A game-based learning software model

Shamsa Abdulla Al Mazrouei, Nafla Saeed Al Derei, Boumediene Belkhouche

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    By introducing various modes of learning, technology, and specifically educational technology, has drastically changed the knowledge acquisition process. One promising mode is game-based learning (GBL). GBL provides rich and meaningful contexts that effectively supports different forms of learning, which require novel software models. Yet, despite the extensive research on GBL development, proposed models are highly conceptual and do not lend themselves to implementation. Thus, we elaborate a software model of game-based learning by developing several design perspectives to facilitate direct implementation.

    Original languageEnglish
    Title of host publicationProceedings - 2015 11th International Conference on Innovations in Information Technology, IIT 2015
    EditorsLeila Ismail
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    Pages350-355
    Number of pages6
    ISBN (Electronic)9781467385114
    DOIs
    Publication statusPublished - Jan 12 2016
    Event11th International Conference on Innovations in Information Technology, IIT 2015 - Dubai, United Arab Emirates
    Duration: Nov 1 2015Nov 3 2015

    Publication series

    NameProceedings - 2015 11th International Conference on Innovations in Information Technology, IIT 2015

    Other

    Other11th International Conference on Innovations in Information Technology, IIT 2015
    Country/TerritoryUnited Arab Emirates
    CityDubai
    Period11/1/1511/3/15

    Keywords

    • Game-based learning
    • cyber-learning
    • implementability
    • knowledge acquisition
    • multi-modal learning
    • software model

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Computer Science Applications
    • Communication

    Fingerprint

    Dive into the research topics of 'A game-based learning software model'. Together they form a unique fingerprint.

    Cite this