{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:22:56Z","timestamp":1743002576666,"version":"3.40.3"},"publisher-location":"Cham","reference-count":64,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031447501"},{"type":"electronic","value":"9783031447518"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-44751-8_20","type":"book-chapter","created":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T04:01:58Z","timestamp":1697169718000},"page":"257-273","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Through a Gender Lens: A Serious Game for Young Children to Enhance Bullying Awareness and Encourage the Adoption of the Defender Role"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1164-9484","authenticated-orcid":false,"given":"Attracta","family":"Brennan","sequence":"first","affiliation":[]},{"given":"Caroline","family":"Manghan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2052-3143","authenticated-orcid":false,"given":"Mary","family":"Dempsey","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2628-5054","authenticated-orcid":false,"given":"John","family":"McAvoy","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4856-3756","authenticated-orcid":false,"given":"Sam","family":"Redfern","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,14]]},"reference":[{"key":"20_CR1","unstructured":"WHO: Social determinants of health and well-being among young people (2012)"},{"key":"20_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2020.103958","volume":"157","author":"A Calvo-Morata","year":"2020","unstructured":"Calvo-Morata, A., et al.: Serious games to prevent and detect bullying and cyberbullying: a systematic serious games and literature review. Comput. Educ. 157, 103958 (2020)","journal-title":"Comput. Educ."},{"issue":"1","key":"20_CR3","doi-asserted-by":"publisher","first-page":"60","DOI":"10.5498\/wjp.v7.i1.60","volume":"7","author":"SE Moore","year":"2017","unstructured":"Moore, S.E., et al.: Consequences of bullying victimization in childhood and adolescence: a systematic review and meta-analysis. World J. Psychiatry 7(1), 60 (2017)","journal-title":"World J. Psychiatry"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Armitage, R.: Bullying in children: impact on child health. BMJ Paediatrics Open 5(1) (2021)","DOI":"10.1136\/bmjpo-2020-000939"},{"issue":"1","key":"20_CR5","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1002\/wps.20399","volume":"16","author":"L Arseneault","year":"2017","unstructured":"Arseneault, L.: The long-term impact of bullying victimization on mental health. World Psychiatry 16(1), 27 (2017)","journal-title":"World Psychiatry"},{"issue":"sup1","key":"20_CR6","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1080\/13548506.2017.1279740","volume":"22","author":"E Menesini","year":"2017","unstructured":"Menesini, E., Salmivalli, C.: Bullying in schools: the state of knowledge and effective interventions. Psychol. Health Med. 22(sup1), 240\u2013253 (2017)","journal-title":"Psychol. Health Med."},{"issue":"4","key":"20_CR7","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1080\/00405841.2014.947222","volume":"53","author":"C Salmivalli","year":"2014","unstructured":"Salmivalli, C.: Participant roles in bullying: how can peer bystanders be utilized in interventions? Theory Pract. 53(4), 286\u2013292 (2014)","journal-title":"Theory Pract."},{"issue":"2","key":"20_CR8","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1080\/00405841.2016.1148988","volume":"55","author":"S Graham","year":"2016","unstructured":"Graham, S.: Victims of bullying in schools. Theory Pract. 55(2), 136\u2013144 (2016)","journal-title":"Theory Pract."},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Raminhos, C., et al.: A serious game-based solution to prevent bullying. Int. J. Perv. Comput. Commun. (2016)","DOI":"10.1145\/2837126.2837135"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1016\/j.chiabu.2017.01.012","volume":"65","author":"LJ Lambe","year":"2017","unstructured":"Lambe, L.J., et al.: Does defending come with a cost? Examining the psychosocial correlates of defending behaviour among bystanders of bullying in a Canadian sample. Child Abuse Negl. 65, 112\u2013123 (2017)","journal-title":"Child Abuse Negl."},{"issue":"4","key":"20_CR11","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1111\/sjop.12453","volume":"59","author":"B Lucas-Molina","year":"2018","unstructured":"Lucas-Molina, B., et al.: Bullying, defending, and outsider behaviors: the moderating role of social status and gender in their relationship with empathy. Scand. J. Psychol. 