<?xml version="1.1" encoding="utf-8"?><!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" dtd-version="1.1" specific-use="sps-1.9" article-type="research-article" xml:lang="en">
    <front>
        <journal-meta>
            <journal-id journal-id-type="publisher-id">inter</journal-id>
            <journal-title-group>
                <journal-title>Psychosocial Intervention</journal-title>
                <abbrev-journal-title abbrev-type="publisher">Interv. psicossoc</abbrev-journal-title>
            </journal-title-group>
            <issn pub-type="ppub">1132-0559</issn>
            <issn pub-type="epub">2173-4712</issn>
            <publisher>
                <publisher-name>Colegio Oficial de la Psicología de Madrid</publisher-name>
            </publisher>
        </journal-meta>
        <article-meta>
            <article-id pub-id-type="doi">10.5093/pi2022a5</article-id>
                        <article-id pub-id-type="other">00002</article-id>
            <article-categories>
                <subj-group subj-group-type="heading">
                    <subject>research-article</subject>
                </subj-group>
            </article-categories>
            <title-group>
                <article-title>Serious Game-based Psychosocial Intervention to Foster Prosociality in Cyberbullying Bystanders</article-title>
                <trans-title-group xml:lang="es">
                    <trans-title>La intervención psicosocial mediante juegos serios para fomentar la prosocialidad en los testigos de ciberacoso</trans-title>
                </trans-title-group>
            </title-group>
            <contrib-group>
                <contrib contrib-type="author">
                    <name>
                        <surname>Ferreira</surname>
                        <given-names>Paula C.</given-names>
                    </name>
                    <xref ref-type="aff" rid="aff01">a</xref>
                    <xref ref-type="aff" rid="aff02">b</xref>
                    <xref ref-type="corresp" rid="c01"/>
                </contrib>
                <contrib contrib-type="author">
                    <name>
                        <surname>Simão</surname>
                        <given-names>Ana Margarida Veiga</given-names>
                    </name>
                    <xref ref-type="aff" rid="aff01">a</xref>
                </contrib>
                <contrib contrib-type="author">
                    <name>
                        <surname>Paiva</surname>
                        <given-names>Ana</given-names>
                    </name>
                    <xref ref-type="aff" rid="aff02">c</xref>
                </contrib>
                <contrib contrib-type="author">
                    <name>
                        <surname>Martinho</surname>
                        <given-names>Carlos</given-names>
                    </name>
                    <xref ref-type="aff" rid="aff02">b</xref>
                </contrib>
                <contrib contrib-type="author">
                    <name>
                        <surname>Prada</surname>
                        <given-names>Rui</given-names>
                    </name>
                    <xref ref-type="aff" rid="aff02">b</xref>
                </contrib>
                <contrib contrib-type="author">
                    <name>
                        <surname>Rocha</surname>
                        <given-names>José</given-names>
                    </name>
                    <xref ref-type="aff" rid="aff02">b</xref>
                </contrib>
            </contrib-group>
            <aff id="aff01">
                <label>a</label>
                <institution content-type="orgname">University of Lisbon</institution>
                <addr-line>
                    <named-content content-type="city">Lisbon</named-content>
                </addr-line>
                <country country="PT">Portugal</country>
                <institution content-type="original">University of Lisbon, Lisbon, Portugal;</institution>
            </aff>
            <aff id="aff02">
                <label>c</label>
                <institution content-type="orgname">Instituto Superior Técnico</institution>
                <institution content-type="orgdiv1">GAIPS</institution>
                <addr-line>
                    <named-content content-type="city">Porto Salvo</named-content>
                </addr-line>
                <country country="PT">Portugal</country>
                <institution content-type="original">Instituto Superior Técnico, INESC-ID, GAIPS, Porto Salvo, Portugal</institution>
            </aff>
            <author-notes>
                <corresp id="c01">Correspondence: <email>paula.ferreira@campus.ul.pt</email> (P. C. Ferreira)</corresp>
                <fn fn-type="conflict" id="fn01">
                    <label>Conflict of Interest</label>
                    <p>The authors of this article declare no conflict of interest.</p>
                </fn>
            </author-notes>
          <pub-date publication-format="electronic" date-type="pub">
             <day>13</day>
             <month>5</month>
             <year>2022</year>
         </pub-date>
             <pub-date publication-format="electronic" date-type="collection">
             <month>5</month>
             <year>2022</year>
         </pub-date>
         <volume>31</volume>
         <issue>2</issue>
         <fpage>83</fpage>
         <lpage>96</lpage>
         <history>
                <date date-type="received">
                    <day>16</day>
                    <month>06</month>
                    <year>2021</year>
                </date>
                <date date-type="accepted">
                    <day>08</day>
                    <month>02</month>
                    <year>2022</year>
                </date>
                <date date-type="pub">
                    <day>28</day>
                    <month>02</month>
                    <year>2022</year>
                </date>
            </history>
            <permissions>
                <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by-nc-nd/4.0/" xml:lang="en">
                    <license-p>This is an Open Access article distributed under the terms of the Creative Commons Attribution-Noncommercial No Derivative License, which permits unrestricted non-commercial use, distribution, and reproduction in any medium provided the original work is properly cited and the work is not changed in any way.</license-p>
                </license>
            </permissions>
            <abstract>
                <title>ABSTRACT</title>
                <p>Bystanders of cyberbullying play an important role in the resolution of such situations and therefore, it is beneficial to promote self-regulation strategies that enable them to engage in prosocial behavior in these contexts. We propose that serious game-based psychosocial interventions with profile-based social agents can encourage prosocial bystander behavior in cyberbullying. A pilot quasi-experimental study with repeated and pre/post measurements was performed. We randomly assigned 194 7th and 8th graders to three conditions, namely experimental condition (<italic>n</italic> = 103, <italic>M</italic><sub>age</sub> = 13.91, <italic>SD</italic> = 1.02, 53.3% male); alternative condition (<italic>n</italic> = 37, <italic>M</italic><sub>age</sub> = 14, <italic>SD</italic> = 0.86, 54.1% female) and control condition (<italic>n</italic> = 54, <italic>M</italic><sub>age</sub> = 13.92, <italic>SD</italic> = 0.85, 50.9% female). An analysis of covariance showed that players revealed higher levels of prosocial assertive behavior when compared to other participants. Through multilevel modelling of longitudinal log-file data, we found that those who did not experience the game tended to interpret the cyberbullying situations more as non-serious, avoid assuming responsibility for intervening, and engage in aggressive behavior toward the victim. Players tended to support more and were less aggressive with victims from their in-group than those from the out-group. Insights for the development of games to promote prosocial behavior in bystanders of cyberbullying are presented.</p>
            </abstract>
            <trans-abstract xml:lang="es">
                <title>RESUMEN</title>
                <p>Los testigos del ciberacoso juegan un importante papel en la resolución de dichas situaciones, lo que es útil para proponer estrategias de autorregulación que les permitan implicarse en comportamientos prosociales en estos contextos. Proponemos que las intervenciones que se sirven de juegos serios con agentes sociales basados en perfiles pueden potenciar el comportamiento prosocial de los testigos de ciberacoso. Se llevó a cabo un estudio piloto cuasiexperimental de medidas repetidas pre/post. Se asignó a 194 alumnos de 7º y 8º a tres condiciones, condición experimental (<italic>n</italic> = 103, <italic>M</italic><sub>edad</sub> = 13.91, <italic>SD</italic> = 1.02, 53.3% varones), condición alternativa (<italic>n</italic> = 37, <italic>M</italic><sub>edad</sub> = 14, <italic>SD</italic> = 0.86, 54.1% mujeres) y condición control (<italic>n</italic> = 54, <italic>M</italic><sub>edad</sub> = 13.92, <italic>SD</italic> = 0.85, 50.9% mujeres). En el análisis de covarianza los jugadores tenían un mayor nivel de comportamiento prosocial asertivo en comparación con otros participantes. En un modelado multinivel de datos longitudinales de archivo quienes no tenían experiencia en el juego tendían a interpretar más las situaciones de ciberacoso como no serias, a evitar asumir la responsabilidad de intervenir y a participar en comportamiento agresivo hacia la víctima. Los jugadores tendían a dar más apoyo y eran menos agresivos con las víctimas de su grupo que con las de otro grupo. Se presentan ideas sobre el desarrollo de juegos que potencien el comportamiento prosocial en testigos de ciberacoso.</p>
            </trans-abstract>
            <kwd-group xml:lang="en">
                <title>Keywords</title>
                <kwd>Cyberbullying bystanders</kwd>
                <kwd>Self-regulation</kwd>
                <kwd>In-group and out-group social agents</kwd>
                <kwd>Serious games</kwd>
            </kwd-group>
            <kwd-group xml:lang="es">
                <title>Palabras clave</title>
                <kwd>Testigos de ciberacoso</kwd>
                <kwd>Autorregulación</kwd>
                <kwd>Agentes del grupo y fuera del grupo</kwd>
                <kwd>Serious games</kwd>
            </kwd-group>
            <funding-group>
                <award-group>
                    <funding-source>Science and Technology, Portugal</funding-source>
                    <award-id>PTDC/PSI-GER/1918/2020</award-id>
                </award-group>
                <award-group>
                    <funding-source>CICPSI</funding-source>
                    <funding-source>University of Lisbon</funding-source>
                    <award-id>UIDB/04527/2020</award-id>
                    <award-id>UIDP/04527/2020</award-id>
                </award-group>
                <funding-statement>Funding: This study was supported by the Portuguese Foundation for Science and Technology, Portugal [PTDC/PSI-GER/1918/2020] and by CICPSI, Research Centre for Psychological Science of the Faculty of Psychology of the University of Lisbon (UIDB/04527/2020; UIDP/04527/2020).</funding-statement>
            </funding-group>
            <counts>
                <fig-count count="8"/>
                <table-count count="2"/>
                <equation-count count="0"/>
                <ref-count count="90"/>
            </counts>
        </article-meta>
    </front>
    <body>
        <sec sec-type="intro">
            <title>Introduction</title>
        <p>With an increasing adherence to social networks, adolescents often witness aggressive behavior online among peers and may react in different ways as bystanders of these events (<xref ref-type="bibr" rid="B31">Ferreira et al., 2020</xref>). How adolescents behave when witnessing cyberbullying incidents may be influenced by personal, behavioral, and contextual aspects (<xref ref-type="bibr" rid="B28">DeSmet et al., 2016</xref>). Throughout this decision-making process while interacting with others, personal, behavioral, and contextual factors influence each other at varying levels and in different types of interaction (<xref ref-type="bibr" rid="B05">Bandura, 2006</xref>). Cyberbullying may be defined as repeated and intentionally harmful actions toward peers using digital technologies (<xref ref-type="bibr" rid="B43">Hinduja &amp; Patchin, 2009</xref>) and often occurs without being captured in real-time. Context is critical to help understand and deal with the phenomenon. Serious games with social (non-human) agents offer promising prospects to provide context to understand adolescent bystanders’ reactions to cyberbullying. A game may be defined as a system which consists of individuals who engage in the activity of playing, the rules by which the activity is governed and the artefacts that are used in the activity (<xref ref-type="bibr" rid="B59">Martinho et al., 2014</xref>). Serious games may be considered applications (if digital) with an entertainment component that include different media to enhance players’ experience through interaction in diverse contexts while conveying a message to players, with an educational purpose to foster learning (<xref ref-type="bibr" rid="B50">Laamarti et al., 2014</xref>). Social agents may be considered cognitive and evolving artificial intelligence entities that can reason about their own and others’ actions, interact with other agents (<xref ref-type="bibr" rid="B34">Foo et al., 2007</xref>) and humans (<xref ref-type="bibr" rid="B87">van der Wal, 2012</xref>). As recent literature has suggested, social agents are becoming an increasingly significant part of individuals’ lives in daily work and leisure activities (<xref ref-type="bibr" rid="B72">Pilarski et al., 2019</xref>). Hence, how these agents can trigger individuals’ reactions and aid them in managing daily challenges, such as cyberbullying, is of utmost importance.</p>
        <p>To understand how different factors play a role in adolescents’ reactions to cyberbullying as bystanders, it is imperative to examine these interactions in context as they occur. Serious games with social agents designed within a social-cognitive approach (<xref ref-type="bibr" rid="B05">Bandura, 2006</xref>) and a social identity approach (<xref ref-type="bibr" rid="B81">Tajfel &amp; Turner, 1979</xref>) may provide such contexts. Therefore, we aim to investigate how explicit training of self-regulation strategies can foster prosociality in bystanders of cyberbullying (social cognitive approach). We also propose to investigate whether social agents in serious games trigger different bystander behavior in cyberbullying events, depending on their role as members of the players’ in-group or out-group (social identity approach).</p>
        <sec>
            <title>Developing Prosociality in Bystanders of Cyberbullying through Self-Regulation</title>
            <p>Recent studies have emphasized the role of bystanders as key agents who can hinder or worsen situations of violence among peers (<xref ref-type="bibr" rid="B64">Moreno-Bataller et al., 2019</xref>) and, therefore, are prominent figures in these contexts. Hence, it is imperative to identify aspects which may increase bystanders’ intentions to help cybervictims because they are a key factor in reducing cyberbullying (<xref ref-type="bibr" rid="B56">Liu et al., 2021</xref>; <xref ref-type="bibr" rid="B58">Luo &amp; Bussey, 2019</xref>). In fact, it is important to develop prosocial bystander behavior, such as defending the victim, because it has been associated with reduced moral disengagement and increased self-efficacy to defend others (<xref ref-type="bibr" rid="B15">Bussey et al., 2020</xref>).</p>
            <p>In previous research, several factors have been identified as having an influence on bystanders’ prosocial behavior to help victims, such as interpreting the event as an emergency (<xref ref-type="bibr" rid="B52">Latané &amp; Darley, 1970</xref>). In fact, perceiving a situation as severe is a key cognitive factor which leads to prosocial bystander behavior (<xref ref-type="bibr" rid="B76">Shotland &amp; Stebbins, 1983</xref>). In the event of an ambiguous situation, which can be characteristic of cyberbullying due to the physical distance (<xref ref-type="bibr" rid="B49">Knauf et al., 2018</xref>; <xref ref-type="bibr" rid="B57">Lo Cricchio et al., 2021</xref>), bystanders may be uncertain about how to behave in these contexts (<xref ref-type="bibr" rid="B79">Solomon et al., 1978</xref>). Another important factor which may impact bystanders’ prosocial behavior to help the victim is their perception of the victims’ state of emergency. Recent research has shown that bystanders who perceive a victim’s state of emergency to be more severe, have a greater tendency to help the latter in cyberbullying situations (<xref ref-type="bibr" rid="B51">Lambe et al., 2019</xref>; <xref ref-type="bibr" rid="B56">Liu et al., 2021</xref>; <xref ref-type="bibr" rid="B68">Obermaier et al., 2016</xref>). Furthermore, research has also shown that feeling responsible for intervening is also associated with bystanders’ intentions to help the victims (<xref ref-type="bibr" rid="B36">González &amp; Lay, 2017</xref>; <xref ref-type="bibr" rid="B51">Lambe et al., 2019</xref>; <xref ref-type="bibr" rid="B52">Latané &amp; Darley, 1970</xref>). This also holds for cyberbullying situations where perceived severity and emergency influences bystanders’ feelings of responsibility to intervene prosocially (<xref ref-type="bibr" rid="B28">DeSmet et al., 2016</xref>; <xref ref-type="bibr" rid="B47">Kazerooni et al., 2018</xref>; <xref ref-type="bibr" rid="B68">Obermaier et al., 2016</xref>) while triggering empathic reactions towards the victims (<xref ref-type="bibr" rid="B49">Knauf et al., 2018</xref>).</p>
            <p>According to the bystander intervention model proposed by <xref ref-type="bibr" rid="B27">Darley and Latané (1968)</xref>, apart from noticing an event and interpreting it as an emergency, as well as taking responsibility for intervening, bystanders go through a decision-making process of determining the appropriate manner in which to intervene before engaging in helping behavior. Recent research has determined that from the moment bystanders notice an event to when they engage in prosocial behavior they engage in a reflective process which implies self-regulation (<xref ref-type="bibr" rid="B32">Ferreira et al., 2021</xref>), encompassing self-efficacy beliefs about intervening prosocially (<xref ref-type="bibr" rid="B31">Ferreira et al., 2020</xref>). In fact, self-regulation processes may inclusively hinder bystanders’ aggressive defending intervention (<xref ref-type="bibr" rid="B86">Valdés-Cuervo et al., 2021</xref>) and an aggressive style of interpersonal communication (<xref ref-type="bibr" rid="B88">Veiga Simão et al., 2021</xref>) in cyberbullying situations, thus, endorsing the potential of self-regulation as a critical process which constrains aggressive interpersonal behavior (<xref ref-type="bibr" rid="B19">Carlo et al., 2012</xref>; <xref ref-type="bibr" rid="B61">Memmott-Elison et al., 2020</xref>; <xref ref-type="bibr" rid="B77">Silver &amp; Silver, 2019</xref>). Furthermore, self-regulation processes have been known to have the potential to promote prosocial behavior (<xref ref-type="bibr" rid="B88">Veiga Simão et al., 2021</xref>) and empathic reactions (<xref ref-type="bibr" rid="B32">Ferreira et al., 2021</xref>) through the use of digital tools. Therefore, research is necessary to explore the regulation of bystander behavior in interpersonal relationships (<xref ref-type="bibr" rid="B86">Valdés-Cuervo et al., 2021</xref>).</p>
        </sec>
        <sec>
            <title>A Social-Cognitive Approach to Self-regulating Bystander Behavior in Cyberbullying in Serious Games</title>
            <p>There have been multiple theories providing a framework for the development of serious games. The Social Cognitive Theory, for example, has been used as a specific framework for development (<xref ref-type="bibr" rid="B28">DeSmet et al., 2016</xref>). This theory proposes an agentic perspective to human functioning through the influence of personal and contextual factors on the regulation of one’s own behavior. Individuals are producers and products of social systems in an interplay between direct, proxy, and collective agency (<xref ref-type="bibr" rid="B04">Bandura, 2001</xref>). Agency refers to individuals’ ability to determine their own functioning and the circumstances surrounding it through intentionality (i.e., action plans), forethought (i.e., setting goals), self-reactiveness (i.e., self-regulation) and self-reflectiveness (i.e., self-examination) (<xref ref-type="bibr" rid="B05">Bandura, 2006</xref>). However, adolescents’ ability to understand their own thought and others’ perspectives and to make decisions progress with age and maturity (<xref ref-type="bibr" rid="B09">Blakemore, 2012</xref>).</p>
            <p>Adolescence is a phase of life where emotionally intense relationships are formed and, therefore, understanding how to manage these relationships is an issue of significant value. Hence, developing self-regulation competencies to handle disturbing events is crucial. Specifically, individuals can engage in 1) covert self-regulation, where they adapt specific feelings and thoughts, 2) environmental self-regulation, where they monitor the impact of diverse conditions and control them strategically, and 3) behavioral regulation, where individuals observe and strategically adapt their own performance (<xref ref-type="bibr" rid="B90">Zimmerman, 2013</xref>).</p>
            <p>The Social Cognitive Theory has been applied to a one-session single-player serious game against cyberbullying, Friendly Attac (<xref ref-type="bibr" rid="B29">DeSmet et al., 2018</xref>). A user study of this game, which was designed for 8<sup>th</sup> graders, revealed that it improved players’ prosocial skills, self-efficacy, and intentions to engage in positive bystander behavior. The results from Friendly Attac also revealed that the game fostered awareness regarding cyberbullying, although no effects were found on behavior itself, as well as bullying or cyberbullying prevalence.</p>
            <p>Adolescents’ efficacy beliefs to deal with adverse situations contributes to how they assume responsibility and take control of their life and peer pressure, which may lead them toward destructive behavior (<xref ref-type="bibr" rid="B07">Bandura et al., 2003</xref>). This sense of efficacy to self-regulate one’s own life may direct adolescents toward engaging in prosociality and refraining from injurious behavior (<xref ref-type="bibr" rid="B05">Bandura, 2006</xref>). While prosociality involves empathetic, collaborative, assertive, and helpful behavior that benefits others (<xref ref-type="bibr" rid="B08">Barrett &amp; Yarrow, 1977</xref>; <xref ref-type="bibr" rid="B10">Böckler et al., 2016</xref>), aggressive behavior aims to deliberately harm others (<xref ref-type="bibr" rid="B65">Nagin &amp; Tremblay, 1999</xref>).</p>
            <p>Adolescents can act aggressively in an impulsive or reflected way as a response to observed cyberbullying events, or they can act in a reflected prosocial manner by engaging in problem-solving and/or reporting behavior (<xref ref-type="bibr" rid="B31">Ferreira et al., 2020</xref>) and by being assertive (<xref ref-type="bibr" rid="B08">Barrett &amp; Yarrow, 1977</xref>). Adolescents can also act passively, experiencing a bystander effect, which can hinder helping behavior toward a victim (<xref ref-type="bibr" rid="B28">DeSmet et al., 2016</xref>). The bystander effect (<xref ref-type="bibr" rid="B27">Darley &amp; Latané, 1968</xref>) is a psychological phenomenon that occurs in individuals in severe situations where they do not help the victim because the presence of others hinders them from intervening. The bystander effect purports to the inhibiting influence of the presence of others on assisting behavior (<xref ref-type="bibr" rid="B27">Darley &amp; Latané, 1968</xref>), which may influence how bystanders resort to the diffusion of responsibility, which entails a reduced sense of responsibility to intervene (<xref ref-type="bibr" rid="B53">Latané &amp; Nida, 1981</xref>). Thus, the Bystander Intervention Model was developed to study bystander behavior in different contexts (<xref ref-type="bibr" rid="B52">Latané &amp; Darley, 1970</xref>). This model emphasizes various phases through which bystanders may go through to engage in different types of behavior in emergency situations. According to a recent study (<xref ref-type="bibr" rid="B31">Ferreira et al., 2020</xref>), the phases proposed by <xref ref-type="bibr" rid="B52">Latané and Darley (1970)</xref>, namely, noticing a possibly problematic event, interpreting the event as being good or bad, assuming or not responsibility for intervening, knowing whether and how to intervene, and intervening, may lead to either impulsive or reflected aggressive bystander behavior, or to reflected prosocial behavior.</p>
        </sec>
        <sec>
            <title>Providing Context with Serious Games and Social Agents within a Social Identity Approach</title>
            <p>Serious games can provide a direct immersive experience of the phenomenon, raising awareness and empathy with victims of bullying and cyberbullying (<xref ref-type="bibr" rid="B17">Calvo-Morata et al., 2020</xref>). Accordingly, these games can inclusively be used to teach innovative strategies to deal with these phenomena. In a systematic review of research with serious games to prevent and detect bullying (61%), cyberbullying (21%), and other phenomena (18%) among children, adolescents, and adults (<xref ref-type="bibr" rid="B17">Calvo-Morata et al., 2020</xref>), a total of 33 games were considered. The main mechanics used in these games to reach their objective are choices, dialogues, adventure, scenarios, exploration, and customization, among others (<xref ref-type="bibr" rid="B17">Calvo-Morata et al., 2020</xref>). Similarly, we present a game based on cyberbullying scenarios within a single storyline.</p>
            <p>Previous research with serious games has indicated that these tools are meaningful and valid resources to teach adolescents about phenomena related with violence (<xref ref-type="bibr" rid="B13">Bowen et al., 2014</xref>). The NN-Lazarinis game presented various short stories about online behavior with different characters (<xref ref-type="bibr" rid="B54">Lazarinis et al., 2020</xref>), similar to what we propose with various social agents and scenarios, but with a single storyline. Also, research on CyberBullet (<xref ref-type="bibr" rid="B63">Mikka-Muntuumo et al., 2018</xref>) and <italic>Conectado</italic> (<xref ref-type="bibr" rid="B18">Calvo-Morata et al., 2018</xref>) presented its design and development as a single player game, whereas we propose a multiplayer game. The latter also presented a single game session, such as other games like FearNot! (<xref ref-type="bibr" rid="B71">Paiva et al., 2005</xref>), whereas we propose multiple sessions. However, like with other games, such as the The #StopBully app (<xref ref-type="bibr" rid="B67">Neo et al., 2018</xref>), the Inn Inoue game (<xref ref-type="bibr" rid="B42">Higashino et al 2019</xref>), the Bully Book (<xref ref-type="bibr" rid="B30">De Troyer et al., 2016</xref>), Cyberhero Mobile Safety game (<xref ref-type="bibr" rid="B44">Hswen, et al., 2014</xref>), and Cooperative Cybereduca 2.0 (<xref ref-type="bibr" rid="B35">Garaigordobil &amp; Martínez-Valderrey, 2018</xref>), research provided no information regarding CyberBullet’s effectiveness in promoting prosocial and empathic behavior (<xref ref-type="bibr" rid="B63">Mikka-Muntuumo et al., 2018</xref>), which we present in this study regarding our game. Moreover, research on these games presented no analyses with in-game performance. In our study, we present results with this type of data from the experimental condition with the game. We also present our analyses with the inclusion of a control condition, as opposed to previous research (<xref ref-type="bibr" rid="B18">Calvo-Morata et al., 2018</xref>). Also, research on the Anti-Bullying Village 3D virtual environment (<xref ref-type="bibr" rid="B70">Olenik-Shemesh et al, 2014</xref>) showed that the experimental group reported no changes in cyberbullying experiences and in socio-emotional factors, whereas the control group reported more cyberbullying experiences and a decrease in social support. To contribute to these findings, we expect that the game we present fosters pro-social behavior among those in the experimental condition. In line with our expectation, research focusing on another game (Monité) has found that serious games function to minimize bullying behavior (<xref ref-type="bibr" rid="B38">Guerra, 2017</xref>).</p>
