{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T13:57:18Z","timestamp":1775743038847,"version":"3.50.1"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,2,24]],"date-time":"2019-02-24T00:00:00Z","timestamp":1550966400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000267","name":"Arts and Humanities Research Council","doi-asserted-by":"publisher","award":["AH\/L50385X\/1"],"award-info":[{"award-number":["AH\/L50385X\/1"]}],"id":[{"id":"10.13039\/501100000267","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s10676-019-09498-y","type":"journal-article","created":{"date-parts":[[2019,2,23]],"date-time":"2019-02-23T20:18:56Z","timestamp":1550953136000},"page":"105-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Getting away with murder: why virtual murder in MMORPGs can be wrong on Kantian grounds"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9121-6170","authenticated-orcid":false,"given":"Helen","family":"Ryland","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,24]]},"reference":[{"key":"9498_CR1","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/s10676-015-9381-x","volume":"17","author":"R Ali","year":"2015","unstructured":"Ali, R. (2015). A new solution to the gamer\u2019s dilemma. Ethics and Information Technology, 17, 267\u2013274.","journal-title":"Ethics and Information Technology"},{"issue":"4","key":"9498_CR2","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s10676-015-9383-8","volume":"17","author":"C Bartel","year":"2015","unstructured":"Bartel, C. (2015). \u2018Free will and moral responsibility in video games\u2019. Ethics and Information Technology, 17(4), 285\u2013293.","journal-title":"Ethics and Information Technology"},{"key":"9498_CR3","unstructured":"Chalk, A. (2017) Playerunknown\u2019s Battlegrounds player banned for team-killing a team-killer\u2019 [online]. Retrieved July 09, 2017 \n                    http:\/\/tinyurl.cpm\/y6wgz8m9\n                    \n                  ."},{"issue":"3","key":"9498_CR4","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/s10676-007-9144-4","volume":"9","author":"AJ Craft","year":"2007","unstructured":"Craft, A. J. (2007). Sin in cyber-eden: Understanding the metaphysics and morals of virtual worlds. Ethics and Information Technology, 9(3), 205\u2013217.","journal-title":"Ethics and Information Technology"},{"key":"9498_CR5","volume-title":"Artificial morality: Virtuous robots for virtual games","author":"P Danielson","year":"1992","unstructured":"Danielson, P. (1992). Artificial morality: Virtuous robots for virtual games. London: Routledge."},{"key":"9498_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1017\/S0031819107319013","volume":"82","author":"J Driver","year":"2007","unstructured":"Driver, J. (2007). Dream immorality. Philosophy, 82(1), 5\u201322.","journal-title":"Philosophy"},{"key":"9498_CR7","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/s10676-012-9298-6","volume":"14","author":"J Dunn","year":"2012","unstructured":"Dunn, J. (2012). Virtual worlds and moral evaluation. Ethics and Information Technology, 14, 255\u2013265.","journal-title":"Ethics and Information Technology"},{"key":"9498_CR8","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/s10676-017-9417-5","volume":"19","author":"M Goerger","year":"2017","unstructured":"Goerger, M. (2017). Value, violence, and the ethics of gaming. Ethics and Information Technology, 19, 95\u2013105.","journal-title":"Ethics and Information Technology"},{"key":"9498_CR9","volume-title":"Homo Luden: A study of the play-element in culture","author":"J Huizinga","year":"1949","unstructured":"Huizinga, J. (1949). Homo Luden: A study of the play-element in culture. London: Routledge and Kegan Paul."},{"key":"9498_CR10","volume-title":"Groundworks of the metaphysics of morals: Revised Edition. Translated and edited by Mary Gregor and Jens Timmerman","author":"I Kant","year":"2012","unstructured":"Kant, I. (2012). [1785]) Groundworks of the metaphysics of morals: Revised Edition. Translated and edited by Mary Gregor and Jens Timmerman. Cambridge: Cambridge University Press."