<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article article-type="research-article" dtd-version="2.0" xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JSG</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Serious Games</journal-id>
      <journal-title>JMIR Serious Games</journal-title>
      <issn pub-type="epub">2291-9279</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v12i1e58452</article-id>
      <article-id pub-id-type="pmid">39718822</article-id>
      <article-id pub-id-type="doi">10.2196/58452</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Game-Based Promotion of Assertiveness to Mitigate the Effects of Bullying in High School Students: Development and Evaluation Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Coristine</surname>
            <given-names>Andrew</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Yang</surname>
            <given-names>Fan</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Pelser-Carstens</surname>
            <given-names>Veruschka</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Santos</surname>
            <given-names>Antonio</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Lepe-Salazar</surname>
            <given-names>Francisco</given-names>
          </name>
          <degrees>DEd</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Ludolab</institution>
            <addr-line>Nigromante 89, Centro</addr-line>
            <addr-line>Colima, 28030</addr-line>
            <country>Mexico</country>
            <phone>52 3121100163</phone>
            <email>flepe@ludolab.org</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-8947-7929</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Mejía-Romero</surname>
            <given-names>Fernando</given-names>
          </name>
          <degrees>CSE</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0009-0000-3267-8578</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Benicio-Rodríguez</surname>
            <given-names>Dámaso</given-names>
          </name>
          <degrees>CSE</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0009-0001-0116-1995</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Hernández-Reyes</surname>
            <given-names>Aylin</given-names>
          </name>
          <degrees>CSE</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6361-9140</ext-link>
        </contrib>
        <contrib id="contrib5" contrib-type="author">
          <name name-style="western">
            <surname>Nakajima</surname>
            <given-names>Tatsuo</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-5116-2128</ext-link>
        </contrib>
        <contrib id="contrib6" contrib-type="author">
          <name name-style="western">
            <surname>Salgado-Torres</surname>
            <given-names>Sarita</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-5202-4827</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Ludolab</institution>
        <addr-line>Colima</addr-line>
        <country>Mexico</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Universidad de Colima</institution>
        <addr-line>Colima</addr-line>
        <country>Mexico</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Department of Computer Science and Engineering</institution>
        <institution>Waseda University</institution>
        <addr-line>Tokyo</addr-line>
        <country>Japan</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Francisco Lepe-Salazar <email>flepe@ludolab.org</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <year>2024</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>24</day>
        <month>12</month>
        <year>2024</year>
      </pub-date>
      <volume>12</volume>
      <elocation-id>e58452</elocation-id>
      <history>
        <date date-type="received">
          <day>15</day>
          <month>3</month>
          <year>2024</year>
        </date>
        <date date-type="rev-request">
          <day>23</day>
          <month>10</month>
          <year>2024</year>
        </date>
        <date date-type="rev-recd">
          <day>10</day>
          <month>11</month>
          <year>2024</year>
        </date>
        <date date-type="accepted">
          <day>12</day>
          <month>11</month>
          <year>2024</year>
        </date>
      </history>
      <copyright-statement>©Francisco Lepe-Salazar, Fernando Mejía-Romero, Dámaso Benicio-Rodríguez, Aylin Hernández-Reyes, Tatsuo Nakajima, Sarita Salgado-Torres. Originally published in JMIR Serious Games (https://games.jmir.org), 24.12.2024.</copyright-statement>
      <copyright-year>2024</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Serious Games, is properly cited. The complete bibliographic information, a link to the original publication on https://games.jmir.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://games.jmir.org/2024/1/e58452" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>For years, Mexico has reported the highest global incidence of school bullying, with approximately 19% of students going through some form of hostile peer interactions. Despite numerous interventions, these harmful conducts remain deeply entrenched in educational environments.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>To address this issue, we developed <italic>Bernstein</italic>, a serious game that promotes assertiveness—an essential protective factor that reduces the negative effects of bullying.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p><italic>Bernstein</italic> was designed using multiple composite scenarios, a methodology grounded in cognitive behavioral therapy. To evaluate the game’s effectiveness, we conducted an exploratory trial using the Rathus Assertiveness Schedule to assess assertiveness levels before and after the intervention. Participants were high school students who met the inclusion criteria of being open to playing a serious game (with no prior gaming experience required) and having access to a computer with internet connectivity for remote participation. A total of 100 students (65 boys and 35 girls) enrolled in the intervention; however, only 46 participants in the treatment group and 46 in the control group completed the study, resulting in a dropout rate of 8% (8/100). A paired 1-tailed <italic>t</italic> test was used to compare pre- and postintervention scores within each group, and a one-way ANOVA was conducted to compare the average score improvements between the 2 groups.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>The treatment group showed a pretest mean Rathus Assertiveness Schedule score of –2.78 (SD 25.93) and a posttest mean of 1.69 (SD 29.48), with a paired 1-tailed <italic>t</italic> test yielding a <italic>P</italic> value of .01. The control group had a pretest mean of 2.07 (SD 25.69) and a posttest mean of –2.39 (SD 32.98), with a paired 1-tailed <italic>t</italic> test yielding a <italic>P</italic> value of .04. The one-way ANOVA (between groups) yielded a <italic>P</italic> value of .006, indicating a statistically significant difference, favoring <italic>Bernstein</italic> over the alternative protocol. Participant feedback highlighted the game’s engaging narrative and character design, although usability issues, such as navigation challenges, were noted as areas for improvement.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>The results suggest that <italic>Bernstein</italic> is a promising tool for promoting assertiveness in high school students, providing a potential strategy for addressing bullying-related issues. The study underscores the value of integrating <italic>Bernstein</italic> into educational programs, offering students a safe and interactive environment to develop resilience. As an exploratory trial, this study faced limitations affecting the generalizability of findings, including the remote format’s impact on facilitator guidance and a relatively small sample size. Further trials with larger, more diverse groups are recommended to validate these early results and enhance <italic>Bernstein</italic>’s scalability as part of a comprehensive antibullying strategy.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>serious games</kwd>
        <kwd>bullying</kwd>
        <kwd>assertiveness</kwd>
        <kwd>multiple composite scenarios</kwd>
        <kwd>scenario</kwd>
        <kwd>cognitive behavioral therapy</kwd>
        <kwd>gaming</kwd>
        <kwd>design</kwd>
        <kwd>development</kwd>
        <kwd>bully</kwd>
        <kwd>assertive</kwd>
        <kwd>feasibility</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>“Bullying” is a term used to describe the aggressive and intentional acts carried out by an individual or a group repeatedly against an individual [<xref ref-type="bibr" rid="ref1">1</xref>]. Ever since bullying was recognized as a psychosocial problem, several research groups have investigated its causes, as well as possible ways to eradicate it [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref3">3</xref>].</p>
        <p>It commonly takes place in spaces where people spend time together (eg, school, work, etc). With the advancement of technology, new forms of bullying have emerged, such is the case of cyberbullying [<xref ref-type="bibr" rid="ref4">4</xref>]. An example of cyberbullying is online harassment. In this form of digital bullying, the abuser has the advantage of being able to invade the personal space of the person being bullied at a distance, keeping his or her real identity anonymous, which in turn allows him or her to provoke greater fear in the person being bullied [<xref ref-type="bibr" rid="ref5">5</xref>].</p>
        <p>Those who have experienced public humiliation, including bullying and cyberbullying, are considered to be more likely to commit suicide [<xref ref-type="bibr" rid="ref2">2</xref>]. Therefore, worldwide, multiple programs and initiatives have been carried out to counteract its effects. However, as studies show, this problem continues to grow [<xref ref-type="bibr" rid="ref6">6</xref>].</p>
        <p>According to information presented by the Organization for Economic Cooperation and Development, Mexico has held the first place in cases of bullying at school on various occasions [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref8">8</xref>]. In 2019, the results of the Programme for International Student Assessment test indicated that approximately 19% of students in the country had experienced some form of bullying. Furthermore, it was stipulated that a significant number of suicides committed by children in Mexico were due to cases of bullying, and, unfortunately, these numbers are expected to increase [<xref ref-type="bibr" rid="ref9">9</xref>].</p>
        <p>To contribute to the solution of this issue, we started a new project. A recent analysis of interventions to prevent bullying in schools showed that enhancing interpersonal skills, particularly assertiveness, stands out as the most effective protective factor in mitigating its consequences [<xref ref-type="bibr" rid="ref10">10</xref>]. With this insight, we decided to develop a solution that promotes said protective factor.</p>
        <p>To appeal to a young demographic, we chose to work with serious games [<xref ref-type="bibr" rid="ref11">11</xref>]. A serious game differentiates from regular games in that they have an additional objective that can be educational or illustrative [<xref ref-type="bibr" rid="ref12">12</xref>].</p>
        <p>To ensure that the protective factor is properly addressed, we made use of the multiple composite scenarios (MCS), a methodology for the design of serious games rooted in principles of cognitive behavioral therapy (CBT) [<xref ref-type="bibr" rid="ref13">13</xref>]. Unlike other game design approaches, MCS offers a unique blend of versatility and specificity, providing a comprehensive framework for crafting immersive experiences that properly address mental problems. The game we created with it is called <italic>Bernstein</italic>.</p>
        <p><italic>Bernstein</italic> is a serious game that promotes the development of assertiveness in high school students. To assess its potential benefits, we carried out an exploratory trial. This paper outlines the findings from this intervention, delving into its benefits and limitations. Furthermore, we discuss our plans for future work aimed at enhancing its overall effectiveness.</p>
      </sec>
      <sec>
        <title>Notions of Bullying</title>
        <p>Bullying is the deliberate, intentional, and repeated use of force, threats, and coercion to abuse; cause fear or distress; dominate; harm; exclude; and intimidate physically (eg, slapping, hitting, and kicking), verbally (eg, threatening, yelling, and insulting), and psychologically (eg, denigrating and belittling) an individual or a group of people who are unable to defend themselves [<xref ref-type="bibr" rid="ref14">14</xref>-<xref ref-type="bibr" rid="ref19">19</xref>]. Bullies (ie, perpetrators of the aggression) usually choose their targets based on characteristics such as appearance, disability, age, race, religion, sex, and so forth [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref20">20</xref>].</p>
        <p>People become bullies for various reasons including imitation, having a low self-esteem, or experiencing violence at home [<xref ref-type="bibr" rid="ref21">21</xref>-<xref ref-type="bibr" rid="ref23">23</xref>]. The person most affected by bullying is the one who receives the aggressive acts, that is, the recipient. As a consequence of bullying, those who are bullied may develop depression, drop out of school, or commit suicide [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref24">24</xref>].</p>
        <p>Different actors intervene in bullying in addition to the perpetrator and the recipient, including facilitators (those who join the bully to antagonize others), reinforcers (those who do not antagonize but indirectly support the bullying by either making fun of the target or encouraging the bully), bully+target (those who are both a bully and a recipient of bullying), defenders (those who in some way help the target), and bystanders (those who witness the bullying but do not act accordingly) [<xref ref-type="bibr" rid="ref25">25</xref>]. It should be noted that these extra actors are not necessarily present on every occasion.</p>
        <p>Given its prevalence in modern societies (from 17% to 20.8% in some sectors), bullying is considered a sociocultural phenomenon [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref18">18</xref>]. It is believed that more than 50% of students worldwide have been involved in some form of bullying, as targets, bullies, or bystanders [<xref ref-type="bibr" rid="ref17">17</xref>].</p>
        <p>Some of the strategies that exist to deal with this phenomenon include school programs, institutional policies, rules within the classroom, teacher training, information campaigns, awareness campaigns, discussion forums, workshops, psychological interventions, and educational interventions, among others [<xref ref-type="bibr" rid="ref15">15</xref>,<xref ref-type="bibr" rid="ref17">17</xref>].</p>
        <p>The type of consequences experienced by the recipients of bullying depends on the severity of the attacks. There are cases in which the recipients do not experience consequences in the mid- to long term. This is due to a series of factors that are directly related to the level of affectation of the recipient. That is, the greater the presence of certain factors, the stronger or weaker the consequences may be. These types of factors are known as risk factors (those that reinforce the negative effects) and protective factors (those that reduce the negative effects).</p>
      </sec>
      <sec>
        <title>Selection of the Protective Factor to be Promoted</title>