            <p>Another study focusing on a game (i.e., Bully Book) found that using simulation of interactions on social networks is important to be able to develop games where a social network is a key element of gameplay. Accordingly, we incorporated a fictitious social network into the game we present to set the scene for the storyline with the different cyberbullying scenarios. Moreover, we incorporated various response options, as previous research on games has suggested for these types of scenarios (<xref ref-type="bibr" rid="B20">Carmona Torres et al., 2011</xref>).</p>
            <p>Furthermore, to understand how players may react to specific situations, it is important to provide context and social feedback with interactive entities, such as social agents (<xref ref-type="bibr" rid="B02">Ahn et al., 2014</xref>; <xref ref-type="bibr" rid="B25">Coplan, 2011</xref>; <xref ref-type="bibr" rid="B26">Dalibard et al., 2012</xref>; <xref ref-type="bibr" rid="B40">Hara et al., 2002</xref>; 2002; <xref ref-type="bibr" rid="B46">Johnson et al., 2008</xref>; <xref ref-type="bibr" rid="B62">Midden &amp; Ham, 2009</xref>; <xref ref-type="bibr" rid="B69">Ohmoto et al., 2017</xref>; <xref ref-type="bibr" rid="B74">Ruijten et al., 2015</xref>). They may improve social interaction in educational applications, such as serious games (<xref ref-type="bibr" rid="B23">Choi et al., 2001</xref>; <xref ref-type="bibr" rid="B33">Fogg, 2003</xref>; <xref ref-type="bibr" rid="B66">Nass &amp; Moon, 2000</xref>; <xref ref-type="bibr" rid="B89">Yalcin &amp; DiPaola, 2018</xref>). Accordingly, social agents can be part of serious games to constitute a context and social belonging for players, where behavioral changes resulting from playing may be observed, which is what we propose to do.</p>
            <p>Some studies have highlighted the importance of players belonging to the in-group of the social agents involved, because this type of virtual friendship may influence their emotional and behavioral reactions in the game (<xref ref-type="bibr" rid="B01">Abbink &amp; Harris, 2019</xref>; <xref ref-type="bibr" rid="B12">Bos et al., 2004</xref>). An in-group is a social group that individuals identify psychologically with as members (i.e., peer group), whereas an out-group is a social group that individuals do not identify with (<xref ref-type="bibr" rid="B81">Taijfel &amp; Turner, 1979</xref>; <xref ref-type="bibr" rid="B82">Tajfel &amp; Turner, 1986</xref>). In-group preferences may depend on different phenomena and may be established almost immediately, even based on subjective and imaginary characteristics. This in-group and out-group differentiation is part of the Social Identity Theory.</p>
            <p>A social identity approach constitutes two overlapping social psychological theories, namely the Social Identity Theory and Self-Categorization Theory. Social identity is a part of individuals’ self-concept resulting from their belief that they belong to a certain social group (<xref ref-type="bibr" rid="B84">Turner &amp; Oakes, 1986</xref>). Accordingly, the Social Identity Theory was developed to help explain intergroup behavior (<xref ref-type="bibr" rid="B81">Tajfel &amp; Turner, 1979</xref>; <xref ref-type="bibr" rid="B82">Tajfel &amp; Turner, 1986</xref>; <xref ref-type="bibr" rid="B83">Turner, 1999</xref>; <xref ref-type="bibr" rid="B84">Turner &amp; Oakes, 1986</xref>) based on perceived group status differences, legitimacy and stability of those status differences, and ability to other groups. The self-categorization theory was developed to add to the social identity theory to generate a broader explanation of self and group processes (<xref ref-type="bibr" rid="B85">Turner &amp; Reynolds, 2010</xref>). For this study’s purposes, it is important to note that social identification may encourage individuals to engage in prosocial behavior toward others (<xref ref-type="bibr" rid="B39">Hackel et al., 2017</xref>), and that players in games show favouritism for their in-group (<xref ref-type="bibr" rid="B37">Guegan et al., 2015</xref>). Therefore, a social identity approach was considered to conceptualize the social agents (see Appendix for details) in the game we present in this study.</p>
        </sec>
        <sec>
            <title>The Present Study: Designing Com@Viver – A Serious Game to Foster Prosociality</title>
            <p>Prosocial behavior can be determining for reducing aggression in social networks and for building social support, hence, it is imperative to develop psychosocial interventions with resources to foster prosociality in adolescence (<xref ref-type="bibr" rid="B06">Bandura, 2008</xref>). In the present study, we propose to focus on the Social Cognitive Theory (<xref ref-type="bibr" rid="B05">Bandura, 2006</xref>) and a social identity approach (<xref ref-type="bibr" rid="B85">Turner &amp; Reynolds, 2010</xref>) as a framework for developing a serious game with social agents to help adolescents engage in self-reflection and the regulation of behavior in cyberbullying (<xref ref-type="fig" rid="f01">Figure 1</xref>).</p>
            <fig id="f01">
                <label>Figure 1</label>
                <caption>
                    <title>A Conceptual Framework for Developing Serious Game-based Interventions to Foster Prosociality in Cyberbullying</title>
                </caption>
                <graphic xlink:href="1132-0559-inter-31-2-0083-gf01.jpg"/>
            </fig>
            <p>The game we present also used appraisal theories of emotion and moral agency as framework references, but to investigate other variables (i.e., emotions, empathy, and moral disengagement) (<xref ref-type="bibr" rid="B32">Ferreira et al., 2021</xref>) and, therefore, will not be explored in this study. The conceptual framework for response options in the game include prosociality (<xref ref-type="bibr" rid="B08">Barrett &amp; Yarrow, 1977</xref>; <xref ref-type="bibr" rid="B10">Böckler et al., 2016</xref>), and aggressiveness (<xref ref-type="bibr" rid="B65">Nagin &amp; Tremblay, 1999</xref>), as well as the Bystander Intervention Model (<xref ref-type="bibr" rid="B52">Latané &amp; Darley, 1970</xref>).</p>
            <p>Moreover, unlike other games (<xref ref-type="bibr" rid="B17">Calvo-Morata et al., 2020</xref>), the multiplayer and multisession Com@Viver focuses on both prevention and intervention, since it is based on a fictitious social network where players interact as bystanders with colleagues and social agents in cyberbullying situations. Players can react to the situations as they unfold on the social network (session 1 is diagnostic) and are guided with self-regulation strategies (sessions 2, 3, and 4) throughout various sessions to learn how to engage in prosocial and empathic behavior.</p>
            <p>The Social Cognitive Theory has been used as a specific framework for development (<xref ref-type="bibr" rid="B28">DeSmet et al., 2016</xref>). The multiplayer game Com@Viver design provides opportunities for players to reflect on their own and each other’s actions and is based on a social cognitive approach, in which personal (i.e., players’ moral beliefs, self-reflections, and emotions), behavioral (i.e., players’ possible pro-social, aggressive, or passive behavioral reactions), and environmental (i.e., in-group and out-group social agent membership – a social identity approach) aspects are considered (<xref ref-type="bibr" rid="B05">Bandura, 2006</xref>) when players are prompted with the social agents’ behavior in cyberbullying situations. Such an intervention can provide advances in helping adolescents deal with observed cyberbullying events because of its behavioral self-regulation strategies, which are explicitly taught to the players according to the Social Cognitive Theory to promote reflection (e.g., perspective taking through forethought, intentionality through strategic planning, self-reactiveness through pro-social performance, self-reflectiveness through self-examination), except in an initial diagnostic session of the game, and which we explain ahead. The game design is also built upon the Bystander Intervention Model (<xref ref-type="bibr" rid="B52">Latané &amp; Darley, 1970</xref>), since players take the perspective of the bystander in cyberbullying (see <xref ref-type="fig" rid="f01">Figure 1</xref>). Accordingly, the players’ behavioral responses in the game were conceptualized according to the Bystander Intervention Model (<xref ref-type="bibr" rid="B27">Darley &amp; Latané, 1968</xref>; <xref ref-type="bibr" rid="B52">Latané &amp; Darley, 1970</xref>) and behavioral self-regulation (<xref ref-type="bibr" rid="B90">Zimmerman, 2013</xref>) toward prosociality in cyberbullying situations.</p>
            <p>To design the psychosocial intervention we present in this study, we considered it beneficial (1) to foster human-agent interactions in the game to build social relationships (<xref ref-type="bibr" rid="B69">Ohmoto et al., 2017</xref>); (2) that the players have social agents in their in-group (<xref ref-type="bibr" rid="B01">Abbink &amp; Harris, 2019</xref>; <xref ref-type="bibr" rid="B12">Bos et al., 2004</xref>); (3) to provide social feedback (i.e., in a chat for instance) to offer a more realistic social interaction (<xref ref-type="bibr" rid="B62">Midden et al., 2009</xref>); and (4) to provide players with response options to interact in the game (<xref ref-type="bibr" rid="B20">Carmona Torres et al., 2011</xref>) so that they may develop self-regulation strategies effectively and meaningfully.</p>
            <p>Considering cyberbullying is a social phenomenon (<xref ref-type="bibr" rid="B80">Souza et al., 2018</xref>), we present psychosocial intervention based on a multiplayer multi-session game to examine bystanders’ behavioral trajectories throughout time while interacting with various social agents. We believe this intervention will answer a call to enable a deep analysis of adolescent bystanders’ behavior in cyberbullying situations (<xref ref-type="bibr" rid="B03">Allison &amp; Bussey, 2017</xref>), and foster prosociality (<xref ref-type="bibr" rid="B06">Bandura, 2008</xref>) and, therefore, we propose to answer two research questions. Firstly, can the explicit training of self-regulation strategies foster adolescent bystander prosocial behavior in cyberbullying in serious games? To answer this research question, we propose to confirm hypotheses which enable to specifically consider bystanders’ prosocial assertive behavior, interpretation of cyberbullying situations, responsibility to intervene, aggressive or supportive behaviour towards the victim either before or after playing the game, or during gameplay. Therefore, we propose that:</p>
            <p><italic>Hypothesis 1</italic>: Players will reveal greater levels of prosocial assertive behavior than individuals who did not experience the game.</p>
            <p><italic>Hypothesis 2</italic>: Those who did not experience the game will tend to interpret the cyberbullying situations more as non-serious throughout time than the players.</p>
            <p><italic>Hypothesis 3</italic>: Those who did not experience the game will avoid assuming responsibility for intervening more throughout time than the players.</p>
            <p><italic>Hypothesis 4</italic>: Those who did not experience the game will engage in aggressive behavior against the victim more throughout time than players.</p>
            <p><italic>Hypothesis 5</italic>: Players will tend to support the victim more throughout time than those who did not experience the game.</p>
            <p>Moreover, can social agents in serious games trigger different bystander behavior in cyberbullying events, depending on their role as members of the players’ in-group or out-group? To answer this research question regarding social agents as members of the players’ in-group or out-group, we propose to confirm two hypotheses specifically referring to players’ aggressive or supportive behaviour towards the victims from their out-group and in-group. Hence:</p>
            <p><italic>Hypothesis 6</italic>: Both players and those who did not experience the game will tend to be more aggressive with the victims from their out-group.</p>
            <p><italic>Hypothesis 7:</italic> Both players and those who did not experience the game will tend to support the victims from their in-group.</p>
        </sec></sec>
        <sec sec-type="methods">
            <title>Method</title>
            <sec>
                <title>Study Design</title>
                <p>A pilot quasi-experimental control-group design with repeated measurements (with pre- and post-test) was used in this study with process data gathered in classrooms (<xref ref-type="bibr" rid="B48">Klug et al., 2011</xref>). Unlike previous research conducted to assess serious games (<xref ref-type="bibr" rid="B17">Calvo-Morata et al., 2020</xref>), we used an alternative intervention condition, as well as a control group to test any Hawthorne effects (<xref ref-type="bibr" rid="B75">Schmitz &amp; Wiese, 2006</xref>). That is, three conditions were constituted in this study, namely, an experimental condition (EC), an alternative intervention condition (AIC), and a control condition (CC).</p>
            </sec>
            <sec>
                <title>Participants</title>
                <p>A convenience sample of 194 7<sup>th</sup> and 8<sup>th</sup> graders from Portugal (<italic>M</italic><sub>age</sub> = 12.93, <italic>SD</italic> = .9,; 50.8% male) was used in this study. Participants were randomly assigned to the EC who played the game (<italic>n</italic> =103, <italic>M</italic><sub>age</sub> = 13.91, <italic>SD</italic> = 1.02, 53.3% male), the AIC who did not play the game, but viewed the storyline on paper (<italic>n</italic> = 37, <italic>M</italic><sub>age</sub> = 14, <italic>SD</italic> = 0.86, 54.1% female) or the CC who had their usual classes (<italic>n</italic> = 54, <italic>M</italic><sub>age</sub> = 13.92, <italic>SD</italic> = 0.85, 50.9% female). Participants belonged to eight different classes from three different schools. The data gathered for analysis purposes was only from those who provided own and parental consent to participate in the study, and responses in the pre and post-tests, as well as those who participated in the game throughout all or most of the sessions (see Data Analysis section for details).</p>
            </sec>
            <sec>
                <title>Instruments</title>
                <p>We used the Prosocial Assertive Behavior (PAB) task, which is composed of ten items and is based (<xref ref-type="bibr" rid="B45">Jakubowski &amp; Lange, 1978</xref>) on the theory of communication styles (i.e., assertiveness), to assess prosocial assertive behavior (<xref ref-type="bibr" rid="B08">Barrett &amp; Yarrow, 1977</xref>). It was evaluated with the Item Response Theory (IRT) through Rasch analysis polytomous methodology with the Winsteps software program by <xref ref-type="bibr" rid="B55">Linacre (2013)</xref> to measure its unidimensionality and to understand participants’ scores of prosocial assertiveness in hypothetical situations. Participants were asked to respond to daily life situations of adolescents (e.g., “You are in line at the snack bar and one of your colleagues cuts you. How likely are you to respond ‘I was here first. Respect those in line’?”). Participants should respond in the manner presented in terms of probability from 1 (<italic>not likely at all</italic>) to 5 (<italic>very likely</italic>). With Winsteps we estimated participants’ scores on a one-dimensional logit scale and evaluated the properties of the PAB. All items were evaluated to understand whether they had excessive infit and outfit mean square residuals. The items all showed infit/outfit scores lower than 1.5, as well as <italic>z</italic> statistic &gt; 2.00, as recommended in the literature (<xref ref-type="bibr" rid="B11">Bond &amp; Fox, 2007</xref>). The distribution revealed a narrow range of difficulty (-1.05 &lt; Di &lt; 0.96). The person separation reliability was .71, the item separation reliability was .99 and the Cronbach’s a was .73.</p>
                <p>Players’ “bystander behavioral reactions” in the game (recorded log-file data of the players’ actions during the game), which we analyzed with multilevel modeling, included (for more details on the game design, see Appendix):</p>
                <list list-type="alpha-lower">
                    <list-item>
                        <p>Interpreting the event as non-serious with euphemistic language (e.g., “She [the bully] was just joking. It’s nothing serious”).</p>
                    </list-item>
                    <list-item>
                        <p>Avoiding responsibility for the event (e.g., “It’s [the situation] none of my business”).</p>
                    </list-item>
                    <list-item>
                        <p>Bystander aggressive intervention toward the victim (e.g., “Hey Samuel [the victim], you have an awful taste in women”).</p>
                    </list-item>
                    <list-item>
                        <p>Bystander prosocial behavior in the cyberbullying situation (e.g., “I’m talking to her [the victim]”).</p>
                    </list-item>
                </list>
            </sec>
            <sec>
                <title>Procedures</title>
                <p>This study complied with all relevant ethical regulations. Authorization to conduct this study was granted by the Ethical Commission of the Faculty of Psychology of the University of Lisbon, the Ministry of Education of Portugal, the Portuguese National Commission of Data Protection, school’s boards of directors, teachers, parents, and the adolescents themselves.</p>
                <p>We used a longitudinal design with five game playing sessions (a session per week). Specifically, the students in the EC played session 0 with no cyberbullying content, which served to help them learn how to play the game. This session was not included in the multilevel analysis. A face validation was done of the game with the elements from session 0, including a cyberbullying case, with participants who were not in the main study assessed the game to provide suggestions and information regarding instructions, gameplay, the game’s objectives, and the overall quality of the interaction.</p>
                <p>In session 1, students’ initial reactions to the cyberbullying scenario presented served as diagnostic data. In sessions 2, 3, and 4, students reacted to the cyberbullying scenarios, but had explicit training in self-regulation strategies to promote pro-social behavior. The students viewed these scenarios and strategies as posts which were presented by social agents. The students in the AIC experienced the same sessions, but in a paper format, that is, with text to read on paper and multiple choice options to react to the same posts. Therefore, the students in this AIC did not interact with the agents or other colleagues on a computer. The sessions with the EC and the AIC were supervised by three researchers. Those in the CC had their regular classes.</p>
                <p>In the pre- and post-test sessions, students from the EG, AIG, and CG filled out the Prosocial Assertive Behavior Task online which was administered by 3 researchers in a classroom context in their own schools. All participants were informed that they could have psychological assistance available to them with a professional psychologist and that they could quit the intervention at any time they felt the need to.</p>
                <p>Furthermore, at the end of the intervention, all students were given the opportunity to experience the game for ethical purposes.</p>
            </sec>
            <sec>
                <title>Data Analysis</title>
                <p><bold>Pre and post-test differences in prosocial assertive behavior among groups.</bold> We computed an analysis of covariance (ANCOVA) for repeated measures from the pre- and post-test survey data on prosocial assertive behavior of the EC, AIC, and CC because of existing pre-test differences with IBM, SPSS, 25.0. All statistical assumptions were met. The data used in this analysis was from participants who participated in both the pre and post-tests (EC = 103, AIC = 37, CC = 54). Participants who did not attend the sessions were not included in this analysis. We also present the effect size according to <xref ref-type="bibr" rid="B24">Cohen’s (1988)</xref> cut-off points for small (hp<sup>2</sup> = .009), medium (hp<sup>2</sup> = .058) and large effects (hp<sup>2</sup> = .137).</p>
                <p><bold>Longitudinal data from the game sessions.</bold> We used participants’ behavioral responses to the cyberbullying situations from the four sessions of the game (EC) and sessions on paper (AIC) as our process data, namely interpreting the event, assuming/avoiding responsibility for intervening, intervening aggressively toward the victim, or with prosocial behavior (coded 1 for no response and 2 for response). We considered time and the experimental condition as the covariates in the multilevel linear modelling analyses. We aggregated the data by day to acquire a mean score of each group for variable per day.</p>
                <p>We computed multilevel linear modelling (IBM, SPSS, 25.0) for repeated measures designs in order to measure the difference between the EC and the AIC regarding their bystander behavior throughout the four sessions. Data was structured at the within-person in time level (level 1) and the between person level (level 2). We used a sample size of 560 session entries (4 session entries per participant measured on four occasions) for participants’ bystander behavior at level 1, and of 140 participants at level 2. At level 1 of the analyses, the variance corresponds to the variability in the bystanders’ average of interpreting the cyberbullying situation as non-serious (Hypothesis 2), avoiding responsibility (Hypothesis 3), engaging in aggressive behavior toward the victim (Hypothesis 4), and engaging in prosocial behavior/supporting the victim (Hhypothesis 5) around their own growth trajectory (<xref ref-type="bibr" rid="B78">Singer et al., 2003</xref>).</p>
                <p>We used two commonly used techniques which offer asymptotically unbiased estimates for smaller and unbalanced sample sizes, such as restricted maximum likelihood (models for interpreting the event and avoiding responsibility) and maximum likelihood (models for aggressive and prosocial behavior) for estimation purposes, respectively (<xref ref-type="bibr" rid="B41">Heck et al., 2013</xref>; <xref ref-type="bibr" rid="B60">McCoach, 2010</xref>), and introduced the variables in SPSS in three steps (i.e., models 1, 2, and 3) to examine the interaction effects. We also used either a scaled identity or a diagonal covariance structure for the repeated measures effect and a variance components covariance structure for the intercept random effect to examine the total variance in the outcome within and between individuals. The scaled identity covariance structure presumes that there is a constant variance across occasions, whereas the diagonal presumes heterogeneous variances for each measurement occasion, but both structures assume no correlation between components (<xref ref-type="bibr" rid="B41">Heck et al. 2013</xref>). Moreover, the scaled identity covariance structure has one estimated parameter (models for avoiding responsibility and aggressive behavior toward the victim), whereas the diagonal has 4 (models for interpreting the situation and prosocial behavior toward the victim).</p>
                <p>In a first step for each dependent variable model (i.e., interpreting the situation, avoiding responsibility, aggressive behavior, and prosocial behavior toward the victim), we calculated an intercept-only model to determine how much variability existed at each level. In a second step, we analysed the shape of the growth trajectory. Specifically, we tested a model with a linear trend, another model with a quadratic trend, and final model with orthogonal polynomials. The latter did not yield any significant results in explaining dependent variables’ growth. The model with linear time revealed significant results for interpreting the situation, avoiding responsibility, and prosocial behavior toward the victim, whereas a linear and quadratic time model was significant for bystanders’ aggressive behavior toward the victim. Lastly, we analysed differences in development between the participants in the EC and AIC because we wanted to understand whether the treatment (game) was related to different growth patterns. Therefore, we combined the level 1 model with time specified as linear or quadratic (as mentioned previously) to describe participants’ growth over time, presuming the intercept varied between subjects and that the time slope would be randomly varying. We proposed to present parsimonious models (<xref ref-type="bibr" rid="B41">Heck et al., 2013</xref>). The proportion of variance (ICC) was estimated with a one-tailed test for variances.</p>
                <p>We measured the improvement of each model in comparison with the previous models with the corresponding likelihood ratios. This difference in likelihood approximates is according to the chi-square distribution (change in degrees of freedom between models: subtraction of the number of new parameters added to the model from the parameters of the previous model). Thus, we show the differences in the deviances (by subtraction) as evidence that the model with the covariates fits the data better than the model with the intercept and time and the intercept-only model. Essentially, we compared the intercept-only model (model 1), the intercept + time model (model 2) and the model with the predictors (model 3) for each bystander intervention variable to understand whether or not there were improvements in terms of fit indices.</p>
            </sec>
        </sec>
        <sec sec-type="results">
            <title>Results</title>
            <sec>
                <title>Pre and Post-test Differences in Prosocial Assertive Behavior in Bystanders of Cyberbullying</title>
                <p>We proposed that players in the experimental condition (EC) would reveal greater levels of prosocial assertive behavior than individuals who did not experience the game (Hypothesis 1). The ANCOVA results showed that those in the EC revealed higher levels of prosocial assertive behavior after the intervention in comparison with those in the (alternative intervention condition) AIC and in the (control condition) CC (<xref ref-type="fig" rid="f02">Figure 2</xref>), <italic>F</italic>(2, 190) = 20.39, <italic>p</italic> &lt; .001, therefore, confirming Hypothesis 1. We found large effects for players’ prosocial assertive behavior (hp<sup>2</sup> = .18).</p>
            </sec>
            <sec>
                <title>Longitudinal Results from the Sessions</title>
                <p>Firstly, we computed the means, correlations, and reliability coefficients of each variable (<xref ref-type="table" rid="t01">Table 1</xref>).</p>
                <table-wrap id="t01">
                    <label>Table 1</label>
                    <caption>
                        <title>Correlations and Descriptive Statistics of Bystander Behavior</title>