59(4), 473\u2013482 (2018)","journal-title":"Scand. J. Psychol."},{"issue":"3","key":"20_CR12","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1002\/ab.21688","volume":"43","author":"LN Jenkins","year":"2017","unstructured":"Jenkins, L.N., Nickerson, A.B.: Bullying participant roles and gender as predictors of bystander intervention. Aggress. Behav. 43(3), 281\u2013290 (2017)","journal-title":"Aggress. Behav."},{"key":"20_CR13","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1016\/j.chb.2017.10.011","volume":"78","author":"A DeSmet","year":"2018","unstructured":"DeSmet, A., et al.: The efficacy of the Friendly Attac serious digital game to promote prosocial bystander behavior in cyberbullying among young adolescents: a cluster-randomized controlled trial. Comput. Hum. Behav. 78, 336\u2013347 (2018)","journal-title":"Comput. Hum. Behav."},{"issue":"10","key":"20_CR14","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1016\/S2215-0366(15)00223-0","volume":"2","author":"AB Klomek","year":"2015","unstructured":"Klomek, A.B., Sourander, A., Elonheimo, H.: Bullying by peers in childhood and effects on psychopathology, suicidality, and criminality in adulthood. Lancet Psychiatry 2(10), 930\u2013941 (2015)","journal-title":"Lancet Psychiatry"},{"key":"20_CR15","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.avb.2015.05.007","volume":"23","author":"D \u00c1lvarez-Garc\u00eda","year":"2015","unstructured":"\u00c1lvarez-Garc\u00eda, D., Garc\u00eda, T., N\u00fa\u00f1ez, J.C.: Predictors of school bullying perpetration in adolescence: a systematic review. Aggress. Violent Beh. 23, 126\u2013136 (2015)","journal-title":"Aggress. Violent Beh."},{"issue":"2","key":"20_CR16","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1177\/0143034317749992","volume":"39","author":"VA Coelho","year":"2018","unstructured":"Coelho, V.A., Sousa, V.: Class-level risk factors for bullying and victimization in Portuguese middle schools. Sch. Psychol. Int. 39(2), 121\u2013137 (2018)","journal-title":"Sch. Psychol. Int."},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Bauman, S., Cross, D., Walker, J.: Principles of Cyberbullying Research: Definition, Methods, and Measures, p. 2013 (2013)","DOI":"10.4324\/9780203084601"},{"key":"20_CR18","unstructured":"Brennan, A., Dempsey, M.: P-PAC (Partnership in Pedagogy, Accreditation, and Collaboration): a framework to support student transition to employability in industry. A lean systems case study. Manag. Prod. Eng. Rev. 9 (2018)"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Brennan, A., Dempsey, M.: The student voice: the students own views on smartphone usage and impact on their academic performance. INTED, Valencia (2018)","DOI":"10.21125\/inted.2018.1836"},{"key":"20_CR20","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1016\/j.chb.2018.05.013","volume":"86","author":"I-K Peter","year":"2018","unstructured":"Peter, I.-K., Petermann, F.: Cyberbullying: a concept analysis of defining attributes and additional influencing factors. Comput. Hum. Behav. 86, 350\u2013366 (2018)","journal-title":"Comput. Hum. Behav."},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Schade, B.P., Larwin, K.H., Larwin, D.A.: Public vs. private cyberbullying among adolescents. Interdiscip. Educ. Psychol. 1(1), 5 (2017)","DOI":"10.31532\/InterdiscipEducPsychol.1.1.005"},{"key":"20_CR22","unstructured":"van Tiel, J.: Cyberbullying, an overlooked and ever growing danger to the development of children (2020)"},{"issue":"2","key":"20_CR23","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1080\/0144929X.2020.1813332","volume":"41","author":"B Ron\u010devi\u0107 Zubkovi\u0107","year":"2022","unstructured":"Ron\u010devi\u0107 Zubkovi\u0107, B., et al.: The role of experience during playing bullying prevention serious game: effects on knowledge and compassion. Behav. Inf. Technol. 41(2), 401\u2013415 (2022)","journal-title":"Behav. Inf. Technol."},{"key":"20_CR24","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1016\/j.compedu.2015.07.011","volume":"87","author":"A Calder\u00f3n","year":"2015","unstructured":"Calder\u00f3n, A., Ruiz, M.: A systematic literature review on serious games evaluation: an application to software project management. Comput. Educ. 87, 396\u2013422 (2015)","journal-title":"Comput. Educ."