). Players are allocated virtual money for completing levels of the game. For each question answered correctly, a player gets R250 ($16.38). If a player answers 6 correct questions in a level, they are given R1500 ($98.27) for that level. Players are expected to gain bragging rights from their net worth in the game. For a player to proceed, they have to answer 80% of a level’s questions. There is a leaderboard in the game that shows the top players and their respective net worth.</p>
      </sec>
      <sec>
        <title>Game Flow Design</title>
        <p>The flow of play in Plagi-Warfare is illustrated in <xref rid="figure2" ref-type="fig">Figure 2</xref>. The player starts by signing in (or signs up if the player is new to the game), and they select the desired mode of play, detective or mafia member. The player is then presented with menu options to access the leaderboard and game options (where they can select avatars to represent themselves), view their profile, or select a level to play. When all levels are completed for the selected mode, the game halts—“End Game.”</p>
        <fig id="figure2" position="float">
          <label>Figure 2</label>
          <caption>
            <p>Plagi-Warfare game flow design. APB: Auckland Park Bunting Road; APK: Auckland Park Kingsway; DFC: Doornfontein.</p>
          </caption>
          <graphic xlink:href="games_v10i1e33459_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Design of Players’ Feedback</title>
        <p>We selected 30 participants from the University of Johannesburg across different backgrounds, all having good exposure to games and a good knowledge of what plagiarism is. The following are the questions from the survey:</p>
        <list list-type="bullet">
          <list-item>
            <p>How likely would you play the game? (1, unlikely; 10, extremely likely)</p>
          </list-item>
          <list-item>
            <p>Would you recommend the game to someone else to play?</p>
          </list-item>
          <list-item>
            <p>Do you think this game can help in educating students about plagiarism?</p>
          </list-item>
          <list-item>
            <p>What would you enjoy about this game?</p>
          </list-item>
          <list-item>
            <p>What would you improve about the game?</p>
          </list-item>
        </list>
      </sec>
      <sec>
        <title>Implementation, Results, and Evaluation</title>
        <p>Here, we present the technologies used for the implementation of Plagi-Warfare, a description of some important algorithms designed to perform certain tasks (such as procedural content generation of variants of plagiarism quizzes), results in the form of screenshots from the finished game, and an evaluation showing the opinion of players of this game.</p>
      </sec>
      <sec>
        <title>Systems Design, Tools, and Resources</title>
        <p>Plagi-Warfare was created using the Unity Game Engine, alongside the Microsoft Visual Studio Integrated Development Environment (IDE). We also used some asset libraries, such as Unity Asset Store, Turbosquid, and Cgtrader (used for both 3D models and 3D graphics) and Mixamo (used for character animation and generation). The database is hosted on PhpMyAdmin, which holds 2 tables, PlayerInfo and PlayerData. PlayerInfo holds the account information of the player—that is, username, email, password, gamer tag, and student status. PlayerData holds the game data of the player—that is, current level and scores for each respective game mode. PlayerInfo has a mandatory one-to-one relationship with PlayerData. A simple entity-relationship (E-R) model that describes these tables and their relationship is shown in <xref rid="figure3" ref-type="fig">Figure 3</xref>. The E-R model is a tool used by analysts to visualize data stored in a database [<xref ref-type="bibr" rid="ref23">23</xref>].</p>
        <fig id="figure3" position="float">
          <label>Figure 3</label>
          <caption>
            <p>Plagi-Warfare database design.</p>
          </caption>
          <graphic xlink:href="games_v10i1e33459_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Algorithms</title>
        <p>Here, we present a few algorithms that were designed to perform specific operations in the game. Algorithm 1.1 (<xref ref-type="boxed-text" rid="box1">Textbox 1</xref>) takes a set of 20 predefined locations from design time and a book object that needs to be placed in the game scene. The algorithm computes a random location for the placement of the book and returns this location to other parts of the game.</p>
        <p>Other algorithms include the following:</p>
        <list list-type="bullet">
          <list-item>
            <p>Content generation algorithm: An algorithm that takes a library quiz designed by a librarian and automatically generates variations of the quiz, thereby maximizing the replayability of the game.</p>
          </list-item>
          <list-item>
            <p>Field-of-view (FoV) algorithm: During the mafia gameplay, there are detectives patrolling the environments to attempt to catch the player. This algorithm sets an invisible radius around each detective with a set degree range and length. Should the player enter this area, a caught screen is triggered, causing the player to have to restart the level.</p>
          </list-item>
          <list-item>
            <p>Transferring NPCs: In the detective side, when the player is in range of the NPC’s box collider, this algorithm is triggered. The player is given an option on whether they want to take the NPC to the interrogation room by pressing the E key. Once this event is triggered, 3 different locations are checked. If the first location is not filled, then the NPC is moved to that position. Once all 3 locations are filled, this algorithm does not run. When the player is in close proximity to a student NPC, they are given an option to take the student NPC to the interrogation room.</p>
          </list-item>
          <list-item>
            <p>Selective shuffling: This algorithm selects random quizzes from the repository of generated quizzes, given that the player has not previously been presented with the actual instance of the quiz problem.</p>
          </list-item>
          <list-item>
            <p>Updating levels in the database: This algorithm saves the player’s current state (level of play, current score, etc) in the database.</p>
          </list-item>
          <list-item>
            <p>Answer submission: This algorithm validates the player’s answer with respect to the predefined model answer of the plagiarism quiz. Scores are awarded as a result.</p>
          </list-item>
        </list>
        <boxed-text id="box1" position="float">
          <title>Algorithm 1.1.</title>
          <p><bold>Algorithm 1.1:</bold> Shuffling spawn locations of objects</p>
          <p><bold>Data:</bold> LocationsXYZ [20], BookObject</p>
          <p><bold>Result:</bold> Book Location</p>
          <p>     begin</p>
          <p>     instance_location ← LocationsXYZ(getRandom[1,20]);</p>
          <p>     Book_Loc ← Transform (BookObject, instance_location);</p>
          <p>     <bold>return</bold> Book_Loc</p>
          <p>end</p>
        </boxed-text>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Screenshots From Plagi-Warfare</title>
        <p>Here, we showcase a few screenshots from Plagi-Warfare. In <xref rid="figure4" ref-type="fig">Figure 4</xref>(a), the bookshelves at the APB campus library are shown. <xref rid="figure4" ref-type="fig">Figure 4</xref>(b) shows a conversation scene between the player and the NPC. The entrance of 1 of the environments is shown in <xref rid="figure4" ref-type="fig">Figure 4</xref>(c). <xref rid="figure4" ref-type="fig">Figure 4</xref>(d) shows 1 of the book spawn locations during a game session. The NPC interrogation is shown in <xref rid="figure4" ref-type="fig">Figure 4</xref>(e). In <xref rid="figure4" ref-type="fig">Figure 4</xref>(f), we show the detective’s introduction scene. <xref rid="figure5" ref-type="fig">Figure 5</xref> presents a view of the APB library from upstairs and the different way points of the NPCs. Each color represents a different NPC path. More results (a recorded video of the game during play) are published online.</p>
        <fig id="figure4" position="float">
          <label>Figure 4</label>
          <caption>
            <p>Screenshots of both gameplay and behind the scenes of environments. APK: Auckland Park Kingsway; NPC: nonplayer character.</p>
          </caption>
          <graphic xlink:href="games_v10i1e33459_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <fig id="figure5" position="float">
          <label>Figure 5</label>
          <caption>
            <p>Library at APB campus, illustrating the different NPC waypoints. APB: Auckland Park Bunting Road; NPC: nonplayer character.</p>
          </caption>
          <graphic xlink:href="games_v10i1e33459_fig5.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Game Evaluation</title>
        <p>In this section, we present the result of an evaluation conducted to gather the opinions of players. The results from the evaluation are shown in <xref rid="figure6" ref-type="fig">Figure 6</xref>(a) and <xref rid="figure6" ref-type="fig">Figure 6</xref>(b). The results show that the majority (27/30, 90%) of the players found the game educational and believed that they could learn about plagiarism from the game, while a small number stated that they were not sure—there was no negative stance on this question. In addition, 1 (3%) player said that they would not recommend the game, while 23 (77%) said they would, and the remaining (6, 20%) were not sure. This is a high recommendation rate.</p>
