{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T19:29:08Z","timestamp":1761766148078},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2017,2,28]],"date-time":"2017-02-28T00:00:00Z","timestamp":1488240000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Game J"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s40869-017-0032-9","type":"journal-article","created":{"date-parts":[[2017,2,28]],"date-time":"2017-02-28T03:45:37Z","timestamp":1488253537000},"page":"33-61","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["On the Impact of Software Patching on Gameplay for the League of Legends Computer Game"],"prefix":"10.1007","volume":"6","author":[{"given":"Mark","family":"Claypool","sequence":"first","affiliation":[]},{"given":"Artian","family":"Kica","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"La Manna","sequence":"additional","affiliation":[]},{"given":"Lindsay","family":"O\u2019Donnell","sequence":"additional","affiliation":[]},{"given":"Tom","family":"Paolillo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,28]]},"reference":[{"issue":"1","key":"32_CR4","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1287\/isre.1080.0226","volume":"21","author":"a Arora","year":"2010","unstructured":"Arora, A., Krishnan, R., Telang, R., & Yang, Y. (2010). An empirical analysis of software vendors\u2019 patch release behavior: Impact of vulnerability disclosure. Information Systems Resarch, 21(1), 115\u2013132.","journal-title":"Information Systems Resarch"},{"key":"32_CR1","unstructured":"Champion.gg\u2014 LoL champion stats, builds, runes, and masteries. http:\/\/champion.gg\/ . Retrieved October 15, 2016."},{"key":"32_CR5","doi-asserted-by":"publisher","unstructured":"Claypool, M., Decelle, J., Hall, G., & O\u2019Donnell, L. (2015). Surrender at 20? Matchmaking in League of Legends. In Proceedings of the IEEE Games, Entertainment, Media Conference (GEM), Toronto, Canada.","DOI":"10.1109\/GEM.2015.7377234"},{"key":"32_CR6","unstructured":"E-Sports Earnings. Largest overall prize pools in eSports. http:\/\/www.esportsearnings.com\/tournaments . Retrieved June 22, 2016."},{"key":"32_CR7","unstructured":"E-Sports Earnings. League of Legends 2014 World Championships. http:\/\/www.esportsearnings.com\/tournaments\/7376-lol-2014-world-championship ."},{"key":"32_CR8","unstructured":"E-Sports Earnings. League of Legends 2015 World Championships. http:\/\/www.esportsearnings.com\/tournaments\/15149-lol-2015-world-championship . Retrieved June 22, 2016."},{"issue":"4","key":"32_CR9","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1145\/1151659.1159961","volume":"36","author":"C Gkantsidis","year":"2006","unstructured":"Gkantsidis, C., Karagiannis, T., & VojnoviC, M. (2006). Planet scale software updates. ACM SIGCOMM Computer Communications Review, 36(4), 423\u2013434.","journal-title":"ACM SIGCOMM Computer Communications Review"},{"key":"32_CR10","doi-asserted-by":"publisher","unstructured":"Hullett, K., Nagappan, N., Schuh, E., & Hopson, J. (2011). Data analytics for game development: NIER track. In Proceedings of the 33rd IEEE International Conference on Software Engineering (ICSE), Honolulu, Hawaii.","DOI":"10.1145\/1985793.1985952"},{"key":"32_CR11","unstructured":"Jeppesen, L. B. (2004). Profiting from innovative user communities: How firms organize the production of user modifications in the computer games industry. Department of Industrial Economics and Strategy, Copenhagen Business School, Cophenhagen, Denmark: Technical report."},{"key":"32_CR12","doi-asserted-by":"publisher","unstructured":"Kow, Y. M., & Nardi, B. (2010). Culture and creativity: World of warcraft modding in China and the U.S. In W. S. Bainbridge (Ed.), Online worlds: Convergence of the real and the virtual. Human\u2014computer interaction (pp. 21\u201341). Springer.","DOI":"10.1007\/978-1-84882-825-4_3"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Lin, Z., Jiang, X., Xu, D., Mao, B., & Xie, L. (2007). AutoPaG: Towards automated software patch generation with source code root cause identification and repair. In Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS) (pp. 329\u2013340), Singapore.","DOI":"10.1145\/1229285.1267001"},{"issue":"1","key":"32_CR14","first-page":"1","volume":"25","author":"R Lizardi","year":"2012","unstructured":"Lizardi, R. (2012). DLC: Perpetual commodification of the video game. Democratic Communiqu\u00e9, 25(1), 1\u201345.","journal-title":"Democratic Communiqu\u00e9"},{"key":"32_CR2","unstructured":"Lol\u2014League of legends summoner stats and champion build guides. http:\/\/www.lolking.net\/ . Retrieved October 15, 2016."},{"key":"32_CR15","unstructured":"Nieborg, D. B. (2005). Am I mod or not?\u2014An analysis of first person shooter modification culture. In Proceedings of the Creative Gamers Seminar\u2014Exploring Participatory Culture in Gaming, Helsinki, Finland."},{"key":"32_CR3","unstructured":"Patch. http:\/\/leagueoflegends.wikia.com\/wiki\/Patch . Retrieved November 18, 2016."},{"key":"32_CR16","unstructured":"Picture of Horse. (2016). Choosing the right champion. https:\/\/support.riotgames.com\/hc\/en-us\/articles\/201752864-Choosing-the-Right-Champion ."},{"key":"32_CR17","unstructured":"Raptr\u2014The Offical Blog (2015). Most played games: November 2015. http:\/\/goo.gl\/bVytCX . Retrieved June 22, 2016."},{"key":"32_CR18","unstructured":"Riot Games. Our games. http:\/\/www.riotgames.com\/our-games . Retrieved June 22, 2016."},{"key":"32_CR19","doi-asserted-by":"publisher","unstructured":"Schryen, G. (2009). A comprehensive and comparative analysis of the patching behavior of open source and closed source software vendors. In Proceedings of the IEEE Conference on IT Security Incident Management and IT Forensics (IMF), Stutgart, Germany.","DOI":"10.1109\/IMF.2009.15"},{"key":"32_CR20","unstructured":"Sotamaa, O. (2004). Playing it my way? Mapping the modder agency. In Proceedings of the Internet Research Conference (Vol. 5, pp. 19\u201322)."},{"key":"32_CR21","doi-asserted-by":"publisher","unstructured":"Webb, S. D., & Soh, S. (2007). Cheating in networked computer games: A review. In Proceedings of the 2nd International Conference on Digital Interactive Media in Entertainment and Arts (DIMEA) (pp. 105\u2013112). Australia: Perth.","DOI":"10.1145\/1306813.1306839"}],"container-title":["The Computer Games Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40869-017-0032-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40869-017-0032-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40869-017-0032-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T11:42:08Z","timestamp":1692704528000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40869-017-0032-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,28]]},"references-count":21,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["32"],"URL":"https:\/\/doi.org\/10.1007\/s40869-017-0032-9","relation":{},"ISSN":["2052-773X"],"issn-type":[{"value":"2052-773X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,28]]}}}