        <p>To learn which factors related to bullying cause the greatest affectation in young students, we conducted a review of the literature. Furthermore, we searched for factors that may help reduce the affectation by this psychosocial phenomenon (ie, protective factors). For this task, we consulted various mental health articles related to interventions carried out in schools [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref21">21</xref>-<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>].</p>
        <p>We found that having a low self-esteem and social isolation are 2 of the most relevant risk factors. In contrast, having a greater number of social relationships, being assertive, and having a high self-esteem were shown to be the most prominent protective factors in reducing the negative effects of bullying. It should be noted that we found that increasing self-esteem is effective in elementary school children but not as effective at older ages. Given that our target audience are high school students, for our project, we chose to focus on the promotion of the protective factor of assertiveness.</p>
        <p>Assertiveness should not be confused with aggression, which is the forceful or disrespectful expression of one’s way of seeing things, or the imposition of one’s needs onto others. Assertiveness is an essential, interpersonal behavior that aims to enable individuals to (1) minimize power differences that may exist with others; (2) act in their own best interests; (3) stand up for themselves without undue anxiety; (4) express their beliefs, concerns, feelings, interests, needs, opinions, point of view of things, and personal rights honestly; (5) exercise their rights; and (6) share privately held information with people in a position of authority [<xref ref-type="bibr" rid="ref27">27</xref>-<xref ref-type="bibr" rid="ref29">29</xref>]. This while respecting and acknowledging the rights of others.</p>
      </sec>
      <sec>
        <title>Games and Bullying</title>
        <p>Ours is not the first project that aims to address a psychosocial issue such as bullying by making use of a video game. Video games offer players the opportunity to try different paths and learn different points of view and perspectives in digital environments [<xref ref-type="bibr" rid="ref30">30</xref>]. For that reason, it is believed that they are capable of promoting behavior change, problem-solving, and acquisition of skills.</p>
        <p>The main goal of commercial video games is to entertain. Games whose purpose goes beyond entertainment are referred to as serious games. Serious games differ from commercial games in that they have an additional objective [<xref ref-type="bibr" rid="ref12">12</xref>]. Among the objectives that these usually pursue are raising awareness, teaching, training, changing perceptions, persuading, promoting skill development, improving attitudes, instilling positive attitudes, nurturing player empathy, and so forth [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref30">30</xref>-<xref ref-type="bibr" rid="ref41">41</xref>].</p>
        <p>To achieve this goal, serious games make use of formal strategies and techniques. Such is the case of serious games for education, which make use of pedagogical methodologies to teach a concept or skill [<xref ref-type="bibr" rid="ref42">42</xref>]. Other topics covered by serious games include caring for the environment, mental health, and sports, among others [<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref44">44</xref>].</p>
        <p>There are various game titles related to the subject of bullying. StopBully is a serious game that through role-playing puts the player in the role of recipient or bystander, thus simulating real-world situations [<xref ref-type="bibr" rid="ref16">16</xref>]. Its objective is to prevent bullying by helping recipients improve their behavioral competence to avoid or face situations [<xref ref-type="bibr" rid="ref39">39</xref>].</p>
        <p>Conectado is an educational game that seeks to increase awareness among young people about school bullying [<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]. This title puts players in the role of recipients with the aim of fostering in them empathy with those who are bullied.</p>
        <p>FearNot! is a serious game that takes place in a virtual school with characters typical of everyday school life (eg, bullies, recipients, bystanders, and helpers) [<xref ref-type="bibr" rid="ref35">35</xref>]. Its goal is for players to observe bullying scenarios and interact with the recipients, as well as advise them on the best way to deal with the situation.</p>
        <p>Stop bullying now! is a serious game whose goal is to enable caregivers of people with disabilities to learn how to respond to bullying situations [<xref ref-type="bibr" rid="ref18">18</xref>]. To do this, it presents different characters and situations, such as children and adults with disabilities, parents, teachers, supervisors, and bullies who show different bullying behaviors.</p>
        <p>Happy Class is a role-playing game (RPG) in which students experience the role of bullying bystanders through chat [<xref ref-type="bibr" rid="ref41">41</xref>]. Its goal is for players to understand the seriousness of the damage caused by cyberbullying and the important role of bystanders while learning how to prevent further violence by taking appropriate action.</p>
        <p>The game studio Disparity developed and published an indie title that covers the topic of bullying called “Ninja Pizza Girl” (NPG). NPG narrates the story of a 16-year-old girl named Gemma, who works in her father’s business delivering pizzas and who is forced to face “the most ruthless enemies a teenage girl can have: other teenagers” [<xref ref-type="bibr" rid="ref45">45</xref>]. Throughout the story told in NPG, topics such as self-esteem, bullying, and resilience are discussed. Enemies in this game attack the player through insults and taunts. An interesting detail about the production of NPG is that part of the team that worked on the game had previously been a recipient of bullying [<xref ref-type="bibr" rid="ref46">46</xref>].</p>
        <p>A Day at my School is a serious game developed with Unity that highlights the perspective of a bystander and that presents a situation in which the abuser becomes the recipient. This title consists of 2 stages whose objective is to raise awareness and motivate the player to report bullying when the situation arises [<xref ref-type="bibr" rid="ref47">47</xref>]. It should be noted that this serious game is available for free on the web.</p>
        <p>A research group at Leuphana University presented the conceptual design for Bully you, Bully me, a serious game that asks players to enact scenarios of bullying to make them reflect about the consequences of their actions [<xref ref-type="bibr" rid="ref48">48</xref>].</p>
        <p>There are also commercial games that deal with bullying. Such is the case of Bully, an action and adventure game set in an open world environment [<xref ref-type="bibr" rid="ref49">49</xref>]. In Bully, the player plays a 15-year-old teenager who can decide whether or not to harass others and see what effects and consequences his actions have. It should be noted that its effectiveness in preventing bullying has not been tested.</p>
        <p>In general, serious games that address bullying tend to (1) simulate real-world scenarios; (2) present cases of bullying; (3) provide recommendations; (4) ask the player to take action (eg, supporting the recipient of bullying); and (5) optionally, encourage reflection. Furthermore, several of the titles presented here contemplate their use as part of an intervention in which a teacher or a guide uses them as an example to invite participants to dialogue and reflect on it.</p>
        <p>Among the limitations of the aforementioned examples are (1) little variety of scenarios or narratives, (2) little variety of devices on which they are available, (3) little variety of actions that they allow players, and (4) type of audience to which they are directed (mostly children and young people).</p>
        <p>Inspired by other games that seek to contribute to the mitigation of bullying, we decided to present realistic scenarios that allow players to act and reflect on it. However, unlike them, we decided to (1) create a game that would present different scenarios (eg, bullying between people in the same family and professional bullying), (2) work on a prototype that can be used on different devices, (3) increase the number of actions a player can perform, and (4) create a game that is interesting for young and older players. Another key distinction is that, to the best of our knowledge, our serious game is the only one explicitly designed to promote assertiveness in players as a strategy to mitigate the impact of bullying they may experience. In other words, <italic>Bernstein</italic> uniquely frames assertiveness as a practical tool for building resilience against bullying, rather than treating it as a stand-alone skill or ultimate objective.</p>
      </sec>
      <sec>
        <title>Notions of Assertiveness</title>
        <p>Assertiveness refers to a person’s ability to (1) communicate with others in a clear, firm, positive, honest, direct, and balanced way; (2) stand up for his or her own beliefs without limiting or attacking others; (3) meet his or her own needs and concerns; (4) demonstrate certainty in his or her actions; (5) express what he or she feels and thinks, even if it results in negative consequences; (6) be direct in asking for what he or she wants or needs; (7) behave confidently; (8) be sociable and active; (9) take control of his or her life; and (10) being frank [<xref ref-type="bibr" rid="ref50">50</xref>-<xref ref-type="bibr" rid="ref57">57</xref>]. This differs from aggressiveness in that an assertive person does not seek to impose himself or herself or harm others to achieve his or her goals. Assertiveness is commonly linked to job success, as well as personal growth and development [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref55">55</xref>].</p>
      </sec>
      <sec>
        <title>Relevance of Assertiveness in Adolescence</title>
        <p>Adolescence is a pivotal stage for socioemotional development, during which young people navigate complex identity formation and peer dynamics. In this process, the ability to express thoughts, needs, and emotions clearly—especially when faced with peer pressure or conflict—becomes essential. Assertiveness equips adolescents with the confidence and resilience to advocate for themselves while fostering positive relationships [<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref58">58</xref>]. As a key protective factor, it may not only help reduce the risk of bullying but also enhance academic performance and strengthen social connections.</p>
      </sec>
      <sec>
        <title>Games and Assertiveness</title>
        <p>There is a wide variety of game-based approaches that seek to contribute to the development of assertiveness in players. Such is the case of the model presented in the study by Cheong et al [<xref ref-type="bibr" rid="ref52">52</xref>] for conflict resolution, which is based on balancing the assertiveness and cooperation of users. In the study by Hendrix et al [<xref ref-type="bibr" rid="ref59">59</xref>], a proposal is presented to use games to increase children’s social competence, encouraging them to talk about their needs. In contrast, in the study by Eng [<xref ref-type="bibr" rid="ref60">60</xref>], a learning strategy based on games is disclosed to teach assertive communication and improve team play. van der Lubbe et al [<xref ref-type="bibr" rid="ref61">61</xref>] created a serious game to train the verbal resilience of the players, in order to avoid scams. Finally, in another study by van der Lubbe et al [<xref ref-type="bibr" rid="ref62">62</xref>], a proposal for the use of serious games is presented to empower vulnerable groups by promoting the development of skills such as assertive communication.</p>
        <p>In general, these approaches are characterized by presenting activities that (1) promote the development of an interpersonal skill (eg, assertive communication) and (2) allow players to practice said skill through game scenarios. Unlike these examples, our approach goes beyond fostering a single skill; it aims to encourage holistic improvements in players’ mental health by enhancing their cognitive and behavioral patterns.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Implementing MCS</title>
        <sec>
          <title>Overview</title>
          <p>We set out to develop a serious game aimed at promoting assertiveness in students. To achieve this, we used the MCS methodology, which enables the design of games tailored to prevent specific mental disorders [<xref ref-type="bibr" rid="ref13">13</xref>]. This adaptability (ie, the ability to customize tasks, scenarios, dialogues, feedback, etc) is crucial, as the efficacy of a game depends on its capacity to address the specific needs and challenges of its serious goal.</p>
          <p>MCS draws on CBT principles to reduce the impact of risk factors and promote the adoption of protective factors [<xref ref-type="bibr" rid="ref13">13</xref>]. CBT is a psychological treatment that helps reframe negative emotions, thoughts, memories, and ideas [<xref ref-type="bibr" rid="ref63">63</xref>,<xref ref-type="bibr" rid="ref64">64</xref>]. Both MCS and CBT rely on techniques such as Socratic questioning, definition of terms, cost-benefit analysis, and systematic gradual exposure to achieve their objectives.</p>
          <p>Various technological applications (eg, computer software, mobile apps, wearable sensors, and virtual agents) have been inspired by certain aspects of CBT. Such is the case of (1) technology for user data collection, which is used to collect and analyze data such as mood changes or facial expressions; (2) self-help software, which enables patients to address mental health problems by presenting them psychoeducational materials and activities; (3) technology-based activities, which aim to facilitate activities under therapist guidance; (4) psychoeducation online platforms, which deliver psychoeducational content through multimedia to enhance patient understanding of their disorder; and (5) technology for awareness and coping, which aims to raise awareness about mental health and help individuals deal with life’s challenges through specific tasks [<xref ref-type="bibr" rid="ref13">13</xref>].</p>
          <p>It is important to note that the MCS methodology differs from these applications by focusing on preventing mental disorders through health games. MCS integrates the complete CBT protocol within the game itself, ensuring that players engage in meaningful experiences aligned with therapeutic goals.</p>
        </sec>
        <sec>
          <title>Risk Versus Protective Factors</title>
          <p>A risk factor is a determinant or associated variable that increases the chances that a person will be affected by a problem. In contrast, a protective factor is a determinant or associated variable that reduces the chances that a person will be affected by a problem. For our project, the risk factor we used was social isolation, and the protective factor we promoted was assertiveness.</p>
        </sec>
        <sec>
          <title>Promoting a Protective Factor With a Serious Game</title>