        <fig id="figure6" position="float">
          <label>Figure 6</label>
          <caption>
            <p>Evaluation of Plagi-Warfare. NPC: nonplayer character.</p>
          </caption>
          <graphic xlink:href="games_v10i1e33459_fig6.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
        <p>We also allowed the players to respond to 2 questions in free text: what they enjoyed about the game and how they think Plagi-Warfare can be improved. As seen in <xref rid="figure6" ref-type="fig">Figure 6</xref>(c), notable keywords that our participants repeatedly used are “story,” “game content,” and game design”; after inspecting the actual text of responses, we confirmed that this directly translates to the fact that our players loved the story, the learning that takes place, and the look and feel of the game. Other keywords were “local content” (implying that they know the library and they enjoyed that). There was little attention given to the replayability of the game—this is understandable as it only becomes important after players play for a longer time. The last question that players had to answer was whether they had other ways of improving the game. Here, many keywords came up in the responses, implying that there is no one aspect of the game that is majorly deficient. However, notable suggestions (when we eliminate obvious keywords) included “realistic” and “add/adding” (suggesting the addition of more features). These responses are good for a first launch of Plagi-Warfare and encourages a number of possible upgrades.</p>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>The role of serious games in the learning domain is rapidly growing. This paper explored the development of effective serious games with regard to plagiarism. We hope readers will obtain a general understanding of how to create an effective serious game to combat plagiarism.</p>
        <p>The players found the gameplay and storyline quite engaging. This is important as serious games need to find a balance between entertainment and education in order to create an effective learning environment [<xref ref-type="bibr" rid="ref24">24</xref>].</p>
        <p>We explained how to develop a game that is both enjoyable and educational by demonstrating functional mechanics.</p>
        <p>This is critical since players are less likely to learn from it if they dislike playing the game [<xref ref-type="bibr" rid="ref19">19</xref>]. Serious games must therefore be enjoyable in order for learning to take place.</p>
      </sec>
      <sec>
        <title>Serious Games in the Learning Domain</title>
        <p>In this paper, we leveraged the usefulness of serious games in the learning domain—that is, educational games—and explored new stories, gameplay, and game mechanics to present plagiarism as content in an immersive library gaming 3D environment. This resulted in a video game that we named Plagi-Warfare. In Plagi-Warfare, players can assume 2 different roles: as a mafia member or as a detective. As a mafia member, they make cash from plagiarizing for other students, and as a detective, they try to catch an NPC who is playing as a mafia member. Hence, the major contributions of this paper are as follows:</p>
        <list list-type="bullet">
          <list-item>
            <p>We proposed a new game story and designed new game mechanics for student players to get into an immersive gaming environment and get rewarded by either detecting plagiarism scenarios (as detectives) or play the role of a mafia member to commit plagiarism within the game—another way of clearly acknowledging what plagiarism is.</p>
          </list-item>
          <list-item>
            <p>We created a game that gets played out in a 3D environment, representing the university library of our home university—the University of Johannesburg.</p>
          </list-item>
          <list-item>
            <p>We used new algorithms to create procedurally generated questions that are variations of typical plagiarism-related questions, ensuring replayability of the game.</p>
          </list-item>
          <list-item>
            <p>We proposed several algorithms for the implementation of this game and named this game Plagi-Warfare.</p>
          </list-item>
          <list-item>
            <p>We evaluated this game by asking students to play the game and assess its effectiveness.</p>
          </list-item>
        </list>
      </sec>
      <sec>
        <title>What Is Plagiarism?</title>
        <p>The main concept of plagiarism is presenting or using someone else’s work or ideas as your own work, not citing or giving credit to the person whose idea you are using [<xref ref-type="bibr" rid="ref25">25</xref>]. There are 2 types of plagiarism, intentional and unintentional [<xref ref-type="bibr" rid="ref26">26</xref>]. Intentional plagiarism is when the person knows the concept of plagiarism and has the writing and academic knowledge to prevent/avoid plagiarism by correctly citing the sources but still makes the conscious decision to copy [<xref ref-type="bibr" rid="ref27">27</xref>]. Unintentional plagiarism is more common; this is when the person who is copying has little to no understanding of the concept, has a lack of writing skills regarding citing, and a lack of knowledge about avoiding plagiarism [<xref ref-type="bibr" rid="ref28">28</xref>].</p>
      </sec>
      <sec>
        <title>Plagiarism Due to Students’ Lack of Information</title>
        <p>Unintentional plagiarism can be caused by a lack of knowledge about plagiarism [<xref ref-type="bibr" rid="ref29">29</xref>-<xref ref-type="bibr" rid="ref31">31</xref>]. According to Baker-Gardner et al [<xref ref-type="bibr" rid="ref28">28</xref>], a possible determinant of whether students will plagiarize can be the students’ awareness of the plagiarism policy of the university. When plagiarism policies are clear and precise, there will be caution in trying to plagiarize as students will be aware that consequences exist [<xref ref-type="bibr" rid="ref32">32</xref>]. Once plagiarism policies are known to not be compromised, the students will be more careful when writing in order to make sure that they do not plagiarize [<xref ref-type="bibr" rid="ref28">28</xref>]. Another problem associated with ignorance and plagiarism is the thin line between general knowledge and authorship [<xref ref-type="bibr" rid="ref33">33</xref>]. Being able to differentiate between common knowledge and someone’s ideas is important for students in order to avoid plagiarizing [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref34">34</xref>].</p>
        <p>Although universities often provide information about plagiarism on their websites and from their libraries, we still have cases of plagiarism among students [<xref ref-type="bibr" rid="ref35">35</xref>]. There may be documentation on plagiarism; however, students are faced with the challenge of having to read so much, so it is often difficult to identify what is significant, let alone comprehend and internalize that critical information [<xref ref-type="bibr" rid="ref36">36</xref>]. According to the study conducted by Obeid et al [<xref ref-type="bibr" rid="ref37">37</xref>], when students were exposed to a plagiarism intervention session (students who were exposed to plagiarism lessons), they were proven to plagiarize less in comparison to those who were in the control group (students who did not attend the plagiarism lessons). This signaled that the intervention was an efficient method of reducing plagiarism among research course students.</p>
      </sec>
      <sec>
        <title>Serious Games in Teaching: Educational Games</title>
        <p>Serious games are significantly important in education and in improving the willingness of students to learn [<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]. More satisfaction and enjoyment of the game lead to an enhanced level of interest in the subject matter for the player [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref41">41</xref>]. It has been shown that:</p>
        <list list-type="bullet">
          <list-item>
            <p>Having a well-designed educational game and learning methods that are progressive has been a huge instrument in educational support [<xref ref-type="bibr" rid="ref42">42</xref>].</p>
          </list-item>
          <list-item>
            <p>A test to see whether a game would improve the knowledge of the player was proven to be effective [<xref ref-type="bibr" rid="ref43">43</xref>-<xref ref-type="bibr" rid="ref45">45</xref>].</p>
          </list-item>
          <list-item>
            <p>Knowledge can be improved through observation and experimentation in the gaming environment [<xref ref-type="bibr" rid="ref46">46</xref>-<xref ref-type="bibr" rid="ref48">48</xref>].</p>
          </list-item>
        </list>
        <p>One challenge with educational games is that the immersive part of these games is mostly missing [<xref ref-type="bibr" rid="ref49">49</xref>,<xref ref-type="bibr" rid="ref50">50</xref>], making these games boring. It is therefore important to find a balance between the difficulty of the game and the enjoyment of the player. Different individuals learn in different ways; hence, it is best to cater for as many learning styles as possible [<xref ref-type="bibr" rid="ref51">51</xref>]. We know from the literature that when you combine learning activities with immersive media, it is proven to have great outcomes, sometimes even better than those in both nonimmersive and in-person circumstances [<xref ref-type="bibr" rid="ref52">52</xref>]. Educational games have to solve this conundrum of being educational and fun/immersive in order to successfully induce learning [<xref ref-type="bibr" rid="ref53">53</xref>,<xref ref-type="bibr" rid="ref54">54</xref>]. An attempt to introduce balanced fun and learning was presented by Ade-Ibijola and Aruleba [<xref ref-type="bibr" rid="ref24">24</xref>]. This motivates the creation of immersive educational games, such as the one presented in this paper—Plagi-Warfare.</p>
