Author of the publication

Examining the Influence of Actual-Ideal Self-Discrepancies, Depression, and Escapism, on Pathological Gaming Among Massively Multiplayer Online Adolescent Gamers.

, , and . Cyberpsy., Behavior, and Soc. Networking, 14 (9): 535-539 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Player-Avatar Identification in video gaming: Concept and measurement., , and . Computers in Human Behavior, 29 (1): 257-263 (2013)Examining the Influence of Actual-Ideal Self-Discrepancies, Depression, and Escapism, on Pathological Gaming Among Massively Multiplayer Online Adolescent Gamers., , and . Cyberpsy., Behavior, and Soc. Networking, 14 (9): 535-539 (2011)Moderating Effects of the Family Environment for Parental Mediation and Pathological Internet Use in Youths., , , and . Cyberpsy., Behavior, and Soc. Networking, 18 (1): 30-36 (2015)Scaffolding online historical inquiry tasks: A case study of two secondary school classrooms., and . Computers & Education, 50 (4): 1394-1410 (2008)Liquid Metal-Enabled Soft Logic Devices., , , , and . Adv. Intell. Syst., 3 (6): 2000246 (2021)A novel state cache scheme in structured P2P systems., , , and . J. Parallel Distrib. Comput., 65 (2): 154-168 (2005)Scaling Power and Performance viaProcessor Composability., , , , , , and . IEEE Trans. Computers, 63 (8): 2025-2038 (2014)Compacton, peakon, cuspons, loop solutions and smooth solitons for the generalized KP-MEW equation., , , and . Computers & Mathematics with Applications, 68 (12): 1775-1786 (2014)A Web-based tool and a heuristic method for cooperation of manufacturing supply chain decisions., , , and . J. Intelligent Manufacturing, 12 (5-6): 433-453 (2001)Feature representation and selection in malicious code detection methods based on static system calls., , , , and . Computers & Security, 30 (6-7): 514-524 (2011)