          <p>To promote the adoption of a protective factor, MCS makes use of game scenarios that illustrate the recovery process of a virtual patient. The steps of MCS are to (1) <italic>introduce</italic> a risk factor to the player, (2) <italic>depict</italic> the effects that the risk factor has on a virtual patient, (3) <italic>inform</italic> the player about important psychoeducational facts through trustworthy characters, (4) <italic>distract</italic> the player with game dynamics, (5) <italic>evaluate</italic> what has been learned with game activities, (6) <italic>defend</italic> the virtual patient, (7) <italic>reflect</italic> on the benefits of the protective factor, (8) <italic>apply</italic> the knowledge learned in the virtual world, and (9) <italic>involve</italic> the player in the recovery of the virtual patient [<xref ref-type="bibr" rid="ref13">13</xref>].</p>
          <p>Through the creation of varied and dynamic scenarios, players are presented with a rich and immersive setup. This not only captures their attention but also ensures the adoption of positive behaviors.</p>
          <p>To illustrate the consequences of risk factors in a nonthreatening manner, the figure of the virtual patient is leveraged. This approach is designed to avoid making players feel criticized or judged. In our game, we decided to have secondary characters fulfill this role. Our intention was to provide players with an opportunity to interact with various nonassertive characters, enabling them to witness firsthand the consequences of such behaviors.</p>
          <p>Another strategic element contributing to the overarching goal is the unique scoring system it proposes: Love Coins. Love Coins operate as follows: players who actively engage in positive behaviors earn higher scores. This system was designed as a way to encourage players to adopt healthy behaviors both within the game context and, possibly, in the real world.</p>
        </sec>
      </sec>
      <sec>
        <title>Designing Our Game</title>
        <sec>
          <title>Overview</title>
          <p>To align with different player interactions, scenarios were designed to gradually increase in complexity. They ranged from practicing simple self-expression to managing more challenging interpersonal conflicts. Some scenarios required players to engage in assertive dialogue with in-game characters, while others involved problem-solving tasks that fostered collaboration and interpersonal growth.</p>
          <p>Each scenario was crafted to mirror real-life social dynamics, reflecting challenges that players might encounter outside the game. Characters’ responses were programed to adapt based on the player’s choices (eg, rewarding assertive behavior and gently redirecting passive or aggressive actions). This dynamic feedback system, integrated with the Love Coins scoring mechanism, gave players the opportunity to experiment, reflect, and adjust their behavior in real time.</p>
          <p>Furthermore, gameplay elements such as timed responses and branching dialogues ensured that the learning process remained engaging while providing measurable feedback on behavioral changes throughout the gameplay.</p>
        </sec>
        <sec>
          <title>Bernstein</title>
          <p>The name of the title we created using MCS is <italic>Bernstein</italic>. <italic>Bernstein</italic> is an RPG with features such as puzzles and exploration (<xref rid="figure1" ref-type="fig">Figures 1</xref>-<xref rid="figure3" ref-type="fig">3</xref>). The plot of our serious game focuses on rescuing a friend who is trapped in a dungeon (<xref rid="figure3" ref-type="fig">Figure 3</xref>). To do so, the player must enlist the help of people who are very socially isolated and not assertive. <italic>Bernstein</italic>’s prototype was created with the tool RPG Maker.</p>
          <fig id="figure1" position="float">
            <label>Figure 1</label>
            <caption>
              <p>Avatars for the main character.</p>
            </caption>
            <graphic xlink:href="games_v12i1e58452_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <fig id="figure2" position="float">
            <label>Figure 2</label>
            <caption>
              <p>Example of a conversation.</p>
            </caption>
            <graphic xlink:href="games_v12i1e58452_fig2.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
          <fig id="figure3" position="float">
            <label>Figure 3</label>
            <caption>
              <p>Example of the puzzles: Danger Room (left) and Confront Monster (right).</p>
            </caption>
            <graphic xlink:href="games_v12i1e58452_fig3.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>Narrative</title>
          <p>The plot of the game takes place at the Bernstein Institute, a boarding school located in what was previously a castle. Rumors recently spread among the students, speaking of the existence of a hidden treasure somewhere in the underground dungeon, a restricted access section of the facilities. This draws the attention of Leopold Stotch, the protagonist’s classmate, who decides to venture out on a treasure hunt.</p>
          <p>What Leopold did not know before embarking on a quest is that this dungeon was designed with various mechanisms to ward off intruders, some of supernatural origin. For that reason, he gets trapped with no apparent way out. The game begins the moment the player receives a call for help from Leopold. To get to where his or her friend is, the player must make his or her way through obstructed paths. To do so, the player will need specific tools. Fortunately, everything needed by the player can be found within the institute itself. However, the player will have to convince the owners of said tools to cooperate.</p>
          <p>To win, the player must help his or her new friends to overcome their insecurities and become more assertive. By doing so, the player can get the items needed to enter the section of the dungeon where Leopold is trapped. A walkthrough of the game is shown in <xref rid="figure4" ref-type="fig">Figure 4</xref>.</p>
          <fig id="figure4" position="float">
            <label>Figure 4</label>
            <caption>
              <p>Walkthrough of the game.</p>
            </caption>
            <graphic xlink:href="games_v12i1e58452_fig4.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
        <sec>
          <title>Gameplay</title>
          <p>The game’s map is divided into 2 sections: the boarding school and the dungeon (<xref rid="figure4" ref-type="fig">Figure 4</xref>). The boarding school is an open area, which the player can freely explore. It is in this section where the classmates who can help the player in his or her adventure are found. In contrast, the dungeon is a closed space. It has 6 doors that can be opened with a different object. Five of these doors, when opened, lead to a puzzle that the player must solve. The sixth door is where Leopold is trapped, so opening it ends the game.</p>
          <p>To win, the player must (1) earn many Love Coins by helping his or her new friends to be more assertive, (2) get specific items to open doors, and (3) solve the puzzles. The game has 3 different endings (good, regular, and bad). Which one the player gets depends on the score he or she obtains.</p>
        </sec>
        <sec>
          <title>Game Scenarios</title>
          <p>To facilitate the understanding of the MCS present in the game, we summarized the content of the game in <xref ref-type="table" rid="table1">Table 1</xref>. The first rows present the name of the characters and the object they possess. The subsequent rows break down the steps of MCS for each character.</p>
          <table-wrap position="float" id="table1">
            <label>Table 1</label>
            <caption>
              <p>Game scenarios present in Bernstein.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="30"/>
              <col width="120"/>
              <col width="0"/>
              <col width="170"/>
              <col width="170"/>
              <col width="0"/>
              <col width="170"/>
              <col width="0"/>
              <col width="170"/>
              <col width="0"/>
              <col width="170"/>
              <thead>
                <tr valign="top">
                  <td colspan="11">
                    <bold>Character</bold>
                  </td>
                </tr>
                <tr valign="top">
                  <td colspan="3">
                    <break/>
                  </td>
                  <td>Felix</td>
                  <td colspan="2">Abel</td>
                  <td colspan="2">Samuel</td>
                  <td colspan="2">Elena</td>
                  <td>Beatriz</td>
                </tr>
                <tr valign="top">
                  <td colspan="11">
                    <bold>Specific object</bold>
                  </td>
                </tr>
                <tr valign="top">
                  <td colspan="3">
                  </td>
                  <td>Wrench</td>
                  <td colspan="2">Book of glyphs</td>
                  <td colspan="2">Pickaxe</td>
                  <td colspan="2">Battery</td>
                  <td>Stethoscope</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td colspan="11">
                    <bold>Step</bold>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Step 1: Present risk factor</td>
                  <td colspan="2">Player learns that the character believes that things will get awkward or something will go bad if he tells others what he wants/needs</td>
                  <td>Player learns that the character tries to be better because he feels obliged to</td>
                  <td colspan="2">Player learns that the character thinks that what he likes is not as important and no one cares</td>
                  <td colspan="2">Player learns that the character is a perfectionist, she wants to do everything the “right” way</td>
                  <td colspan="2">Player learns that the character sees everything in a chaotic or catastrophic way</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Step 2: Show consequences</td>
                  <td colspan="2">Character has no friends, avoids talking to others</td>
                  <td>Character demands a lot from others and is unhappy</td>
                  <td colspan="2">Character is very pessimistic</td>
                  <td colspan="2">Character sees flaws as unacceptable, even her own</td>
                  <td colspan="2">Character is constantly stressed about everything</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Step 3: Psychoeducate</td>
                  <td colspan="2">Discussion topic: We cannot know everything with absolute certainty, we have to be open to try new things</td>
                  <td>Discussion topic: One should do things that one enjoys and likes</td>
                  <td colspan="2">Discussion topic: Learn to see the good things about oneself</td>
                  <td colspan="2">Discussion topic: Things can be good without being perfect</td>
                  <td colspan="2">Discussion topic: Learn to tolerate uncertainty</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Step 4: Distract with activities</td>
                  <td colspan="2">Talk about machines</td>
                  <td>Talk about hobbies</td>
                  <td colspan="2">Talk about treasures in the boarding school</td>
                  <td colspan="2">Talk about her camping trips</td>
                  <td colspan="2">Talk about his piano lessons</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Step 5: Evaluate what was learned</td>
                  <td colspan="2">The player must try to check whether what the character thinks is true</td>
                  <td>The player must highlight the importance of not pleasing everybody</td>
                  <td colspan="2">The player must mention his or her successes</td>
                  <td colspan="2">The player must identify the negative and positive side of things</td>
                  <td colspan="2">The player must analyze the situation realistically</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Step 6: Defend the virtual patient</td>
                  <td colspan="2">A character appears saying that it will not go well for him</td>
                  <td>The character’s older brother appears to remind him of his duties</td>
                  <td colspan="2">A colleague points out that the world is cruel and goals are not easily met</td>
                  <td colspan="2">The character begins to worry when she sees her leaves blown by the wind</td>
                  <td colspan="2">The character receives a phone call about a new project</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Step 7: Reflect on benefits</td>
                  <td colspan="2">Interacting with others may be better than you expect</td>
                  <td>You would feel better saying “I would like to...” instead of “I have to...”</td>
                  <td colspan="2">Your qualities do matter</td>
                  <td colspan="2">Rarely is something all good or all bad</td>
                  <td colspan="2">Sometimes things look bad because you feel bad about them</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Step 8: Apply knowledge</td>
                  <td colspan="2">Puzzle: Danger Room</td>
                  <td>Puzzle: Confront Monster</td>
                  <td colspan="2">Puzzle: Infinite Corridor</td>
                  <td colspan="2">Puzzle: Mayan Tablets</td>
                  <td colspan="2">Puzzle: Room of Lights</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Step 9: Involve the player</td>
                  <td colspan="2">Closing argument: A good outcome is always possible</td>
                  <td>Closing argument: Having the freedom to decide is important</td>
                  <td colspan="2">Closing argument: No matter how adverse the future looks, there will always be good things ahead</td>
                  <td colspan="2">Closing argument: Things do not have to be perfect to be good</td>
                  <td colspan="2">Closing argument: You have to avoid getting carried away</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
        </sec>
      </sec>
      <sec>
        <title>Evaluation</title>
        <p>To explore the effects produced by our game, we compared <italic>Bernstein</italic> with an alternative protocol in a controlled intervention. For this purpose, we made use of a specialized instrument to measure assertiveness. In addition to that, to learn about the participants’ experience, a brief survey was conducted. With the information that we obtained, a quantitative analysis was conducted. To report our results, we followed the guidelines presented in the study by Montgomery et al [<xref ref-type="bibr" rid="ref65">65</xref>].</p>
      </sec>
      <sec>
        <title>Ethics Approval</title>
        <p>The study received prior approval from the Universidad de Colima ethics committee. All participants provided informed consent, confirming that they had read and understood the study’s purpose, procedures, potential risks, and their right to withdraw at any time without consequences. Participant data were collected and processed anonymously to ensure privacy. Students were informed that participation was voluntary, with no financial or material compensation provided.</p>
      </sec>
      <sec>
        <title>Evaluation Instrument</title>
        <sec>
          <title>Overview</title>
          <p>To assess participants’ abilities before and after the trial, we used the Spanish edition of the Rathus Assertiveness Schedule (RAS) [<xref ref-type="bibr" rid="ref66">66</xref>,<xref ref-type="bibr" rid="ref67">67</xref>]. This version was selected due to its successful implementation and validation throughout Latin America over the years. Furthermore, independent studies have consistently confirmed the RAS’s test-retest reliability, internal consistency, and validity [<xref ref-type="bibr" rid="ref68">68</xref>,<xref ref-type="bibr" rid="ref69">69</xref>]. The RAS comprises 30 items designed to evaluate a person’s assertiveness. <xref ref-type="table" rid="table2">Table 2</xref> shows the classification of results based on the scores obtained.</p>