      </sec>
      <sec>
        <title>Problem Statement and Motivation</title>
        <p>Higher education institutions around the world have a significant problem with plagiarism [<xref ref-type="bibr" rid="ref55">55</xref>,<xref ref-type="bibr" rid="ref56">56</xref>]. Resources, such as the internet, have contributed to an increase in plagiarism [<xref ref-type="bibr" rid="ref57">57</xref>]. This problem became more prevalent during the 2020 COVID-19 pandemic, where all assessments were conducted online [<xref ref-type="bibr" rid="ref58">58</xref>], leading to the emancipation of many proctoring systems [<xref ref-type="bibr" rid="ref59">59</xref>]. There is also a concern that in most cases, students are not informed of universities’ policy on plagiarism [<xref ref-type="bibr" rid="ref60">60</xref>]. Gullifer et al [<xref ref-type="bibr" rid="ref61">61</xref>] stated that the amount of information students have to consume on admission to institutions is usually too much, leading to less attention on the topic of plagiarism.</p>
        <p>Several attempts have been made to educate students about plagiarism using games [<xref ref-type="bibr" rid="ref12">12</xref>-<xref ref-type="bibr" rid="ref14">14</xref>]—most of these games are designed with stories, mechanics, and gameplay that the students do not find interesting or realistic [<xref ref-type="bibr" rid="ref62">62</xref>]. This is the problem addressed in this paper—to create a more realistic story, mechanics, and gameplay in delivering an immersive educational game for teaching students about plagiarism. This we have done in a new game—Plagi-Warfare. In the following section, we discuss related works, in particular existing educational games for teaching plagiarism and other library-created games.</p>
      </sec>
      <sec>
        <title>Related Works and Gaps</title>
        <p>In this section, we present related works, specifically serious games in education or educational games for teaching plagiarism and games used by libraries around the world to teach specific subjects or topics.</p>
        <sec>
          <title>Existing Plagiarism Educational Games</title>
          <p><xref ref-type="table" rid="table1">Table 1</xref> describes 4 educational games that are specifically designed to train/inform the player about plagiarism, and <xref ref-type="table" rid="table2">Table 2</xref> lists existing library games worldwide.</p>
          <table-wrap position="float" id="table1">
            <label>Table 1</label>
            <caption>
              <p>Existing plagiarism educational games.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="250"/>
              <col width="750"/>
              <thead>
                <tr valign="top">
                  <td>Game name</td>
                  <td>Similarity to Plagi-Warfare</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>Cheats and Geeks [<xref ref-type="bibr" rid="ref63">63</xref>]</td>
                  <td>Designed in the style of a dice board game, the game places the player in the role of a graduate student who has to publish a paper for a competition. The player must complete pop quizzes about plagiarism before being able to complete the challenges in the game.</td>
                </tr>
                <tr valign="top">
                  <td>Frenetic Filing [<xref ref-type="bibr" rid="ref63">63</xref>]</td>
                  <td>A retro-style-designed game in which the player needs to solve as many processed plagiarism cases before a set time elapses. The game rewards the player with virtual sneakers and coffee that assist in speeding up the player’s review of cases.</td>
                </tr>
                <tr valign="top">
                  <td>Murky Misconduct [<xref ref-type="bibr" rid="ref63">63</xref>]</td>
                  <td>Murky Misconduct is a crime detective game where the player engages as a plagiarism investigator. They are tasked with tracking down potential perpetrators by comparing academic papers and finally prosecuting the players. Players are educated on the complex ethics issues and consequences of plagiarism.</td>
                </tr>
                <tr valign="top">
                  <td>Goblin Threat [<xref ref-type="bibr" rid="ref12">12</xref>]</td>
                  <td>This game is designed as a clicking game, where the player must find hidden goblins, which ask the player questions related to plagiarism. Game content covers how to cite sources, types of plagiarism with their repercussions, and the variations between plagiarism and paraphrasing.</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
          <table-wrap position="float" id="table2">
            <label>Table 2</label>
            <caption>
              <p>Existing library games around the world.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="160"/>
              <col width="420"/>
              <col width="210"/>
              <col width="210"/>
              <thead>
                <tr valign="top">
                  <td>Game name</td>
                  <td>Description of library game</td>
                  <td>University/college library</td>
                  <td>Educational content</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>Nightmare on Vine Street</td>
                  <td>In this game, the player is secured inside the library around evening time and must satisfy zombies with assets found in the library to get away [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref64">64</xref>].</td>
                  <td>University of Tennessee at Chattanooga, USA</td>
                  <td>The game improves the information literacy of students.</td>
                </tr>
                <tr valign="top">
                  <td>Within Range</td>
                  <td>In this game, the player has to place books according to the call number before the allocated time is up [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref65">65</xref>].</td>
                  <td>Carnegie Mellon University, USA</td>
                  <td>Library staff learns how to store books.</td>
                </tr>
                <tr valign="top">
                  <td>Defense of Hidgeon</td>
                  <td>At the beginning of this game, students are instructed to start library research while navigating, looking, and finding assets. During the game, students have to go to distinctive libraries and search web for answers [<xref ref-type="bibr" rid="ref64">64</xref>,<xref ref-type="bibr" rid="ref66">66</xref>].</td>
                  <td>University of Michigan, USA</td>
                  <td>Students learn how to conduct research using library resources.</td>
                </tr>
                <tr valign="top">
                  <td>Secret Agents in the Library</td>
                  <td>The player assumes the role of a secret agent in this online game. The objective of the game is to protect the library from an invader by answering questions as well as fetching assets from within the library [<xref ref-type="bibr" rid="ref14">14</xref>].</td>
                  <td>Lycoming College, USA</td>
                  <td>The game improves the information literacy of students, and students learn how to access the library website.</td>
                </tr>
                <tr valign="top">
                  <td>It’s Alive</td>
                  <td>Here, the player acts as a crazy scientist endeavoring to obtain body parts to build an animal, and to obtain these body parts, the player has to correctly respond to a sequence of questions [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref65">65</xref>].</td>
                  <td>Lycoming College, USA</td>
                  <td>Players are able to find out about biology research methods.</td>
                </tr>
                <tr valign="top">
                  <td>Get a Clue</td>
                  <td>Students have to solve a crime by visiting assigned areas and getting rid of suspects and library resources in the game [<xref ref-type="bibr" rid="ref64">64</xref>].</td>
                  <td>Utah Valley University, USA</td>
                  <td>Students are able to navigate around the university library.</td>
                </tr>
                <tr valign="top">
                  <td>LibraryCraft</td>
                  <td>Students can visit various pages of the library website. Students need to find a book in their catalogue and use the author’s name as a password to show that they have completed the task [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref67">67</xref>].</td>
                  <td>Utah Valley University, USA</td>
                  <td>Students find out about the library resource/assets and how to manage research.</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
        </sec>
        <sec>
          <title>Gaps</title>
          <p>Although there have been attempts by different game developers and researchers to create educational games for teaching students what plagiarism is, the following issues are yet to be addressed:</p>