},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Brennan, A., et al.: Cosmic Sounds: A game to support Phonological Awareness skills for children with Dyslexia. IEEE Trans. Learn. Technol. 15 (2022)","DOI":"10.1109\/TLT.2022.3170231"},{"issue":"1","key":"20_CR26","doi-asserted-by":"publisher","first-page":"14","DOI":"10.3390\/info11010014","volume":"11","author":"FG Silva","year":"2019","unstructured":"Silva, F.G.: Practical methodology for the design of educational serious games. Information 11(1), 14 (2019)","journal-title":"Information"},{"issue":"2","key":"20_CR27","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1080\/10508406.2010.508029","volume":"20","author":"MJ Habgood","year":"2011","unstructured":"Habgood, M.J., Ainsworth, S.E.: Motivating children to learn effectively: exploring the value of intrinsic integration in educational games. J. Learn. Sci. 20(2), 169\u2013206 (2011)","journal-title":"J. Learn. Sci."},{"issue":"4","key":"20_CR28","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1207\/s15516709cog0504_2","volume":"5","author":"TW Malone","year":"1981","unstructured":"Malone, T.W.: Toward a theory of intrinsically motivating instruction. Cogn. Sci. 5(4), 333\u2013369 (1981)","journal-title":"Cogn. Sci."},{"issue":"4","key":"20_CR29","doi-asserted-by":"publisher","first-page":"1350","DOI":"10.18517\/ijaseit.8.4.6490","volume":"8","author":"SA Alserri","year":"2018","unstructured":"Alserri, S.A., Zin, N.A.M., Wook, T.: Gender-based engagement model for serious games. Int. J. Adv. Sci. Eng. Inf. Technol. 8(4), 1350\u20131357 (2018)","journal-title":"Int. J. Adv. Sci. Eng. Inf. Technol."},{"key":"20_CR30","doi-asserted-by":"crossref","unstructured":"Buzady, Z.: Flow, leadership and serious games\u2013a pedagogical perspective. World J. Sci. Technol. Sustain. Dev. 14, 204\u2013217 (2017)","DOI":"10.1108\/WJSTSD-05-2016-0035"},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Wang, J.-Y., Lin, W., Yueh, H.-P.: Collaborate or compete? How will multiplayers\u2019 interaction affect their learning performance in serious games. In: Rau, P.L. (ed.) Cross-Cultural Design. Culture and Society. HCII 2019. Lecture Notes in Computer Science, vol. 11577, pp. 482\u2013491. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22580-3_36","DOI":"10.1007\/978-3-030-22580-3_36"},{"key":"20_CR32","doi-asserted-by":"crossref","unstructured":"Geslin, E., J\u00e9gou, L., Beaudoin, D.: How color properties can be used to elicit emotions in video games. Int. J. Comput. Games Technol. 2016, 1\u20139 (2016)","DOI":"10.1155\/2016\/5182768"},{"key":"20_CR33","doi-asserted-by":"crossref","unstructured":"Brown, A., et al.: Gender Differences when Adopting Avatars for Educational Games. In: 2021 Australasian Computer Science Week Multiconference (2021)","DOI":"10.1145\/3437378.3442691"},{"key":"20_CR34","unstructured":"Reay, E.: The child in games: representations of children in video games (2009\u20132019). Game Stud. 21(1) (2021)"},{"issue":"4","key":"20_CR35","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s10643-013-0600-y","volume":"42","author":"E Levine","year":"2014","unstructured":"Levine, E., Tamburrino, M.: Bullying among young children: strategies for prevention. Early Childhood Educ. J. 42(4), 271\u2013278 (2014)","journal-title":"Early Childhood Educ. J."},{"key":"20_CR36","unstructured":"Wang, K., et al.: Indicators of School Crime and Safety: 2019. NCES 2020\u2013063\/NCJ 254485. National Center for Education Statistics (2020)"},{"issue":"1","key":"20_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13052-018-0446-4","volume":"44","author":"P Ferrara","year":"2018","unstructured":"Ferrara, P., et al.: Cyberbullying a modern form of bullying: let\u2019s talk about this health and social problem. Ital. J. Pediatr. 44(1), 1\u20133 (2018)","journal-title":"Ital. J. Pediatr."},{"key":"20_CR38","doi-asserted-by":"crossref","unstructured":"Anderson, K.E.: Getting acquainted with social networks and apps: it is time to talk about TikTok. Library hi tech news (2020)","DOI":"10.1108\/LHTN-01-2020-0001"},{"key":"20_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2019.103643","volume":"142","author":"J Park","year":"2019","unstructured":"Park, J., et al.: GAMESIT: a gamified system for information technology training. Comput. Educ. 142, 103643 (2019)","journal-title":"Comput. Educ."},{"key":"20_CR40","doi-asserted-by":"crossref","unstructured":"Winter, L.