          <table-wrap position="float" id="table2">
            <label>Table 2</label>
            <caption>
              <p>Classification of results.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="700"/>
              <col width="300"/>
              <thead>
                <tr valign="top">
                  <td>Category</td>
                  <td>Score</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>Unassertive</td>
                  <td>–90 to –20</td>
                </tr>
                <tr valign="top">
                  <td>Situationally unassertive</td>
                  <td>–20 to 0</td>
                </tr>
                <tr valign="top">
                  <td>Mildly assertive</td>
                  <td>0 to 20</td>
                </tr>
                <tr valign="top">
                  <td>Assertive</td>
                  <td>20 to 40</td>
                </tr>
                <tr valign="top">
                  <td>Likely aggressive</td>
                  <td>40 to 90</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
        </sec>
        <sec>
          <title>Alternative Protocol</title>
          <p>The alternative protocol we chose for the comparison was an adaptation of Your Perfect Right (YPR) [<xref ref-type="bibr" rid="ref58">58</xref>]. YPR aims to contribute to the development of assertiveness-related skills by presenting and evaluating different scenarios (eg, dealing with difficult people, handling criticism, and expressing feelings) and by providing recommendations of best courses of action. We decided to compare our approach with YPR as it is regarded as the leading assertiveness training program and has been tested by independent studies throughout the years [<xref ref-type="bibr" rid="ref70">70</xref>,<xref ref-type="bibr" rid="ref71">71</xref>]. It should be noted that to save resources (eg, paper, printer ink, etc) and to facilitate the execution of the intervention, an informational website was created.</p>
        </sec>
        <sec>
          <title>Participant Selection and Group Allocation</title>
          <p>From January to December of 2022, students from 2 local high schools were invited to participate in our intervention. The selection criteria we established were (1) to be open to playing a serious game (previous experience with games not necessary) and (2) to have access to a computer with internet access. In total, 100 students accepted our invitation (65 boys and 35 girls). They were randomly and evenly divided into treatment and control groups through a blocked randomization process with block sizes of 4 people. The randomization was centrally managed to ensure an unbiased allocation. The average age of the participants was 17.59 years. In the end, only 92 participants finished the experiment. The main reason why most did not complete the study was a lack of time (eg, conflict with their class schedule). To thank students for their participation, they were offered extra credits in their computer science course (or its equivalent).</p>
        </sec>
        <sec>
          <title>Development of the Intervention</title>
          <p>The intervention consisted of a single 90-minute session, with both the treatment (<italic>Bernstein</italic>) and control (YPR) groups following identical timelines. Due to COVID-19 health concerns, all activities were conducted remotely.</p>
          <p>At the start of the session, participants completed the Spanish edition of the RAS as a pretest to assess their interpersonal skills related to assertiveness before group allocation (treatment or control). Participants received a secure link with detailed instructions for accessing and completing the RAS. To ensure accurate responses, they were advised to find a quiet space, and additional measures were taken to enhance data reliability, including monitoring submissions for completeness and allowing only 1 submission per participant.</p>
          <p>Following the pretest, participants engaged with either <italic>Bernstein</italic> (treatment) or a YPR session (control) for approximately 60 minutes. The session concluded with the posttest RAS assessment to measure any changes in assertiveness levels. To maintain the quality of the experiment, steps were taken to mitigate potential biases: (1) evaluator bias was minimized through automated data collection, and (2) demand characteristics were controlled by clearly explaining the intervention’s purpose to participants [<xref ref-type="bibr" rid="ref72">72</xref>].</p>
          <p>It is important to note that, throughout the study, no adverse events or unintended effects were observed.</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Treatment Group</title>
        <p>A total of 46 students completed the intervention in the treatment group. To protect their personal information, we assigned each an identification code, which we used consistently throughout the study (T1-T46). The scores they obtained before and after playing can be seen in <xref ref-type="table" rid="table3">Table 3</xref>. To observe the effects produced by <italic>Bernstein</italic>, we compared the pre- and posttest scores of the participants using an inferential statistical test. The instrument we chose for this purpose, based on experts recommendations, was Student 1-tailed <italic>t</italic> test for paired samples [<xref ref-type="bibr" rid="ref73">73</xref>,<xref ref-type="bibr" rid="ref74">74</xref>]. Also known as the paired 1-tailed <italic>t</italic> test, this instrument was used to compare participants’ pre- and postintervention scores and assess the statistical significance of the observed differences. We established the following null hypothesis: there is no difference between participants’ scores before and after engaging with <italic>Bernstein</italic>. As shown in <xref ref-type="table" rid="table3">Table 3</xref>, the analysis yielded a <italic>P</italic> value below .05, suggesting that the intervention likely influenced the outcome.</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Pre- and posttest scores of participants in the treatment and control groups.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="250"/>
            <col width="250"/>
            <col width="250"/>
            <col width="250"/>
            <thead>
              <tr valign="top">
                <td>Group</td>
                <td>Pretest, mean (SD)</td>
                <td>Posttest, mean (SD)</td>
                <td><italic>P</italic> value</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Treatment</td>
                <td>–2.78 (25.93)</td>
                <td>1.69 (29.48)</td>
                <td>.01</td>
              </tr>
              <tr valign="top">
                <td>Control</td>
                <td>2.07 (25.69)</td>
                <td>–2.39 (32.98)</td>
                <td>.04</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Control Group</title>
        <p>A total of 46 students completed the intervention in the control group. To protect their personal information, we assigned each one an identification code, which we used throughout the study (C1-C46). The scores they obtained before and after playing are shown in <xref ref-type="table" rid="table3">Table 3</xref>. To observe the effects produced by the alternative protocol, we compared the pre- and posttest scores of the participants using an inferential statistical test. The instrument we chose for this purpose was also Student 1-tailed <italic>t</italic> test for paired samples. The null hypothesis that we established was the following: there is no difference between the results of the participants before and after participating in a YPR session. As shown in <xref ref-type="table" rid="table3">Table 3</xref>, at <italic>P</italic>&lt;.05, we obtained a statistically significant result.</p>
      </sec>
      <sec>
        <title>Statistical Evaluation of the Results</title>
        <p>Following expert recommendations, we conducted a one-way ANOVA [<xref ref-type="bibr" rid="ref73">73</xref>,<xref ref-type="bibr" rid="ref74">74</xref>]. This analysis allowed us to compare the effectiveness of <italic>Bernstein</italic> and the alternative protocol by examining differences in score improvements between the 2 groups. The data that we used as input for this calculation were the average of the effects observed in both groups (ie, difference between pre- and posttest scores). The null hypothesis we established was the following: there is no difference between the results produced by <italic>Bernstein</italic> and the alternative protocol (ie, YPR) in the development of interpersonal skills related to assertiveness.</p>
        <p><xref ref-type="table" rid="table4">Table 4</xref> shows the results of our calculations. The columns included in this table are sum of squares, degrees of freedom, mean square, <italic>F</italic> ratio, and <italic>P</italic> value of the null hypothesis being true. As <xref ref-type="table" rid="table4">Table 4</xref> shows, at <italic>P</italic> value of &lt;.05, there is a statistically significant difference between the 2 interventions, with the results favoring <italic>Bernstein</italic>.</p>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Comparison of the results of the treatment and control groups with a one-way ANOVA.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="200"/>
            <col width="160"/>
            <col width="160"/>
            <col width="160"/>
            <col width="160"/>
            <col width="160"/>
            <thead>
              <tr valign="top">
                <td>Results</td>
                <td>SS<sup>a</sup></td>
                <td>
                  <italic>df</italic>
                </td>
                <td>MS<sup>b</sup></td>
                <td>
                  <italic>F<sup>c</sup></italic>
                </td>
                <td><italic>P</italic> value</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Between groups</td>
                <td>1809.39</td>
                <td>1</td>
                <td>1809.39</td>
                <td>7.865</td>
                <td>.006</td>
              </tr>
              <tr valign="top">
                <td>Within groups</td>
                <td>20702.56</td>
                <td>90</td>
                <td>230.02</td>
                <td>—<sup>d</sup></td>
                <td>—</td>
              </tr>
              <tr valign="top">
                <td>Total</td>
                <td>22511.95</td>
                <td>91</td>
                <td>—</td>
                <td>—</td>
                <td>—</td>
              </tr>
            </tbody>
          </table>
          <table-wrap-foot>
            <fn id="table4fn1">
              <p><sup>a</sup>SS: sum of squares.</p>
            </fn>
            <fn id="table4fn2">
              <p><sup>b</sup>MS: mean square.</p>
            </fn>
            <fn id="table4fn3">
              <p><sup>c</sup><italic>F</italic>: <italic>F</italic> ratio.</p>
            </fn>
            <fn id="table4fn4">
              <p><sup>d</sup>Not applicable.</p>
            </fn>
          </table-wrap-foot>
        </table-wrap>
      </sec>
      <sec>
        <title>Participant Experience</title>
        <p>To learn more about the impression that participants had of <italic>Bernstein</italic>, we asked them to respond to a form with both open-ended and 5-item Likert-scale questions (with 1 being totally negative and 5 totally positive). As the results suggest (<xref ref-type="table" rid="table5">Table 5</xref>), in general, participants enjoyed the intervention and had a pleasant experience. The highest rated factors were the language used in the game and the scenery design. The factor with the lowest score was the usability. When asked what suggestions they had to improve <italic>Bernstein</italic>, students mentioned the following: adding a checklist of the activities the character must do, including directional arrows to guide the character, adding more engaging sound effects, including side quests to improve the player’s game stats, and adding a navigation map.</p>
        <table-wrap position="float" id="table5">
          <label>Table 5</label>
          <caption>
            <p>Evaluation of Bernstein.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="700"/>
            <col width="300"/>
            <thead>
              <tr valign="top">
                <td>Criterion</td>
                <td>Value, mean (SD)</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Usability</td>
                <td>3.63 (1.21)</td>
              </tr>
              <tr valign="top">
                <td>Language used</td>
                <td>4.43 (0.91)</td>
              </tr>
              <tr valign="top">
                <td>Narrative</td>
                <td>4.09 (1.07)</td>
              </tr>
              <tr valign="top">
                <td>Relationship with expectations</td>
                <td>3.74 (1.11)</td>
              </tr>
              <tr valign="top">
                <td>Character design</td>
                <td>3.98 (1.06)</td>
              </tr>
              <tr valign="top">
                <td>Scenery design</td>
                <td>4.17 (1.07)</td>
              </tr>
              <tr valign="top">
                <td>Navigation</td>
                <td>3.74 (1.09)</td>
              </tr>
              <tr valign="top">
                <td>Activities</td>
                <td>3.72 (1.29)</td>
              </tr>
              <tr valign="top">
                <td>Satisfaction</td>
                <td>3.85 (1.06)</td>
              </tr>
              <tr valign="top">
                <td>Experience</td>
                <td>4.02 (0.89)</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>Bullying is a serious psychosocial problem that affects a significant number of young people. To help mitigate its consequences, we created <italic>Bernstein</italic>, a serious game that promotes the protective factor of assertiveness. To assess its effects, we carried out an exploratory trial with students from local high schools. As the results show, with <italic>P</italic>&lt;.05, we obtained statistically significant results, confirming the feasibility of promoting assertiveness through <italic>Bernstein</italic>.</p>
        <p>In contrast, despite having obtained a statistically significant value, the effects of a single YPR session (the alternative protocol) were moderately negative. YPR was originally designed to be delivered over multiple sessions, so compressing it into a single session likely contributed to its limited impact. Future research should explore alternative delivery protocols, including cumulative sessions, to better enhance assertiveness outcomes.</p>
        <p>One way to estimate the effect size of an intervention, including those that seek to promote the protective factor of assertiveness, is to determine Cohen <italic>d</italic> for the values measured pre- and posttest [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref75">75</xref>]. Results of <italic>d</italic> can be interpreted as follows: 0.5 as small, from 0.5 to 0.8 as medium, and those 0.8 as large. For <italic>Bernstein</italic>, we obtained a Cohen <italic>d</italic> of 0.15885. These findings are consistent with results from similar interventions [<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref29">29</xref>]. Although the effect size may be classified as small, research suggests that even modest improvements in assertiveness can yield meaningful real-world outcomes. Assertiveness enables students to resist peer pressure, navigate interpersonal conflicts, and express personal boundaries effectively, without resorting to aggression [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref57">57</xref>]. Consequently, incremental yet sustained gains in assertiveness have the potential to enhance resilience, strengthen peer relationships, and reduce the risk of bullying incidents.</p>
