Data Mining Techniques for Analysing Data Extracted from Serious Games: A Systematic Literature Review

被引:0
|
作者
Acosta-Uriguen, Maria-Ines [1 ]
Orellana, Marcos [1 ]
Cedillo, Priscila [1 ,2 ]
机构
[1] Univ Azuay, Lab Invest & Desarrollo Informat LIDI, Azuay, Ecuador
[2] Univ Cuenca, Azuay, Ecuador
关键词
Data Mining; Serious Games; Systematic Review;
D O I
10.5220/0011042900003188
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Serious games are applications that pursue, on the one hand, the users' entertainment and, on the other hand, look to promote their learning, cognitive stimulation, among reaching other objectives. Moreover, data generated from those games (e.g., demographic information, gaming precision, user efficiency) provide insights helpful in improving certain aspects such as the attention and memory of the gamers. Therefore, applying data mining techniques over those data allows obtaining multiple patterns to improve the game interface, identify preferences, discover, predict, train, and stimulate the users' cognitive situation, among other aspects, to reach the games' objectives. Unfortunately, although several solutions have been addressed about this topic, no secondary studies have been found to condensate research that uses data mining to extract patterns from serious games. Thus, this paper presents a Systematic Literature Review (SLR) to extract such evidence from studies reported between 2001 and 2021. Besides, this SLR aims to answer research questions involving serious games solutions that train the cognitive functions of their users and data mining techniques associated with data gathered from those games.
引用
收藏
页码:220 / 227
页数:8
相关论文
共 50 条
  • [1] Rainfall Prediction using Data Mining Techniques: A Systematic Literature Review
    Aftab, Shabib
    Ahmad, Munir
    Hameed, Noureen
    Bashir, Muhammad Salman
    Ali, Iftikhar
    Nawaz, Zahid
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (05) : 143 - 150
  • [2] Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review
    Salo, Fadi
    Injadat, Mohammadnoor
    Nassif, Ali Bou
    Shami, Abdallah
    Essex, Aleksander
    IEEE ACCESS, 2018, 6 : 56046 - 56058
  • [3] Privacy-preserving data (stream) mining techniques and their impact on data mining accuracy: a systematic literature review
    Hewage, U. H. W. A.
    Sinha, R.
    Naeem, M. Asif
    ARTIFICIAL INTELLIGENCE REVIEW, 2023, 56 (09) : 10427 - 10464
  • [4] Privacy-preserving data (stream) mining techniques and their impact on data mining accuracy: a systematic literature review
    U. H. W. A. Hewage
    R. Sinha
    M. Asif Naeem
    Artificial Intelligence Review, 2023, 56 : 10427 - 10464
  • [5] Data Mining Techniques: A Systematic Mapping Review
    Almozayen, Nouf A.
    Bin Othman, Mohd Khalit
    Bin Gani, Abdullah
    Alharethi, Salman Z.
    RECENT TRENDS IN INFORMATION AND COMMUNICATION TECHNOLOGY, 2018, 5 : 66 - 77
  • [6] Data Mining Techniques for Disease Risk Prediction Model: A Systematic Literature Review
    Ahmad, Wan Muhamad Taufik Wan
    Ab Ghani, Nur Laila
    Drus, Sulfeeza Mohd
    RECENT TRENDS IN DATA SCIENCE AND SOFT COMPUTING, IRICT 2018, 2019, 843 : 40 - 46
  • [7] Data Mining Techniques for Transformer Failure Prediction Model: A Systematic Literature Review
    Ravi, Nanthiine Nair
    Drus, Sulfeeza Mohd
    Krishnan, Prajindra Sankar
    2019 IEEE 9TH SYMPOSIUM ON COMPUTER APPLICATIONS & INDUSTRIAL ELECTRONICS (ISCAIE), 2019, : 305 - 309
  • [8] Serious Games for Children: A Systematic Literature Review
    Yanti, Putri Previa
    Rosmansyah, Yusep
    Dabarsyah, Budiman
    2019 INTERNATIONAL CONFERENCE ON INFORMATICS, MULTIMEDIA, CYBER AND INFORMATION SYSTEM (ICIMCIS), 2019, : 79 - 83
  • [9] ENHANCING THE VALUE AND USEFULNESS OF DATA EXTRACTED FROM AN ECONOMIC SYSTEMATIC LITERATURE REVIEW
    Miles, L.
    Mauskopf, J.
    VALUE IN HEALTH, 2024, 27 (06) : S407 - S407
  • [10] Automated Data Mining Techniques:A Critical Literature Review
    Asghar, Sohail
    Iqbal, Khalid
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 75 - 79