                    </caption>
                    <graphic xlink:href="1132-0559-inter-31-2-0083-gt01.jpg"/>
                    <table-wrap-foot>
                        <fn>
                            <p><italic>Note</italic>. EC = experimental condition; AIC = alternative intervention condition; correlations below the diagonal are day level correlations (<italic>n</italic> = 560); correlations above the diagonal are person-level correlations (<italic>n</italic> = 140). The level 1 means and standard deviations are reported according to the time variable (from 1 to 4).</p>
                            <p>>*<italic>p</italic> &lt; .05, **<italic>p</italic> &lt; .01.</p>
                        </fn>
                    </table-wrap-foot>
                </table-wrap>
                <p>After performing multilevel analyses, the estimates of variance for levels 1 and 2 of interpreting the cyberbullying situation as non-serious (repeated measures: <italic>Z</italic><sub>w</sub> = 7.54, <italic>Z</italic><sub>w</sub> = 7.20, <italic>Z</italic><sub>w</sub> = 6.35, <italic>Z</italic><sub>w</sub> = 6.60, <italic>p</italic> &lt; .001; intercept: <italic>Z</italic><sub>w</sub> = 3.18, <italic>p</italic> &lt; .001, respectively) suggest that there was sufficient variation in intercepts across bystanders. Results revealed a variance between individuals of 8% (session 1), 11% (session 2), 22% (session 3), and 22% (session 4) for a diagonal structure of interpreting the cyberbullying situation as non-serious and 92% (session 1), 89% (session 2), 78% (session 3), and 78% (session 4) of variance within individuals for interpreting the cyberbullying situation as non-serious over time. For interpreting the cyberbullying situation as non-serious, models 2 and 3 presented improved fit indices over model 1 (deviance = 4.49, <italic>df</italic> = 1, <italic>p</italic> &lt; .01; deviance = 2.69, <italic>df</italic> = 3, <italic>p</italic> &lt; .01, respectively), although model 3 did not present better fit values than model 2. The results pertaining to the fixed effects for interpreting cyberbullying as non-serious suggest that the scores of the participants in the AIC did not increase significantly over each interval. Results also suggest that there was an initial significant difference between this group and those in the EC. However, over time, players (i.e., EC) decreased their interpretation of cyberbullying as non-serious at a greater rate (β = -.05) than those in the AIC (<xref ref-type="fig" rid="f03">Figure 3</xref>). These results confirm Hypothesis 2, which stated that those who did not experience the game tended to interpret the cyberbullying situations more as non-serious throughout time than the players.</p>
                <fig id="f02">
                    <label>Figure 2</label>
                    <caption>
                        <title> Differences between the EC, the AIC and the CC regarding Prosocial Assertive Behavior.</title>
                    </caption>
                    <graphic xlink:href="1132-0559-inter-31-2-0083-gf02.jpg"/>
                </fig>
                <fig id="f03">
                    <label>Figure 3</label>
                    <caption>
                        <title>The Trajectories of Bystanders’ Interpretation of Cyberbullying as Non-serious.</title>
                    </caption>
                    <graphic xlink:href="1132-0559-inter-31-2-0083-gf03.jpg"/>
                </fig>
                <fig id="f04">
                    <label>Figure 4</label>
                    <caption>
                        <title>The Trajectories of Bystanders Avoiding Responsibility for Intervening in Cyberbullying.</title>
                    </caption>
                    <graphic xlink:href="1132-0559-inter-31-2-0083-gf04.jpg"/>
                </fig>
                <fig id="f05">
                    <label>Figure 5</label>
                    <caption>
                        <title>The Trajectories of Bystanders’ Aggressive Behavior toward Victims of Cyberbullying.</title>
                    </caption>
                    <graphic xlink:href="1132-0559-inter-31-2-0083-gf05.jpg"/>
                </fig>
                <p>Levels 1 and 2 estimates of variance for avoiding responsibility (repeated measures: <italic>Z</italic><sub>w</sub> = 13.83, <italic>p</italic> &lt; .001; intercept: <italic>Z</italic><sub>w</sub> = 3.83, <italic>p</italic> &lt; .001, respectively) revealed that there was sufficient variation in intercepts across bystanders. Results showed a variance between individuals of 19% for a scaled identity structure of avoiding responsibility and 81% of variance within individuals for avoiding responsibility over time. For avoiding responsibility, model 3 presented improved fit indices over models 1 and 2 (deviance = 3.06, <italic>df</italic> = 3, <italic>p</italic> &lt; .01; deviance = 4.32, <italic>df</italic> = 2, <italic>p</italic> &lt; .01, respectively), although model 2 did not reveal better values than model 1. The results for the fixed effects regarding avoiding responsibility indicate that those in the AIC increased significantly over each interval (β = .21). Results also indicate that there was no initial significant difference between the control condition and the EC. However, over time, those in the EC decreased avoiding responsibility in cyberbullying (β = -.09), thus, confirming Hypothesis 3, which stated that those who did not experience the game would tend to avoid assuming responsibility for intervening more throughout time than the players (<xref ref-type="fig" rid="f04">Figure 4</xref>).</p>
                <p>The estimates of variance for levels 1 and 2 of engaging in aggressive behavior toward the victim (repeated measures: <italic>Z</italic><sub>w</sub> = 13.81, <italic>p</italic> &lt; .001; intercept: <italic>Z</italic><sub>w</sub> = 4.47, <italic>p</italic> &lt; .001, respectively) showed that there was sufficient variation in intercepts across bystanders. Results demonstrated a variance between individuals of 25% for a scaled identity structure of engaging in aggressive behavior toward the victim and 75% of variance within individuals for engaging in aggressive behavior toward the victim over time. For engaging in aggressive behavior toward the victim, model 2 showed an improvement over model 1 (deviance = 4.34, <italic>df</italic> = 2, <italic>p</italic> &lt; .01), whereas model 3 revealed better values then models 1 and 2 (deviance = 9.31, <italic>df</italic> = 4, <italic>p</italic> &lt; .01; deviance = 4.96, <italic>df</italic> = 2, <italic>p</italic> &lt; .01, respectively). The fixed effects result for engaging in aggressive behavior toward the victim suggest that the scores of those in the AIC did not increase significantly over each interval. Results also suggest that there was no initial significant difference between this group and those in the EC. Nevertheless, over time, players (i.e., EC) decreased their aggressive behavior toward the victim at a greater rate (β = -.04) than those in the AIC (<xref ref-type="fig" rid="f05">Figure 5</xref>). These results confirm Hypothesis 4, which stated that those who did not experience the game tended to engage in aggressive behavior toward the victim more throughout time than the players.</p>
                <p>Levels 1 and 2 estimates of variance for engaging in prosocial behavior/supporting the victim (repeated measures: <italic>Z</italic><sub>w</sub> = 6.76, <italic>Z</italic><sub>w</sub> = 6.92, <italic>Z</italic><sub>w</sub> = 6.64, <italic>Z</italic><sub>w</sub> = 6.72, <italic>p</italic> &lt; .001; intercept: <italic>Z</italic><sub>w</sub> = 4.41 <italic>p</italic> &lt; .001, respectively) demonstrated that there was sufficient variation in intercepts across bystanders. Results presented a variance between individuals of 27% (session 1), 26% (session 2), 28% (session 3), and 27% (session 4) for a diagonal structure of engaging in prosocial behavior/supporting the victim, and 73% (session 1), 74% (session 2), 72% (session 3), and 73% (session 4) of variance within individuals for prosocial behavior/supporting the victim over time. For engaging in prosocial behavior/supporting the victim, model 2 showed an improvement over model 1 (deviance = 0.43, <italic>df</italic> = 1, <italic>p</italic> &lt; .01), whereas model 3 revealed better values then models 1 and 2 (deviance = 13.61, <italic>df</italic> = 3, <italic>p</italic> &lt; .01; deviance = 13.17, <italic>df</italic> = 2, <italic>p</italic> &lt; .01, respectively). The results for the fixed effects of engaging in prosocial behavior toward the victim showed that over each interval, the scores of those in the AIC decreased significantly (β = -.19). Results also showed that there was no initial significant difference between this group and those in the EC. Nonetheless, over time, players (i.e., EC) increased their prosocial behavior in cyberbullying situations at a greater rate (β = .07) than those in the AIC (<xref ref-type="fig" rid="f06">Figure 6</xref>). These results confirm Hypothesis 5, which stated that players would tend to support the victim more throughout time than those who did not experience the game.</p>
                <fig id="f06">
                    <label>Figure 6</label>
                    <caption>
                        <title>The Trajectories of Bystanders’ Prosocial Behavior toward Victims of Cyberbullying.</title>
                    </caption>
                    <graphic xlink:href="1132-0559-inter-31-2-0083-gf06.jpg"/>
                </fig>
                <p>A linear time variable was significant in explaining the growth of interpreting the cyberbullying situation as non-serious, avoiding responsibility and engaging in prosocial behavior/supporting the victim, whereas linear and quadratic time were significant in explaining the growth of engaging in aggressive behavior toward the victim (<xref ref-type="table" rid="t02">Table 2</xref>).</p>
                <table-wrap id="t02">
                    <label>Table 2</label>
                    <caption>
                        <title>Fixed and Random Effects Parameter Estimates for Models Predicting Bystander Intervention</title>
                    </caption>
                    <graphic xlink:href="1132-0559-inter-31-2-0083-gt02.jpg"/>
                    <table-wrap-foot>
                        <fn>
                            <p><italic>Note</italic>. Standard errors are in brackets.</p>
                            <p><italic>p</italic> = .05 or <italic>p</italic> &lt; .05, **<italic>p</italic> &lt; .01 or <italic>p</italic> &lt; .001.</p>
                        </fn>
                    </table-wrap-foot>
                </table-wrap>
                <p>Results also indicated (Table 1) that the players (EC) were more aggressive toward the victims in sessions 0 (<italic>M</italic> = 1.16, <italic>SD</italic> = 0.36) and 3 (<italic>M</italic> = 1.09, <italic>SD</italic> = 0.28), who were from the out-group. Moreover, results also revealed that those in the AIC were more aggressive to the victim in session 3 (<italic>M</italic> = 1.15, <italic>SD</italic> = 0.36) who belonged to the out-group, and then the victim in session 2 (<italic>M</italic> = 1.10, <italic>SD</italic> = 0.30) who belonged to the in-group. These results corroborate in part Hypothesis 6, which stated that both players and those who did not experience the game would tend to be more aggressive with the victims from their out-group. Specifically, only the players in the EC fully substantiated this hypothesis, whereas those in the AIC upheld it in part.</p>
                <p>Moreover, results also revealed that (<xref ref-type="table" rid="t01">Table 1</xref>), the players (EC) were more prosocial toward the victims in sessions 2 (<italic>M</italic> = 1.46, <italic>SD</italic> = 0.50) and 1 (<italic>M</italic> = 1.44, <italic>SD</italic> = 0.44), who were from the in-group. Furthermore, those in the AIC were more prosocial to the victim in session 0 (<italic>M</italic> = 1.31, <italic>SD</italic> = 0.47) who belonged to the out-group, and then the victim in sessions 1 (<italic>M</italic> = 1.28, <italic>SD</italic> = 0.47) and 2 (<italic>M</italic> = 1.28, <italic>SD</italic> = 0.45) who belonged to the in-group. These results corroborate in part Hypothesis 7, which stated that both players and those who did not experience the game would tend to be more prosocial with the victims from their in-group. Specifically, only the players in the EC fully substantiated this hypothesis, whereas those in the AIC upheld it in part.</p>
            </sec>
        </sec>
        <sec sec-type="discussion">
            <title>Discussion</title>
            <sec>
                <title>Self-regulation Training to Foster Prosocial Bystander Behaviour in Cyberbullying</title>
                <p>To answer the first research question, this study found that the explicit training of self-regulation strategies could foster prosocial bystander behavior in cyberbullying with serious game-based interventions. Specifically, results from pre- and post-tests showed that players revealed greater levels of prosocial assertive behavior than those who did not experience the game. These findings are an important contribution, since they showed that in fact, serious games have the potential to develop and encourage the use of prosocial assertive behavior to benefit others (<xref ref-type="bibr" rid="B08">Barrett &amp; Yarrow, 1977</xref>; <xref ref-type="bibr" rid="B10">Böckler et al., 2016</xref>) through self-reflection (<xref ref-type="bibr" rid="B31">Ferreira, et al., 2020</xref>) even in severe situations, where the presence of others may hinder them from intervening (<xref ref-type="bibr" rid="B27">Darley &amp; Latané, 1968</xref>; <xref ref-type="bibr" rid="B28">DeSmet et al., 2016</xref>). They also contribute to research on prosocial game development to encourage prosocial behavior by showing that players’ prosocial behavior can increase throughout time, especially when the game clearly shows that they will have to express this behavior in order to “win”. Even if it is not support for behavior change in real life, it shows that the participants know what is considered appropriate from the point of view of social behavior, as they manage to win the game. By encouraging a participant to implement prosocial behavior in the game itself through self-regulation, the game can offer a greater understanding of the consequences of this same behavior, which only happens through interactivity. Therefore, it is essential to develop serious games that focus on the promotion of prolonged prosociality, as opposed to a one-session episode of prosocial training, which is what previous research has found (<xref ref-type="bibr" rid="B29">DeSmet et al., 2018</xref>). Moreover, this study focused on placing the participants as bystanders of cyberbullying (not victims for ethical purposes) as they occurred in the game, providing them with an opportunity to interact with the social agents and have the power to intervene in different situations, as opposed to watching videos or reading about scenarios, or as opposed to not focusing on the role of the bystander (<xref ref-type="bibr" rid="B22">Chatzidaki et al., 2011</xref>; <xref ref-type="bibr" rid="B30">De Troyer et al., 2016</xref>; <xref ref-type="bibr" rid="B42">Higashino et al., 2019</xref>; Hswen, et al., 2014; <xref ref-type="bibr" rid="B54">Lazarinis et al., 2020</xref>; <xref ref-type="bibr" rid="B63">Mikka-Muntuumo et al., 2018</xref>; <xref ref-type="bibr" rid="B67">Neo et al., 2018</xref>; <xref ref-type="bibr" rid="B70">Olenik-Shemesh et al., 2014</xref>).</p>
                <p>Also to help answer our first research question, the results from the longitudinal data (Hypothesis 2 and 3) also revealed that those who did not experience the game tended to interpret the cyberbullying situations more as non-serious and avoided assuming responsibility for intervening more throughout time than the players (EC). These results add to previous findings that indicated that adolescents tend to distort the consequences of cyberbullying and even engage in cognitive restructuring to transform the phenomenon into something less serious (<xref ref-type="bibr" rid="B73">Romera et al., 2021</xref>), especially in the case of no self-regulation training. Moreover, although minimizing responsibility was not significant for cyberbullying in <xref ref-type="bibr" rid="B73">Romera et al’s (2021)</xref> study, our results indicated that this type of moral disengagement mechanism can be more evident in those who do not have self-regulation training that is specific to managing cyberbullying events.</p>
                <p>By promoting self-regulation, the game empowered players to reduce the possibility of interpreting the event as non-serious, as well as diffusing or displacing responsibility (i.e., both moral disengagement mechanisms), which implies a minimized sense of responsibility to intervene when amongst a group of people (<xref ref-type="bibr" rid="B53">Latané &amp; Nida, 1981</xref>). Furthermore, those who did not experience the game engaged in aggressive behavior against the victim more throughout time than players. This result adds to previous research that found that an intervention based on reflecting on values and behaviour change using narratives could reduce cyberbullying perpetration in the experimental condition (<xref ref-type="bibr" rid="B16">Calvete et al., 2021</xref>). Moreover, our findings help explain how serious games based on the training of self-regulation strategies can reduce individuals’ tendency to act passively, experiencing a bystander effect, which can hinder helping behavior toward a victim (<xref ref-type="bibr" rid="B27">Darley &amp; Latané, 1968</xref>; <xref ref-type="bibr" rid="B28">DeSmet et al., 2016</xref>), and even aggressively to either impulsively or deliberately harm others (<xref ref-type="bibr" rid="B02">Ahn et al., 2014</xref>; <xref ref-type="bibr" rid="B31">Ferreira et al., 2020</xref>). These findings contribute to previous research that demonstrated that games can increase knowledge about cyberbullying in a ludic manner, but that have not provided objective evidence regarding their effectiveness to promote prosocial behavior (<xref ref-type="bibr" rid="B22">Chatzidaki et al., 2011</xref>; <xref ref-type="bibr" rid="B30">De Troyer et al., 2016</xref>; <xref ref-type="bibr" rid="B38">Guerra, 2017</xref>; <xref ref-type="bibr" rid="B42">Higashino et al., 2019</xref>; Hswen, et al., 2014; <xref ref-type="bibr" rid="B54">Lazarinis et al., 2020</xref>; <xref ref-type="bibr" rid="B63">Mikka-Muntuumo et al., 2018</xref>; <xref ref-type="bibr" rid="B67">Neo et al., 2018</xref>; <xref ref-type="bibr" rid="B70">Olenik-Shemesh et al., 2014</xref>), such as our in-game performance data.</p>
            </sec>
            <sec>
                <title>In-group and Out-group Social Agents Can Foster Different Bystander Behaviour in Cyberbullying</title>
                <p>This study also questioned whether social agents could foster different bystander behavior in cyberbullying events in serious games, depending on their role as members of the players’ in-group or out-group. To help answer this second research question we proposed and confirmed two hypotheses which revealed that only the players were more aggressive with the victims from their out-group and supported the victims from their in-group. Therefore, the social agents did foster different bystander behavior in cyberbullying events in serious games. These results support previous research that has stressed the importance of players belonging to the in-group of social agents because this interaction can have an impact on their emotional and behavioral reactions towards situations (<xref ref-type="bibr" rid="B01">Abbink &amp; Harris, 2019</xref>; <xref ref-type="bibr" rid="B12">Bos et al., 2004</xref>). Nonetheless, our findings provide an important contribution to research on self and group processes (<xref ref-type="bibr" rid="B85">Turner &amp; Reynolds, 2010</xref>) because it has provided evidence that social identification may encourage individuals to engage in prosocial behavior toward others (<xref ref-type="bibr" rid="B39">Hackel et al., 2017</xref>), and that players can in fact show favouritism for their in-group (<xref ref-type="bibr" rid="B37">Guegan et al., 2015</xref>), but that the promotion of self-regulation strategies can increase prosociality also toward individuals of an out-group.</p>
            </sec>
            <sec>
                <title>Limitations and Future Directions</title>
                <p>This study has some limitations which are worth mentioning. Other variables could have been measured, such as specific moral disengagement mechanisms, which are part of the social cognitive perspective of moral agency (<xref ref-type="bibr" rid="B05">Bandura, 2006</xref>; <xref ref-type="bibr" rid="B73">Romera et al., 2021</xref>). These variables could provide promising opportunities for future research. Moreover, although the amount of data we examined was substantial, we used a small sample size and future work could use not only larger sample sizes to examine results as those presented here, but also used samples from more diverse cultural contexts. Nevertheless, 30 level-2 units are sufficient to produce unbiased parameter estimates in multilevel linear analysis; therefore, we decided to present the results (<xref ref-type="bibr" rid="B60">McCoach, 2010</xref>).</p>
                <p>Furthermore, in this game, the in-group and out-group of the players were predetermined. However, future research could invest in having players choose which social agents may belong to their in-group so that further insights may be acquired regarding their preferences and beliefs of which group they belong to within this context (<xref ref-type="bibr" rid="B84">Turner &amp; Oakes, 1986</xref>). By providing this choice, research could further investigate how players react to the social agents’ role in the game (whether they are victims, aggressors, and/or observers of cyberbullying), thus offering more detailed data on how these individuals engage during intergroup interactions (<xref ref-type="bibr" rid="B81">Tajfel &amp; Turner, 1979</xref>; <xref ref-type="bibr" rid="B82">Tajfel &amp; Turner, 1986</xref>; <xref ref-type="bibr" rid="B83">Turner, 1999</xref>; <xref ref-type="bibr" rid="B84">Turner &amp; Oakes, 1986</xref>). Moreover, future research with serious game-based psychosocial interventions could provide more awareness of the impact of bystander behavior by focusing on providing participants with opportunities to see different outcomes of cyberbullying situations by viewing both pro-social and aggressive bystander interventions.</p>
            </sec>
            <sec>
                <title>Theoretical Contribution and Implications for Practice</title>
                <p>The theoretical relevance of this study falls on the integrated approach with which it framed prosocial behavior among adolescents in cyberbullying contexts. The serious game presented in this study included elements from a social identity approach as a framework for developing a serious game with social agents (<xref ref-type="bibr" rid="B85">Turner &amp; Reynolds, 2010</xref>) and a social cognitive perspective of self-regulation (<xref ref-type="bibr" rid="B05">Bandura, 2006</xref>) to empower adolescents to engage in the regulation of behavior as bystanders in cyberbullying. The assistance of these digital resources enhanced bystanders’ prosocial potential, as they engaged in helping behavior more towards the victims who were their friends (in-group), but the training of self-regulation enabled them to become increasingly prosocial in a flexible manner. Therefore, they were not only products of the context that surrounded them, but were also active producers of their environment (<xref ref-type="bibr" rid="B04">Bandura, 2001</xref>). By intentionally engaging in planning possible courses of action and self-examining their own behavior and that of others (<xref ref-type="bibr" rid="B05">Bandura, 2006</xref>) in cyberbullying, players had opportunities to interpret the events, consider responsibility for intervening, and determine their course of action to increase their prosociality (<xref ref-type="bibr" rid="B52">Latané &amp; Darley, 1970</xref>), independently of whether the victims were from their in-group or out-group. In doing so, the players engaged in individual agency, by influencing their own gameplay through their behavior; in proxy agency by helping the victims of cyberbullying; and in collective agency by socially coordinating efforts with their team members to reach their shared goal to go on the school field trip (<xref ref-type="bibr" rid="B06">Bandura, 2008</xref>).</p>
                <p>The practical implications of this theoretical contribution may be a step forward to a human-machine partnership to reach various milestones in designing serious games for preventing and intervening in cyberbullying. Firstly, players can be given the option to make responsible decisions in choosing which social agents they want to build social relationships with based on their characteristics (in-group vs. out-group), which complements previous design recommendations to foster human-agent interactions (<xref ref-type="bibr" rid="B01">Abbink &amp; Harris, 2019</xref>; <xref ref-type="bibr" rid="B12">Bos et al., 2004</xref>; <xref ref-type="bibr" rid="B69">Ohmoto et al., 2017</xref>). Accordingly, players could also be given the opportunity to change the status of their relationship with the social agents. Secondly, this responsible decision-making can be encouraged through the regulation of behavior and emotions, as well as empathy promotion (<xref ref-type="bibr" rid="B80">Souza et al., 2018</xref>; <xref ref-type="bibr" rid="B88">Veiga Simão et al., 2021</xref>) with a solid basis on social emotional ethical learning (<xref ref-type="bibr" rid="B14">Burroughs &amp; Barkauskas, 2017</xref>). Thirdly, the feedback received from the social agents to offer a more realistic social interaction can be complemented with emotional cues that other players could post (e.g., sharing emojis to express emotions regarding the cyberbullying situation in a private area), which could be integrated into the game and add to previous research on game design (<xref ref-type="bibr" rid="B62">Midden &amp; Ham, 2009</xref>). Lastly, in providing response options for social interaction, the game could provide players with features (e.g., feedback loops of their own behavior and the social agents’ actions and vice versa) which enable them to re-examine their own behavioral response to previous cyberbullying incidents and make desired changes (<xref ref-type="bibr" rid="B05">Bandura, 2006</xref>). This is also an innovative contribution to previous research on behavior change and game design based on previous studies that have been conducted with games (<xref ref-type="bibr" rid="B17">Calvo-Morata et al., 2020</xref>; <xref ref-type="bibr" rid="B20">Carmona Torres et al., 2011</xref>), showing that online violence does not have to cause more violence or silence among bystanders.</p>
            </sec>
        </sec>
    </body>
    <back>
        <fn-group>
            <fn fn-type="other">
                <p>Cite this article as: Ferreira, P. C., Veiga Simão, A. M., Paiva, A., Martinho, C., Prada, R., &amp; Rocha, J. (2022). Serious game-based psychosocial intervention to foster prosociality in cyberbullying bystanders. <italic>Psychosocial Intervention, 31</italic>(2), 83-96. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.5093/pi2022a5">https://doi.org/10.5093/pi2022a5</ext-link></p>
            </fn>
            <fn fn-type="financial-disclosure">
                <p>Funding: This study was supported by the Portuguese Foundation for Science and Technology, Portugal [PTDC/PSI-GER/1918/2020] and by CICPSI, Research Centre for Psychological Science of the Faculty of Psychology of the University of Lisbon (UIDB/04527/2020; UIDP/04527/2020).</p>
            </fn>
        </fn-group>
        <ref-list>
            <title>References</title>
            <ref id="B01">

