

PHYSIOLOGICAL EFFECTS AND ADDICTIVE BEHAVIORS ASSOCIATED WITH VIRTUAL REALITY (VR) GAMING
Abstract
References
Smith, J. A., & Brown, R. L. (2021). The impact of virtual reality on user health: A systematic review. Journal of Digital Health, 15(3), 101-115. DOI: 10.1007/s10462-021-
-2
Johnson, K. T., & Lee, S. M. (2020).
Comprehending gaming addiction in immersive environments: A focus on virtual reality. Computers in Human Behavior, 112, 106468. DOI: 10.1016/j.chb.2020.106468
Miller, P., & Thompson, G. (2019). Neurological and physiological effects of prolonged VR gaming: A longitudinal study. International Journal of Neuroscience, 129(5), 457-469. DOI:
3109/00207454.2019.1581284
Li, Y., & Zhang, W. (2021). The ethics of VR gaming: Guidelines for healthy engagement. Ethics in Information Technology, 23(1), 57-
DOI: 10.1007/s10676-020-09531-4
Park, H. J., & Kim, Y. J. (2020). Exploring escapism through VR gaming: A psychological analysis of behaviors and mental-health effects. Cyberpsychology, Behavior and Social Networking, 23(7), 445-451. DOI: 10.1089/cyber.2020.0023
Wang, T., & Carter, B. (2018). The physiological impacts of virtual reality experiences: An overview of short- and long- term effects. Virtual Reality Journal, 22(4), 289-305. DOI: 10.1007/s10055-018-0345-7
Cheng, Z., & Wu, L. (2021). Managing compulsive gaming: The role of virtual reality in addiction and therapy. Addiction Research & Theory, 29(5), 389-400. DOI: 10.1080/16066359.2021.1887987.
Deepak, N.R., Balaji, S. (2016). Uplink Channel Performance and Implementation of Software for Image Communication in 4G Network. In: Silhavy, R., Senkerik, R., Oplatkova, Z., Silhavy, P., Prokopova, Z. (eds) Software Engineering Perspectives and Application in Intelligent Systems. CSOC 2016. Advances in Intelligent Systems and Computing, vol 465. Springer, Cham. https://doi.org/10.1007/978-3-319-33622- 0_10
Simran Pal R and Deepak N R, “Evaluation on Mitigating Cyber Attacks and Securing Sensitive Information with the Adaptive Secure Metaverse Guard (ASMG) Algorithm Using Decentralized Security”, Journal of Computational Analysis and Applications (JoCAAA), vol. 33, no. 2, pp. 656–667, Sep.
B, Omprakash & Metan, Jyoti & Konar, Anisha & Patil, Kavitha & KK, Chiranthan. (2024). Unravelling Malware Using Co- Existence Of Features. 1-6. 10.1109/ICAIT61638.2024.10690795.
Refbacks
- There are currently no refbacks.