Search Results
techniques. Information security risk management. 13 Act CXII of 2011 on information self-determination and freedom of information. [2011. évi CXII. törvény az információs
Addressing problematic video game use: A multimethod, dual-context perspective on leisure-time use
Commentary on: Policy responses to problematic video game use: A systematic review of current measures and future possibilities (Király et al., 2018)
Authors:
Antonius J. Van Rooij
and
Laura M. Nijkamp
using player motivation theories and an ensemble approach . Paper presented at 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, Boston, MA , 157 – 164 . doi