          <list list-type="bullet">
            <list-item>
              <p>Story and gaming environment: For this, we proposed a 2-sided storyline that allows a student to play as a good guy or a bad guy, detecting plagiarism or plagiarizing and escaping being caught, respectively, within the game.</p>
            </list-item>
            <list-item>
              <p>Replayability: To the best of our knowledge, none of the existing games has the ability to present the player with new problems every time they play. We have written new algorithms for this task.</p>
            </list-item>
            <list-item>
              <p>First local solution: As far as we can tell, no South African university has an educational game for teaching plagiarism.</p>
            </list-item>
          </list>
          <p>These issues are addressed in the design of Plagi-Warfare, discussed in the Methods section, covering the design aspects of Plagi-Warfare, such as the game flow, story development, and other design considerations.</p>
        </sec>
      </sec>
      <sec>
        <title>Future Work</title>
        <p>We are currently busy digitizing several topics offered by the university’s library to make them more attractive to students. Educational games are at the center of this digitization; hence, we anticipate more work in this space in the future. In the future, we will also open up the evaluation of Plagi-Warfare to the entire student population of our university. Given that we have over 40,000 students, we hope to gain more insights into what we can improve about this game.</p>
      </sec>
      <sec>
        <title>Conclusion</title>
        <p>In this paper, we presented a new educational game that teaches students about plagiarism by using a new crime story and an immersive 3D gaming environment representing the university libraries of the University of Johannesburg. To do this, we allowed players to play as either a mafia member or a detective and supplied them with procedurally generated quizzes that ensure that the game remains replayable. We demonstrated the first version of the game and presented the evaluation of the game. The responses from the students show that the game can be used to learn about plagiarism and that they would recommend it to others. Plagi-Warfare addresses a major gap in South Africa, as there is no such game in any South African university, and worldwide with its unique storyline and its environment that allow the global community to experience our libraries at the University of Johannesburg. Given the increasing appeal of video games among digital natives, the use of an immersive game about plagiarism is expected to give more students the motivation and eagerness to learn about plagiarism.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">APB</term>
          <def>
            <p>Auckland Park Bunting Road</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">APK</term>
          <def>
            <p>Auckland Park Kingsway</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">DFC</term>
          <def>
            <p>Doornfontein</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">E-R</term>
          <def>
            <p>entity-relationship</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">FoV</term>
          <def>
            <p>field of view</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">IDE</term>
          <def>
            <p>Integrated Development Environment</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">NPC</term>
          <def>
            <p>nonplayer character</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>The authors would like to acknowledge the support of Alrina De Bruyn and Dr Elize Du Toit throughout the development stage of the game presented in this work. We also acknowledge the funding support of the library of the University of Johannesburg, South Africa.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abdi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Idris</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Alguliyev</surname>
              <given-names>RM</given-names>
            </name>
            <name name-style="western">
              <surname>Aliguliyev</surname>
              <given-names>RM</given-names>
            </name>
          </person-group>
          <article-title>PDLK: plagiarism detection using linguistic knowledge</article-title>
          <source>Expert Syst Appl</source>
          <year>2015</year>
          <month>12</month>
          <volume>42</volume>
          <issue>22</issue>
          <fpage>8936</fpage>
          <lpage>8946</lpage>
          <pub-id pub-id-type="doi">10.1016/j.eswa.2015.07.048</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Šprajc</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Urh</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Jerebic</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Trivan</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Reasons for plagiarism in higher education</article-title>
          <source>Organizacija</source>
          <year>2017</year>
          <month>02</month>
          <day>12</day>
          <volume>50</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <pub-id pub-id-type="doi">10.1515/orga-2017-0002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Chou</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Why do they become potential cyber-plagiarizers? Exploring the alternative thinking of copy-and-paste youth in Taiwan</article-title>
          <source>Comput Educ</source>
          <year>2015</year>
          <month>09</month>
          <volume>87</volume>
          <fpage>357</fpage>
          <lpage>367</lpage>
          <pub-id pub-id-type="doi">10.1016/j.compedu.2015.07.006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Thomas</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>de Bruin</surname>
              <given-names>GP</given-names>
            </name>
          </person-group>
          <article-title>Plagiarism in South African management journals</article-title>
          <source>SAJS</source>
          <year>2015</year>
          <volume>111</volume>
          <issue>1/2</issue>
          <fpage>1</fpage>
          <lpage>3</lpage>
          <pub-id pub-id-type="doi">10.17159/sajs.2015/20140017</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Carmela</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Kathryn</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Shelley</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Academic staff responses to student plagiarism in universities: a literature review from 1990 to 2019</article-title>
          <source>Issues Educ Res</source>
          <year>2019</year>
          <month>10</month>
          <day>21</day>
          <volume>29</volume>
          <issue>4</issue>
          <fpage>1131</fpage>
          <lpage>1142</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.iier.org.au/iier29/demaio.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>de Maio</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Dixon</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Yeo</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Responding to student plagiarism in Western Australian universities: the disconnect between policy and academic staff</article-title>
          <source>J High Educ Policy Manag</source>
          <year>2019</year>
          <month>09</month>
          <day>05</day>
          <volume>42</volume>
          <issue>1</issue>
          <fpage>102</fpage>
          <lpage>116</lpage>
          <pub-id pub-id-type="doi">10.1080/1360080x.2019.1662927</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Louw</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Defining plagiarism: student and staff perceptions of a grey concept</article-title>
          <source>SAJHE</source>
          <year>2017</year>
          <month>09</month>
          <day>1</day>
          <volume>31</volume>
          <issue>5</issue>
          <fpage>116</fpage>
          <lpage>135</lpage>
          <pub-id pub-id-type="doi">10.20853/31-5-580</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jerome</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Christopher</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Ifeakachuku</surname>
              <given-names>O</given-names>
            </name>
          </person-group>
          <article-title>Awareness and perception of plagiarism of postgraduate students in selected universities in Ogun State, Nigeria</article-title>
          <source>Libr Philos Pract</source>
          <year>2016</year>
          <month>02</month>
          <day>01</day>
          <fpage>1</fpage>
          <lpage>25</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://eprints.lmu.edu.ng/1833/"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Permana</surname>
              <given-names>IGY</given-names>
            </name>
            <name name-style="western">
              <surname>Santosa</surname>
              <given-names>MH</given-names>
            </name>
          </person-group>
          <article-title>ELF students' perception about plagiarism</article-title>
          <year>2018</year>
          <month>05</month>
          <day>08</day>
          <conf-name>Language in the Online and Offline World</conf-name>
          <conf-date>May 2018</conf-date>
          <conf-loc>Petra University, Surabaya</conf-loc>
          <fpage>128</fpage>