                <mixed-citation>Abbink, K., &amp; Harris, D. (2019). In-group favouritism and out-group discrimination in naturally occurring groups. <italic>PloS one, 14</italic>(9), e0221616. https://doi.org/10.1371/journal.pone.0221616</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Abbink</surname>
                            <given-names>K</given-names>
                        </name>
                        <name>
                            <surname>Harris</surname>
                            <given-names>D</given-names>
                        </name>
                    </person-group>
                    <year>2019</year>
                    <article-title>In-group favouritism and out-group discrimination in naturally occurring groups</article-title>
                    <source>PloS one</source>
                    <volume>14</volume>
                    <issue>9</issue>
                    <elocation-id>e0221616</elocation-id>
                    <pub-id pub-id-type="doi">10.1371/journal.pone.0221616</pub-id>

                </element-citation>
            </ref>
            <ref id="B02">

                <mixed-citation>Ahn, H. K., Kim, H. J., &amp; Aggarwal, P. (2014). Helping fellow beings: Anthropomorphized social causes and the role of anticipatory guilt. <italic>Psychological Science, 25</italic>(1), 224-229. https://doi.org/10.1177/0956797613496823</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Ahn</surname>
                            <given-names>H. K</given-names>
                        </name>
                        <name>
                            <surname>Kim</surname>
                            <given-names>H. J</given-names>
                        </name>
                        <name>
                            <surname>Aggarwal</surname>
                            <given-names>P.</given-names>
                        </name>
                    </person-group>
                    <year>2014</year>
                    <article-title>Helping fellow beings: Anthropomorphized social causes and the role of anticipatory guilt</article-title>
                    <source>Psychological Science</source>
                    <volume>25</volume>
                    <issue>1</issue>
                    <fpage>224</fpage>
                    <lpage>229</lpage>
                    <pub-id pub-id-type="doi">10.1177/0956797613496823</pub-id>

                </element-citation>
            </ref>
            <ref id="B03">

                <mixed-citation>Allison, K. R., &amp; Bussey, K. (2017). Individual and collective moral influences on intervention in cyberbullying. <italic>Computers in Human Behavior, 74</italic>, 7-15. https://doi.org/10.1016/j.chb.2017.04.019</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Allison</surname>
                            <given-names>K. R</given-names>
                        </name>
                        <name>
                            <surname>Bussey</surname>
                            <given-names>K.</given-names>
                        </name>
                    </person-group>
                    <year>2017</year>
                    <article-title>Individual and collective moral influences on intervention in cyberbullying</article-title>
                    <source>Computers in Human Behavior</source>
                    <volume>74</volume>
                    <fpage>7</fpage>
                    <lpage>15</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.chb.2017.04.019</pub-id>

                </element-citation>
            </ref>
            <ref id="B04">

                <mixed-citation>Bandura, A. (2001). Social cognitive theory: An agentic perspective. <italic>Annual Review of Psychology, 52</italic>(1), 1-26. https://doi.org/10.1146/annurev.psych.52.1.1</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Bandura</surname>
                            <given-names>A.</given-names>
                        </name>
                    </person-group>
                    <year>2001</year>
                    <article-title>Social cognitive theory: An agentic perspective</article-title>
                    <source>Annual Review of Psychology</source>
                    <volume>52</volume>
                    <issue>1</issue>
                    <fpage>1</fpage>
                    <lpage>26</lpage>
                    <pub-id pub-id-type="doi">10.1146/annurev.psych.52.1.1</pub-id>

                </element-citation>
            </ref>
            <ref id="B05">

                <mixed-citation>Bandura, A. (2006). Toward a psychology of human agency. <italic>Perspectives on Psychological Science, 1</italic>(2), 164-180. https://doi.org/10.1111/j.1745-6916.2006.00011.x</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Bandura</surname>
                            <given-names>A</given-names>
                        </name>
                    </person-group>
                    <year>2006</year>
                    <article-title>Toward a psychology of human agency</article-title>
                    <source>Perspectives on Psychological Science</source>
                    <volume>1</volume>
                    <issue>2</issue>
                    <fpage>164</fpage>
                    <lpage>180</lpage>
                    <pub-id pub-id-type="doi">10.1111/j.1745-6916.2006.00011.x</pub-id>

                </element-citation>
            </ref>
            <ref id="B06">

                <mixed-citation>Bandura, A. (2008). Toward an agentic theory of the self. <italic>Advances in Self Research, 3</italic>, 15-49.</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Bandura</surname>
                            <given-names>A.</given-names>
                        </name>
                    </person-group>
                    <year>2008</year>
                    <article-title>Toward an agentic theory of the self</article-title>
                    <source>Advances in Self Research</source>
                    <volume>3</volume>
                    <fpage>15</fpage>
                    <lpage>49</lpage>

                </element-citation>
            </ref>
            <ref id="B07">

                <mixed-citation>Bandura, A., Caprara, G. V., Barbaranelli, C., Gerbino, M., &amp; Pastorelli, C. (2003). Role of affective self-regulatory efficacy in diverse spheres of psychosocial functioning. <italic>Child development, 74</italic>(3), 769-782. https://doi.org/10.1111/1467-8624.00567</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Bandura</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Caprara</surname>
                            <given-names>G. V</given-names>
                        </name>
                        <name>
                            <surname>Barbaranelli</surname>
                            <given-names>C</given-names>
                        </name>
                        <name>
                            <surname>Gerbino</surname>
                            <given-names>M</given-names>
                        </name>
                        <name>
                            <surname>Pastorelli</surname>
                            <given-names>C.</given-names>
                        </name>
                    </person-group>
                    <year>2003</year>
                    <article-title>Role of affective self-regulatory efficacy in diverse spheres of psychosocial functioning</article-title>
                    <source>Child development</source>
                    <volume>74</volume>
                    <issue>3</issue>
                    <fpage>769</fpage>
                    <lpage>782</lpage>
                    <pub-id pub-id-type="doi">10.1111/1467-8624.00567</pub-id>

                </element-citation>
            </ref>
            <ref id="B08">

                <mixed-citation>Barrett, D. E., &amp; Yarrow, M. R. (1977). Prosocial behavior, social inferential ability, and assertiveness in children. <italic>Child Development, 48</italic>(2), 475-481. https://doi.org/10.2307/1128642</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Barrett</surname>
                            <given-names>D. E</given-names>
                        </name>
                        <name>
                            <surname>Yarrow</surname>
                            <given-names>M. R.</given-names>
                        </name>
                    </person-group>
                    <year>1977</year>
                    <article-title>Prosocial behavior, social inferential ability, and assertiveness in children</article-title>
                    <source>Child Development</source>
                    <volume>48</volume>
                    <issue>2</issue>
                    <fpage>475</fpage>
                    <lpage>481</lpage>
                    <pub-id pub-id-type="doi">10.2307/1128642</pub-id>

                </element-citation>
            </ref>
            <ref id="B09">

                <mixed-citation>Blakemore, S. J. (2012). Imaging brain development: the adolescent brain. <italic>Neuroimage, 61</italic>(2), 397-406. https://doi.org/10.1016/j.neuroimage.2011.11.080</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Blakemore</surname>
                            <given-names>S. J.</given-names>
                        </name>
                    </person-group>
                    <year>2012</year>
                    <article-title>Imaging brain development: the adolescent brain</article-title>
                    <source>Neuroimage</source>
                    <volume>61</volume>
                    <issue>2</issue>
                    <fpage>397</fpage>
                    <lpage>406</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.neuroimage.2011.11.080</pub-id>

                </element-citation>
            </ref>
            <ref id="B10">

                <mixed-citation>Böckler, A., Tusche, A., &amp; Singer, T. (2016). The structure of human prosociality: Differentiating altruistically motivated, norm motivated, strategically motivated, and self-reported prosocial behavior. <italic>Social Psychological and Personality Science, 7</italic>(6), 530-541. https://doi.org/10.1177/1948550616639650</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Böckler</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Tusche</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Singer</surname>
                            <given-names>T.</given-names>
                        </name>
                    </person-group>
                    <year>2016</year>
                    <article-title>The structure of human prosociality: Differentiating altruistically motivated, norm motivated, strategically motivated, and self-reported prosocial behavior</article-title>
                    <source>Social Psychological and Personality Science</source>
                    <volume>7</volume>
                    <issue>6</issue>
                    <fpage>530</fpage>
                    <lpage>541</lpage>
                    <pub-id pub-id-type="doi">10.1177/1948550616639650</pub-id>

                </element-citation>
            </ref>
            <ref id="B11">

                <mixed-citation>Bond, T. G., &amp; Fox, C. M. (2007). <italic>Applying the Rasch model</italic>. Erlbaum.</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Bond</surname>
                            <given-names>T. G</given-names>
                        </name>
                        <name>
                            <surname>Fox</surname>
                            <given-names>C. M.</given-names>
                        </name>
                    </person-group>
                    <year>2007</year>
                    <source>Applying the Rasch model</source>
                    <publisher-name>Erlbaum</publisher-name>

                </element-citation>
            </ref>
            <ref id="B12">

                <mixed-citation>Bos, N., Shami, N. S., Olson, J. S., Cheshin, A., &amp; Nan, N. (2004, November). In-group/out-group effects in distributed teams: An experimental simulation. In <italic>Proceedings of the 2004 ACM conference on computer supported cooperative work</italic> (pp. 429-436). https://doi.org/10.1145/1031607.1031679</mixed-citation>

                <element-citation publication-type="confproc">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Bos</surname>
                            <given-names>N</given-names>
                        </name>
                        <name>
                            <surname>Shami</surname>
                            <given-names>N. S</given-names>
                        </name>
                        <name>
                            <surname>Olson</surname>
                            <given-names>J. S</given-names>
                        </name>
                        <name>
                            <surname>Cheshin</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Nan</surname>
                            <given-names>N.</given-names>
                        </name>
                    </person-group>
                    <year>2004</year>
                    <month>11</month>
                    <conf-name>In-group/out-group effects in distributed teams: An experimental simulation</conf-name>
                    <source>Proceedings of the 2004 ACM conference on computer supported cooperative work</source>
                    <fpage>429</fpage>
                    <lpage>436</lpage>
                    <pub-id pub-id-type="doi">10.1145/1031607.1031679</pub-id>

                </element-citation>
            </ref>
            <ref id="B13">

                <mixed-citation>Bowen, E., Walker, K., Mawer, M., Holdsworth, E., Sorbring, E., Helsing, B., Bolin, A., Leen, E., Held, P., Awouters, V., &amp; Jans, S. (2014). “It’s like you’re actually playing as yourself”: Development and preliminary evaluation of ‘Green Acres High’, a serious game-based primary intervention to combat adolescent dating violence. <italic>Psychosocial Intervention, 23</italic>(1), 43-55. https://doi.org/10.5093/in2014a5</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Bowen</surname>
                            <given-names>E</given-names>
                        </name>
                        <name>
                            <surname>Walker</surname>
                            <given-names>K</given-names>
                        </name>
                        <name>
                            <surname>Mawer</surname>
                            <given-names>M</given-names>
                        </name>
                        <name>
                            <surname>Holdsworth</surname>
                            <given-names>E</given-names>
                        </name>
                        <name>
                            <surname>Sorbring</surname>
                            <given-names>E</given-names>
                        </name>
                        <name>
                            <surname>Helsing</surname>
                            <given-names>B</given-names>
                        </name>
                        <name>
                            <surname>Bolin</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Leen</surname>
                            <given-names>E</given-names>
                        </name>
                        <name>
                            <surname>Held</surname>
                            <given-names>P</given-names>
                        </name>
                        <name>
                            <surname>Awouters</surname>
                            <given-names>V</given-names>
                        </name>
                        <name>
                            <surname>Jans</surname>
                            <given-names>S.</given-names>
                        </name>
                    </person-group>
                    <year>2014</year>
                    <article-title>“It’s like you’re actually playing as yourself”: Development and preliminary evaluation of ‘Green Acres High’, a serious game-based primary intervention to combat adolescent dating violence</article-title>
                    <source>Psychosocial Intervention</source>
                    <volume>23</volume>
                    <issue>1</issue>
                    <fpage>43</fpage>
                    <lpage>55</lpage>
                    <pub-id pub-id-type="doi">10.5093/in2014a5</pub-id>

                </element-citation>
            </ref>
            <ref id="B14">

                <mixed-citation>Burroughs, M. D., &amp; Barkauskas, N. J. (2017). Educating the whole child: Social-emotional learning and ethics education. <italic>Ethics and Education, 12</italic>(2), 218-232. https://doi.org/10.1080/17449642.2017.1287388</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Burroughs</surname>
                            <given-names>M. D</given-names>
                        </name>
                        <name>
                            <surname>Barkauskas</surname>
                            <given-names>N. J.</given-names>
                        </name>
                    </person-group>
                    <year>2017</year>
                    <article-title>Educating the whole child: Social-emotional learning and ethics education</article-title>
                    <source>Ethics and Education</source>
                    <volume>12</volume>
                    <issue>2</issue>
                    <fpage>218</fpage>
                    <lpage>232</lpage>
                    <pub-id pub-id-type="doi">10.1080/17449642.2017.1287388</pub-id>