-C., et al.: Applying pedagogical approaches to enhance learning: linking self-regulated and skills-based learning with support from Moodle extensions. In: 2013 Second IIAI International Conference on Advanced Applied Informatics. IEEE (2013)","DOI":"10.1109\/IIAI-AAI.2013.35"},{"issue":"3","key":"20_CR41","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/S0142-694X(02)00052-2","volume":"24","author":"R Coyne","year":"2003","unstructured":"Coyne, R.: Mindless repetition: learning from computer games. Des. Stud. 24(3), 199\u2013212 (2003)","journal-title":"Des. Stud."},{"issue":"1","key":"20_CR42","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1016\/j.chb.2010.10.001","volume":"27","author":"KR Hamlen","year":"2011","unstructured":"Hamlen, K.R.: Children\u2019s choices and strategies in video games. Comput. Hum. Behav. 27(1), 532\u2013539 (2011)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"20_CR43","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1186\/1471-2288-11-100","volume":"11","author":"S Crowe","year":"2011","unstructured":"Crowe, S., et al.: The case study approach. BMC Med. Res. Methodol. 11(1), 100 (2011)","journal-title":"BMC Med. Res. Methodol."},{"key":"20_CR44","unstructured":"Hulley, S.B.: Designing Clinical Research. Lippincott Williams & Wilkins (2007)"},{"key":"20_CR45","doi-asserted-by":"crossref","unstructured":"Cantone, E., et al.: Interventions on bullying and cyberbullying in schools: a systematic review. Clin. Pract. Epidemiol. Mental Health: CP & EMH 11(Suppl. 1 M4), 58 (2015)","DOI":"10.2174\/1745017901511010058"},{"key":"20_CR46","unstructured":"Ransford-Kaldon, C.R., et al.: Implementation of Effective Intervention: An Empirical Study to Evaluate the Efficacy of Fountas & Pinnell's Leveled Literacy Intervention System (LLI). 2009\u20132010. Center for Research in Educational Policy (CREP) (2010)"},{"issue":"3","key":"20_CR47","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.nedt.2008.10.012","volume":"29","author":"BC Parker","year":"2009","unstructured":"Parker, B.C., Myrick, F.: A critical examination of high-fidelity human patient simulation within the context of nursing pedagogy. Nurse Educ. Today 29(3), 322\u2013329 (2009)","journal-title":"Nurse Educ. Today"},{"issue":"2","key":"20_CR48","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1111\/j.1756-2589.2012.00119.x","volume":"4","author":"JE Gibson","year":"2012","unstructured":"Gibson, J.E.: Interviews and focus groups with children: methods that match children\u2019s developing competencies. J. Fam. Theory Rev. 4(2), 148\u2013159 (2012)","journal-title":"J. Fam. Theory Rev."},{"issue":"1","key":"20_CR49","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/TLT.2018.2879354","volume":"13","author":"A Calvo-Morata","year":"2018","unstructured":"Calvo-Morata, A., et al.: Validation of a cyberbullying serious game using game analytics. IEEE Trans. Learn. Technol. 13(1), 186\u2013197 (2018)","journal-title":"IEEE Trans. Learn. Technol."},{"key":"20_CR50","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.csi.2016.09.014","volume":"50","author":"\u00c1 Serrano-Laguna","year":"2017","unstructured":"Serrano-Laguna, \u00c1., et al.: Applying standards to systematize learning analytics in serious games. Comput. Stand. Interf. 50, 116\u2013123 (2017)","journal-title":"Comput. Stand. Interf."},{"key":"20_CR51","unstructured":"Maguire, M., Delahunt, B.: Doing a thematic analysis: a practical, step-by-step guide for learning and teaching scholars. All Irel. J. High. Educ. 9(3) (2017)"},{"key":"20_CR52","doi-asserted-by":"publisher","first-page":"160940691988727","DOI":"10.1177\/1609406919887274","volume":"18","author":"K Adler","year":"2019","unstructured":"Adler, K., Salanter\u00e4, S., Zumstein-Shaha, M.: Focus group interviews in child, youth, and parent research: an integrative literature review. Int. J. Qual. Methods 18, 1609406919887274 (2019)","journal-title":"Int. J. Qual. Methods"},{"issue":"2","key":"20_CR53","first-page":"3084","volume":"3","author":"CW Turner","year":"2006","unstructured":"Turner, C.W., Lewis, J.R., Nielsen, J.: Determining usability test sample size. Int. Encycl. Ergon. Hum. Factors 3(2), 3084\u20133088 (2006)","journal-title":"Int. Encycl. Ergon. Hum. Factors"},{"key":"20_CR54","doi-asserted-by":"crossref","unstructured":"Cheng, Y.-M., et al.: Investigating elementary school students\u2019 technology acceptance by applying digital game-based learning to environmental education. Australas. J. Educ. Technol. 