          <lpage>133</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.researchgate.net/profile/Gabriel-Fajar-Sasmita-Aji/project/The-Concept-of-Home-in-VS-Naipauls-THE-ENIGMA-OF-ARRIVAL-Postcolonial-Studies/attachment/5afe6f0b4cde260d15df6526/AS:627520735043585@1526624010579/download/Proceedings+LOOW6,+May+8+&#38;+9,+Petra.pdf#page=136"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="web">
          <source>Game Videos</source>
          <access-date>2022-01-25</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.tinyurl.com/plagi-warfare">https://www.tinyurl.com/plagi-warfare</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Richa</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Puneet</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Avoiding plagiarism in research through free online plagiarism tools</article-title>
          <year>2015</year>
          <month>01</month>
          <day>06</day>
          <conf-name>4th International Symposium on Emerging Trends and Technologies in Libraries and Information Services</conf-name>
          <conf-date>2015</conf-date>
          <conf-loc>Noida, India</conf-loc>
          <fpage>275</fpage>
          <lpage>280</lpage>
          <pub-id pub-id-type="doi">10.1109/ettlis.2015.7048211</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kier</surname>
              <given-names>CA</given-names>
            </name>
          </person-group>
          <article-title>Plagiarism intervention using a game-based tutorial in an online distance education course</article-title>
          <source>J Acad Ethics</source>
          <year>2019</year>
          <month>08</month>
          <day>13</day>
          <volume>17</volume>
          <issue>4</issue>
          <fpage>429</fpage>
          <lpage>439</lpage>
          <pub-id pub-id-type="doi">10.1007/s10805-019-09340-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bradley</surname>
              <given-names>EG</given-names>
            </name>
          </person-group>
          <article-title>Using computer simulations and games to prevent student plagiarism</article-title>
          <source>J Educ Technol Syst</source>
          <year>2015</year>
          <month>12</month>
          <day>09</day>
          <volume>44</volume>
          <issue>2</issue>
          <fpage>240</fpage>
          <lpage>252</lpage>
          <pub-id pub-id-type="doi">10.1177/0047239515617653</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Snyder Broussard</surname>
              <given-names>MJ</given-names>
            </name>
          </person-group>
          <article-title>Digital games in academic libraries: a review of games and suggested best practices</article-title>
          <source>Ref Serv Rev</source>
          <year>2012</year>
          <month>02</month>
          <day>10</day>
          <volume>40</volume>
          <issue>1</issue>
          <fpage>75</fpage>
          <lpage>89</lpage>
          <pub-id pub-id-type="doi">10.1108/00907321211203649</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kazimoglu</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Kiernan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bacon</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Mackinnon</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>A serious game for developing computational thinking and learning introductory computer programming</article-title>
          <source>Proc Soc Behav Sci</source>
          <year>2012</year>
          <volume>47</volume>
          <fpage>1991</fpage>
          <lpage>1999</lpage>
          <pub-id pub-id-type="doi">10.1016/j.sbspro.2012.06.938</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Konstantin</surname>
              <given-names>MA</given-names>
            </name>
          </person-group>
          <article-title>Purposeful by design? A serious game design assessesment framework</article-title>
          <year>2012</year>
          <month>05</month>
          <day>29</day>
          <conf-name>International Conference on the Foundations of Digital Games</conf-name>
          <conf-date>2012</conf-date>
          <conf-loc>Montreal, QC, Canada</conf-loc>
          <fpage>121</fpage>
          <lpage>128</lpage>
          <pub-id pub-id-type="doi">10.1145/2282338.2282364</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Steffen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Mau</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Schramm-Klein</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Who is the loser when I lose the game? Does losing an advergame have a negative impact on the perception of the brand?</article-title>
          <source>J Advert</source>
          <year>2013</year>
          <month>04</month>
          <day>03</day>
          <volume>42</volume>
          <issue>2-3</issue>
          <fpage>183</fpage>
          <lpage>195</lpage>
          <pub-id pub-id-type="doi">10.1080/00913367.2013.774598</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mihelj</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Novak</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Milavec</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ziherl</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Olenšek</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Munih</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Virtual rehabilitation environment using principles of intrinsic motivation and game design</article-title>
          <source>Presence (Camb)</source>
          <year>2012</year>
          <month>02</month>
          <volume>21</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>15</lpage>
          <pub-id pub-id-type="doi">10.1162/pres_a_00078</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Carrie</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Yu-Hao</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Brian</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Ben</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Impacts of forced serious game play on vulnerable subgroups</article-title>
          <source>Int J Gaming Comput-Mediat Simul</source>
          <year>2011</year>
          <month>01</month>
          <day>03</day>
          <volume>3</volume>
          <issue>3</issue>
          <fpage>34</fpage>
          <lpage>53</lpage>
          <pub-id pub-id-type="doi">10.4018/jgcms.2011070103</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Whalen</surname>
              <given-names>KA</given-names>
            </name>
            <name name-style="western">
              <surname>Berlin</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ekberg</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Barletta</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Hammersberg</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>‘All they do is win’: lessons learned from use of a serious game for Circular Economy education</article-title>
          <source>Resour Conserv Recycl</source>
          <year>2018</year>
          <month>08</month>
          <volume>135</volume>
          <fpage>335</fpage>
          <lpage>345</lpage>
          <pub-id pub-id-type="doi">10.1016/j.resconrec.2017.06.021</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Adellin</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Khuan</surname>
              <given-names>CT</given-names>
            </name>
            <name name-style="western">
              <surname>Gertrude</surname>
              <given-names>LD</given-names>
            </name>
          </person-group>
          <article-title>Conceptual framework puzzle game with high replayability</article-title>
          <source>J Phys Conf Ser</source>
          <year>2019</year>
          <month>05</month>
          <day>01</day>
          <volume>1228</volume>
          <issue>1</issue>
          <fpage>012070</fpage>
          <pub-id pub-id-type="doi">10.1088/1742-6596/1228/1/012070</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hall</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Stickler</surname>
              <given-names>U</given-names>
            </name>
            <name name-style="western">
              <surname>Herodotou</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Iacovides</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Expressivity of creativity and creative design considerations in digital games</article-title>
          <source>Comput Hum Behav</source>
          <year>2020</year>
          <month>04</month>
          <volume>105</volume>
          <fpage>106206</fpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2019.106206</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bagui</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Earp</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <source>Database Design Using Entity-Relationship Diagrams</source>
          <year>2011</year>
          <publisher-loc>Boca Raton, FL</publisher-loc>
          <publisher-name>CRC Press</publisher-name>
          <fpage>3</fpage>
          <lpage>5</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abejide</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>Aruleba</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Interactive learning of factual contents using a game-like quiz</article-title>
          <year>2018</year>
          <month>12</month>
          <day>31</day>
          <conf-name>Annual Conference of the Southern African Computer Lecturers' Association</conf-name>
          <conf-date>2018</conf-date>
          <conf-loc>Johannesburg, South Africa</conf-loc>
          <fpage>285</fpage>
          <lpage>298</lpage>