        <p>To assess participant experience, we used a brief Likert-5 questionnaire. The highest rated features were language (4.43) and scenery design (4.17), while usability (3.63) and activities (3.72) scored lower, pointing to areas for improvement. Participants suggested adding activity checklists, directional arrows for navigation, and more engaging sound effects. These insights highlight key opportunities for future iterations. Improving usability will enhance player experience and better align game mechanics with mental health goals. Planned updates include clearer visual cues such as in-game maps, side quests to foster autonomy, new branching storylines to provide more opportunities for practicing assertiveness in varied contexts, and redesigned activities to sustain engagement and motivation.</p>
        <p>While our study demonstrated the feasibility of promoting assertiveness through <italic>Bernstein</italic>, conducting the trial remotely introduced limitations. Without in-person guidance, participants missed opportunities for immediate feedback, which could have enhanced engagement. Real-time facilitator support, available in face-to-face settings, would allow for clearer guidance, encouragement, and correction during gameplay.</p>
        <p>Although remote execution ensures safety and accessibility, follow-up studies should aim to compare remote and in-person interventions to better understand how delivery mode influences outcomes. A hybrid approach may ultimately strengthen <italic>Bernstein</italic>’s impact and scalability.</p>
        <p>Another limitation of this exploratory trial is the relatively small sample size of the intervention, which restricts the generalizability of the findings. Future interventions with larger, more diverse participant groups are necessary to strengthen external validity and provide more conclusive evidence of <italic>Bernstein</italic>’s effectiveness.</p>
        <p><italic>Bernstein</italic> simulates realistic social situations, allowing players to practice expressing needs, setting boundaries, and managing peer pressure—skills directly relevant to school and social environments. Future research should explore the real-world impact of these skills through longitudinal studies, follow-up assessments, or hybrid interventions that combine gameplay with guided reflection or role-playing exercises.</p>
        <p>While the RAS is a reliable tool for measuring assertiveness, its scope is primarily limited to behavioral expressions (ie, without explicitly evaluating underlying thought patterns or decision-making processes). Incorporating complementary metrics (eg, resilience, empathy, and cognitive or emotional regulation scales) would provide a more holistic assessment of <italic>Bernstein</italic>’s impact. Future studies should explore these additional dimensions to gain deeper insights into how the game influences players.</p>
        <p><italic>Bernstein</italic> is not the first serious game that seeks to contribute to the solution of the problem of bullying. Although there are other examples, to our knowledge, it is the only title that focuses on promoting the protective factor of assertiveness for that purpose. Future experiments with larger samples will be crucial to compare <italic>Bernstein</italic>’s effectiveness with other interventions and to validate its distinctiveness.</p>
      </sec>
      <sec>
        <title>Lessons Learned</title>
        <p>The results obtained through the application of MCS were satisfactory. In its current iteration, it offers a comprehensive framework that facilitates the design of games capable of promoting protective factors as well as reducing risk factors, all while maintaining a targeted focus.</p>
        <p>While serious games offer many benefits, they often fall short in replicating the complexities of real-world scenarios [<xref ref-type="bibr" rid="ref76">76</xref>]. MCS, however, empowers creators to design games that more effectively capture and simulate nuanced, multilayered situations. As demonstrated in this study, it has proven to be an effective tool for crafting settings that reflect real-life challenges, enabling a more immersive and impactful experience for players.</p>
        <p>We also identified areas for improvement. The Love Coin system functions as a cognitive-behavioral feedback mechanism, rewarding actions aligned with the game’s therapeutic goals. However, it may unintentionally bias player choices by encouraging reward-seeking over authentic exploration, leading players to prioritize earning coins over experimenting with diverse responses. This can limit deeper learning and reduce the sense of freedom, affecting the realism of their recovery journey. Future versions could implement more balanced scoring, rewarding effort, exploration, and varied strategies to promote meaningful engagement.</p>
        <p>Furthermore, we assessed the benefits of implementing MCS for a specific issue. To ascertain its effectiveness to address different mental problems, additional validation would be required.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>Bullying, characterized by physical, verbal, and psychological aggression, continues to pose significant challenges in educational settings worldwide. As official data suggest, Mexico holds the highest global incidence of school bullying. This highlights the urgency of finding innovative and effective solutions to mitigate its impact on students’ well-being.</p>
        <p>In response, we developed <italic>Bernstein</italic>, a serious game aimed at promoting assertiveness—identified as a key protective factor against bullying. Through the MCS methodology, grounded in CBT principles, <italic>Bernstein</italic> provides an interactive and immersive environment for players to develop interpersonal skills. The results of our intervention suggest that the game is a feasible tool for fostering assertiveness, with statistically significant improvements observed at <italic>P</italic>&lt;.05.</p>
        <p>While these findings are promising, it is essential to explore <italic>Bernstein</italic>’s efficacy in comparison with other bullying prevention interventions. Existing approaches, such as assertiveness training workshops, institutional awareness campaigns, and teacher-led interventions, have shown varying degrees of success. However, <italic>Bernstein</italic> offers a unique, scalable, and engaging alternative through a serious game, which may appeal to adolescents and allows them to practice assertive behaviors in a safe, controlled environment.</p>
        <p>The potential for broader impact lies in integrating <italic>Bernstein</italic> into school curricula. Unlike traditional interventions that rely heavily on lectures or role-playing exercises, <italic>Bernstein</italic> immerses students in realistic situations, enabling experiential learning at their own pace. Furthermore, the game could complement other antibullying strategies, such as peer mentoring or mental health support services, providing a well-rounded toolkit for educators.</p>
        <p>Future research should focus on expanding <italic>Bernstein</italic>’s implementation across diverse educational settings to evaluate its long-term impact and scalability. Collaborating with schools to integrate the game into regular curricula would allow for a more comprehensive evaluation of its effectiveness. Furthermore, comparative, “in-the-wild” studies with other antibullying programs could yield insights into how serious games such as <italic>Bernstein</italic> stack up against conventional interventions in promoting assertiveness and reducing bullying incidents.</p>
        <p>The findings presented here showcase the feasibility of using <italic>Bernstein</italic> to promote assertiveness. While further validation with larger samples is needed, the results offer promising evidence that game-based interventions can play a meaningful role in mitigating bullying. With proper support and integration into educational practices, <italic>Bernstein</italic> has the potential to become a valuable tool in the ongoing effort to combat bullying and foster healthier school environments in Mexico and worldwide.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">CBT</term>
          <def>
            <p>cognitive behavioral therapy</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">MCS</term>
          <def>
            <p>multiple composite scenarios</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">NPG</term>
          <def>
            <p>Ninja Pizza Girl</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">RAS</term>
          <def>
            <p>Rathus Assertiveness Schedule</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">RPG</term>
          <def>
            <p>role-playing game</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">YPR</term>
          <def>
            <p>Your Perfect Right</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>“And as you would that men should do to you, do you also to them in like manner” (Luke 6:31, Douay-Rheims). The authors would like to thank the authorities at Instituto Superior de Educación Normal del Estado de Colima, Professor Gregorio Torres Quintero, and Universidad de Colima for their support to conduct the study.</p>
    </ack>
    <notes>
      <sec>
        <title>Data Availability</title>
        <p>Anonymized experimental data and the version of <italic>Bernstein</italic> used in this work are available for research purposes upon request.</p>
      </sec>
    </notes>
    <fn-group>
      <fn fn-type="con">
        <p>FLS and FMR were involved in the conceptualization of the project and serious game. FLS and SST jointly conducted data curation. Formal analysis was carried out by FLS, SST, and TN. FLS led funding acquisition efforts and oversaw project administration. Investigation was a collaborative effort by FLS and FMR, while methodology was jointly developed by FLS, FMR, DBR, and AHR. Resources were provided by FLS. The software development team included FLS, FMR, DBR, and AHR. Supervision was shared among FLS, SST, and TN. Validation was conducted by FLS, SST, and TN, with visualization led by FLS, FMR, DBR, and AHR. The original draft was prepared by FLS and FMR, with further review and editing provided by FLS, SST, and TN. All authors read and approved the final version.</p>
      </fn>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Yu</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Wakefield</surname>
              <given-names>RL</given-names>
            </name>
            <name name-style="western">
              <surname>Leidner</surname>
              <given-names>DE</given-names>
            </name>
          </person-group>
          <article-title>Friend or foe cyberbullying in social network sites. ACM SIGMIS</article-title>
          <source>SIGMIS Database</source>
          <year>2016</year>
          <volume>47</volume>
          <issue>1</issue>
          <fpage>51</fpage>
          <lpage>71</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2894216.2894220"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2894216.2894220</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cohen</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Lam</surname>
              <given-names>DY</given-names>
            </name>
            <name name-style="western">
              <surname>Agarwal</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Cormier</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Jagdev</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Jin</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Kukreti</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Liu</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Rahim</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Rawat</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Sun</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Wexler</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Using computer technology to address the problem of cyberbullying</article-title>
          <source>SIGCAS Comput Soc</source>
          <year>2014</year>
          <volume>44</volume>
          <issue>2</issue>
          <fpage>52</fpage>
          <lpage>61</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2656870.2656876"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2656870.2656876</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>de la Serna</surname>
              <given-names>JM</given-names>
            </name>
          </person-group>
          <article-title>Causas del acoso escolar o bullying. Causes of bullying</article-title>
          <source>WebConsultas</source>
          <year>2013</year>
          <month>12</month>
          <day>09</day>
          <access-date>2021-01-17</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.webconsultas.com/bebes-y-ninos/psicologia-infantil/causas-del-acoso-escolar-o-bullying">http://www.webconsultas.com/bebes-y-ninos/psicologia-infantil/causas-del-acoso-escolar-o-bullying</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kwak</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Blackburn</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Han</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Exploring cyberbullying and other toxic behavior in team competition online games</article-title>
          <year>2015</year>
          <conf-name>CHI '15: CHI Conference on Human Factors in Computing Systems</conf-name>
          <conf-date>April 18, 2015</conf-date>
          <conf-loc>Seoul, South Korea</conf-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <fpage>3739</fpage>
          <lpage>3748</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2702123.2702529"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2702123.2702529</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sutherland</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Coventry</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Sillence</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Using animated scenarios to explore severity of cyberbullying and reporting readiness</article-title>
          <source>Proceedings of the 26th Australian Computer-Human Interaction Conference on Designing Futures: the Future of Design (OzCHI'14)</source>
          <year>2014</year>
          <conf-name>OzCHI '14: the Future of Design Sydney</conf-name>
          <conf-date>December 02, 2014</conf-date>
          <conf-loc>Sydney, New South Wales, Australia</conf-loc>
          <fpage>2</fpage>
          <lpage>5</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2686612.2686683"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2686612.2686683</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zych</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Ortega-Ruiz</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Del Rey</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Systematic review of theoretical studies on bullying and cyberbullying: facts, knowledge, prevention, and intervention</article-title>
          <source>Aggression Violent Behav</source>
          <year>2015</year>
          <volume>23</volume>
          <fpage>1</fpage>
          <lpage>21</lpage>