                </element-citation>
            </ref>
            <ref id="B15">

                <mixed-citation>Bussey, K., Luo, A., Fitzpatrick, S., &amp; Allison, K. (2020). Defending victims of cyberbullying: The role of self-efficacy and moral disengagement. <italic>Journal of School Psychology, 78</italic>, 1-12. https://doi.org/10.1016/j.jsp.2019.11.006</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Bussey</surname>
                            <given-names>K</given-names>
                        </name>
                        <name>
                            <surname>Luo</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Fitzpatrick</surname>
                            <given-names>S</given-names>
                        </name>
                        <name>
                            <surname>Allison</surname>
                            <given-names>K.</given-names>
                        </name>
                    </person-group>
                    <year>2020</year>
                    <article-title>Defending victims of cyberbullying: The role of self-efficacy and moral disengagement</article-title>
                    <source>Journal of School Psychology</source>
                    <volume>78</volume>
                    <fpage>1</fpage>
                    <lpage>12</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.jsp.2019.11.006</pub-id>

                </element-citation>
            </ref>
            <ref id="B16">

                <mixed-citation>Calvete, E., Cortazar, N., Fernández-González, L., Echezarraga, A., Beranuy, M., León, A., González-Cabrera, J., &amp; Orue, I. (2021). Effects of a brief preventive intervention in cyberbullying and grooming in adolescents. <italic>Psychosocial Intervention, 30</italic>(2), 75-84. https://doi.org/10.5093/pi2020a22</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Calvete</surname>
                            <given-names>E</given-names>
                        </name>
                        <name>
                            <surname>Cortazar</surname>
                            <given-names>N</given-names>
                        </name>
                        <name>
                            <surname>Fernández-González</surname>
                            <given-names>L</given-names>
                        </name>
                        <name>
                            <surname>Echezarraga</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Beranuy</surname>
                            <given-names>M</given-names>
                        </name>
                        <name>
                            <surname>León</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>González-Cabrera</surname>
                            <given-names>J</given-names>
                        </name>
                        <name>
                            <surname>Orue</surname>
                            <given-names>I.</given-names>
                        </name>
                    </person-group>
                    <year>2021</year>
                    <article-title>Effects of a brief preventive intervention in cyberbullying and grooming in adolescents</article-title>
                    <source>Psychosocial Intervention</source>
                    <volume>30</volume>
                    <issue>2</issue>
                    <fpage>75</fpage>
                    <lpage>84</lpage>
                    <pub-id pub-id-type="doi">10.5093/pi2020a22</pub-id>

                </element-citation>
            </ref>
            <ref id="B17">

                <mixed-citation>Calvo-Morata, A., Alonso-Fernández, C., Freire-Morán, M., Martínez-Ortiz I., &amp; Fernández-Manjón, B. (2020). Serious games to prevent and detect bullying and cyberbullying: a systematic serious games and literature review. <italic>Computers &amp; Education, 157</italic>(2), Article 103958. https://doi.org/10.1016/j.compedu.2020.103958</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Calvo-Morata</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Alonso-Fernández</surname>
                            <given-names>C</given-names>
                        </name>
                        <name>
                            <surname>Freire-Morán</surname>
                            <given-names>M</given-names>
                        </name>
                        <name>
                            <surname>Martínez-Ortiz</surname>
                            <given-names>I.</given-names>
                        </name>
                        <name>
                            <surname>Fernández-Manjón</surname>
                            <given-names>B.</given-names>
                        </name>
                    </person-group>
                    <year>2020</year>
                    <article-title>Serious games to prevent and detect bullying and cyberbullying: a systematic serious games and literature review</article-title>
                    <source>Computers &amp; Education</source>
                    <volume>157</volume>
                    <issue>2</issue>
                    <comment>Article 103958</comment>
                    <pub-id pub-id-type="doi">10.1016/j.compedu.2020.103958</pub-id>

                </element-citation>
            </ref>
            <ref id="B18">

                <mixed-citation>Calvo-Morata, A., Rotaru, D. C., Alonso-Fernández, C., Freire-Morán, M., Martínez-Ortiz, I., &amp; Fernández-Manjón, B. (2018). Validation of a cyberbullying serious game using game analytics. <italic>IEEE Transactions on Learning Technologies, 13</italic>(1), 186-197. https://doi.org/10.1109/TLT.2018.2879354</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Calvo-Morata</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Rotaru</surname>
                            <given-names>D. C</given-names>
                        </name>
                        <name>
                            <surname>Alonso-Fernández</surname>
                            <given-names>C</given-names>
                        </name>
                        <name>
                            <surname>Freire-Morán</surname>
                            <given-names>M</given-names>
                        </name>
                        <name>
                            <surname>Martínez-Ortiz</surname>
                            <given-names>I</given-names>
                        </name>
                        <name>
                            <surname>Fernández-Manjón</surname>
                            <given-names>B.</given-names>
                        </name>
                    </person-group>
                    <year>2018</year>
                    <article-title>Validation of a cyberbullying serious game using game analytics</article-title>
                    <source>IEEE Transactions on Learning Technologies</source>
                    <volume>13</volume>
                    <issue>1</issue>
                    <fpage>186</fpage>
                    <lpage>197</lpage>
                    <pub-id pub-id-type="doi">10.1109/TLT.2018.2879354</pub-id>

                </element-citation>
            </ref>
            <ref id="B19">

                <mixed-citation>Carlo, G., Crockett, L. J., Wolff, J. M., &amp; Beal, S. J. (2012). The role of emotional reactivity, self-regulation, and puberty in adolescents’ prosocial behaviors. <italic>Social Development, 21</italic>(4), 667-685. https://doi.org/10.1111/j.1467-9507.2012.00660.x</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Carlo</surname>
                            <given-names>G</given-names>
                        </name>
                        <name>
                            <surname>Crockett</surname>
                            <given-names>L. J</given-names>
                        </name>
                        <name>
                            <surname>Wolff</surname>
                            <given-names>J. M</given-names>
                        </name>
                        <name>
                            <surname>Beal</surname>
                            <given-names>S. J.</given-names>
                        </name>
                    </person-group>
                    <year>2012</year>
                    <article-title>The role of emotional reactivity, self-regulation, and puberty in adolescents’ prosocial behaviors</article-title>
                    <source>Social Development</source>
                    <volume>21</volume>
                    <issue>4</issue>
                    <fpage>667</fpage>
                    <lpage>685</lpage>
                    <pub-id pub-id-type="doi">10.1111/j.1467-9507.2012.00660.x</pub-id>

                </element-citation>
            </ref>
            <ref id="B20">

                <mixed-citation>Carmona Torres, J. A., Cangas Díaz, A. J., &amp; Langer Herrera, Á. I. (2011). Applications of 3D simulation in mental health: Utilities and new developments. In L. L’Abate. (Ed.), <italic>Mental illnesses: Evaluation, treatment, and implications</italic> (pp. 37-56). InTech. https://doi.org/10.5772/29597</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Carmona Torres</surname>
                            <given-names>J. A</given-names>
                        </name>
                        <name>
                            <surname>Cangas Díaz</surname>
                            <given-names>A. J</given-names>
                        </name>
                        <name>
                            <surname>Langer Herrera</surname>
                            <given-names>Á. I.</given-names>
                        </name>
                    </person-group>
                    <year>2011</year>
                    <chapter-title>Applications of 3D simulation in mental health: Utilities and new developments</chapter-title>
                    <person-group person-group-type="editor">
                        <name>
                            <surname>L’Abate</surname>
                            <given-names>L.</given-names>
                        </name>
                    </person-group>
                    <source>Mental illnesses: Evaluation, treatment, and implications</source>
                    <fpage>37</fpage>
                    <lpage>56</lpage>
                    <pub-id pub-id-type="doi">10.5772/29597</pub-id>

                </element-citation>
            </ref>
            <ref id="B21">

                <mixed-citation>Cebolledo Gutierrez, E. O., &amp; De Troyer, O. (2015, September). Modelling social network interactions in games. In <italic>Eleventh Artificial Intelligence and Interactive Digital Entertainment Conference</italic>. https://www.aaai.org/ocs/index.php/AIIDE/AIIDE15/paper/view/11579/11412</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Cebolledo Gutierrez</surname>
                            <given-names>E. O</given-names>
                        </name>
                        <name>
                            <surname>De Troyer</surname>
                            <given-names>O.</given-names>
                        </name>
                    </person-group>
                    <year>2015</year>
                    <month>09</month>
                    <chapter-title>Modelling social network interactions in games</chapter-title>
                    <source>Eleventh Artificial Intelligence and Interactive Digital Entertainment Conference</source>
                    <ext-link ext-link-type="uri" xlink:href="https://www.aaai.org/ocs/index.php/AIIDE/AIIDE15/paper/view/11579/11412">https://www.aaai.org/ocs/index.php/AIIDE/AIIDE15/paper/view/11579/11412</ext-link>

                </element-citation>
            </ref>
            <ref id="B22">

                <mixed-citation>Chatzidaki, E., Kostaras, N., &amp; Xenos, M. (2011, November). <italic>Assessment of an educational online virtual game enviroment : The case of SimSafety</italic>. 1st European Immersive Education Summit. Universidad Carlos III, Leganés, Madrid, Spain.</mixed-citation>

                <element-citation publication-type="confproc">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Chatzidaki</surname>
                            <given-names>E</given-names>
                        </name>
                        <name>
                            <surname>Kostaras</surname>
                            <given-names>N</given-names>
                        </name>
                        <name>
                            <surname>Xenos</surname>
                            <given-names>M.</given-names>
                        </name>
                    </person-group>
                    <year>2011</year>
                    <month>11</month>
                    <source>Assessment of an educational online virtual game enviroment : The case of SimSafety</source>
                    <conf-name>1st European Immersive Education Summit. Universidad Carlos III</conf-name>
                    <conf-loc>Leganés, Madrid, Spain</conf-loc>

                </element-citation>
            </ref>
            <ref id="B23">

                <mixed-citation>Choi, Y. K., Miracle, G. E., &amp; Biocca, F. (2001). The effects of anthropomorphic agents on advertising effectiveness and the mediating role of presence. <italic>Journal of Interactive Advertising, 2</italic>(1), 19-32. https://doi.org/10.1080/15252019.2001.10722055</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Choi</surname>
                            <given-names>Y. K</given-names>
                        </name>
                        <name>
                            <surname>Miracle</surname>
                            <given-names>G. E</given-names>
                        </name>
                        <name>
                            <surname>Biocca</surname>
                            <given-names>F.</given-names>
                        </name>
                    </person-group>
                    <year>2001</year>
                    <article-title>The effects of anthropomorphic agents on advertising effectiveness and the mediating role of presence</article-title>
                    <source>Journal of Interactive Advertising</source>
                    <volume>2</volume>
                    <issue>1</issue>
                    <fpage>19</fpage>
                    <lpage>32</lpage>
                    <pub-id pub-id-type="doi">10.1080/15252019.2001.10722055</pub-id>

                </element-citation>
            </ref>
            <ref id="B24">

                <mixed-citation>Cohen, J. (1988). <italic>Statistical power analysis for the behavioral sciences</italic> (2<sup>nd</sup> ed.). Erlbaum Associates.</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Cohen</surname>
                            <given-names>J.</given-names>
                        </name>
                    </person-group>
                    <year>1988</year>
                    <source>Statistical power analysis for the behavioral sciences</source>
                    <edition>2<sup>nd</sup> ed.</edition>
                    <publisher-name>Erlbaum Associates</publisher-name>

                </element-citation>
            </ref>
            <ref id="B25">

                <mixed-citation>Coplan, A. (2011). Will the real empathy please stand up? A case for a narrow conceptualization. <italic>The Southern Journal of Philosophy, 49</italic>(s1), 40-65. https://doi.org/10.1111/j.2041-6962.2011.00056.x</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Coplan</surname>
                            <given-names>A.</given-names>
                        </name>
                    </person-group>
                    <year>2011</year>
                    <article-title>Will the real empathy please stand up? A case for a narrow conceptualization</article-title>
                    <source>The Southern Journal of Philosophy</source>
                    <volume>49</volume>
                    <issue>s1</issue>
                    <fpage>40</fpage>
                    <lpage>65</lpage>
                    <pub-id pub-id-type="doi">10.1111/j.2041-6962.2011.00056.x</pub-id>

                </element-citation>
            </ref>
            <ref id="B26">

                <mixed-citation>Dalibard, S., Magnenat-Talmann, N., &amp; Thalmann, D. (2012, May). <italic>Anthropomorphism of artificial agents: A comparative survey of expressive design and motion of virtual characters and social robots</italic>. Workshop on autonomous social robots and virtual humans at the 25th annual conference on computer animation and social agents (CASA 2012). https://hal.archives-ouvertes.fr/hal-00732763</mixed-citation>

                <element-citation publication-type="confproc">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Dalibard</surname>
                            <given-names>S</given-names>
                        </name>
                        <name>
                            <surname>Magnenat-Talmann</surname>
                            <given-names>N</given-names>
                        </name>
                        <name>
                            <surname>Thalmann</surname>
                            <given-names>D.</given-names>
                        </name>
                    </person-group>
                    <year>2012</year>
                    <month>05</month>
                    <source>Anthropomorphism of artificial agents: A comparative survey of expressive design and motion of virtual characters and social robots</source>
                    <conf-name>Workshop on autonomous social robots and virtual humans at the 25th annual conference on computer animation and social agents (CASA 2012)</conf-name>
                    <ext-link ext-link-type="uri" xlink:href="https://hal.archives-ouvertes.fr/hal-00732763">https://hal.archives-ouvertes.fr/hal-00732763</ext-link>

                </element-citation>
            </ref>
            <ref id="B27">

                <mixed-citation>Darley, J. M., &amp; Latané, B. (1968). Bystander intervention in emergencies: Diffusion of responsibility. <italic>Journal of Personality and Social Psychology, 8</italic>(4 pt. 1), 377-383. https://doi.org/10.1037/h0025589</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Darley</surname>
                            <given-names>J. M</given-names>
                        </name>
                        <name>
                            <surname>Latané</surname>
                            <given-names>B</given-names>
                        </name>
                    </person-group>
                    <year>1968</year>
                    <article-title>Bystander intervention in emergencies: Diffusion of responsibility</article-title>
                    <source>Journal of Personality and Social Psychology</source>
                    <volume>8</volume>
                    <comment>4 pt. 1</comment>
                    <fpage>377</fpage>
                    <lpage>383</lpage>
                    <pub-id pub-id-type="doi">10.1037/h0025589</pub-id>

                </element-citation>
            </ref>
            <ref id="B28">

                <mixed-citation>DeSmet, A., Bastiaensens, S., Van Cleemput, K., Poels, K., Vandebosch, H., Cardon, G., &amp; De Bourdeaudhuij, I. (2016). Deciding whether to look after them, to like it, or leave it: A multidimensional analysis of predictors of positive and negative bystander behavior in cyberbullying among adolescents. <italic>Computers in Human Behavior, 57</italic>, 398-415. https://doi.org/10.1016/j.chb.2015.12.051</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>DeSmet</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Bastiaensens</surname>
                            <given-names>S</given-names>
                        </name>
                        <name>
                            <surname>Van Cleemput</surname>
                            <given-names>K</given-names>
                        </name>
                        <name>
                            <surname>Poels</surname>
                            <given-names>K</given-names>
                        </name>
                        <name>
                            <surname>Vandebosch</surname>
                            <given-names>H</given-names>
                        </name>
                        <name>
                            <surname>Cardon</surname>
                            <given-names>G</given-names>
                        </name>
                        <name>
                            <surname>De Bourdeaudhuij</surname>
                            <given-names>I.</given-names>
                        </name>
                    </person-group>
                    <year>2016</year>
                    <article-title>Deciding whether to look after them, to like it, or leave it: A multidimensional analysis of predictors of positive and negative bystander behavior in cyberbullying among adolescents</article-title>
                    <source>Computers in Human Behavior</source>
                    <volume>57</volume>
                    <fpage>398</fpage>
                    <lpage>415</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.chb.2015.12.051</pub-id>

                </element-citation>
            </ref>
            <ref id="B29">

                <mixed-citation>DeSmet, A., Bastiaensens, S., Van Cleemput, K., Poels, K., Vandebosch, H., Deboutte, G., Herrewijn, L., Malliet, S., Pabian, S., Van Broeckhoven, F., De Troyer, O., Deglorie, G., Van Hoecke, S., Samyn, K., &amp; De Bourdeaudhuij, I. (2018). The efficacy of the Friendly Attac serious digital game to promote prosocial bystander behavior in cyberbullying among young adolescents: A cluster-randomized controlled trial. <italic>Computers in Human Behavior, 78</italic>, 336-347. https://doi.org/10.1016/j.chb.2017.10.011</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>DeSmet</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Bastiaensens</surname>
                            <given-names>S</given-names>
                        </name>
                        <name>
                            <surname>Van Cleemput</surname>
                            <given-names>K</given-names>
                        </name>
                        <name>
                            <surname>Poels</surname>
                            <given-names>K</given-names>
                        </name>
                        <name>
                            <surname>Vandebosch</surname>
                            <given-names>H</given-names>
                        </name>
                        <name>
                            <surname>Deboutte</surname>
                            <given-names>G</given-names>
                        </name>
                        <name>
                            <surname>Herrewijn</surname>
                            <given-names>L</given-names>
                        </name>
                        <name>
                            <surname>Malliet</surname>
                            <given-names>S</given-names>
                        </name>
                        <name>
                            <surname>Pabian</surname>
                            <given-names>S</given-names>
                        </name>
                        <name>
                            <surname>Van Broeckhoven</surname>
                            <given-names>F</given-names>
                        </name>
                        <name>
                            <surname>De Troyer</surname>
                            <given-names>O</given-names>
                        </name>
                        <name>
                            <surname>Deglorie</surname>
                            <given-names>G</given-names>
                        </name>
                        <name>
                            <surname>Van Hoecke</surname>
                            <given-names>S</given-names>
                        </name>
                        <name>
                            <surname>Samyn</surname>
                            <given-names>K</given-names>
                        </name>
                        <name>
                            <surname>De Bourdeaudhuij</surname>
                            <given-names>I.</given-names>
                        </name>
                    </person-group>
                    <year>2018</year>
                    <article-title>The efficacy of the Friendly Attac serious digital game to promote prosocial bystander behavior in cyberbullying among young adolescents: A cluster-randomized controlled trial</article-title>
                    <source>Computers in Human Behavior</source>
                    <volume>78</volume>
                    <fpage>336</fpage>
                    <lpage>347</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.chb.2017.10.011</pub-id>

                </element-citation>
            </ref>
            <ref id="B30">

                <mixed-citation>De Troyer, O., Helalouch, A., &amp; Debruyne, C. (2016). <italic>Towards computer-supported self-debriefing of a serious game against cyber bullying</italic> (Vol. 10653, pp. 374-384). http://doi.org/10.1007/978-3-319-50182-6_34</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>De Troyer</surname>
                            <given-names>O</given-names>
                        </name>
                        <name>
                            <surname>Helalouch</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Debruyne</surname>
                            <given-names>C.</given-names>
                        </name>
                    </person-group>
                    <year>2016</year>
                    <source>Towards computer-supported self-debriefing of a serious game against cyber bullying</source>
                    <volume>10653</volume>
                    <fpage>374</fpage>
                    <lpage>384</lpage>
                    <pub-id pub-id-type="doi">10.1007/978-3-319-50182-6_34</pub-id>

                </element-citation>
            </ref>
            <ref id="B31">

                <mixed-citation>Ferreira, P. C., Veiga Simão, A. M., Paiva, A., &amp; Ferreira, A. (2020) Responsive bystander behaviour in cyberbullying: A path through self-efficacy. <italic>Behaviour &amp; Information Technology, 39</italic>(5), 511-524. https://doi.org/10.1080/0144929X.2019.1602671</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Ferreira</surname>
                            <given-names>P. C</given-names>
                        </name>
                        <name>
                            <surname>Veiga Simão</surname>
                            <given-names>A. M</given-names>
                        </name>
                        <name>
                            <surname>Paiva</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Ferreira</surname>
                            <given-names>A.</given-names>
                        </name>
                    </person-group>
                    <year>2020</year>
                    <article-title>Responsive bystander behaviour in cyberbullying: A path through self-efficacy</article-title>
                    <source>Behaviour &amp; Information Technology</source>
                    <volume>39</volume>
                    <issue>5</issue>
                    <fpage>511</fpage>
                    <lpage>524</lpage>
                    <pub-id pub-id-type="doi">10.1080/0144929X.2019.1602671</pub-id>

                </element-citation>
            </ref>
            <ref id="B32">

                <mixed-citation>Ferreira, P. C., Veiga Simão, A. M., Paiva, A., Martinho, C., Prada, R., Ferreira, A., &amp; Santos, F. (2021). Exploring empathy in cyberbullying with serious games. <italic>Computers &amp; Education, 166</italic>, 104-155. https://doi.org/10.1016/j.compedu.2021.104155</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Ferreira</surname>
                            <given-names>P. C</given-names>
                        </name>
                        <name>
                            <surname>Veiga Simão</surname>
                            <given-names>A. M</given-names>
                        </name>
                        <name>
                            <surname>Paiva</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Martinho</surname>
                            <given-names>C</given-names>
                        </name>
                        <name>
                            <surname>Prada</surname>
                            <given-names>R</given-names>
                        </name>
                        <name>
                            <surname>Ferreira</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Santos</surname>
                            <given-names>F.</given-names>
                        </name>
                    </person-group>
                    <year>2021</year>
                    <article-title>Exploring empathy in cyberbullying with serious games</article-title>
                    <source>Computers &amp; Education</source>
                    <volume>166</volume>
                    <fpage>104</fpage>
                    <lpage>155</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.compedu.2021.104155</pub-id>

                </element-citation>
            </ref>
            <ref id="B33">

                <mixed-citation>Fogg, B. J. (2003)<italic>. Persuasive technology: Using computers to change what we think and do</italic>. Morgan Kaufmann.</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Fogg</surname>
                            <given-names>B. J.</given-names>
                        </name>
                    </person-group>
                    <year>2003</year>
                    <source>Persuasive technology: Using computers to change what we think and do</source>
                    <publisher-name>Morgan Kaufmann</publisher-name>

