{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:29:17Z","timestamp":1777937357749,"version":"3.51.4"},"reference-count":65,"publisher":"SAGE Publications","issue":"12","license":[{"start":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T00:00:00Z","timestamp":1726790400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2025,12]]},"abstract":"<jats:p>Can players\u2019 network-level parameters predict gaming perpetration, victimization, and their overlap? Extending the Structural Hole Theory and the Shadow of the Future Effect, this study examines the potential advantages and accountability conferred by key network metrics (i.e., ego network size, brokerage, and closure) and their behavioral implications. Using longitudinal co-play network and complaint data from 55,760 players in an online multiplayer game over two months, the findings reveal that higher network size is associated with greater perpetration and reduced victimization. Network closure is linked to reduced involvement in both perpetration and victimization, while network brokerage is linked to increased involvement in both. The overlap of perpetration and victimization is predicted by higher network size and lower closure. Theoretically, this study complements existing research on gaming toxicity from a structural perspective. Practically, the findings underscore the importance of considering network elements, particularly network closure, in designing interventions to mitigate gaming toxicity.<\/jats:p>","DOI":"10.1177\/14614448241268995","type":"journal-article","created":{"date-parts":[[2024,9,21]],"date-time":"2024-09-21T02:29:02Z","timestamp":1726885742000},"page":"6569-6590","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["With great power comes great accountability: Network positions, victimization, perpetration, and victim-perpetrator overlap in an online multiplayer game"],"prefix":"10.1177","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3108-314X","authenticated-orcid":false,"given":"Mingxuan","family":"Liu","sequence":"first","affiliation":[{"name":"University of Macau, China"}]},{"given":"Qiusi","family":"Sun","sequence":"additional","affiliation":[{"name":"Syracuse University, USA"}]},{"given":"Dmitri","family":"Williams","sequence":"additional","affiliation":[{"name":"University of Southern California, USA"}]}],"member":"179","published-online":{"date-parts":[[2024,9,20]]},"reference":[{"key":"e_1_3_4_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3270316.3271545"},{"key":"e_1_3_4_3_1","unstructured":"Aivazpour Z Beebe N (2018) Cyberbullying: investigating the roles of power and communication medium. In: Twenty-Fourth Americas conference on information systems (AMCIS) New Orleans LA. Available at: https:\/\/web.archive.org\/web\/20200318065316id_\/https:\/\/aisel.aisnet.org\/cgi\/viewcontent.cgi?article=1400&context=amcis2018"},{"key":"e_1_3_4_4_1","unstructured":"Anti-Defamation League (ADL) (2022) Online hate and harassment survey 2022 June. Available at: https:\/\/www.adl.org\/sites\/default\/files\/pdfs\/2022-06\/Online-Hate-and-Harassment-Survey-2022-v7.pdf"},{"key":"e_1_3_4_5_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780429351815-4"},{"key":"e_1_3_4_6_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.89.6.1023"},{"key":"e_1_3_4_7_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.7466396"},{"key":"e_1_3_4_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.10.036"},{"key":"e_1_3_4_9_1","doi-asserted-by":"publisher","DOI":"10.2991\/sores-18.2019.16"},{"key":"e_1_3_4_10_1","volume-title":"UCINET 5.0 for Windows","author":"Borgatti SP","year":"1997","unstructured":"Borgatti SP, Everett MG, Freeman LC (1997) UCINET 5.0 for Windows. Columbia, SC: Analytic Technologies."},{"key":"e_1_3_4_11_1","doi-asserted-by":"publisher","DOI":"10.2307\/2393552"},{"key":"e_1_3_4_12_1","doi-asserted-by":"publisher","DOI":"10.4159\/9780674029095"},{"key":"e_1_3_4_13_1","volume-title":"Structural Holes: The Social Structure of Competition","author":"Burt RS","year":"1995","unstructured":"Burt RS (1995) Structural Holes: The Social Structure of Competition. Cambridge, MA: Harvard University Press."},{"key":"e_1_3_4_14_1","first-page":"31","volume-title":"Social Capital: Theory and Research","author":"Burt RS","year":"2001","unstructured":"Burt RS (2001) Closure as social capital. In: Lin N, Cook KS, Burt RS (eds) Social Capital: Theory and Research. New York: Aldine de Gruyter, pp. 31\u201355."},{"key":"e_1_3_4_15_1","volume-title":"Brokerage and Closure: An Introduction to Social Capital","author":"Burt RS","year":"2007","unstructured":"Burt RS (2007) Brokerage and Closure: An Introduction to Social Capital. Oxford: Oxford University Press."},{"key":"e_1_3_4_16_1","doi-asserted-by":"publisher","DOI":"10.1086\/667856"},{"key":"e_1_3_4_17_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315129457-2"},{"key":"e_1_3_4_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474680"},{"key":"e_1_3_4_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10826-015-0125-7"},{"key":"e_1_3_4_20_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.80.2.173"},{"key":"e_1_3_4_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/20563051211033808"},{"key":"e_1_3_4_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2020.101504"},{"key":"e_1_3_4_23_1","doi-asserted-by":"publisher","DOI":"10.2307\/2094546"},{"key":"e_1_3_4_24_1","doi-asserted-by":"publisher","DOI":"10.18574\/nyu\/9781479838523.001.0001"},{"key":"e_1_3_4_25_1","first-page":"1","article-title":"The igraph software package for complex network research","volume":"1695","author":"Csardi G","year":"2006","unstructured":"Csardi G, Nepusz T (2006) The igraph software package