          <pub-id pub-id-type="doi">10.1016/j.avb.2015.10.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ayala</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Bullying en México supera promedio de la OCDE. Bullying in Mexico exceeds the OECD average</article-title>
          <source>Publimetro</source>
          <year>2017</year>
          <month>04</month>
          <day>19</day>
          <access-date>2021-01-17</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.publimetro.com.mx/mx/noticias/2017/04/19/bullying-mexico-supera-promedio-ocde.html">https://www.publimetro.com.mx/mx/noticias/2017/04/19/bullying-mexico-supera-promedio-ocde.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="web">
          <article-title>México primer lugar en bullying: OCDE. Mexico ranks first in bullying: OECD</article-title>
          <source>El Sol de Hidalgo</source>
          <year>2021</year>
          <access-date>2021-01-30</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.elsoldehidalgo.com.mx/local/mexico-primer-lugar-en-bullying-ocde-6304439.html#:~:text=De%20acuerdo%20con%20datos%20arrojados,y%20secundaria%20sufrieron%20violencia%20escolar">https://www.elsoldehidalgo.com.mx/local/mexico-primer-lugar-en-bullying-ocde-6304439.html#:~:text=De%20acuerdo%20con%20datos%20arrojados,y%20secundaria%20sufrieron%20violencia%20escolar</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="web">
          <article-title>Suicidio infantil en México: un problema del que no se habla lo suficiente. Child suicide in Mexico: a problem that is not talked about enough</article-title>
          <source>Pie de Página</source>
          <year>2021</year>
          <month>07</month>
          <day>12</day>
          <access-date>2021-12-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://piedepagina.mx/suicidio-infantil-en-mexico-un-problema-del-que-no-se-habla-lo-suficiente/">https://piedepagina.mx/suicidio-infantil-en-mexico-un-problema-del-que-no-se-habla-lo-suficiente/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zych</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Farrington</surname>
              <given-names>DP</given-names>
            </name>
            <name name-style="western">
              <surname>Llorent</surname>
              <given-names>VJ</given-names>
            </name>
            <name name-style="western">
              <surname>Ttofi</surname>
              <given-names>MM</given-names>
            </name>
          </person-group>
          <source>Protecting Children Against Bullying and Its Consequences</source>
          <year>2017</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lepe-Salazar</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Preventing anorexia nervosa through cognitive-behavioral feedback in an affective game</article-title>
          <year>2015</year>
          <conf-name>17th International Conference on E-health Networking, Application &amp; Services (HealthCom)</conf-name>
          <conf-date>October 17, 2015</conf-date>
          <conf-loc>Boston, MA</conf-loc>
          <fpage>14</fpage>
          <lpage>17</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1109/HealthCom.2015.7454529"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/healthcom.2015.7454529</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="web">
          <article-title>Eight examples that explain all you need to know about serious games and game-based learning</article-title>
          <source>Gamelearn</source>
          <year>2021</year>
          <month>01</month>
          <day>17</day>
          <access-date>2021-01-17</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.game-learn.com/en/resources/blog/all-you-need-to-know-serious-games-game-based-learning-examples/">https://www.game-learn.com/en/resources/blog/all-you-need-to-know-serious-games-game-based-learning-examples/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lepe-Salazar</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Salgado-Torres</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Multiple composite scenarios: a game-based methodology for the prevention of mental disorders</article-title>
          <source>Entertainment Comput</source>
          <year>2023</year>
          <volume>44</volume>
          <fpage>100519</fpage>
          <pub-id pub-id-type="doi">10.1016/j.entcom.2022.100519</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Balayn</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Szlavik</surname>
              <given-names>Z</given-names>
            </name>
            <name name-style="western">
              <surname>Bozzon</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Automatic identification of harmful, aggressive, abusive, and offensive language on the web: a survey of technical biases informed by psychology literature</article-title>
          <source>Trans Soc Comput</source>
          <year>2021</year>
          <volume>4</volume>
          <issue>3</issue>
          <fpage>1</fpage>
          <lpage>56</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3479158"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3479158</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gaffney</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Farrington</surname>
              <given-names>DP</given-names>
            </name>
            <name name-style="western">
              <surname>White</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Anti-bullying programs—toolkit technical report</article-title>
          <source>Youth Endowment Fund</source>
          <year>2021</year>
          <month>6</month>
          <access-date>2024-11-27</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://youthendowmentfund.org.uk/wp-content/uploads/2021/06/Anti-bullying-programmes-Technical-Report.pdf">https://youthendowmentfund.org.uk/wp-content/uploads/2021/06/Anti-bullying-programmes-Technical-Report.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Iivari</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Ventä-Olkkonen</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Sharma</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Molin-Juustila</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Kinnunen</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>CHI against bullying: taking stock of the past and envisioning the future</article-title>
          <year>2021</year>
          <conf-name>CHI '21: CHI Conference on Human Factors in Computing Systems</conf-name>
          <conf-date>May 07, 2021</conf-date>
          <conf-loc>Yokohama, Japan</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3411764.3445282"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3411764.3445282</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kinnunen</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Tackling bullying with technology—a  literature review of existing bullying prevention solutions</article-title>
          <source>Oulun Yliopisto</source>
          <year>2022</year>
          <access-date>2022-05-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://urn.fi/URN:NBN:fi:oulu-202205121965">http://urn.fi/URN:NBN:fi:oulu-202205121965</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lievense</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Vacaru</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Liber</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Bonnet</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Sterkenburg</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>"Stop bullying now!" investigating the effectiveness of a serious game for teachers in promoting autonomy-supporting strategies for disabled adults: a randomized controlled trial</article-title>
          <source>Disabil Health J</source>
          <year>2019</year>
          <volume>12</volume>
          <issue>2</issue>
          <fpage>310</fpage>
          <lpage>317</lpage>
          <pub-id pub-id-type="doi">10.1016/j.dhjo.2018.11.013</pub-id>
          <pub-id pub-id-type="medline">30514657</pub-id>
          <pub-id pub-id-type="pii">S1936-6574(18)30245-0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stavroulia</surname>
              <given-names>KE</given-names>
            </name>
            <name name-style="western">
              <surname>Ruiz-Harisiou</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Manouchou</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Georgiou</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Sella</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Lanitis</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>A 3D virtual environment for training teachers to identify bullying</article-title>
          <year>2016</year>
          <conf-name>18th Mediterranean Electrotechnical Conference (MELECON)</conf-name>
          <conf-date>2016 April 20</conf-date>
          <conf-loc>Lemesos, Cyprus</conf-loc>
          <fpage>1</fpage>
          <lpage>6</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1109/MELCON.2016.7495417"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/melcon.2016.7495417</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bellini</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Olivier</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Comber</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>"That Really Pushes My Buttons": designing bullying and harassment training for the workplace</article-title>
          <source>Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI'18)</source>
          <year>2018</year>
          <conf-name>CHI '18: CHI Conference on Human Factors in Computing Systems</conf-name>
          <conf-date>April 21, 2018</conf-date>
          <conf-loc>Montreal, QC</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3173574.3173809"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3173574.3173809</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alm</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>The role of shyness and self-focused attention for attribution of reactions in social situations to internal and external causes</article-title>
          <source>Scand J Psychol</source>
          <year>2007</year>
          <volume>48</volume>
          <issue>6</issue>
          <fpage>519</fpage>
          <lpage>527</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1467-9450.2007.00607.x</pub-id>
          <pub-id pub-id-type="medline">18028074</pub-id>
          <pub-id pub-id-type="pii">SJOP607</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Matsunaga</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Parents don’t (Always) Know their children have been bullied: child-parent discrepancy on bullying and family-level profile of communication standards</article-title>
          <source>Hum Commun Res</source>
          <year>2009</year>
          <volume>35</volume>
          <issue>2</issue>
          <fpage>221</fpage>
          <lpage>247</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1468-2958.2009.01345.x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tsaousis</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>The relationship of self-esteem to bullying perpetration and peer victimization among schoolchildren and adolescents: a meta-analytic review</article-title>
          <source>Aggression Violent Behav</source>
          <year>2016</year>
          <volume>31</volume>
          <fpage>186</fpage>
          <lpage>199</lpage>
          <pub-id pub-id-type="doi">10.1016/j.avb.2016.09.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wei</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Zhang</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ye</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Meng</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>A school bullying detecting algorithm based on motion recognition and speech emotion recognition</article-title>
          <year>2020</year>
          <conf-name>International Conference on Intelligent Computing and Human-Computer Interaction (ICHCI)</conf-name>
          <conf-date>December 06, 2020</conf-date>
          <conf-loc>Sanya, China</conf-loc>
          <fpage>276</fpage>
          <lpage>279</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1109/ICHCI51889.2020.00066"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/ichci51889.2020.00066</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>PK</given-names>
            </name>
          </person-group>
          <article-title>Bullying: definition, types, causes, consequences and intervention</article-title>
          <source>Soc Pers Psychol Compass</source>
          <year>2016</year>
          <volume>10</volume>
          <issue>9</issue>
          <fpage>519</fpage>
          <lpage>532</lpage>
          <pub-id pub-id-type="doi">10.1111/spc3.12266</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Farrington</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Baldry</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Individual risk factors for school bullying</article-title>
          <source>J Aggress Conflict Peace Res</source>
          <year>2010</year>
          <volume>2</volume>
          <issue>1</issue>
          <fpage>4</fpage>
          <lpage>16</lpage>
          <pub-id pub-id-type="doi">10.5042/jacpr.2010.0001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="web">
          <article-title>Assertiveness training</article-title>
          <source>Association for Behavioral and Cognitive Therapies (ABCT)</source>
          <year>2022</year>
          <access-date>2022-09-29</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.abct.org/fact-sheets/assertiveness-training/">https://www.abct.org/fact-sheets/assertiveness-training/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nakamura</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Yoshinaga</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Tanoue</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Kato</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Nakamura</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Aoishi</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Shiraishi</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Development and evaluation of a modified brief assertiveness training for nurses in the workplace: a single-group feasibility study</article-title>
          <source>BMC Nurs</source>
          <year>2017</year>
          <volume>16</volume>
          <fpage>29</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcnurs.biomedcentral.com/articles/10.1186/s12912-017-0224-4"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12912-017-0224-4</pub-id>
          <pub-id pub-id-type="medline">28592922</pub-id>
          <pub-id pub-id-type="pii">224</pub-id>
          <pub-id pub-id-type="pmcid">PMC5461750</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Omura</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Maguire</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Levett-Jones</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Stone</surname>
              <given-names>TE</given-names>
            </name>
          </person-group>
          <article-title>The effectiveness of assertiveness communication training programs for healthcare professionals and students: a systematic review</article-title>
          <source>Int J Nurs Stud</source>
          <year>2017</year>
          <volume>76</volume>
          <fpage>120</fpage>
          <lpage>128</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijnurstu.2017.09.001</pub-id>
          <pub-id pub-id-type="medline">28964979</pub-id>
          <pub-id pub-id-type="pii">S0020-7489(17)30200-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>YC</given-names>
            </name>
          </person-group>