                </element-citation>
            </ref>
            <ref id="B34">

                <mixed-citation>Foo, N. (2007, December). Social agents. In <italic>Australasian Joint Conference on Artificial Intelligence</italic> (pp. 14-14). Springer. https://doi.org/10.1007/978-3-540-76928-6_2 (2005)</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Foo</surname>
                            <given-names>N</given-names>
                        </name>
                    </person-group>
                    <year>2007</year>
                    <month>12</month>
                    <chapter-title>Social agents</chapter-title>
                    <source>Australasian Joint Conference on Artificial Intelligence</source>
                    <fpage>14</fpage>
                    <lpage>14</lpage>
                    <publisher-name>Springer</publisher-name>
                    <pub-id pub-id-type="doi">10.1007/978-3-540-76928-6_2</pub-id>

                </element-citation>
            </ref>
            <ref id="B35">

                <mixed-citation>Garaigordobil, M., &amp; Martínez-Valderrey, V. (2018). Technological resources to prevent cyberbullying during adolescence: The Cyberprogram 2.0 program and the cooperative Cybereduca 2.0 Videogame. <italic>Frontiers in Psychology, 9</italic>, 1-12. http://doi.org/10.3389/fpsyg.2018.00745</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Garaigordobil</surname>
                            <given-names>M</given-names>
                        </name>
                        <name>
                            <surname>Martínez-Valderrey</surname>
                            <given-names>V.</given-names>
                        </name>
                    </person-group>
                    <year>2018</year>
                    <article-title>Technological resources to prevent cyberbullying during adolescence: The Cyberprogram 2.0 program and the cooperative Cybereduca 2.0 Videogame</article-title>
                    <source>Frontiers in Psychology</source>
                    <volume>9</volume>
                    <fpage>1</fpage>
                    <lpage>12</lpage>
                    <pub-id pub-id-type="doi">10.3389/fpsyg.2018.00745</pub-id>

                </element-citation>
            </ref>
            <ref id="B36">

                <mixed-citation>González, R., &amp; Lay, S. (2017). Sense of responsibility and empathy: Bridging the gap between attributions and helping behaviours. In <italic>Intergroup helping</italic> (pp. 331-347). Springer. https://doi.org/10.1007/978-3-319-53026-0_16</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>González</surname>
                            <given-names>R</given-names>
                        </name>
                        <name>
                            <surname>Lay</surname>
                            <given-names>S.</given-names>
                        </name>
                    </person-group>
                    <year>2017</year>
                    <chapter-title>Sense of responsibility and empathy: Bridging the gap between attributions and helping behaviours</chapter-title>
                    <source>Intergroup helping</source>
                    <fpage>331</fpage>
                    <lpage>347</lpage>
                    <publisher-name>Springer</publisher-name>
                    <pub-id pub-id-type="doi">10.1007/978-3-319-53026-0_16</pub-id>

                </element-citation>
            </ref>
            <ref id="B37">

                <mixed-citation>Guegan, J., Moliner, P., &amp; Buisine, S. (2015). Why are online games so self-involving: A social identity analysis of massively multiplayer online role-playing games. <italic>European Journal of Social Psychology, 45</italic>(3), 349-355. https://doi.org/10.1002/ejsp.2103</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Guegan</surname>
                            <given-names>J</given-names>
                        </name>
                        <name>
                            <surname>Moliner</surname>
                            <given-names>P</given-names>
                        </name>
                        <name>
                            <surname>Buisine</surname>
                            <given-names>S.</given-names>
                        </name>
                    </person-group>
                    <year>2015</year>
                    <article-title>Why are online games so self-involving: A social identity analysis of massively multiplayer online role-playing games</article-title>
                    <source>European Journal of Social Psychology</source>
                    <volume>45</volume>
                    <issue>3</issue>
                    <fpage>349</fpage>
                    <lpage>355</lpage>
                    <pub-id pub-id-type="doi">10.1002/ejsp.2103</pub-id>

                </element-citation>
            </ref>
            <ref id="B38">

                <mixed-citation>Guerra, J. (2017). <italic>Estudio evaluativo de prevención del acoso escolar con un videojuego</italic>. Universidad de Extremadura. https://dialnet.unirioja.es/servlet/tesis?codigo=132873</mixed-citation>

                <element-citation publication-type="webpage">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Guerra</surname>
                            <given-names>J.</given-names>
                        </name>
                    </person-group>
                    <year>2017</year>
                    <source>Estudio evaluativo de prevención del acoso escolar con un videojuego</source>
                    <publisher-name>Universidad de Extremadura</publisher-name>
                    <ext-link ext-link-type="uri" xlink:href="https://dialnet.unirioja.es/servlet/tesis?codigo=132873">https://dialnet.unirioja.es/servlet/tesis?codigo=132873</ext-link>

                </element-citation>
            </ref>
            <ref id="B39">

                <mixed-citation>Hackel, L. M., Zaki, J., &amp; Van Bavel, J. J. (2017). Social identity shapes social valuation: Evidence from prosocial behavior and vicarious reward. <italic>Social Cognitive and Affective Neuroscience, 12</italic>(8), 1219-1228. https://doi.org/10.1093/scan/nsx045</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Hackel</surname>
                            <given-names>L. M</given-names>
                        </name>
                        <name>
                            <surname>Zaki</surname>
                            <given-names>J</given-names>
                        </name>
                        <name>
                            <surname>Van Bavel</surname>
                            <given-names>J. J.</given-names>
                        </name>
                    </person-group>
                    <year>2017</year>
                    <article-title>Social identity shapes social valuation: Evidence from prosocial behavior and vicarious reward</article-title>
                    <source>Social Cognitive and Affective Neuroscience</source>
                    <volume>12</volume>
                    <issue>8</issue>
                    <fpage>1219</fpage>
                    <lpage>1228</lpage>
                    <pub-id pub-id-type="doi">10.1093/scan/nsx045</pub-id>

                </element-citation>
            </ref>
            <ref id="B40">

                <mixed-citation>Hara, H., Sugawara, K., Kinoshita, T., &amp; Uchiya, T. (2002, September). Flexible distributed agent system and its application. In <italic>Proceedings of the 5th Joint Conference of Knowledge-based Software Engineering</italic> (pp. 72-77).</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Hara</surname>
                            <given-names>H</given-names>
                        </name>
                        <name>
                            <surname>Sugawara</surname>
                            <given-names>K</given-names>
                        </name>
                        <name>
                            <surname>Kinoshita</surname>
                            <given-names>T</given-names>
                        </name>
                        <name>
                            <surname>Uchiya</surname>
                            <given-names>T.</given-names>
                        </name>
                    </person-group>
                    <year>2002</year>
                    <month>09</month>
                    <chapter-title>Flexible distributed agent system and its application</chapter-title>
                    <source>Proceedings of the 5th Joint Conference of Knowledge-based Software Engineering</source>
                    <fpage>72</fpage>
                    <lpage>77</lpage>

                </element-citation>
            </ref>
            <ref id="B41">

                <mixed-citation>Heck, R. H., Thomas, S. L., &amp; Tabata, L. N. (2013). <italic>Multilevel and longitudinal modeling with IBM SPSS</italic>. Routledge.</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Heck</surname>
                            <given-names>R. H</given-names>
                        </name>
                        <name>
                            <surname>Thomas</surname>
                            <given-names>S. L</given-names>
                        </name>
                        <name>
                            <surname>Tabata</surname>
                            <given-names>L. N.</given-names>
                        </name>
                    </person-group>
                    <year>2013</year>
                    <source>Multilevel and longitudinal modeling with IBM SPSS</source>
                    <publisher-name>Routledge</publisher-name>

                </element-citation>
            </ref>
            <ref id="B42">

                <mixed-citation>Higashino, M., Imado, T., &amp; Inoue, M. (2019). Design of a computerized educational system about risks of social networking services for children. In <italic>ACM 2nd International Conference on Geoinformatics and Data Analysis, Part F1482</italic> (pp. 89-92). http://doi.org/10.1145/3318236.3318263</mixed-citation>

                <element-citation publication-type="confproc">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Higashino</surname>
                            <given-names>M</given-names>
                        </name>
                        <name>
                            <surname>Imado</surname>
                            <given-names>T</given-names>
                        </name>
                        <name>
                            <surname>Inoue</surname>
                            <given-names>M.</given-names>
                        </name>
                    </person-group>
                    <year>2019</year>
                    <conf-name>Design of a computerized educational system about risks of social networking services for children</conf-name>
                    <source>ACM 2nd International Conference on Geoinformatics and Data Analysis, Part F1482</source>
                    <fpage>89</fpage>
                    <lpage>92</lpage>
                    <pub-id pub-id-type="doi">10.1145/3318236.3318263</pub-id>

                </element-citation>
            </ref>
            <ref id="B43">

                <mixed-citation>Hinduja, S., &amp; Patchin, J. (2009). Bullying, cyberbullying, and suicide. <italic>Archives of Suicide Research: Official Journal of the International Academy for Suicide Research. 14</italic>(3), 206-221. https://doi.org/10.1080/13811118.2010.494133</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Hinduja</surname>
                            <given-names>S</given-names>
                        </name>
                        <name>
                            <surname>Patchin</surname>
                            <given-names>J.</given-names>
                        </name>
                    </person-group>
                    <year>2009</year>
                    <article-title>Bullying, cyberbullying, and suicide</article-title>
                    <source>Archives of Suicide Research: Official Journal of the International Academy for Suicide Research</source>
                    <volume>14</volume>
                    <issue>3</issue>
                    <fpage>206</fpage>
                    <lpage>221</lpage>
                    <pub-id pub-id-type="doi">10.1080/13811118.2010.494133</pub-id>

                </element-citation>
            </ref>
            <ref id="B44">

                <mixed-citation>Hswen, Y., Rubenzahl, L., &amp; Bickham, D. S. (2014). Feasibility of an online and mobile videogame curriculum for teaching children safe and healthy cellphone and internet behaviors. <italic>Games for Health: Research, Development, and Clinical Applications, 3</italic>(4), 252-259. https://doi.org/10.1089/g4h.2013.0074</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Hswen</surname>
                            <given-names>Y</given-names>
                        </name>
                        <name>
                            <surname>Rubenzahl</surname>
                            <given-names>L</given-names>
                        </name>
                        <name>
                            <surname>Bickham</surname>
                            <given-names>D. S.</given-names>
                        </name>
                    </person-group>
                    <year>2014</year>
                    <article-title>Feasibility of an online and mobile videogame curriculum for teaching children safe and healthy cellphone and internet behaviors</article-title>
                    <source>Games for Health: Research, Development, and Clinical Applications</source>
                    <volume>3</volume>
                    <issue>4</issue>
                    <fpage>252</fpage>
                    <lpage>259</lpage>
                    <pub-id pub-id-type="doi">10.1089/g4h.2013.0074</pub-id>

                </element-citation>
            </ref>
            <ref id="B45">

                <mixed-citation>Jakubowski, P., &amp; Lange, A. J. (1978). <italic>The assertive option: Your rights &amp; responsibilities</italic>. Research PressPub.</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Jakubowski</surname>
                            <given-names>P</given-names>
                        </name>
                        <name>
                            <surname>Lange</surname>
                            <given-names>A. J.</given-names>
                        </name>
                    </person-group>
                    <year>1978</year>
                    <source>The assertive option: Your rights &amp; responsibilities</source>
                    <publisher-name>Research PressPub</publisher-name>

                </element-citation>
            </ref>
            <ref id="B46">

                <mixed-citation>Johnson, R. D., Veltri, N. F., &amp; Hornik, S. (2008). Attributions of responsibility toward computing technology: The role of interface social cues and user gender. <italic>International Journal of Human-Computer Interaction</italic>, <italic>24</italic>(6), 595-612. https://doi.org/10.1080/10447310802205784</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Johnson</surname>
                            <given-names>R. D</given-names>
                        </name>
                        <name>
                            <surname>Veltri</surname>
                            <given-names>N. F</given-names>
                        </name>
                        <name>
                            <surname>Hornik</surname>
                            <given-names>S.</given-names>
                        </name>
                    </person-group>
                    <year>2008</year>
                    <article-title>Attributions of responsibility toward computing technology: The role of interface social cues and user gender</article-title>
                    <source>International Journal of Human-Computer Interaction</source>
                    <volume>24</volume>
                    <issue>6</issue>
                    <fpage>595</fpage>
                    <lpage>612</lpage>
                    <pub-id pub-id-type="doi">10.1080/10447310802205784</pub-id>

                </element-citation>
            </ref>
            <ref id="B47">

                <mixed-citation>Kazerooni, F., Taylor, S. H., Bazarova, N. N., &amp; Whitlock, J., (2018). Cyberbullying bystander intervention: The number of offenders and retweeting predict likelihood of helping a cyberbullying victim. <italic>Journal of Computer-Mediated Communication, 23</italic>(3), 146-162. https://doi.org/10.1093/jcmc/zmy005</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Kazerooni</surname>
                            <given-names>F</given-names>
                        </name>
                        <name>
                            <surname>Taylor</surname>
                            <given-names>S. H</given-names>
                        </name>
                        <name>
                            <surname>Bazarova</surname>
                            <given-names>N. N</given-names>
                        </name>
                        <name>
                            <surname>Whitlock</surname>
                            <given-names>J.</given-names>
                        </name>
                    </person-group>
                    <year>2018</year>
                    <article-title>Cyberbullying bystander intervention: The number of offenders and retweeting predict likelihood of helping a cyberbullying victim</article-title>
                    <source>Journal of Computer-Mediated Communication</source>
                    <volume>23</volume>
                    <issue>3</issue>
                    <fpage>146</fpage>
                    <lpage>162</lpage>
                    <pub-id pub-id-type="doi">10.1093/jcmc/zmy005</pub-id>

                </element-citation>
            </ref>
            <ref id="B48">

                <mixed-citation>Klug, J., Ogrin, S., Keller, S., Ihringer, A., &amp; Schmitz, B. (2011). A plea for self-regulated learning as a process: Modelling, measuring and intervening. <italic>Psychological Test and Assessment Modeling, 53</italic>(1), 51-72.</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Klug</surname>
                            <given-names>J</given-names>
                        </name>
                        <name>
                            <surname>Ogrin</surname>
                            <given-names>S</given-names>
                        </name>
                        <name>
                            <surname>Keller</surname>
                            <given-names>S</given-names>
                        </name>
                        <name>
                            <surname>Ihringer</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Schmitz</surname>
                            <given-names>B.</given-names>
                        </name>
                    </person-group>
                    <year>2011</year>
                    <article-title>A plea for self-regulated learning as a process: Modelling, measuring and intervening</article-title>
                    <source>Psychological Test and Assessment Modeling</source>
                    <volume>53</volume>
                    <issue>1</issue>
                    <fpage>51</fpage>
                    <lpage>72</lpage>

                </element-citation>
            </ref>
            <ref id="B49">

                <mixed-citation>Knauf, R., Eschenbeck, H., &amp; Hock, M., (2018). Bystanders of bullying: Social-cognitive and affective reactions to school bullying and cyberbullying. <italic>Cyberpsychology: Journal of Psychosocial Research in Cyberspace, 12</italic> (4), article 3. https://doi.org/10.5817/CP2018-4-3</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Knauf</surname>
                            <given-names>R</given-names>
                        </name>
                        <name>
                            <surname>Eschenbeck</surname>
                            <given-names>H</given-names>
                        </name>
                        <name>
                            <surname>Hock</surname>
                            <given-names>M.</given-names>
                        </name>
                    </person-group>
                    <year>2018</year>
                    <article-title>Bystanders of bullying: Social-cognitive and affective reactions to school bullying and cyberbullying</article-title>
                    <source>Cyberpsychology: Journal of Psychosocial Research in Cyberspace</source>
                    <volume>12</volume>
                    <issue>4</issue>
                    <comment>article 3</comment>
                    <pub-id pub-id-type="doi">10.5817/CP2018-4-3</pub-id>

                </element-citation>
            </ref>
            <ref id="B50">

                <mixed-citation>Laamarti, F., Eid, M., &amp; El Saddik, A. (2014). An overview of serious games. <italic>International Journal of Computer Games Technology, 2014</italic>, 11. https://doi.org/10.1155/2014/358152</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Laamarti</surname>
                            <given-names>F</given-names>
                        </name>
                        <name>
                            <surname>Eid</surname>
                            <given-names>M</given-names>
                        </name>
                        <name>
                            <surname>El Saddik</surname>
                            <given-names>A.</given-names>
                        </name>
                    </person-group>
                    <year>2014</year>
                    <article-title>An overview of serious games</article-title>
                    <source>International Journal of Computer Games Technology</source>
                    <volume>11</volume>
                    <pub-id pub-id-type="doi">10.1155/2014/358152</pub-id>

                </element-citation>
            </ref>
            <ref id="B51">

                <mixed-citation>Lambe, L. J., Cioppa, V. D., Hong, I. K., &amp; Craig, W. M. (2019). Standing up to bullying: A social ecological review of peer defending in offline and online contexts. <italic>Aggression and Violent Behavior, 45</italic>, 51-74. https://doi.org/10.1016/j.avb.2018.05.007</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Lambe</surname>
                            <given-names>L. J</given-names>
                        </name>
                        <name>
                            <surname>Cioppa</surname>
                            <given-names>V. D</given-names>
                        </name>
                        <name>
                            <surname>Hong</surname>
                            <given-names>I. K</given-names>
                        </name>
                        <name>
                            <surname>Craig</surname>
                            <given-names>W. M.</given-names>
                        </name>
                    </person-group>
                    <year>2019</year>
                    <article-title>Standing up to bullying: A social ecological review of peer defending in offline and online contexts</article-title>
                    <source>Aggression and Violent Behavior</source>
                    <volume>45</volume>
                    <fpage>51</fpage>
                    <lpage>74</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.avb.2018.05.007</pub-id>

                </element-citation>
            </ref>
            <ref id="B52">

                <mixed-citation>Latané, B., &amp; Darley, J. (1970). <italic>The unresponsive bystander: Why doesn’t he help?</italic> Appleton-Century Crofts.</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Latané</surname>
                            <given-names>B</given-names>
                        </name>
                        <name>
                            <surname>Darley</surname>
                            <given-names>J.</given-names>
                        </name>
                    </person-group>
                    <year>1970</year>
                    <source>The unresponsive bystander: Why doesn’t he help?</source>
                    <publisher-name>Appleton-Century Crofts</publisher-name>

                </element-citation>
            </ref>
            <ref id="B53">

                <mixed-citation>Latané, B., &amp; Nida, S. (1981). Ten years of research on group size and helping. <italic>Psychological Bulletin, 89</italic>(2), 308. https://doi.org/10.1037/0033-2909.89.2.308</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Latané</surname>
                            <given-names>B</given-names>
                        </name>
                        <name>
                            <surname>Nida</surname>
                            <given-names>S.</given-names>
                        </name>
                    </person-group>
                    <year>1981</year>
                    <article-title>Ten years of research on group size and helping</article-title>
                    <source>Psychological Bulletin</source>
                    <volume>89</volume>
                    <issue>2</issue>
                    <fpage>308</fpage>
                    <lpage>308</lpage>
                    <pub-id pub-id-type="doi">10.1037/0033-2909.89.2.308</pub-id>

                </element-citation>
            </ref>
            <ref id="B54">

                <mixed-citation>Lazarinis, F., Alexandri, K., Panagiotakopoulos, C., &amp; Verykios, V. S. (2020). Sensitizing young children on internet addiction and online safety risks through storytelling in a mobile application. <italic>Education and Information Technologies, 25</italic>(1), 163-174. http://doi.org/10.1007/s10639-019-09952-w</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Lazarinis</surname>
                            <given-names>F</given-names>
                        </name>
                        <name>
                            <surname>Alexandri</surname>
                            <given-names>K</given-names>
                        </name>
                        <name>
                            <surname>Panagiotakopoulos</surname>
                            <given-names>C</given-names>
                        </name>
                        <name>
                            <surname>Verykios</surname>
                            <given-names>V. S.</given-names>
                        </name>
                    </person-group>
                    <year>2020</year>
                    <article-title>Sensitizing young children on internet addiction and online safety risks through storytelling in a mobile application</article-title>
                    <source>Education and Information Technologies</source>
                    <volume>25</volume>
                    <issue>1</issue>
                    <fpage>163</fpage>
                    <lpage>174</lpage>
                    <pub-id pub-id-type="doi">10.1007/s10639-019-09952-w</pub-id>

                </element-citation>
            </ref>
            <ref id="B55">

                <mixed-citation>Linacre, J. M. (2013). <italic>Winsteps Rasch measurement computer program</italic> (version 3.80.1). Winsteps.com.</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Linacre</surname>
                            <given-names>J. M.</given-names>
                        </name>
                    </person-group>
                    <year>2013</year>
                    <source>Winsteps Rasch measurement computer program</source>
                    <comment>version 3.80.1</comment>
                    <comment>Winsteps.com</comment>

                </element-citation>
            </ref>
            <ref id="B56">

                <mixed-citation>Liu, C. H., Yin, X. R., &amp; Huang, P. S. (2021). Cyberbullying: Effect of emergency perception on the helping tendencies of bystanders. <italic>Telematics and Informatics, 62</italic>, Article 101627. https://doi.org/10.1016/j.tele.2021.101627</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Liu</surname>
                            <given-names>C. H</given-names>
                        </name>
                        <name>
                            <surname>Yin</surname>
                            <given-names>X. R</given-names>
                        </name>
                        <name>
                            <surname>Huang</surname>
                            <given-names>P. S.</given-names>
                        </name>
                    </person-group>
                    <year>2021</year>
                    <article-title>Cyberbullying: Effect of emergency perception on the helping tendencies of bystanders</article-title>
                    <source>Telematics and Informatics</source>
                    <volume>62</volume>
                    <comment>Article 101627</comment>
                    <pub-id pub-id-type="doi">10.1016/j.tele.2021.101627</pub-id>