          <pub-id pub-id-type="doi">10.1007/978-3-030-05813-5_19</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sakir</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Prajna</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The true meaning of plagiarism</article-title>
          <source>Indian J Rheumatol</source>
          <year>2020</year>
          <month>09</month>
          <day>03</day>
          <volume>15</volume>
          <issue>3</issue>
          <fpage>155</fpage>
          <lpage>158</lpage>
          <pub-id pub-id-type="doi">10.4103/injr.injr_178_20</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Selemani</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Chawinga</surname>
              <given-names>WD</given-names>
            </name>
            <name name-style="western">
              <surname>Dube</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Why do postgraduate students commit plagiarism? An empirical study</article-title>
          <source>Int J Educ Integr</source>
          <year>2018</year>
          <month>9</month>
          <day>19</day>
          <volume>14</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>15</lpage>
          <pub-id pub-id-type="doi">10.1007/s40979-018-0029-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sharma</surname>
              <given-names>BK</given-names>
            </name>
          </person-group>
          <article-title>Plagiarism among university students: intentional or accidental?</article-title>
          <source>J NELTA</source>
          <year>2010</year>
          <month>07</month>
          <day>09</day>
          <volume>12</volume>
          <issue>1</issue>
          <fpage>134</fpage>
          <lpage>140</lpage>
          <pub-id pub-id-type="doi">10.3126/nelta.v12i1.3440</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Baker-Gardner</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Smart</surname>
              <given-names>C-A</given-names>
            </name>
          </person-group>
          <article-title>Ignorance or intent? A case study of plagiarism in higher education among LIS students in the Caribbean</article-title>
          <source>Handbook of Research on Academic Misconduct in Higher Education</source>
          <year>2017</year>
          <month>01</month>
          <day>01</day>
          <publisher-loc>Hershey, PA</publisher-loc>
          <publisher-name>IGI Global</publisher-name>
          <fpage>182</fpage>
          <lpage>205</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fatemi</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Saito</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Unintentional plagiarism and academic integrity: the challenges and needs of postgraduate international students in Australia</article-title>
          <source>J Furth High Educ</source>
          <year>2019</year>
          <month>11</month>
          <day>21</day>
          <volume>44</volume>
          <issue>10</issue>
          <fpage>1305</fpage>
          <lpage>1319</lpage>
          <pub-id pub-id-type="doi">10.1080/0309877x.2019.1683521</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yuet-Ming</surname>
              <given-names>NY</given-names>
            </name>
          </person-group>
          <article-title>A 3-step teaching approach for a blended learning of ‘understanding and avoiding unintentional plagiarism’</article-title>
          <source>Nurse Educ Pract</source>
          <year>2019</year>
          <month>10</month>
          <day>14</day>
          <fpage>1</fpage>
          <lpage>12</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.sciencedirect.com/science/article/abs/pii/S1471595317308685"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zwick</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Springer</surname>
              <given-names>ML</given-names>
            </name>
            <name name-style="western">
              <surname>Guerrero</surname>
              <given-names>JK</given-names>
            </name>
            <name name-style="western">
              <surname>DiVentura</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>York</surname>
              <given-names>KP</given-names>
            </name>
          </person-group>
          <article-title>An activity to promote recognition of unintentional plagiarism in scientific writing in undergraduate biology courses</article-title>
          <source>J Microbiol Biol Educ</source>
          <year>2019</year>
          <month>01</month>
          <volume>20</volume>
          <issue>2</issue>
          <fpage>70</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1128/jmbe.v20i2.1751"/>
          </comment>
          <pub-id pub-id-type="doi">10.1128/jmbe.v20i2.1751</pub-id>
          <pub-id pub-id-type="medline">31501686</pub-id>
          <pub-id pub-id-type="pii">jmbe-20-38</pub-id>
          <pub-id pub-id-type="pmcid">PMC6713481</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kayaoğlu</surname>
              <given-names>MN</given-names>
            </name>
            <name name-style="western">
              <surname>Erbay</surname>
              <given-names>Ş</given-names>
            </name>
            <name name-style="western">
              <surname>Flitner</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Saltaş</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Examining students’ perceptions of plagiarism: a cross-cultural study at tertiary level</article-title>
          <source>J Furth High Educ</source>
          <year>2015</year>
          <month>03</month>
          <day>09</day>
          <volume>40</volume>
          <issue>5</issue>
          <fpage>682</fpage>
          <lpage>705</lpage>
          <pub-id pub-id-type="doi">10.1080/0309877x.2015.1014320</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Satija</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Martínez-Ávila</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Plagiarism: an essay in terminology</article-title>
          <source>DESIDOC J Lib Info Technol</source>
          <year>2019</year>
          <month>03</month>
          <day>11</day>
          <volume>39</volume>
          <issue>2</issue>
          <fpage>87</fpage>
          <lpage>93</lpage>
          <pub-id pub-id-type="doi">10.14429/djlit.39.2.13937</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Park</surname>
              <given-names>CS</given-names>
            </name>
          </person-group>
          <article-title>Is your idea safe?</article-title>
          <source>J Adv Nurs</source>
          <year>2018</year>
          <month>12</month>
          <day>05</day>
          <volume>74</volume>
          <issue>12</issue>
          <fpage>2711</fpage>
          <lpage>2712</lpage>
          <pub-id pub-id-type="doi">10.1111/jan.13862</pub-id>
          <pub-id pub-id-type="medline">30259556</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gullifer</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Tyson</surname>
              <given-names>GA</given-names>
            </name>
          </person-group>
          <article-title>Exploring university students' perceptions of plagiarism: a focus group study</article-title>
          <source>Stud High Educ</source>
          <year>2010</year>
          <month>06</month>
          <day>07</day>
          <volume>35</volume>
          <issue>4</issue>
          <fpage>463</fpage>
          <lpage>481</lpage>
          <pub-id pub-id-type="doi">10.1080/03075070903096508</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fischer</surname>
              <given-names>BA</given-names>
            </name>
            <name name-style="western">
              <surname>Zigmond</surname>
              <given-names>MJ</given-names>
            </name>
          </person-group>
          <article-title>Educational approaches for discouraging plagiarism</article-title>
          <source>Urol Oncol</source>
          <year>2011</year>
          <month>1</month>
          <volume>29</volume>
          <issue>1</issue>
          <fpage>100</fpage>
          <lpage>3</lpage>
          <pub-id pub-id-type="doi">10.1016/j.urolonc.2010.11.014</pub-id>
          <pub-id pub-id-type="medline">21194645</pub-id>
          <pub-id pub-id-type="pii">S1078-1439(10)00367-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Obeid</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Hill</surname>
              <given-names>DB</given-names>
            </name>
          </person-group>
          <article-title>An intervention designed to reduce plagiarism in a research methods classroom</article-title>
          <source>Teach Psychol</source>
          <year>2017</year>
          <month>02</month>
          <day>20</day>
          <volume>44</volume>
          <issue>2</issue>
          <fpage>155</fpage>
          <lpage>159</lpage>
          <pub-id pub-id-type="doi">10.1177/0098628317692620</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Amorim</surname>
              <given-names>AN</given-names>
            </name>
            <name name-style="western">
              <surname>Jeon</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Abel</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Felisberto</surname>
              <given-names>EF</given-names>
            </name>
            <name name-style="western">
              <surname>Barbosa</surname>
              <given-names>LNF</given-names>
            </name>
            <name name-style="western">
              <surname>Dias</surname>
              <given-names>NM</given-names>
            </name>
          </person-group>
