{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:57:18Z","timestamp":1742990238259,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319151670"},{"type":"electronic","value":"9783319151687"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15168-7_21","type":"book-chapter","created":{"date-parts":[[2015,2,27]],"date-time":"2015-02-27T13:30:58Z","timestamp":1425043858000},"page":"167-175","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Digital Addiction Ontology for Social Networking Systems"],"prefix":"10.1007","author":[{"given":"Amen","family":"Alrobai","sequence":"first","affiliation":[]},{"given":"Huseyin","family":"Dogan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,28]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Ha, J.H., et al.: Psychiatric comorbidity assessed in Korean children and adolescents who screen positive for Internet addiction. Journal of Clinical Psychiatry (2006)","key":"21_CR1","DOI":"10.4088\/JCP.v67n0517"},{"unstructured":"Young, K.S., de Abreu, C.N.: Internet addiction: A handbook and guide to evaluation and treatment (2011)","key":"21_CR2"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1089\/109493100316067","volume":"3","author":"M Griffiths","year":"2000","unstructured":"Griffiths, M.: Does Internet and computer addiction exist? Some case study evidence. CyberPsychology and Behavior 3, 211\u2013218 (2000)","journal-title":"CyberPsychology and Behavior"},{"unstructured":"Hammersley, R.: Personal e-mail communication to ADDICT-L discussion group (1995)","key":"21_CR4"},{"doi-asserted-by":"crossref","unstructured":"Hart, J., et al.: Exploring the facebook experience: a new approach to usability, pp. 471\u2013474 (2008)","key":"21_CR5","DOI":"10.1145\/1463160.1463222"},{"doi-asserted-by":"crossref","unstructured":"Thompson, A.-J., Kemp, E.A.: Web 2.0: extending the framework for heuristic evaluation, pp. 29\u201336 (2009)","key":"21_CR6","DOI":"10.1145\/1577782.1577788"},{"key":"21_CR7","first-page":"90","volume":"8","author":"D King","year":"2010","unstructured":"King, D., Delfabbro, P., Griffiths, M.: Video Game Structural Characteristics: A New Psychological Taxonomy 8, 90\u2013106 (2010)","journal-title":"Video Game Structural Characteristics: A New Psychological Taxonomy"},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"2217","DOI":"10.1016\/j.chb.2007.10.007","volume":"24","author":"DH Goh","year":"2008","unstructured":"Goh, D.H., Ang, R.P., Tan, H.C.: Strategies for designing effective psychotherapeutic gaming interventions for children and adolescents. Comput. Hum. Behav. 24, 2217\u20132235 (2008)","journal-title":"Comput. Hum. Behav."},{"unstructured":"Sch\u00fcll, N.D.: Addiction by Design. Princeton University Press (2012)","key":"21_CR9"},{"doi-asserted-by":"crossref","unstructured":"Dickerson, C.E.: Towards a logical and scientific foundation for system concepts, principles, and terminology. IEEE (2008)","key":"21_CR10","DOI":"10.1109\/SYSOSE.2008.4724161"},{"doi-asserted-by":"crossref","unstructured":"Dogan, H., Barot, V., Henshaw, M., Siemieniuch, C.: Formalisation and mapping of terminologies for Systems of Systems Engineering thesaurus. Presented at the 2013 8th International Conference on System of Systems Engineering (SoSE) (2013)","key":"21_CR11","DOI":"10.1109\/SYSoSE.2013.6575241"},{"unstructured":"Lazar, J., Feng, J.H., Hochheiser, H.: Research methods in human-computer interaction (2010)","key":"21_CR12"},{"key":"21_CR13","doi-asserted-by":"publisher","first-page":"1277","DOI":"10.1177\/1049732305276687","volume":"15","author":"HF Hsieh","year":"2005","unstructured":"Hsieh, H.F.: Three Approaches to Qualitative Content Analysis. Qual. Health Res. 15, 1277\u20131288 (2005)","journal-title":"Qual. Health Res."