{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,12]],"date-time":"2025-12-12T13:19:20Z","timestamp":1765545560560,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642027734"},{"type":"electronic","value":"9783642027741"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02774-1_61","type":"book-chapter","created":{"date-parts":[[2009,7,14]],"date-time":"2009-07-14T19:50:39Z","timestamp":1247601039000},"page":"567-573","source":"Crossref","is-referenced-by-count":19,"title":["Cheating Behaviors in Online Gaming"],"prefix":"10.1007","author":[{"given":"Henry Been-Lirn","family":"Duh","sequence":"first","affiliation":[]},{"given":"Vivian Hsueh Hua","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"61_CR1","unstructured":"Pritchard, M.: How to Hurt the Hackers: The Scoop on Internet Cheating and How You Can Combat It, http:\/\/www.gamasutra.com\/features\/20000724\/pritchard_pfv.htm"},{"key":"61_CR2","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1108\/02640470210424455","volume":"20","author":"J.J. Yan","year":"2002","unstructured":"Yan, J.J., Choi, H.: Security Issues in Online Game. The Electronic Library\u00a020, 125\u2013133 (2002)","journal-title":"The Electronic Library"},{"key":"61_CR3","first-page":"286","volume-title":"19th Annual Computer Security Applications Conference","author":"J. Yan","year":"2003","unstructured":"Yan, J.: Security Design in Online Games. In: 19th Annual Computer Security Applications Conference, pp. 286\u2013295. IEEE Press, New York (2003)"},{"key":"61_CR4","first-page":"1","volume-title":"4th ACM SIGCOMM Workshop on Network and System Support for Games","author":"J. Yan","year":"2005","unstructured":"Yan, J., Randell, B.: A Systematic Classification of Cheating in Online Games. In: 4th ACM SIGCOMM Workshop on Network and System Support for Games, pp. 1\u20139. ACM Press, New Yok (2005)"},{"key":"61_CR5","unstructured":"O\u2019Brien, M., Gray, G.: Game Cheats and Cheat Prevention, http:\/\/gw.stratics.com\/content\/arenanet\/articles20020408_obrien_gray.php"},{"key":"61_CR6","first-page":"131","volume-title":"2nd Annual Conference on Privacy, Security and Trust","author":"Y. Chen","year":"2004","unstructured":"Chen, Y., Chen, P.S., Korba, L.: Online Gaming Crime and Security Issue- Case and Countermeasures from Taiwan. In: 2nd Annual Conference on Privacy, Security and Trust, pp. 131\u2013136. National Research Council, Canada (2004)"},{"key":"61_CR7","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1177\/0894439307313515","volume":"26","author":"N. Selwyn","year":"2008","unstructured":"Selwyn, N.: A Safe Haven for Misbehaving? An Investigation of Online Misbehavior among University Students. Social Science Computer Review\u00a026, 446\u2013465 (2008)","journal-title":"Social Science Computer Review"},{"key":"61_CR8","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1002\/cb.45","volume":"5","author":"J. Denegri-Knott","year":"2006","unstructured":"Denegri-Knott, J.: Consumers Behaving Badly. Journal of Consumer Behavior\u00a05, 82\u201394 (2006)","journal-title":"Journal of Consumer Behavior"},{"key":"61_CR9","doi-asserted-by":"crossref","unstructured":"Brooke, P.J.: Playing the Game: Cheating, Loopholes and Virtual Identity. ACM Computers and Society Magazine\u00a024(3) (2004)","DOI":"10.1145\/1052791.1052794"},{"key":"61_CR10","doi-asserted-by":"crossref","DOI":"10.4159\/9780674042605","volume-title":"A Theory of Justice","author":"J. Rawls","year":"1971","unstructured":"Rawls, J.: A Theory of Justice. Oxford University Press, Oxford (1971)"},{"key":"61_CR11","unstructured":"Consalvo, M.: Gaining Advantage: How Videogame Players Define and Negotiate Cheating, http:\/\/www.waikato.ac.nz\/film\/2005papers\/319B\/docs\/Consalvo.pdf"},{"key":"61_CR12","unstructured":"IT GlobalSecure, Inc., http:\/\/www.secureplay.com\/papers\/docs\/WhyCheatingMatters.pdf"}],"container-title":["Lecture Notes in Computer Science","Online Communities and Social Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02774-1_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T00:38:25Z","timestamp":1685061505000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02774-1_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642027734","9783642027741"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02774-1_61","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}