          <article-title>Using Escribo play video games to improve phonological awareness, early reading, and writing in preschool</article-title>
          <source>Educ Res</source>
          <year>2020</year>
          <month>03</month>
          <day>09</day>
          <volume>49</volume>
          <issue>3</issue>
          <fpage>188</fpage>
          <lpage>197</lpage>
          <pub-id pub-id-type="doi">10.3102/0013189x20909824</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zucker</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Fisch</surname>
              <given-names>AA</given-names>
            </name>
          </person-group>
          <article-title>Play and learning with KAHOOT!: Enhancing collaboration and engagement in grades 9-16 through digital games</article-title>
          <source>J Lang Lit Educ</source>
          <year>2019</year>
          <month>04</month>
          <day>20</day>
          <volume>15</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>15</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://eric.ed.gov/?id=EJ1212450"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Iten</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Petko</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Learning with serious games: is fun playing the game a predictor of learning success?</article-title>
          <source>Br J Educ Technol</source>
          <year>2014</year>
          <month>11</month>
          <day>11</day>
          <volume>47</volume>
          <issue>1</issue>
          <fpage>151</fpage>
          <lpage>163</lpage>
          <pub-id pub-id-type="doi">10.1111/bjet.12226</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tsekleves</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Cosmas</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Aggoun</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Benefits, barriers and guideline recommendations for the implementation of serious games in education for stakeholders and policymakers</article-title>
          <source>Br J Educ Technol</source>
          <year>2014</year>
          <month>10</month>
          <day>24</day>
          <volume>47</volume>
          <issue>1</issue>
          <fpage>164</fpage>
          <lpage>183</lpage>
          <pub-id pub-id-type="doi">10.1111/bjet.12223</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shute</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Fengfeng</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Russell</surname>
              <given-names>GA</given-names>
            </name>
            <name name-style="western">
              <surname>Seyedahmad</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Ginny</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Xi</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Feldman</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>How to increase learning while not decreasing the fun in educational games</article-title>
          <source>Learning Science: Theory, Research, and Practice</source>
          <year>2019</year>
          <month>7</month>
          <day>26</day>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>McGraw Hill</publisher-name>
          <fpage>327</fpage>
          <lpage>357</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Buchinger</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>da Silva Hounsell</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Guidelines for designing and using collaborative-competitive serious games</article-title>
          <source>Comput Educ</source>
          <year>2018</year>
          <month>03</month>
          <volume>118</volume>
          <fpage>133</fpage>
          <lpage>149</lpage>
          <pub-id pub-id-type="doi">10.1016/j.compedu.2017.11.007</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Chooi</surname>
              <given-names>YL</given-names>
            </name>
            <name name-style="western">
              <surname>Paul</surname>
              <given-names>JW</given-names>
            </name>
            <name name-style="western">
              <surname>Daniel</surname>
              <given-names>TM</given-names>
            </name>
          </person-group>
          <article-title>Online educational games improve the learning of cardiac pharmacology in undergraduate pharmacy teaching</article-title>
          <source>Pharm Educ</source>
          <year>2018</year>
          <month>10</month>
          <day>11</day>
          <volume>18</volume>
          <fpage>298</fpage>
          <lpage>302</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ortofonshop.com/pharmacyeducation/article/view/634"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Murad</surname>
              <given-names>SS</given-names>
            </name>
          </person-group>
          <article-title>Brain involvement in the use of games in nursing education</article-title>
          <source>JNEP</source>
          <year>2017</year>
          <month>01</month>
          <day>21</day>
          <volume>7</volume>
          <issue>6</issue>
          <fpage>90</fpage>
          <pub-id pub-id-type="doi">10.5430/jnep.v7n6p90</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hanif</surname>
              <given-names>AF</given-names>
            </name>
            <name name-style="western">
              <surname>Zulisman</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Mohd</surname>
              <given-names>HZ</given-names>
            </name>
          </person-group>
          <article-title>Game-based learning and gamification: searching for definitions</article-title>
          <source>Int J Simul Syst Sci Technol</source>
          <year>2018</year>
          <month>02</month>
          <day>03</day>
          <volume>19</volume>
          <fpage>41.1</fpage>
          <lpage>41.5</lpage>
          <pub-id pub-id-type="doi">10.5013/ijssst.a.19.06.41</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Din</surname>
              <given-names>ZU</given-names>
            </name>
            <name name-style="western">
              <surname>Gibson</surname>
              <given-names>GE</given-names>
            </name>
          </person-group>
          <article-title>Serious games for learning prevention through design concepts: an experimental study</article-title>
          <source>Saf Sci</source>
          <year>2019</year>
          <month>06</month>
          <volume>115</volume>
          <fpage>176</fpage>
          <lpage>187</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ssci.2019.02.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>O’Brien</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Pitera</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Gamifying instruction and engaging students with breakout EDU</article-title>
          <source>J Educ Technol Syst</source>
          <year>2019</year>
          <month>10</month>
          <day>26</day>
          <volume>48</volume>
          <issue>2</issue>
          <fpage>192</fpage>
          <lpage>212</lpage>
          <pub-id pub-id-type="doi">10.1177/0047239519877165</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Barbosa</surname>
              <given-names>JFR</given-names>
            </name>
            <name name-style="western">
              <surname>Madeira</surname>
              <given-names>CAG</given-names>
            </name>
          </person-group>
          <article-title>Playeduc: a conceptual framework for the development of digital educational games</article-title>
          <year>2019</year>
          <month>09</month>
          <day>02</day>
          <conf-name>IEEE 19th International Conference on Advanced Learning Technologies (ICALT)</conf-name>
          <conf-date>2019</conf-date>
          <conf-loc>Maceio, Brazil</conf-loc>
          <fpage>103</fpage>
          <lpage>104</lpage>
          <pub-id pub-id-type="doi">10.1109/icalt.2019.00038</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Opeyemi</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Jonathan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Rebecca</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Alison</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Learning mathematics through serious games: an engagement framework</article-title>
          <year>2016</year>
          <month>10</month>
          <day>12</day>
          <conf-name>IEEE Frontiers in Education Conference (FIE)</conf-name>
          <conf-date>2016</conf-date>
          <conf-loc>Erie, PA, USA</conf-loc>
          <fpage>1</fpage>
          <lpage>5</lpage>
          <pub-id pub-id-type="doi">10.1109/fie.2016.7757401</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Huang</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Do different learning styles make a difference when it comes to creativity? An empirical study</article-title>
          <source>Comput Hum Behav</source>
          <year>2019</year>
          <month>11</month>
          <volume>100</volume>
          <fpage>252</fpage>
          <lpage>257</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2018.10.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>De Gloria</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bellotti</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Berta</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Serious games for education and training</article-title>
          <source>Int J Serious Games</source>
          <year>2014</year>
          <month>02</month>
          <day>03</day>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>11</lpage>