},{"issue":"2","key":"9498_CR11","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s10676-016-9401-5","volume":"18","author":"TW Kim","year":"2016","unstructured":"Kim, T. W., & Werbach, K. (2016). More than just a game: Ethical issues in gamification. Ethics and Information Technology, 18(2), 157\u2013173.","journal-title":"Ethics and Information Technology"},{"key":"9498_CR12","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s10676-008-9168-4","volume":"11","author":"M Luck","year":"2009","unstructured":"Luck, M. (2009). \u2018The gamer\u2019s dilemma: An analysis of the arguments for the moral distinction between virtual murder and virtual paedophilia. Ethics and Information Technology, 11, 31\u201336.","journal-title":"Ethics and Information Technology"},{"issue":"6","key":"9498_CR13","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1111\/jpcu.12200","volume":"47","author":"D Mason","year":"2014","unstructured":"Mason, D. (2014). Video games, theater, and the paradox of fiction. The Journal of Popular Culture, 47(6), 1109\u20131121.","journal-title":"The Journal of Popular Culture"},{"key":"9498_CR14","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1023\/A:1013802119431","volume":"3","author":"M McCormick","year":"2001","unstructured":"McCormick, M. (2001). Is it wrong to play violent video games?. Ethics and Information Technology, 3, 277\u2013287.","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"9498_CR15","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10676-017-9420-x","volume":"19","author":"S Ostritsch","year":"2017","unstructured":"Ostritsch, S. (2017). The amoralist challenge to gaming and the gamer\u2019s moral obligation. Ethics and Information Technology, 19(2), 117\u2013128.","journal-title":"Ethics and Information Technology"},{"issue":"1","key":"9498_CR16","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1086\/656041","volume":"121","author":"J Pallikkathayil","year":"2010","unstructured":"Pallikkathayil, J. (2010). Deriving morality from politics: Rethinking the formula of humanity. Ethics, 121(1), 116\u2013147.","journal-title":"Ethics"},{"key":"9498_CR100","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:osobl\/9780199572809.001.0001","volume-title":"On what matters: Volume one","author":"D Parfit","year":"2011","unstructured":"Parfit, D. (2011). On what matters: Volume one, Oxford: Oxford University Press."},{"key":"9498_CR17","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s10676-010-9250-6","volume":"13","author":"S Patridge","year":"2011","unstructured":"Patridge, S. (2011). The incorrigible social meaning of video game imagery. Ethics and Information Technology, 13, 303\u2013312.","journal-title":"Ethics and Information Technology"},{"key":"9498_CR18","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s10676-012-9310-1","volume":"15","author":"S Patridge","year":"2013","unstructured":"Patridge, S. (2013). Pornography, ethics, and video games. Ethics and Information Technology, 15, 25\u201334.","journal-title":"Ethics and Information Technology"},{"key":"9498_CR19","unstructured":"Statista (2015) Number of World of Warcraft (WOW) subscribers from 2015 to 2023 (in millions). Retrieved July 04, 2018 from \n                    https:\/\/www.statista.com\/statistics\/276601\/number-of-world-of-warcraft-subscribers-by-quarter\/\n                    \n                  ."},{"key":"9498_CR20","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s10676-006-9126-y","volume":"9","author":"DI Waddington","year":"2007","unstructured":"Waddington, D. I. (2007). Locating the wrongness in ultra-violent video games. Ethics and Information Technology, 9, 121\u2013128.","journal-title":"Ethics and Information Technology"},{"key":"9498_CR21","volume-title":"Virtual morality: Morals, ethics, and new Media","author":"MJP Wolf","year":"2003","unstructured":"Wolf, M. J. P. (2003). Virtual morality: Morals, ethics, and new Media. New York: Peter Land Publishing."},{"key":"9498_CR22","first-page":"9","volume":"21","author":"J Wolfendale","year":"2009","unstructured":"Wolfendale, J. (2009). Virtual harm and attachment. Australian Institute of Family Studies, 21, 9\u201311.","journal-title":"Australian Institute of Family Studies"},{"key":"9498_CR23","volume-title":"Ethics in the virtual world: The morality and psychology of gaming","author":"G Young","year":"2013","unstructured":"Young, G. (2013) Ethics in the virtual world: The morality and psychology of gaming. Durham: Acumen Publishing Ltd."},{"key":"9498_CR24","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/s10676-016-9386-0","volume":"17","author":"G Young","year":"2015","unstructured":"Young, G. (2015). Violent video games and morality: A meta-ethical approach. Ethics and Information Technology, 17, 311\u2013321.","journal-title":"Ethics and Information Technology"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09498-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-019-09498-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-019-09498-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,23]],"date-time":"2020-02-23T19:03:42Z","timestamp":1582484622000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-019-09498-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,24]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["9498"],"URL":"https:\/\/doi.org\/10.1007\/s10676-019-09498-y","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,24]]},"assertion":[{"value":"24 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}