},{"key":"21_CR14","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1089\/1094931041291295","volume":"7","author":"J Suler","year":"2004","unstructured":"Suler, J.: The online disinhibition effect. CyberPsychology and Behavior 7, 321\u2013326 (2004)","journal-title":"CyberPsychology and Behavior"},{"key":"21_CR15","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1006\/knac.1993.1008","volume":"5","author":"TR Gruber","year":"1993","unstructured":"Gruber, T.R.: A translation approach to portable ontology specifications. Knowledge Acquisition 5, 199\u2013220 (1993)","journal-title":"Knowledge Acquisition"},{"unstructured":"Hesse, W.: Ontologies in the Software Engineering Process (2005)","key":"21_CR16"},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1111\/j.1460-2466.2005.tb03019.x","volume":"55","author":"SE Caplan","year":"2005","unstructured":"Caplan, S.E.: A social skill account of problematic Internet use. Journal of Communication 55, 721\u2013736 (2005)","journal-title":"Journal of Communication"},{"key":"21_CR18","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/S0747-5632(00)00041-8","volume":"17","author":"RA Davis","year":"2001","unstructured":"Davis, R.A.: A cognitive-behavioral model of pathological Internet use. Comput. Hum. Behav. 17, 187\u2013195 (2001)","journal-title":"Comput. Hum. Behav."},{"key":"21_CR19","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/BF01539190","volume":"12","author":"M Griffiths","year":"1996","unstructured":"Griffiths, M.: Gambling on the internet: A brief note. J. Gambling Stud. 12, 471\u2013473 (1996)","journal-title":"J. Gambling Stud."},{"key":"21_CR20","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1142\/S0219649211003085","volume":"10","author":"H Dogan","year":"2011","unstructured":"Dogan, H., de C. Henshaw, M.J., Ragsdell, G.: The Risk of Information Management Without Knowledge Management: A Case Study. J. Info. Know. Mgmt. 10, 393\u2013408 (2011)","journal-title":"J. Info. Know. Mgmt."},{"key":"21_CR21","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1176\/appi.ajp.2007.07101556","volume":"165","author":"J Block","year":"2008","unstructured":"Block, J.: Issues for DSM-V: Internet Addiction. Am. J. Psychiatry 165, 306\u2013307 (2008)","journal-title":"Am. J. Psychiatry"},{"key":"21_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-319-05843-6_9","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"A Alrobai","year":"2014","unstructured":"Alrobai, A., Phalp, K., Ali, R.: Digital addiction: a requirements engineering perspective. In: Salinesi, C., van de Weerd, I. (eds.) REFSQ 2014. LNCS, vol. 8396, pp. 112\u2013118. Springer, Heidelberg (2014)"},{"key":"21_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/nem.779","volume":"22","author":"K Yogo","year":"2012","unstructured":"Yogo, K., et al.: Incentive-rewarding mechanism to stimulate activities in social networking services. International Journal of Network Management 22, 1\u201311 (2012)","journal-title":"International Journal of Network Management"},{"unstructured":"Gacitua, R., et al.: Making Tacit Requirements Explicit. Presented at the 2009 Second International Workshop on Managing Requirements Knowledge (MARK) (2009)","key":"21_CR24"},{"issue":"1","key":"21_CR25","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s11469-006-9009-9","volume":"4","author":"L Widyanto","year":"2006","unstructured":"Widyanto, L., Griffiths, M.: internet addiction: a critical review. International Journal of Mental Health and Addiction 4(1), 31\u201351 (2006)","journal-title":"International Journal of Mental Health and Addiction"},{"unstructured":"Newman, W.M.: Busy days: exposing temporal metrics, problems and elasticities through diary studies. In: CHI 2004 Workshop on Temporal Issues in Work (2004)","key":"21_CR26"}],"container-title":["Lecture Notes in Computer Science","Social Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15168-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T14:27:54Z","timestamp":1675261674000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15168-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319151670","9783319151687"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15168-7_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 February 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}