          <source>BREAKAWAY: Examining the Educational Potential of Using a Narrative-Based Digital Game for Bullying Prevention</source>
          <year>2018</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>State University of New York at Buffalo</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Calvo-Morata</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Alonso-Fernández</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Freire</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Martínez-Ortiz</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Fernández-Manjón</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Serious games to prevent and detect bullying and cyberbullying: a systematic serious games and literature review</article-title>
          <source>Comput Educ</source>
          <year>2020</year>
          <volume>157</volume>
          <fpage>103958</fpage>
          <pub-id pub-id-type="doi">10.1016/j.compedu.2020.103958</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Calvo-Morata</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Alonso-Fernández</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Freire</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Martínez-Ortiz</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Fernández-Manjón</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Creating awareness on bullying and cyberbullying among young people: validating the effectiveness and design of the serious game Conectado</article-title>
          <source>Telematics Inform</source>
          <year>2021</year>
          <volume>60</volume>
          <fpage>101568</fpage>
          <pub-id pub-id-type="doi">10.1016/j.tele.2021.101568</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>María</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Del moral pérez and lourdes villalustre martínez análisis de "serious games" anti-"bullying": recursos lúdicos para promover habilidades prosociales en escolares</article-title>
          <source>Rev Complut Educ</source>
          <year>2018</year>
          <volume>29</volume>
          <issue>4</issue>
          <fpage>1345</fpage>
          <lpage>1364</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.5209/RCED.55419"/>
          </comment>
          <pub-id pub-id-type="doi">10.5209/rced.55419</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ferreira</surname>
              <given-names>Pc</given-names>
            </name>
            <name name-style="western">
              <surname>Veiga Simão</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Paiva</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Martinho</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Prada</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Ferreira</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Santos</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Exploring empathy in cyberbullying with serious games</article-title>
          <source>Comput Educ</source>
          <year>2021</year>
          <volume>166</volume>
          <fpage>104155</fpage>
          <pub-id pub-id-type="doi">10.1016/j.compedu.2021.104155</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hall</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Jones</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Paiva</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Aylett</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Fear Not! providing children with strategies to cope with bullying</article-title>
          <year>2009</year>
          <conf-name>IDC '09: The 8th International Conference on Interactive Design and Children</conf-name>
          <conf-date>2009 June 03, 2009</conf-date>
          <conf-loc>Como, Italy</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/1551788.1551854"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/1551788.1551854</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Koli-Vehovec</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Smojver-Ai</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Dori</surname>
              <given-names>TM</given-names>
            </name>
            <name name-style="western">
              <surname>Ronevi Zubkovi</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Evaluation of serious game for changing students' behavior in bullying situation</article-title>
          <source>J Comput Assist Learn</source>
          <year>2020</year>
          <volume>36</volume>
          <issue>3</issue>
          <fpage>323</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1111/jcal.12402"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/jcal.12402/v2/response1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kriglstein</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Hengstberger</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Fribert</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Stiehl</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Schrank</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Pfeiffer</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Wernbacher</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Wallner</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Be a buddy not a bully—two educational games to help prevent bullying in schools</article-title>
          <year>2020</year>
          <conf-name>CHI PLAY '20: The Annual Symposium on Computer-Human Interaction in Play</conf-name>
          <conf-date>November 2-5, 2020</conf-date>
          <conf-loc>Ottawa, Canada</conf-loc>
          <fpage>287</fpage>
          <lpage>291</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3383668.3419914"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3383668.3419914</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mancilla-Caceres</surname>
              <given-names>JF</given-names>
            </name>
            <name name-style="western">
              <surname>Amir</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Espelage</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Adaptive game for reducing aggressive behavior</article-title>
          <source>Proceedings of the companion publication of the 2013 international conference on Intelligent user interfaces companion (IUI '13 Companion)</source>
          <year>2013</year>
          <conf-name>IUI '13: 18th International Conference on Intelligent User Interfaces</conf-name>
          <conf-date>March 19, 2013</conf-date>
          <conf-loc>Santa Monica, CA</conf-loc>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2451176.2451183"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2451176.2451183</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Raminhos</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Cláudio</surname>
              <given-names>AP</given-names>
            </name>
            <name name-style="western">
              <surname>Carmo</surname>
              <given-names>MB</given-names>
            </name>
            <name name-style="western">
              <surname>Carvalhosa</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Candeias</surname>
              <given-names>MJ</given-names>
            </name>
            <name name-style="western">
              <surname>Gaspar</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>A serious game-based solution to prevent bullying</article-title>
          <year>2015</year>
          <conf-name>The 13th International Conference on Advances in Mobile Computing and Multimedia</conf-name>
          <conf-date>December 13, 2015</conf-date>
          <conf-loc>Brussels, Belgium</conf-loc>
          <fpage>11</fpage>
          <lpage>13</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2837126.2837135"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2837126.2837135</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shome</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Rahman</surname>
              <given-names>MM</given-names>
            </name>
            <name name-style="western">
              <surname>Chellappan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Al Islam</surname>
              <given-names>ABMA</given-names>
            </name>
          </person-group>
          <article-title>A generalized mechanism beyond NLP for real-time detection of cyber abuse through facial expression analytics</article-title>
          <year>2020</year>
          <conf-name>MobiQuitous: Computing, Networking and Services</conf-name>
          <conf-date>February 03, 2020</conf-date>
          <conf-loc>Houston, TX</conf-loc>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <fpage>348</fpage>
          <lpage>357</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3360774.3360793"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3360774.3360793</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Yoon</surname>
              <given-names>HS</given-names>
            </name>
          </person-group>
          <article-title>A case study on the development of a serious game "Happy Class" for preventing cyber bullying</article-title>
          <source>J Korea Game Soc</source>
          <year>2020</year>
          <volume>20</volume>
          <issue>2</issue>
          <fpage>45</fpage>
          <lpage>59</lpage>
          <pub-id pub-id-type="doi">10.7583/jkgs.2020.20.2.45</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lepe-Salazar</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>A model to analyze and design educational games with pedagogical foundations</article-title>
          <year>2015</year>
          <conf-name>ACE 2015: 12th International Conference on Advances in Computer Entertainment Technology</conf-name>
          <conf-date>November 15, 2015</conf-date>
          <conf-loc>Iskandar, Malaysia</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2832932.2832951"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2832932.2832951</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lepe-Salazar</surname>
              <given-names>F</given-names>
            </name>
          </person-group>
          <article-title>Más allá de la diversiónxplorando el potencial de los videojuegos</article-title>
          <source>Ludolab</source>
          <year>2021</year>
          <month>08</month>
          <access-date>2022-12-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://ludolab.org/mas-alla-de-la-diversion-explorando-el-potencial-de-los-videojuegos/">https://ludolab.org/mas-alla-de-la-diversion-explorando-el-potencial-de-los-videojuegos/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lepe-Salazar</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Cortés-Álvarez</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Serratos</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Jauregui-Flores</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Juárez-Cervantes</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Valdovinos-López</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Rincón-Martínez</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Moreno-De la Madrid</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>A game-based service to mitigate the risk of inundations caused by solid waste accumulation, Chapter 13, 22</article-title>
          <source>Making Smart Cities More Playable</source>
          <year>2019</year>
          <publisher-loc>Singapore</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Disparity Games</collab>
          </person-group>
          <source>Ninja Pizza Girl</source>
          <year>2017</year>
          <month>04</month>
          <access-date>2021-01-17</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.facebook.com/disparitygames/">https://www.facebook.com/disparitygames/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Stuart</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Ninja Pizza Girl—a game about daughters and bullying</article-title>
          <source>The Guardian</source>
          <year>2014</year>
          <month>08</month>
          <day>12</day>
          <access-date>2014-08-12</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.theguardian.com/technology/2014/aug/12/ninja-pizza-girl-a-game-about-daughters-and-bullying">https://www.theguardian.com/technology/2014/aug/12/ninja-pizza-girl-a-game-about-daughters-and-bullying</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gómez</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>A day at my school—denouncing bullying through games</article-title>
          <source>On Serious Games</source>
          <year>2016</year>
          <month>03</month>
          <day>07</day>
          <access-date>2021-01-17</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.onseriousgames.com/a-day-at-my-school-denouncing-bullying/">http://www.onseriousgames.com/a-day-at-my-school-denouncing-bullying/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pérez-Domínguez</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Bully you, Bully Me – strategy party game about bullying and school shootings (2015)</article-title>
          <source>Civic Playground</source>
          <year>2015</year>
          <access-date>2012-12-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://civicplaygrounds.com/portfolio-item/board-game-about-bullying-and-school-shootings/">https://civicplaygrounds.com/portfolio-item/board-game-about-bullying-and-school-shootings/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <collab>Rockstar Vancouver</collab>
          </person-group>
          <source>Bully</source>
          <year>2006</year>
          <month>10</month>
          <day>17</day>
          <access-date>2023-10-17</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://store.playstation.com/es-gt/product/UP1004-CUSA03507_00-SLUS212690000001">https://store.playstation.com/es-gt/product/UP1004-CUSA03507_00-SLUS212690000001</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Benites Paradeda</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Martinho</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Paiva</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Persuasion strategies using a social robot in an interactive storytelling scenario</article-title>
          <year>2020</year>
          <conf-name>HAI '20: 8th International Conference on Human-Agent Interaction</conf-name>
          <conf-date>November 10-13, 2020</conf-date>
          <conf-loc>Virtual event United States</conf-loc>
          <fpage>69</fpage>
          <lpage>77</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3406499.3415084"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3406499.3415084</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Charlton</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Kingston</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Petridis</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Fletcher</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Using data mining to refine digital behaviour change interventions</article-title>
          <year>2017</year>
          <conf-name>In Proceedings of the  International Conference on Digital Health (DH '17)</conf-name>
          <conf-date>July 02, 2017</conf-date>
          <conf-loc>London, United Kingdom</conf-loc>
          <fpage>90</fpage>
          <lpage>98</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3079452.3079468"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3079452.3079468</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cheong</surname>
              <given-names>YC</given-names>
            </name>
            <name name-style="western">
              <surname>Khaled</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Grappiolo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Campos</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Martinho</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Ingram</surname>