          <pub-id pub-id-type="doi">10.17083/ijsg.v1i1.11</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ben</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Martino</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Charlene</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Martin</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Niklas</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Learning when serious: psychophysiological evaluation of a technology-enhanced learning game</article-title>
          <source>J Educ Technol Soc</source>
          <year>2014</year>
          <month>01</month>
          <day>01</day>
          <volume>17</volume>
          <issue>1</issue>
          <fpage>3</fpage>
          <lpage>16</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Paraskeva</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Mysirlaki</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Papagianni</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Multiplayer online games as educational tools: facing new challenges in learning</article-title>
          <source>Comput Educ</source>
          <year>2010</year>
          <month>2</month>
          <volume>54</volume>
          <issue>2</issue>
          <fpage>498</fpage>
          <lpage>505</lpage>
          <pub-id pub-id-type="doi">10.1016/j.compedu.2009.09.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Asif</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Sriparna</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Gaurav</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Plagiarism detection in text using vector space model</article-title>
          <year>2012</year>
          <month>12</month>
          <day>04</day>
          <conf-name>12th International Conference on Hybrid Intelligent Systems (HIS)</conf-name>
          <conf-date>2012</conf-date>
          <conf-loc>Pune, India</conf-loc>
          <fpage>366</fpage>
          <lpage>371</lpage>
          <pub-id pub-id-type="doi">10.1109/his.2012.6421362</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hu</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>X</given-names>
            </name>
          </person-group>
          <article-title>Institutional policies on plagiarism: the case of eight Chinese universities of foreign languages/international studies</article-title>
          <source>System</source>
          <year>2017</year>
          <month>06</month>
          <volume>66</volume>
          <fpage>56</fpage>
          <lpage>68</lpage>
          <pub-id pub-id-type="doi">10.1016/j.system.2017.03.015</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eret</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Ok</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Internet plagiarism in higher education: tendencies, triggering factors and reasons among teacher candidates</article-title>
          <source>Assess Eval High Educ</source>
          <year>2014</year>
          <month>01</month>
          <day>27</day>
          <volume>39</volume>
          <issue>8</issue>
          <fpage>1002</fpage>
          <lpage>1016</lpage>
          <pub-id pub-id-type="doi">10.1080/02602938.2014.880776</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>García-Peñalvo</surname>
              <given-names>FJ</given-names>
            </name>
            <name name-style="western">
              <surname>Corell</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Abella-García</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Grande-de-Prado</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Burgos</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Tlili</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Tabacco</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Recommendations for mandatory online assessment in higher education during the COVID-19 pandemic</article-title>
          <source>Radical Solutions for Education in a Crisis Context</source>
          <year>2021</year>
          <publisher-loc>Singapore</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>85</fpage>
          <lpage>98</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Petre</surname>
              <given-names>LOEA</given-names>
            </name>
          </person-group>
          <article-title>Aspects of academic performance and ethics in the transition to elearning caused by the actual pandemic: a case study</article-title>
          <source>TEM J</source>
          <year>2020</year>
          <month>05</month>
          <day>27</day>
          <volume>9</volume>
          <issue>2</issue>
          <fpage>656</fpage>
          <lpage>661</lpage>
          <pub-id pub-id-type="doi">10.18421/tem92-31</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ramzan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Munir</surname>
              <given-names>MA</given-names>
            </name>
            <name name-style="western">
              <surname>Siddique</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Asif</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Awareness about plagiarism amongst university students in Pakistan</article-title>
          <source>High Educ</source>
          <year>2011</year>
          <month>9</month>
          <day>30</day>
          <volume>64</volume>
          <issue>1</issue>
          <fpage>73</fpage>
          <lpage>84</lpage>
          <pub-id pub-id-type="doi">10.1007/s10734-011-9481-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gullifer</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Tyson</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Who has read the policy on plagiarism? Unpacking students' understanding of plagiarism</article-title>
          <source>Stud High Educ</source>
          <year>2013</year>
          <month>04</month>
          <day>15</day>
          <volume>39</volume>
          <issue>7</issue>
          <fpage>1202</fpage>
          <lpage>1218</lpage>
          <pub-id pub-id-type="doi">10.1080/03075079.2013.777412</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hart</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Margheri</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Paci</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Sassone</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Riskio: a serious game for cyber security awareness and education</article-title>
          <source>Comput Secur</source>
          <year>2020</year>
          <month>08</month>
          <volume>95</volume>
          <fpage>101827</fpage>
          <pub-id pub-id-type="doi">10.1016/j.cose.2020.101827</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Haddad</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Kalaani</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Gaming against plagiarism (GAP): a game-based approach to illustrate research misconduct to undergraduate engineering students</article-title>
          <year>2014</year>
          <month>03</month>
          <day>30</day>
          <conf-name>2014 American Society for Engineering Education Southeast Section Conference</conf-name>
          <conf-date>March 30-April 1, 2014</conf-date>
          <conf-loc>Macon, GA</conf-loc>
          <fpage>1</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://digitalcommons.georgiasouthern.edu/electrical-eng-facpubs/42/"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Margino</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Revitalizing traditional information literacy instruction: exploring games in academic libraries</article-title>
          <source>Public Serv Q</source>
          <year>2013</year>
          <month>10</month>
          <volume>9</volume>
          <issue>4</issue>
          <fpage>333</fpage>
          <lpage>341</lpage>
          <pub-id pub-id-type="doi">10.1080/15228959.2013.842417</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mallon</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Gaming and gamification</article-title>
          <source>Public Serv Q</source>
          <year>2013</year>
          <month>07</month>
          <volume>9</volume>
          <issue>3</issue>
          <fpage>210</fpage>
          <lpage>221</lpage>
          <pub-id pub-id-type="doi">10.1080/15228959.2013.815502</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jennifer</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Can library research be fun? Using games for information literacy instruction in higher education</article-title>
          <source>Georgia Libr Q</source>
          <year>2016</year>
          <month>1</month>
          <day>7</day>
          <volume>53</volume>
          <issue>3</issue>
          <fpage>1</fpage>
          <lpage>8</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://digitalcommons.kennesaw.edu/glq/vol53/iss3/7/"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Guo</surname>
              <given-names>YR</given-names>
            </name>
            <name name-style="western">
              <surname>Goh</surname>
              <given-names>DH</given-names>
            </name>
          </person-group>
          <article-title>Evaluation of affective embodied agents in an information literacy game</article-title>
          <source>Comput Educ</source>
          <year>2016</year>
          <month>12</month>
          <volume>103</volume>
          <fpage>59</fpage>
          <lpage>75</lpage>
          <pub-id pub-id-type="doi">10.1016/j.compedu.2016.09.013</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