                </element-citation>
            </ref>
            <ref id="B57">

                <mixed-citation>Lo Cricchio, M.G., García-Poole, C., te Brinke, L.W., Bianchi, D., &amp; Menesini, E., (2021). Moral disengagement and cyberbullying involvement: A systematic review. <italic>European Journal of Developmental Psychology, 18</italic>(2), 271-311. https://doi.org/10.1080/17405629.2020.1782186</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Lo Cricchio</surname>
                            <given-names>M.G</given-names>
                        </name>
                        <name>
                            <surname>García-Poole</surname>
                            <given-names>C</given-names>
                        </name>
                        <name>
                            <surname>te Brinke</surname>
                            <given-names>L.W</given-names>
                        </name>
                        <name>
                            <surname>Bianchi</surname>
                            <given-names>D</given-names>
                        </name>
                        <name>
                            <surname>Menesini</surname>
                            <given-names>E.</given-names>
                        </name>
                    </person-group>
                    <year>2021</year>
                    <article-title>Moral disengagement and cyberbullying involvement: A systematic review</article-title>
                    <source>European Journal of Developmental Psychology</source>
                    <volume>18</volume>
                    <issue>2</issue>
                    <fpage>271</fpage>
                    <lpage>311</lpage>
                    <pub-id pub-id-type="doi">10.1080/17405629.2020.1782186</pub-id>

                </element-citation>
            </ref>
            <ref id="B58">

                <mixed-citation>Luo, A., &amp; Bussey, K., (2019). The selectivity of moral disengagement in defenders of cyberbullying: Contextual moral disengagement. <italic>Computers in Human Behavior, 93</italic>, 318-325. https://doi.org/10.1016/j.chb.2018.12.038</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Luo</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Bussey</surname>
                            <given-names>K.</given-names>
                        </name>
                    </person-group>
                    <year>2019</year>
                    <article-title>The selectivity of moral disengagement in defenders of cyberbullying: Contextual moral disengagement</article-title>
                    <source>Computers in Human Behavior</source>
                    <volume>93</volume>
                    <fpage>318</fpage>
                    <lpage>325</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.chb.2018.12.038</pub-id>

                </element-citation>
            </ref>
            <ref id="B59">

                <mixed-citation>Martinho, C., Santos, P., &amp; Prada, R. (2014). <italic>Design e desenvolvimento de jogos</italic> [Game design and development]. FCA Editora de Informática, Lda.</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Martinho</surname>
                            <given-names>C</given-names>
                        </name>
                        <name>
                            <surname>Santos</surname>
                            <given-names>P</given-names>
                        </name>
                        <name>
                            <surname>Prada</surname>
                            <given-names>R.</given-names>
                        </name>
                    </person-group>
                    <year>2014</year>
                    <source>Design e desenvolvimento de jogos</source>
                    <comment>Game design and development</comment>
                    <publisher-name>FCA Editora de Informática, Lda</publisher-name>

                </element-citation>
            </ref>
            <ref id="B60">

                <mixed-citation>McCoach, D. B. (2010). Hierarchical linear modeling. In G. R. Hancock, R.O. Mueller, &amp; L. M. Stapleton (Eds.), <italic>The reviewer’s guide to quantitative methods in the social sciences</italic> (pp. 123-140). Taylor &amp; Francis Group.</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>McCoach</surname>
                            <given-names>D. B.</given-names>
                        </name>
                    </person-group>
                    <year>2010</year>
                    <chapter-title>Hierarchical linear modeling</chapter-title>
                    <person-group person-group-type="editor">
                        <name>
                            <surname>Hancock</surname>
                            <given-names>G. R.</given-names>
                        </name>
                        <name>
                            <surname>Mueller</surname>
                            <given-names>R.O.</given-names>
                        </name>
                        <name>
                            <surname>Stapleton</surname>
                            <given-names>L. M.</given-names>
                        </name>
                    </person-group>
                    <source>The reviewer’s guide to quantitative methods in the social sciences</source>
                    <fpage>123</fpage>
                    <lpage>140</lpage>
                    <publisher-name>Taylor &amp; Francis Group</publisher-name>

                </element-citation>
            </ref>
            <ref id="B61">

                <mixed-citation>Memmott-Elison, M., Padilla-Walker, L. M., Yorgason, J. B., &amp; Coyne, S. M. (2020). Intra-individual associations between intentional self-regulation and prosocial during adolescence: Evidence for bidirectionality. <italic>Journal of Adolescence, 80</italic>, 29-40. https://doi.org/10.1016/j.adolescence.2020.02.001</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Memmott-Elison</surname>
                            <given-names>M</given-names>
                        </name>
                        <name>
                            <surname>Padilla-Walker</surname>
                            <given-names>L. M</given-names>
                        </name>
                        <name>
                            <surname>Yorgason</surname>
                            <given-names>J. B</given-names>
                        </name>
                        <name>
                            <surname>Coyne</surname>
                            <given-names>S. M.</given-names>
                        </name>
                    </person-group>
                    <year>2020</year>
                    <article-title>Intra-individual associations between intentional self-regulation and prosocial during adolescence: Evidence for bidirectionality</article-title>
                    <source>Journal of Adolescence</source>
                    <volume>80</volume>
                    <fpage>29</fpage>
                    <lpage>40</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.adolescence.2020.02.001</pub-id>

                </element-citation>
            </ref>
            <ref id="B62">

                <mixed-citation>Midden, C., &amp; Ham, J. (2009, April). Using negative and positive social feedback from a robotic agent to save energy. In <italic>Proceedings of the 4th International Conference on Persuasive Technology</italic> (pp. 1-6). https://doi.org/10.1145/1541948.1541966</mixed-citation>

                <element-citation publication-type="confproc">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Midden</surname>
                            <given-names>C</given-names>
                        </name>
                        <name>
                            <surname>Ham</surname>
                            <given-names>J.</given-names>
                        </name>
                    </person-group>
                    <year>2009</year>
                    <month>04</month>
                    <conf-name>Using negative and positive social feedback from a robotic agent to save energy</conf-name>
                    <source>Proceedings of the 4th International Conference on Persuasive Technology</source>
                    <fpage>1</fpage>
                    <lpage>6</lpage>
                    <pub-id pub-id-type="doi">10.1145/1541948.1541966</pub-id>

                </element-citation>
            </ref>
            <ref id="B63">

                <mixed-citation>Mikka-Muntuumo, J., Peters, A., &amp; Jazri, H. (2018). CyberBullet – Share your story: An interactive game for stimulating awareness on the harm and negative effects of the internet. In <italic>ACM International Conference Proceeding Series</italic>, 287-290. https://doi.org/10.1145/3283458.3283482</mixed-citation>

                <element-citation publication-type="confproc">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Mikka-Muntuumo</surname>
                            <given-names>J</given-names>
                        </name>
                        <name>
                            <surname>Peters</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Jazri</surname>
                            <given-names>H.</given-names>
                        </name>
                    </person-group>
                    <year>2018</year>
                    <conf-name>CyberBullet – Share your story: An interactive game for stimulating awareness on the harm and negative effects of the internet</conf-name>
                    <source>ACM International Conference Proceeding Series</source>
                    <fpage>287</fpage>
                    <lpage>290</lpage>
                    <pub-id pub-id-type="doi">10.1145/3283458.3283482</pub-id>

                </element-citation>
            </ref>
            <ref id="B64">

                <mixed-citation>Moreno-Bataller, C. B., Segatore-Pittón, M. E., &amp; Tabullo-Tomas, A. J. (2019). Empatía, conducta prosocial y “bullying”. Las acciones de los alumnos espectadores. <italic>Estudios sobre Educación, 37</italic>, 113-134. https://doi.org/10.15581/004.37.113-134</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Moreno-Bataller</surname>
                            <given-names>C. B</given-names>
                        </name>
                        <name>
                            <surname>Segatore-Pittón</surname>
                            <given-names>M. E</given-names>
                        </name>
                        <name>
                            <surname>Tabullo-Tomas</surname>
                            <given-names>A. J.</given-names>
                        </name>
                    </person-group>
                    <year>2019</year>
                    <article-title>Empatía, conducta prosocial y “bullying”. Las acciones de los alumnos espectadores</article-title>
                    <source>Estudios sobre Educación</source>
                    <volume>37</volume>
                    <fpage>113</fpage>
                    <lpage>134</lpage>
                    <pub-id pub-id-type="doi">10.15581/004.37.113-134</pub-id>

                </element-citation>
            </ref>
            <ref id="B65">

                <mixed-citation>Nagin, D., &amp; Tremblay, R. E. (1999). Trajectories of boys’ physical aggression, opposition, and hyperactivity on the path to physically violent and nonviolent juvenile delinquency. <italic>Child Development, 70</italic>(5), 1181-1196. https://doi.org/10.1111/1467-8624.00086</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Nagin</surname>
                            <given-names>D</given-names>
                        </name>
                        <name>
                            <surname>Tremblay</surname>
                            <given-names>R. E.</given-names>
                        </name>
                    </person-group>
                    <year>1999</year>
                    <article-title>Trajectories of boys’ physical aggression, opposition, and hyperactivity on the path to physically violent and nonviolent juvenile delinquency</article-title>
                    <source>Child Development</source>
                    <volume>70</volume>
                    <issue>5</issue>
                    <fpage>1181</fpage>
                    <lpage>1196</lpage>
                    <pub-id pub-id-type="doi">10.1111/1467-8624.00086</pub-id>

                </element-citation>
            </ref>
            <ref id="B66">

                <mixed-citation>Nass, C., &amp; Moon, Y. (2000). Machines and mindlessness: Social responses to computers. <italic>Journal of Social Issues, 56</italic>(1), 81-103. https://doi.org/10.1111/0022-4537.00153</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Nass</surname>
                            <given-names>C</given-names>
                        </name>
                        <name>
                            <surname>Moon</surname>
                            <given-names>Y.</given-names>
                        </name>
                    </person-group>
                    <year>2000</year>
                    <article-title>Machines and mindlessness: Social responses to computers</article-title>
                    <source>Journal of Social Issues</source>
                    <volume>56</volume>
                    <issue>1</issue>
                    <fpage>81</fpage>
                    <lpage>103</lpage>
                    <pub-id pub-id-type="doi">10.1111/0022-4537.00153</pub-id>

                </element-citation>
            </ref>
            <ref id="B67">

                <mixed-citation>Neo, H.-F., Teo, C.-C., &amp; Boon, J. L. H. (2018). Mobile Edutainment learning approach. In <italic>Proceedings of the 2nd International Conference on Digital Technology in Education - ICDTE 2018</italic> (pp. 6-10). ACM Press. http://doi.org/10.1145/3284497.3284500</mixed-citation>

                <element-citation publication-type="confproc">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Neo</surname>
                            <given-names>H.-F</given-names>
                        </name>
                        <name>
                            <surname>Teo</surname>
                            <given-names>C.-C</given-names>
                        </name>
                        <name>
                            <surname>Boon</surname>
                            <given-names>J. L. H.</given-names>
                        </name>
                    </person-group>
                    <year>2018</year>
                    <conf-name>Mobile Edutainment learning approach</conf-name>
                    <source>Proceedings of the 2nd International Conference on Digital Technology in Education - ICDTE 2018</source>
                    <fpage>6</fpage>
                    <lpage>10</lpage>
                    <publisher-name>ACM Press</publisher-name>
                    <pub-id pub-id-type="doi">10.1145/3284497.3284500</pub-id>

                </element-citation>
            </ref>
            <ref id="B68">

                <mixed-citation>Obermaier, M., Fawzi, N., &amp; Koch, T. (2016). Bystanding or standing by? How the number of bystanders affects the intention to intervene in cyberbullying. <italic>New Media &amp; Society, 18</italic>(8), 1491-1507. https://doi.org/10.1177/1461444814563519</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Obermaier</surname>
                            <given-names>M</given-names>
                        </name>
                        <name>
                            <surname>Fawzi</surname>
                            <given-names>N</given-names>
                        </name>
                        <name>
                            <surname>Koch</surname>
                            <given-names>T.</given-names>
                        </name>
                    </person-group>
                    <year>2016</year>
                    <article-title>Bystanding or standing by? How the number of bystanders affects the intention to intervene in cyberbullying</article-title>
                    <source>New Media &amp; Society</source>
                    <volume>18</volume>
                    <issue>8</issue>
                    <fpage>1491</fpage>
                    <lpage>1507</lpage>
                    <pub-id pub-id-type="doi">10.1177/1461444814563519</pub-id>

                </element-citation>
            </ref>
            <ref id="B69">

                <mixed-citation>Ohmoto, Y., Morimoto, T., &amp; Nishida, T. (2017). Effects of the perspectives that influenced on the human mental stance in the multiple-to-multiple human-agent interaction. <italic>Procedia Computer Science, 112</italic>, 1506-1515. https://doi.org/10.1016/j.procs.2017.08.046</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Ohmoto</surname>
                            <given-names>Y</given-names>
                        </name>
                        <name>
                            <surname>Morimoto</surname>
                            <given-names>T</given-names>
                        </name>
                        <name>
                            <surname>Nishida</surname>
                            <given-names>T.</given-names>
                        </name>
                    </person-group>
                    <year>2017</year>
                    <article-title>Effects of the perspectives that influenced on the human mental stance in the multiple-to-multiple human-agent interaction</article-title>
                    <source>Procedia Computer Science</source>
                    <volume>112</volume>
                    <fpage>1506</fpage>
                    <lpage>1515</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.procs.2017.08.046</pub-id>

                </element-citation>
            </ref>
            <ref id="B70">

                <mixed-citation>Olenik-Shemesh, D., Heiman, T., &amp; Rabin, E. (2014). Virtual anti-bullying village project for coping with bullying and cyberbullying within a 3D virtual learning environment: Evaluation research. <italic>International Journal of Cyber Society and Education, 7</italic>(2), 97-124. http://doi.org/10.7903/ijcse.1147</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Olenik-Shemesh</surname>
                            <given-names>D</given-names>
                        </name>
                        <name>
                            <surname>Heiman</surname>
                            <given-names>T</given-names>
                        </name>
                        <name>
                            <surname>Rabin</surname>
                            <given-names>E.</given-names>
                        </name>
                    </person-group>
                    <year>2014</year>
                    <article-title>Virtual anti-bullying village project for coping with bullying and cyberbullying within a 3D virtual learning environment: Evaluation research</article-title>
                    <source>International Journal of Cyber Society and Education</source>
                    <volume>7</volume>
                    <issue>2</issue>
                    <fpage>97</fpage>
                    <lpage>124</lpage>
                    <pub-id pub-id-type="doi">10.7903/ijcse.1147</pub-id>

                </element-citation>
            </ref>
            <ref id="B71">

                <mixed-citation>Paiva, A., Dias, J., Sobral, D., Aylett, R., Woods, S., Hall, L., &amp; Zoll, C. (2005). Learning by feeling: Evoking empathy with synthetic characters. <italic>Applied Artificial Intelligence, 19</italic>(3-4), 235-266. https://doi.org/10.1080/08839510590910165</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Paiva</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Dias</surname>
                            <given-names>J</given-names>
                        </name>
                        <name>
                            <surname>Sobral</surname>
                            <given-names>D</given-names>
                        </name>
                        <name>
                            <surname>Aylett</surname>
                            <given-names>R</given-names>
                        </name>
                        <name>
                            <surname>Woods</surname>
                            <given-names>S</given-names>
                        </name>
                        <name>
                            <surname>Hall</surname>
                            <given-names>L</given-names>
                        </name>
                        <name>
                            <surname>Zoll</surname>
                            <given-names>C.</given-names>
                        </name>
                    </person-group>
                    <year>2005</year>
                    <article-title>Learning by feeling: Evoking empathy with synthetic characters</article-title>
                    <source>Applied Artificial Intelligence</source>
                    <volume>19</volume>
                    <issue>3-4</issue>
                    <fpage>235</fpage>
                    <lpage>266</lpage>
                    <pub-id pub-id-type="doi">10.1080/08839510590910165</pub-id>

                </element-citation>
            </ref>
            <ref id="B72">

                <mixed-citation>Pilarski, P. M., Butcher, A., Johanson, M., Botvinick, M. M., Bolt, A., &amp; Parker, A. S. (2019). Learned human-agent decision-making, communication and joint action in a virtual reality environment. <italic>arXiv preprint arXiv:1905.02691</italic>.</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Pilarski</surname>
                            <given-names>P. M</given-names>
                        </name>
                        <name>
                            <surname>Butcher</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Johanson</surname>
                            <given-names>M</given-names>
                        </name>
                        <name>
                            <surname>Botvinick</surname>
                            <given-names>M. M</given-names>
                        </name>
                        <name>
                            <surname>Bolt</surname>
                            <given-names>A</given-names>
                        </name>
                        <name>
                            <surname>Parker</surname>
                            <given-names>A. S.</given-names>
                        </name>
                    </person-group>
                    <year>2019</year>
                    <article-title>Learned human-agent decision-making, communication and joint action in a virtual reality environment</article-title>
                    <source>arXiv preprint arXiv:1905.02691</source>

                </element-citation>
            </ref>
            <ref id="B73">

                <mixed-citation>Romera, E. M., Ortega-Ruiz, R., Runions, K., &amp; Falla, D. (2021). Moral disengagement strategies in online and offline bullying. <italic>Psychosocial Intervention, 30</italic>(2), 85-93. https://doi.org/10.5093/pi2020a21</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Romera</surname>
                            <given-names>E. M</given-names>
                        </name>
                        <name>
                            <surname>Ortega-Ruiz</surname>
                            <given-names>R</given-names>
                        </name>
                        <name>
                            <surname>Runions</surname>
                            <given-names>K</given-names>
                        </name>
                        <name>
                            <surname>Falla</surname>
                            <given-names>D.</given-names>
                        </name>
                    </person-group>
                    <year>2021</year>
                    <article-title>Moral disengagement strategies in online and offline bullying</article-title>
                    <source>Psychosocial Intervention</source>
                    <volume>30</volume>
                    <issue>2</issue>
                    <fpage>85</fpage>
                    <lpage>93</lpage>
                    <pub-id pub-id-type="doi">10.5093/pi2020a21</pub-id>

                </element-citation>
            </ref>
            <ref id="B74">

                <mixed-citation>Ruijten, P. A., Midden, C. J., &amp; Ham, J. (2015). Lonely and susceptible: The influence of social exclusion and gender on persuasion by an artificial agent. <italic>International Journal of Human-Computer Interaction, 31</italic>(11), 832-842. https://doi.org/10.1080/10447318.2015.1067480</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Ruijten</surname>
                            <given-names>P. A</given-names>
                        </name>
                        <name>
                            <surname>Midden</surname>
                            <given-names>C. J</given-names>
                        </name>
                        <name>
                            <surname>Ham</surname>
                            <given-names>J.</given-names>
                        </name>
                    </person-group>
                    <year>2015</year>
                    <article-title>Lonely and susceptible: The influence of social exclusion and gender on persuasion by an artificial agent</article-title>
                    <source>International Journal of Human-Computer Interaction</source>
                    <volume>31</volume>
                    <issue>11</issue>
                    <fpage>832</fpage>
                    <lpage>842</lpage>
                    <pub-id pub-id-type="doi">10.1080/10447318.2015.1067480</pub-id>

                </element-citation>
            </ref>
            <ref id="B75">

                <mixed-citation>Schmitz, B., &amp; Wiese, B. (2006). New perspectives for the evaluation of training lessons in self-regulated learning: Time-series analyses of diary task data. <italic>Contemporary Educational Psychology, 31</italic>(1), 64-96. https://doi.org/10.1016/j.cedpsych.2005.02.002</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Schmitz</surname>
                            <given-names>B</given-names>
                        </name>
                        <name>
                            <surname>Wiese</surname>
                            <given-names>B.</given-names>
                        </name>
                    </person-group>
                    <year>2006</year>
                    <article-title>New perspectives for the evaluation of training lessons in self-regulated learning: Time-series analyses of diary task data</article-title>
                    <source>Contemporary Educational Psychology</source>
                    <volume>31</volume>
                    <issue>1</issue>
                    <fpage>64</fpage>
                    <lpage>96</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.cedpsych.2005.02.002</pub-id>

                </element-citation>
            </ref>
            <ref id="B76">

                <mixed-citation>Shotland, R. L., &amp; Stebbins, C. A. (1983). Emergency and cost as determinants of helping behavior and the slow accumulation of social psychological knowledge. <italic>Social Psychology Quarterly, 46</italic> (1), 36. https://doi.org/10.2307/3033659</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Shotland</surname>
                            <given-names>R. L</given-names>
                        </name>
                        <name>
                            <surname>Stebbins</surname>
                            <given-names>C. A.</given-names>
                        </name>
                    </person-group>
                    <year>1983</year>
                    <article-title>Emergency and cost as determinants of helping behavior and the slow accumulation of social psychological knowledge</article-title>
                    <source>Social Psychology Quarterly</source>
                    <volume>46</volume>
                    <issue>1</issue>
                    <fpage>36</fpage>
                    <lpage>36</lpage>
                    <pub-id pub-id-type="doi">10.2307/3033659</pub-id>

                </element-citation>
            </ref>
            <ref id="B77">

                <mixed-citation>Silver, E., &amp; Silver, J. R. (2019). Morality and self-control: The role of binding and individualizing moral motives. <italic>Deviant Behavior, 42</italic>(3), 366-385. https://doi.org/10.1080/01639625.2019.1678580</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Silver</surname>
                            <given-names>E</given-names>
                        </name>
                        <name>
                            <surname>Silver</surname>
                            <given-names>J. R.</given-names>
                        </name>
                    </person-group>
                    <year>2019</year>
                    <article-title>Morality and self-control: The role of binding and individualizing moral motives</article-title>
                    <source>Deviant Behavior</source>
                    <volume>42</volume>
                    <issue>3</issue>
                    <fpage>366</fpage>
                    <lpage>385</lpage>
                    <pub-id pub-id-type="doi">10.1080/01639625.2019.1678580</pub-id>