for complex network research. InterJournal, Complex Systems 1695: 1\u20139.","journal-title":"InterJournal, Complex Systems"},{"key":"e_1_3_4_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/1541204014521250"},{"key":"e_1_3_4_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.07.035"},{"key":"e_1_3_4_28_1","doi-asserted-by":"publisher","DOI":"10.2105\/AJPH.2015.302704"},{"key":"e_1_3_4_29_1","unstructured":"Entertainment Software Association (2023) Essential facts about the video game industry. Available at: https:\/\/www.theesa.com\/resource\/2022-essential-facts-about-the-video-game-industry\/"},{"key":"e_1_3_4_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10560-015-0432-2"},{"key":"e_1_3_4_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.017"},{"key":"e_1_3_4_32_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2012.01442.x"},{"key":"e_1_3_4_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.013"},{"key":"e_1_3_4_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531724"},{"key":"e_1_3_4_35_1","doi-asserted-by":"publisher","DOI":"10.1086\/225469"},{"key":"e_1_3_4_36_1","doi-asserted-by":"publisher","DOI":"10.1080\/13614568.2012.746740"},{"key":"e_1_3_4_37_1","volume-title":"Intersectional Tech: Black Users in Digital Gaming","author":"Gray KL","year":"2020","unstructured":"Gray KL (2020) Intersectional Tech: Black Users in Digital Gaming. Baton Rouge, LA: LSU Press."},{"key":"e_1_3_4_38_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.cs\/0109068"},{"key":"e_1_3_4_39_1","doi-asserted-by":"publisher","DOI":"10.1108\/INTR-08-2019-0343"},{"key":"e_1_3_4_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611043"},{"key":"e_1_3_4_41_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.598947"},{"key":"e_1_3_4_42_1","doi-asserted-by":"publisher","DOI":"10.1177\/0018726704045766"},{"issue":"3","key":"e_1_3_4_43_1","first-page":"85","article-title":"Extending the current theorization on cyberbullying: importance of including socio-psychological perspectives","volume":"13","author":"Laurie-ann MH","year":"2021","unstructured":"Laurie-ann MH, Crespi I, Hendry B, et al (2021) Extending the current theorization on cyberbullying: importance of including socio-psychological perspectives. Italian Journal of Sociology of Education 13(3): 85\u2013110.","journal-title":"Italian Journal of Sociology of Education"},{"key":"e_1_3_4_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/10410236.2016.1242032"},{"key":"e_1_3_4_45_1","doi-asserted-by":"publisher","DOI":"10.1093\/workar\/waaa007"},{"key":"e_1_3_4_46_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444815608807"},{"issue":"154","key":"e_1_3_4_47_1","first-page":"315","article-title":"Social network predictors of bullying and victimization","volume":"39","author":"Mouttapa M","year":"2004","unstructured":"Mouttapa M, Valente T, Gallaher P, et al (2004) Social network predictors of bullying and victimization. Adolescence 39(154): 315.","journal-title":"Adolescence"},{"key":"e_1_3_4_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106452"},{"key":"e_1_3_4_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-0134-6_14"},{"key":"e_1_3_4_50_1","doi-asserted-by":"publisher","DOI":"10.5749\/j.ctt2204rbz"},{"key":"e_1_3_4_51_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.91.2.216"},{"key":"e_1_3_4_52_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.43.3.503"},{"key":"e_1_3_4_53_1","doi-asserted-by":"publisher","DOI":"10.2307\/1143010"},{"key":"e_1_3_4_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-79868-9_2"},{"key":"e_1_3_4_55_1","volume-title":"Diffusion of Innovations","author":"Rogers EM","year":"2010","unstructured":"Rogers EM (2010) Diffusion of Innovations. New York: Simon & Schuster."},{"key":"e_1_3_4_56_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.1120.0819"},{"key":"e_1_3_4_57_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650212455197"},{"key":"e_1_3_4_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106343"},{"key":"e_1_3_4_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106786"},{"key":"e_1_3_4_60_1","doi-asserted-by":"publisher","DOI":"10.1002\/ab.20083"},{"key":"e_1_3_4_61_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444809341263"},{"key":"e_1_3_4_62_1","doi-asserted-by":"publisher","DOI":"10.1177\/1368430211402102"},{"key":"e_1_3_4_63_1","first-page":"303","volume-title":"From Cyber Bullying to Cyber Safety: Issues and Approaches in Educational Contexts","author":"Wegge D","year":"2013","unstructured":"Wegge D, Van Cleemput K, Vandebosch H, et al (2013) Setting an agenda for future research into cyberbullying using social network analysis. In: Hanewald R (ed.) From Cyber Bullying to Cyber Safety: Issues and Approaches in Educational Contexts. Hauppauge, NY: Nova Publishers, pp. 303\u2013324."},{"key":"e_1_3_4_64_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439314546729"},{"key":"e_1_3_4_65_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2006.00029.x"},{"key":"e_1_3_4_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106719"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14614448241268995","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14614448241268995","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14614448241268995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T04:02:24Z","timestamp":1777694544000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14614448241268995"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,20]]},"references-count":65,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["10.1177\/14614448241268995"],"URL":"https:\/\/doi.org\/10.1177\/14614448241268995","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,20]]}}}