              <given-names>GPD</given-names>
            </name>
            <name name-style="western">
              <surname>Paiva</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Yannakakis</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>A computational approach towards conflict resolution for serious games</article-title>
          <year>2011</year>
          <conf-name>FDG'11: Foundations of Digital Games</conf-name>
          <conf-date>June 29, 2011</conf-date>
          <conf-loc>Bordeaux, France</conf-loc>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2159365.2159368"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2159365.2159368</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eddy</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Is  technology killing human emotion? how computer-mediated communication compares to face-to-face interactions</article-title>
          <year>2019</year>
          <conf-name>MuC'19: Mensch-und-Computer</conf-name>
          <conf-date>September 08, 2019</conf-date>
          <conf-loc>Hamburg, Germany</conf-loc>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3340764.3344451"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3340764.3344451</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lappalainen</surname>
              <given-names>PH</given-names>
            </name>
          </person-group>
          <article-title>Educating for diversity management in engineering</article-title>
          <year>2020</year>
          <conf-name>IEEE Global Engineering Education Conference (EDUCON)</conf-name>
          <conf-date>April 30, 2020</conf-date>
          <conf-loc>Porto, Portugal</conf-loc>
          <fpage>1483</fpage>
          <lpage>1486</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1109/EDUCON45650.2020.9125329"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/educon45650.2020.9125329</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Miller Frank</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Peters</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Building trust: the importance of both task and social precursors</article-title>
          <year>1998</year>
          <conf-name>In Proceedings of International Conference on Engineering and Technology Management (IEMC '98)</conf-name>
          <conf-date>August 06, 2002</conf-date>
          <conf-loc>San Juan, PR</conf-loc>
          <fpage>322</fpage>
          <lpage>327</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1109/IEMC.1998.727781"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/iemc.1998.727781</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Paradeda</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Ferreira</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Oliveira</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Martinho</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Paiva</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The role of assertiveness in a storytelling game with persuasive robotic non-player characters</article-title>
          <year>2019</year>
          <conf-name>CHI PLAY '19: The Annual Symposium on Computer-Human Interaction in Play</conf-name>
          <conf-date>October 17, 2019</conf-date>
          <conf-loc>Barcelona, Spain</conf-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/3311350.3347162"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/3311350.3347162</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reimold</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Becoming more assertive in your communications</article-title>
          <year>1996</year>
          <conf-name>IPCC 96: Communication on the Fast Track. IPCC 96 Proceedings</conf-name>
          <conf-date>August 06, 2002</conf-date>
          <conf-loc>Saratoga Springs, NY</conf-loc>
          <fpage>122</fpage>
          <lpage>130</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1109/IPCC.1996.552589"/>
          </comment>
          <pub-id pub-id-type="doi">10.1109/ipcc.1996.552589</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Alberti</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Emmons</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>Your Perfect Right: Assertiveness and Equality in Your Life and Relationships</source>
          <year>2017</year>
          <publisher-loc>Oakland, CA</publisher-loc>
          <publisher-name>New Harbinger Publications</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hendrix</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>van Herk</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Verhaegh</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Markopoulos</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Increasing children's social competence through games, an exploratory study</article-title>
          <year>2009</year>
          <conf-name>IDC '09: The 8th International Conference on Interactive Design and Children</conf-name>
          <conf-date>June 03, 2009</conf-date>
          <conf-loc>Como, Italy</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/1551788.1551823"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/1551788.1551823</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Eng</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Game-based learning to teach assertive communication ClickTalk for enhancing team play</article-title>
          <year>2017</year>
          <conf-name>Information Science and Applications 2017. ICISA 2017</conf-name>
          <conf-date>March 20-23, 2017</conf-date>
          <conf-loc>Macau, China</conf-loc>
          <pub-id pub-id-type="doi">10.1007/978-981-10-4154-9_76</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van der Lubbe</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gerritsen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Formolo</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Otte</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bosse</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Gentile</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Allegra</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Söbke</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Tibor Bosse</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>A serious game for training verbal resilience to doorstep scams</article-title>
          <source>Games and Learning Alliance. GALA 2018. Lecture Notes in Computer Science</source>
          <year>2019</year>
          <publisher-loc>Cham, Switzerland</publisher-loc>
          <publisher-name>Springer</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van der Lubbe</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Gerritsen</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Klein</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hindriks</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Empowering vulnerable target groups with serious games and gamification</article-title>
          <source>Entertainment Comput</source>
          <year>2021</year>
          <volume>38</volume>
          <fpage>100402</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.entcom.2020.100402"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.entcom.2020.100402</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Beck</surname>
              <given-names>JS</given-names>
            </name>
          </person-group>
          <source>Cognitive Behavior Therapy: Basics and Beyond (2nd edition)</source>
          <year>2011</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Guilford Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Leahy</surname>
              <given-names>RL</given-names>
            </name>
          </person-group>
          <source>Cognitive Therapy Techniques: A Practitioner's Guide</source>
          <year>2017</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Guilford Press</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Montgomery</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Grant</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Mayo-Wilson</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Macdonald</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Michie</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Hopewell</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Moher</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Reporting randomised trials of social and psychological interventions: the CONSORT-SPI 2018 Extension</article-title>
          <source>Trials</source>
          <year>2018</year>
          <volume>19</volume>
          <issue>1</issue>
          <fpage>407</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://trialsjournal.biomedcentral.com/articles/10.1186/s13063-018-2733-1"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s13063-018-2733-1</pub-id>
          <pub-id pub-id-type="medline">30060754</pub-id>
          <pub-id pub-id-type="pii">10.1186/s13063-018-2733-1</pub-id>
          <pub-id pub-id-type="pmcid">PMC6066921</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>León Madrigal</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Revisión de la escala de asertividad de rathus adaptada por León y Vargas (2009). Review of the Rathus Assertiveness Scale adapted by Leon and Vargas (2009)</article-title>
          <source>Rev Reflexiones</source>
          <year>2009</year>
          <volume>93</volume>
          <issue>1</issue>
          <pub-id pub-id-type="doi">10.15517/rr.v93i1.13751</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rathus</surname>
              <given-names>SA</given-names>
            </name>
          </person-group>
          <article-title>A 30-item schedule for assessing assertive behavior</article-title>
          <source>Behav Ther</source>
          <year>1973</year>
          <volume>4</volume>
          <issue>3</issue>
          <fpage>398</fpage>
          <lpage>406</lpage>
          <pub-id pub-id-type="doi">10.1016/s0005-7894(73)80120-0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gustafson</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>A Swedish psychometric test of the Rathus Assertiveness Schedule</article-title>
          <source>Psychol Rep</source>
          <year>1992</year>
          <volume>71</volume>
          <issue>2</issue>
          <fpage>479</fpage>
          <lpage>482</lpage>
          <pub-id pub-id-type="doi">10.2466/pr0.1992.71.2.479</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mann</surname>
              <given-names>RJ</given-names>
            </name>
            <name name-style="western">
              <surname>Flowers</surname>
              <given-names>JV</given-names>
            </name>
          </person-group>
          <article-title>An investigation of the validity and reliability of the Rathus Assertion Schedule</article-title>
          <source>Psychol Rep</source>
          <year>1978</year>
          <volume>42</volume>
          <issue>2</issue>
          <fpage>632</fpage>
          <lpage>634</lpage>
          <pub-id pub-id-type="doi">10.2466/pr0.1978.42.2.632</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ingram</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Salzberg</surname>
              <given-names>HC</given-names>
            </name>
          </person-group>
          <article-title>Effects of in vivo behavioral rehearsal on the learning of assertive behaviors with a substance abusing population</article-title>
          <source>Addict Behav</source>
          <year>1990</year>
          <volume>15</volume>
          <issue>2</issue>
          <fpage>189</fpage>
          <lpage>194</lpage>
          <pub-id pub-id-type="doi">10.1016/0306-4603(90)90025-s</pub-id>
          <pub-id pub-id-type="medline">2343795</pub-id>
          <pub-id pub-id-type="pii">0306-4603(90)90025-S</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Omura</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Levett-Jones</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Stone</surname>
              <given-names>TE</given-names>
            </name>
          </person-group>
          <article-title>Evaluating the impact of an assertiveness communication training programme for Japanese nursing students: a quasi-experimental study</article-title>
          <source>Nurs Open</source>
          <year>2019</year>
          <volume>6</volume>
          <issue>2</issue>
          <fpage>463</fpage>
          <lpage>472</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://europepmc.org/abstract/MED/30918697"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/nop2.228</pub-id>
          <pub-id pub-id-type="medline">30918697</pub-id>
          <pub-id pub-id-type="pii">NOP2228</pub-id>
          <pub-id pub-id-type="pmcid">PMC6419109</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dell</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Vaidyanathan</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Medhi</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Cutrell</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Thies</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Yours is better! participant response bias in HCI</article-title>
          <year>2012</year>
          <conf-name>CHI '12: CHI Conference on Human Factors in Computing Systems</conf-name>
          <conf-date>May 05, 2012</conf-date>
          <conf-loc>Austin, TX</conf-loc>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Association for Computing Machinery</publisher-name>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1145/2207676.2208589"/>
          </comment>
          <pub-id pub-id-type="doi">10.1145/2207676.2208589</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Box</surname>
              <given-names>GEP</given-names>
            </name>
            <name name-style="western">
              <surname>Hunter</surname>
              <given-names>JS</given-names>
            </name>
            <name name-style="western">
              <surname>Hunter</surname>
              <given-names>WG</given-names>
            </name>
          </person-group>
          <source>Statistics for Experimenters: Design, Innovation and discovery</source>
          <year>2005</year>
          <publisher-loc>Hoboken, NJ</publisher-loc>
          <publisher-name>John Wiley &amp; Sons, Inc</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lazar</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Feng</surname>
              <given-names>JH</given-names>
            </name>
            <name name-style="western">
              <surname>Hochheiser</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <source>Research Methods in Human-Computer Interaction</source>
          <year>2017</year>
          <publisher-loc>Cambridge, MA</publisher-loc>
          <publisher-name>Morgan Kaufmann Publishers</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cohen</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>Statistical Power Analysis for the Behavioral Sciences</source>
          <year>1988</year>
          <publisher-loc>New York, NY</publisher-loc>
          <publisher-name>Routledge</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sparks</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Metafocus: How Realistic Should Your Serious Game Be?</article-title>
          <source>Learning guild</source>
          <year>2019</year>
          <access-date>2019-07-01</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.learningguild.com/articles/metafocus-how-realistic-should-your-serious-game-be/">https://www.learningguild.com/articles/metafocus-how-realistic-should-your-serious-game-be/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