                </element-citation>
            </ref>
            <ref id="B78">

                <mixed-citation>Singer, J. D., Willett, J. B., &amp; Willett, J. B. (2003). <italic>Applied longitudinal data analysis: Modeling change and event occurrence</italic>. Oxford University Press.</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Singer</surname>
                            <given-names>J. D</given-names>
                        </name>
                        <name>
                            <surname>Willett</surname>
                            <given-names>J. B</given-names>
                        </name>
                        <name>
                            <surname>Willett</surname>
                            <given-names>J. B.</given-names>
                        </name>
                    </person-group>
                    <year>2003</year>
                    <source>Applied longitudinal data analysis: Modeling change and event occurrence</source>
                    <publisher-name>Oxford University Press</publisher-name>

                </element-citation>
            </ref>
            <ref id="B79">

                <mixed-citation>Solomon, L.Z., Solomon, H., &amp; Stone, R. (1978). Helping as a function of number of bystanders and ambiguity of emergency. <italic>Personality and Social Psychological Bulletin 4</italic>(2), 318-321. https://doi.org/10.1177/014616727800400231</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Solomon</surname>
                            <given-names>L.Z</given-names>
                        </name>
                        <name>
                            <surname>Solomon</surname>
                            <given-names>H</given-names>
                        </name>
                        <name>
                            <surname>Stone</surname>
                            <given-names>R.</given-names>
                        </name>
                    </person-group>
                    <year>1978</year>
                    <article-title>Helping as a function of number of bystanders and ambiguity of emergency</article-title>
                    <source>Personality and Social Psychological Bulletin</source>
                    <volume>4</volume>
                    <issue>2</issue>
                    <fpage>318</fpage>
                    <lpage>321</lpage>
                    <pub-id pub-id-type="doi">10.1177/014616727800400231</pub-id>

                </element-citation>
            </ref>
            <ref id="B80">

                <mixed-citation>Souza, S. B., Veiga Simão, A. M., Ferreira, A. I., &amp; Ferreira, P. C. (2018). University students’ perceptions of campus climate, cyberbullying and cultural issues: implications for theory and practice. <italic>Studies in Higher Education, 43</italic>(11), 2072-2087. https://doi.org/10.1080/03075079.2017.1307818</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Souza</surname>
                            <given-names>S. B</given-names>
                        </name>
                        <name>
                            <surname>Veiga Simão</surname>
                            <given-names>A. M</given-names>
                        </name>
                        <name>
                            <surname>Ferreira</surname>
                            <given-names>A. I</given-names>
                        </name>
                        <name>
                            <surname>Ferreira</surname>
                            <given-names>P. C</given-names>
                        </name>
                    </person-group>
                    <year>2018</year>
                    <article-title>University students’ perceptions of campus climate, cyberbullying and cultural issues: implications for theory and practice</article-title>
                    <source>Studies in Higher Education</source>
                    <volume>43</volume>
                    <issue>11</issue>
                    <fpage>2072</fpage>
                    <lpage>2087</lpage>
                    <pub-id pub-id-type="doi">10.1080/03075079.2017.1307818</pub-id>

                </element-citation>
            </ref>
            <ref id="B81">

                <mixed-citation>Tajfel, H., &amp; Turner, J. C. (1979). An integrative theory of intergroup conflict. In W. G. Austin &amp; S. Worchel (Eds.), <italic>The social psychology of intergroup relations</italic> (pp. 33-47). Brooks/Cole.</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Tajfel</surname>
                            <given-names>H</given-names>
                        </name>
                        <name>
                            <surname>Turner</surname>
                            <given-names>J. C.</given-names>
                        </name>
                    </person-group>
                    <year>1979</year>
                    <chapter-title>An integrative theory of intergroup conflict</chapter-title>
                    <person-group person-group-type="editor">
                        <name>
                            <surname>Austin</surname>
                            <given-names>W. G.</given-names>
                        </name>
                        <name>
                            <surname>Worchel</surname>
                            <given-names>S.</given-names>
                        </name>
                    </person-group>
                    <source>The social psychology of intergroup relations</source>
                    <fpage>33</fpage>
                    <lpage>47</lpage>
                    <publisher-name>Brooks/Cole</publisher-name>

                </element-citation>
            </ref>
            <ref id="B82">

                <mixed-citation>Tajfel, H., &amp; Turner, J. C. (1986). The social identity theory of intergroup behaviour. In S. Worchel &amp; W. G. Austin (Eds.), <italic>Psychology of intergroup relations</italic> (pp. 7-24). Nelson-Hall.</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Tajfel</surname>
                            <given-names>H</given-names>
                        </name>
                        <name>
                            <surname>Turner</surname>
                            <given-names>J. C.</given-names>
                        </name>
                    </person-group>
                    <year>1986</year>
                    <chapter-title>The social identity theory of intergroup behaviour</chapter-title>
                    <person-group person-group-type="editor">
                        <name>
                            <surname>Worchel</surname>
                            <given-names>S.</given-names>
                        </name>
                        <name>
                            <surname>Austin</surname>
                            <given-names>W. G.</given-names>
                        </name>
                    </person-group>
                    <source>Psychology of intergroup relations</source>
                    <fpage>7</fpage>
                    <lpage>24</lpage>
                    <publisher-name>Nelson-Hall</publisher-name>

                </element-citation>
            </ref>
            <ref id="B83">

                <mixed-citation>Turner, J. C. (1999). Some current issues in research on social identity and self-categorization theories. In N. Ellemers, R. Spears, &amp; B. Doosje (Eds.), <italic>Social identity</italic> (pp. 6-34). Blackwell.</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Turner</surname>
                            <given-names>J. C.</given-names>
                        </name>
                    </person-group>
                    <year>1999</year>
                    <chapter-title>Some current issues in research on social identity and self-categorization theories</chapter-title>
                    <person-group person-group-type="editor">
                        <name>
                            <surname>Ellemers</surname>
                            <given-names>N.</given-names>
                        </name>
                        <name>
                            <surname>Spears</surname>
                            <given-names>R.</given-names>
                        </name>
                        <name>
                            <surname>Doosje</surname>
                            <given-names>B.</given-names>
                        </name>
                    </person-group>
                    <source>Social identity</source>
                    <fpage>6</fpage>
                    <lpage>34</lpage>
                    <publisher-name>Blackwell</publisher-name>

                </element-citation>
            </ref>
            <ref id="B84">

                <mixed-citation>Turner, J. C., &amp; Oakes, P. J. (1986). The significance of the social identity concept for social psychology with reference to individualism, interactionism and social influence. <italic>British Journal of Social Psychology, 25</italic>(3), 237-252. https://doi.org/10.1111/j.2044-8309.1986.tb00732.x</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Turner</surname>
                            <given-names>J. C</given-names>
                        </name>
                        <name>
                            <surname>Oakes</surname>
                            <given-names>P. J.</given-names>
                        </name>
                    </person-group>
                    <year>1986</year>

                    <article-title>The significance of the social identity concept for social psychology with reference to individualism, interactionism and social influence</article-title>
                    <source>British Journal of Social Psychology</source>
                    <volume>25</volume>
                    <issue>3</issue>
                    <fpage>237</fpage>
                    <lpage>252</lpage>
                    <pub-id pub-id-type="doi">10.1111/j.2044-8309.1986.tb00732.x</pub-id>

                </element-citation>
            </ref>
            <ref id="B85">

                <mixed-citation>Turner, J. C., &amp; Reynolds, K. J. (2010). The story of social identity. In T. Postmes &amp; N. Branscombe (Eds.). <italic>Rediscovering social identity: Core sources</italic>. Psychology Press.</mixed-citation>

                <element-citation publication-type="book">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Turner</surname>
                            <given-names>J. C</given-names>
                        </name>
                        <name>
                            <surname>Reynolds</surname>
                            <given-names>K. J.</given-names>
                        </name>
                    </person-group>
                    <year>2010</year>
                    <chapter-title>The story of social identity</chapter-title>
                    <person-group person-group-type="editor">
                        <name>
                            <surname>Postmes</surname>
                            <given-names>T.</given-names>
                        </name>
                        <name>
                            <surname>Branscombe</surname>
                            <given-names>N.</given-names>
                        </name>
                    </person-group>
                    <source>Rediscovering social identity: Core sources</source>
                    <publisher-name>Psychology Press</publisher-name>

                </element-citation>
            </ref>
            <ref id="B86">

                <mixed-citation>Valdés-Cuervo, A. A., Alcántar-Nieblas, C., Parra-Pérez, L. G., Torres-Acuña, G. M., Álvarez-Montero, F. J., &amp; Reyes-Sosa, H. (2021). Unique and interactive effects of guilt and sympathy on bystander aggressive defender intervention in cyberbullying: The mediation of self-regulation. <italic>Computers in Human Behavior, 122</italic>, Article 106842. https://doi.org/10.1016/j.chb.2021.106842</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Valdés-Cuervo</surname>
                            <given-names>A. A</given-names>
                        </name>
                        <name>
                            <surname>Alcántar-Nieblas</surname>
                            <given-names>C</given-names>
                        </name>
                        <name>
                            <surname>Parra-Pérez</surname>
                            <given-names>L. G</given-names>
                        </name>
                        <name>
                            <surname>Torres-Acuña</surname>
                            <given-names>G. M</given-names>
                        </name>
                        <name>
                            <surname>Álvarez-Montero</surname>
                            <given-names>F. J</given-names>
                        </name>
                        <name>
                            <surname>Reyes-Sosa</surname>
                            <given-names>H.</given-names>
                        </name>
                    </person-group>
                    <year>2021</year>
                    <article-title>Unique and interactive effects of guilt and sympathy on bystander aggressive defender intervention in cyberbullying: The mediation of self-regulation</article-title>
                    <source>Computers in Human Behavior</source>
                    <volume>122</volume>
                    <comment>Article 106842</comment>
                    <pub-id pub-id-type="doi">10.1016/j.chb.2021.106842</pub-id>

                </element-citation>
            </ref>
            <ref id="B87">

                <mixed-citation>van der Wal, C. N. (2012). <italic>Social agents: Agent-based modelling of integrated internal and social dynamics of cognitive and affective processes</italic> (Doctoral dissertation). Vrije University. Amsterdam. https://research.vu.nl/en/publications/social-agents-agent-based-modelling-of-integrated-internal-and-so</mixed-citation>

                <element-citation publication-type="thesis">
                    <person-group person-group-type="author">
                        <name>
                            <surname>van der Wal</surname>
                            <given-names>C. N.</given-names>
                        </name>
                    </person-group>
                    <year>2012</year>
                    <source>Social agents: Agent-based modelling of integrated internal and social dynamics of cognitive and affective processes</source>
                    <comment>Doctoral dissertation</comment>
                    <publisher-name>Vrije University</publisher-name>
                    <publisher-loc>Amsterdam</publisher-loc>
                    <ext-link ext-link-type="uri" xlink:href="https://research.vu.nl/en/publications/social-agents-agent-based-modelling-of-integrated-internal-and-so">https://research.vu.nl/en/publications/social-agents-agent-based-modelling-of-integrated-internal-and-so</ext-link>

                </element-citation>
            </ref>
            <ref id="B88">

                <mixed-citation>Veiga Simão, A. M., Ferreira, P. C., Pereira, N., Oliveira, S., Paulino, P., Rosa, H., Ribeiro, R., Coheur, L., Carvalho, J. P., &amp; Trancoso, I. (2021). Prosociality in cyberspace: Developing emotion and behavioral regulation to decrease aggressive communication. <italic>Cognitive Computation, 13</italic>(3), 736-750. https://doi.org/10.1007/s12559-021-09852-7</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Veiga Simão</surname>
                            <given-names>A. M</given-names>
                        </name>
                        <name>
                            <surname>Ferreira</surname>
                            <given-names>P. C</given-names>
                        </name>
                        <name>
                            <surname>Pereira</surname>
                            <given-names>N</given-names>
                        </name>
                        <name>
                            <surname>Oliveira</surname>
                            <given-names>S</given-names>
                        </name>
                        <name>
                            <surname>Paulino</surname>
                            <given-names>P</given-names>
                        </name>
                        <name>
                            <surname>Rosa</surname>
                            <given-names>H</given-names>
                        </name>
                        <name>
                            <surname>Ribeiro</surname>
                            <given-names>R</given-names>
                        </name>
                        <name>
                            <surname>Coheur</surname>
                            <given-names>L</given-names>
                        </name>
                        <name>
                            <surname>Carvalho</surname>
                            <given-names>J. P</given-names>
                        </name>
                        <name>
                            <surname>Trancoso</surname>
                            <given-names>I.</given-names>
                        </name>
                    </person-group>
                    <year>2021</year>
                    <article-title>Prosociality in cyberspace: Developing emotion and behavioral regulation to decrease aggressive communication</article-title>
                    <source>Cognitive Computation</source>
                    <volume>13</volume>
                    <issue>3</issue>
                    <fpage>736</fpage>
                    <lpage>750</lpage>
                    <pub-id pub-id-type="doi">10.1007/s12559-021-09852-7</pub-id>

                </element-citation>
            </ref>
            <ref id="B89">

                <mixed-citation>Yalcin Ö. N., &amp; DiPaola, S. (2018). A computational model of empathy for interactive agents. <italic>Biologically Inspired Cognitive Architectures, 26</italic>, 20-25. https://doi.org/10.1016/j.bica.2018.07.010</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Yalcin</surname>
                            <given-names>Ö. N.</given-names>
                        </name>
                        <name>
                            <surname>DiPaola</surname>
                            <given-names>S.</given-names>
                        </name>
                    </person-group>
                    <year>2018</year>
                    <article-title>A computational model of empathy for interactive agents</article-title>
                    <source>Biologically Inspired Cognitive Architectures</source>
                    <volume>26</volume>
                    <fpage>20</fpage>
                    <lpage>25</lpage>
                    <pub-id pub-id-type="doi">10.1016/j.bica.2018.07.010</pub-id>

                </element-citation>
            </ref>
            <ref id="B90">

                <mixed-citation>Zimmerman, B. J. (2013). From cognitive modeling to self-regulation: A social cognitive career path. <italic>Educational Psychologist, 48</italic>(3), 135-147. https://doi.org/10.1080/00461520.2013.794676</mixed-citation>

                <element-citation publication-type="journal">
                    <person-group person-group-type="author">
                        <name>
                            <surname>Zimmerman</surname>
                            <given-names>B. J.</given-names>
                        </name>
                    </person-group>
                    <year>2013</year>
                    <article-title>From cognitive modeling to self-regulation: A social cognitive career path</article-title>
                    <source>Educational Psychologist</source>
                    <volume>48</volume>
                    <issue>3</issue>
                    <fpage>135</fpage>
                    <lpage>147</lpage>
                    <pub-id pub-id-type="doi">10.1080/00461520.2013.794676</pub-id>

                </element-citation>
            </ref>
        </ref-list>
        <app-group>
            <app id="app01">
                <label>Appendix</label>
                <title>Com@Viver: A Serious Game-based Psychosocial Intervention to Foster Prosociality</title>
                <p>The Com@Viver game includes an introductory session (session 0) where players learn how to play, a diagnostic session (session 1) with no intervention, and three remaining intervention sessions (2, 3, and 4) based on the social-cognitive approach to self-regulation (<xref ref-type="bibr" rid="B90">Zimmerman, 2013</xref>). At the end of each session, players also express their self-reflections about the cyberbullying situation in the game (i.e., how they felt, what they thought, and why they voted for a specific team).</p>
                <p>In the second, third, and fourth sessions, specific self-regulation strategies are presented to players by a social agent (with the function of guidance counsellor) to aid them in reflecting on their decisions and in regulating their behavior. This type of information is displayed prior to the interactions with the social agents and their real-life peers in these latter sessions. These self-regulation strategies are presented as follows: 1) think about what the other person is feeling. (perspective taking through forethought), 2) plan how you are going to respond (intentionality through strategic planning), 3) respect everyone while communicating your thoughts (self-reactiveness through prosocial performance), and 4) reflect about the consequences of your responses (self-reflectiveness through self-examination).</p>
                <p>This type of strategic guidance is also offered as feedback (about players’ behavior in the previous session) in the following session before players interact with the social agents and their peers. This feedback includes suggestions about the consequences of their behavior, how they can self-regulate their behavior toward prosociality and alludes to what was said in the previous session as a form of contextualization. As an example, at the beginning of a session, the following information is presented:</p>
                <p>“In the last session, Carmen (the cyberbully) sent an aggressive post about Estrela.” Some bystander reactions to this post were”: 1) “It’s none of my business”, 2) “What the heck. Estrela deserves our respect”, 3) “I think she deserves it!”, 4) “I understand both sides and why you’re both angry, but I don’t like to see you like this.”</p>
                <p>“Reading these bystander behavioral reactions of the cyberbullying event could lead to different consequences.” The first behavioral reaction could “lead to no one assuming responsibility for intervening, making matters worse.” The second behavioral reaction could “lead Estrela to feel respected and other colleagues might also help her.” The third behavioral reaction could “lead to not understanding Estrela’s perspective, blaming her for what happened.” The fourth behavioral reaction could “lead both Carmen and Estrela to feel understood and others might think better before responding to try and resolve the situation”.</p>
                <p>The game starts with a storyline in an immersive school context where social agents are depicted as peers with different profiles, a profile picture, and a background story to increase players’ engagement and interaction. Some of the social agents’ characteristics potentially resemble some of the players so they can identify more easily with them. A total of twelve social agents are presented in the storyline, five of which belong to the players’ in-group of friends to create proximity, while the remaining agents belong to the out-group.</p>
                <p>The players’ main objective is to earn a place on this year’s bus field trip, where there are a limited number of seats. To do so, each group of three players log onto the same network and perform activities to organize the trip as they interact with each other and the social agents on a fictitious social network during gameplay.</p>
                <p>This social network is composed of a public area, which is the feed, and a private area, which is the chatroom. Additionally, each player can select a profile photo and create their identity in the game to personalize the game experience. The players and social agents are divided into five work groups (i.e., players are all in one group) with different activities to complete for the field trip. At the end of each session, players and social agents vote for the three groups they think should go on the field trip. The three groups with the most votes at the end of the game go on the trip.</p>
                <p>Cyberbullying situations emerge as posts in the feed during gameplay. Players are bystanders in these immersive cyberbullying situations, whereas social agents are cybervictims, cyberbullies, and other bystanders, who generate posts and chats in humanlike interaction. Players may react to these situations by posting likes/dislikes or by posting predefined comments on their feed or in the chatroom. The text of the different posts is predefined so that players are unable to bully each other or the social agents on the network. Players’ behavior influences whether the social agents vote for them to go on the field trip.</p>
                <p>The game offers social feedback in the form of the chatroom to provide a more realistic social interaction. The chatroom is a private area of interaction between the players and one or two agents. In this area, players and agents exchange messages about the cyberbullying case they have just witnessed.</p>
                <p>Simulations of cyberbullying incidents (cases) were provided based on real stories and the actual language (Ritterfeld et al., 2009) that was used in these contexts to observe behavioral change in players. Each cyberbullying case had an aggressor, a victim, and bystanders. Only social agents were victims and aggressors in the game. Bystanders were both social agents and players. Some social agent bystanders showed behavior in favour of aggression, whereas others revealed they are in favour of the victim. Others did not react to the situations. There were a total of 4 explicit cyberbullying situations: case 1, with a victim and an aggressor that are not in the players’ in group; case 2, with a victim and an aggressor of the players’ in group; case 3, a victim of the players’ in group and an aggressor of the out group; and case 4, with a victim of the out group and an aggressor of the players’ in group.</p>
                <fig id="f07">
                    <label>Figure 1</label>
                    <caption>
                        <title>Examples of the Social Agents’ Profiles in the Serious Game Com@Viver.</title>
                    </caption>
                    <graphic xlink:href="1132-0559-inter-31-2-0083-gf07.jpg"/>
                </fig>
                <fig id="f08">
                    <label>Figure 2</label>
                    <caption>
                        <title>A Representation of the First Hypothetical Cyberbullying Case.</title>
                    </caption>
                    <graphic xlink:href="1132-0559-inter-31-2-0083-gf08.jpg"/>
                </fig>
                <p>Com@Viver is a fictional social network site (SNS) whose content was generated by AA (a thread created by the SNS Management which generates content for the SNS where each thread is responsible for an individual network). It runs in any browser although the latest version was built of Chrome (66.0.3359.181) which was the default browser available in all the schools at the time of the intervention. This website has a client-server relationship with a Representational State Transfer (REST) Application Programming Interface (API) server that was hosted on AmazonWeb Services (AWS) (On a t2.micro machine). The back-end was developed using Spring Boot and a Java Persistence API (JPA) database while the front-end is a combination of Hypertext Markup Language (HTML), Cascading Style Sheets (CSS), JavaScript (JS), and jQuery.</p>
                <p>We avoided polling which occurs in the front-end and is the act of constantly checking with the back-end if there is new information. Our network could not function as a regular SNS, since in our implementation, players had to be notified whenever there was a new post, because we wanted to study their reactions to the content of the network. We had to confirm that players saw the content and interacted with it.</p>
                <p>We used Simple (or Streaming) Text Oriented Message Protocol (STOMP), a technology that allows us to notify the front-end through specific endpoints about new or updated information, which is supported by websockets (SockJS3) that allow a continuous communication between the back-end and the front-end. This function is not present in the communication protocol of REST APIs, the Hypertext Transfer Protocol (HTTP). With STOMP4 technology we were able to not only inform the user about new content, but also incrementally update the front-end without having to refresh the page and making unnecessary requests to the server.</p>
            </app>
        </app-group>
    </back>
</article>