29(1) (2013)","DOI":"10.14742\/ajet.65"},{"issue":"12","key":"20_CR55","first-page":"139","volume":"4","author":"T Anastasiadis","year":"2018","unstructured":"Anastasiadis, T., Lampropoulos, G., Siakas, K.: Digital game-based learning and serious games in education. Int. J. Adv. Sci. Res. Eng. 4(12), 139\u2013144 (2018)","journal-title":"Int. J. Adv. Sci. Res. Eng."},{"key":"20_CR56","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1016\/j.compedu.2019.04.006","volume":"136","author":"J Moizer","year":"2019","unstructured":"Moizer, J., et al.: An approach to evaluating the user experience of serious games. Comput. Educ. 136, 141\u2013151 (2019)","journal-title":"Comput. Educ."},{"key":"20_CR57","doi-asserted-by":"crossref","unstructured":"Lyon, N., et al.: Little Newton: an educational physics game. In: Proceedings of the First ACM SIGCHI Annual Symposium on Computer-Human Interaction in Play (2014)","DOI":"10.1145\/2658537.2662985"},{"issue":"4","key":"20_CR58","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1089\/cyber.2018.0302","volume":"22","author":"RA Ratan","year":"2019","unstructured":"Ratan, R.A., et al.: Women keep it real: Avatar gender choice in league of legends. Cyberpsychol. Behav. Soc. Netw. 22(4), 254\u2013257 (2019)","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"issue":"6","key":"20_CR59","doi-asserted-by":"publisher","first-page":"2160","DOI":"10.1016\/j.chb.2012.06.022","volume":"28","author":"S-AA Jin","year":"2012","unstructured":"Jin, S.-A.A.: The virtual malleable self and the virtual identity discrepancy model: investigative frameworks for virtual possible selves and others in avatar-based identity construction and social interaction. Comput. Hum. Behav. 28(6), 2160\u20132168 (2012)","journal-title":"Comput. Hum. Behav."},{"key":"20_CR60","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1016\/j.chb.2017.01.031","volume":"71","author":"C-C Chang","year":"2017","unstructured":"Chang, C.-C., et al.: Is game-based learning better in flow experience and various types of cognitive load than non-game-based learning? Perspective from multimedia and media richness. Comput. Hum. Behav. 71, 218\u2013227 (2017)","journal-title":"Comput. Hum. Behav."},{"key":"20_CR61","doi-asserted-by":"crossref","unstructured":"Gaete, J., et al.: Validation of the revised Olweus Bully\/Victim Questionnaire (OBVQ-R) among adolescents in Chile. Front. Psychol. 12 (2021)","DOI":"10.3389\/fpsyg.2021.578661"},{"key":"20_CR62","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1016\/j.chb.2017.10.008","volume":"78","author":"J Song","year":"2018","unstructured":"Song, J., Oh, I.: Factors influencing bystanders\u2019 behavioral reactions in cyberbullying situations. Comput. Hum. Behav. 78, 273\u2013282 (2018)","journal-title":"Comput. Hum. Behav."},{"issue":"6","key":"20_CR63","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1002\/ab.1027","volume":"27","author":"M Eslea","year":"2001","unstructured":"Eslea, M., Rees, J.: At what age are children most likely to be bullied at school? Aggress. Behav.: Off. J. Int. Soc. Res. Aggress. 27(6), 419\u2013429 (2001)","journal-title":"Aggress. Behav.: Off. J. Int. Soc. Res. Aggress."},{"issue":"16","key":"20_CR64","doi-asserted-by":"publisher","first-page":"2094","DOI":"10.1001\/jama.285.16.2094","volume":"285","author":"TR Nansel","year":"2001","unstructured":"Nansel, T.R., et al.: Bullying behaviors among US youth: prevalence and association with psychosocial adjustment. JAMA 285(16), 2094\u20132100 (2001)","journal-title":"JAMA"}],"container-title":["Lecture Notes in Computer Science","Serious Games"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-44751-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T04:04:14Z","timestamp":1697169854000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-44751-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031447501","9783031447518"],"references-count":64,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-44751-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"14 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"JCSG","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint International Conference on Serious Games","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"jcsg2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/jointconference-on-seriousgames.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3,6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14 poster papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}