<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JMIR</journal-id>
      <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
      <journal-title>Journal of Medical Internet Research</journal-title>
      <issn pub-type="epub">1438-8871</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
    <article-id pub-id-type="publisher-id">v19i5e170</article-id>
    <article-id pub-id-type="pmid">28526662</article-id>
    <article-id pub-id-type="doi">10.2196/jmir.6694</article-id>
    <article-categories>
      <subj-group subj-group-type="heading">
        <subject>Original Paper</subject>
      </subj-group>
      <subj-group subj-group-type="article-type">
        <subject>Original Paper</subject>
      </subj-group>
    </article-categories>
    <title-group>
      <article-title>Attachment Style and Internet Addiction: An Online Survey</article-title>
    </title-group>
    <contrib-group>
      <contrib contrib-type="editor">
        <name>
          <surname>Eysenbach</surname>
          <given-names>Gunther</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Tayaben</surname>
          <given-names>Jude</given-names>
        </name>
      </contrib>
      <contrib contrib-type="reviewer">
        <name>
          <surname>Apolinário-Hagen</surname>
          <given-names>Jennifer</given-names>
        </name>
      </contrib>
    </contrib-group>
    <contrib-group>
      <contrib contrib-type="author" id="contrib1" corresp="yes">
      <name name-style="western">
        <surname>Eichenberg</surname>
        <given-names>Christiane</given-names>
      </name>
      <degrees>PhD</degrees>
      <xref rid="aff1" ref-type="aff">1</xref>
      <address>
        <institution>Sigmund Freud PrivatUniversität Wien</institution>
        <addr-line>Kelsenstr 2</addr-line>
        <addr-line>Vienna,</addr-line>
        <country>Austria</country>
        <phone>43 1 7984098</phone>
        <email>eichenberg@sfu.ac.at</email>
      </address>  
      <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-5803-4965</ext-link></contrib>
      <contrib contrib-type="author" id="contrib2">
        <name name-style="western">
          <surname>Schott</surname>
          <given-names>Markus</given-names>
        </name>
        <degrees>MSc</degrees>
        <xref rid="aff1" ref-type="aff">1</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-2005-2150</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib3">
        <name name-style="western">
          <surname>Decker</surname>
          <given-names>Oliver</given-names>
        </name>
        <degrees>PhD</degrees>
        <xref rid="aff2" ref-type="aff">2</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-9524-921X</ext-link>
      </contrib>
      <contrib contrib-type="author" id="contrib4">
        <name name-style="western">
          <surname>Sindelar</surname>
          <given-names>Brigitte</given-names>
        </name>
        <degrees>PhD</degrees>
        <xref rid="aff1" ref-type="aff">1</xref>
        <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-3377-9693</ext-link>
      </contrib>
    </contrib-group>
    <aff id="aff1">
      <sup>1</sup>
      <institution>Sigmund Freud PrivatUniversität Wien</institution>
      <addr-line>Vienna</addr-line>
      <country>Austria</country>
    </aff>
    <aff id="aff2">
      <sup>2</sup>
      <institution>Universtität Leipzig</institution>
      <addr-line>Leipzig</addr-line>
      <country>Germany</country>
    </aff>
    <author-notes>
      <corresp>Corresponding Author: Christiane Eichenberg 
      <email>eichenberg@sfu.ac.at</email></corresp>
    </author-notes>
    <pub-date pub-type="collection"><month>05</month><year>2017</year></pub-date>
    <pub-date pub-type="epub">
      <day>17</day>
      <month>05</month>
      <year>2017</year>
    </pub-date>
    <volume>19</volume>
    <issue>5</issue>
    <elocation-id>e170</elocation-id>
    <!--history from ojs - api-xml-->
    <history>
      <date date-type="received">
        <day>25</day>
        <month>9</month>
        <year>2016</year>
      </date>
      <date date-type="rev-request">
        <day>3</day>
        <month>11</month>
        <year>2016</year>
      </date>
      <date date-type="rev-recd">
        <day>20</day>
        <month>1</month>
        <year>2017</year>
      </date>
      <date date-type="accepted">
        <day>8</day>
        <month>2</month>
        <year>2017</year>
      </date>
    </history>
    <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
    <copyright-statement>©Christiane Eichenberg, Markus Schott, Oliver Decker, Brigitte Sindelar. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 17.05.2017.</copyright-statement>
    <copyright-year>2017</copyright-year>
    <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.0/">
      <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
    </license>  
    <self-uri xlink:href="http://www.jmir.org/2017/5/e170/" xlink:type="simple"/>
    <abstract>
      <sec sec-type="background">
        <title>Background</title>
        <p>One of the clinically relevant problems of Internet use is the phenomenon of Internet addiction. Considering the fact that there is ample evidence for the relationship between attachment style and substance abuse, it stands to reason that attachment theory can also make an important contribution to the understanding of the pathogenesis of Internet addiction.</p>
      </sec>
      <sec sec-type="objective">
        <title>Objective</title>
        <p>The aim of this study was to examine people’s tendency toward pathological Internet usage in relation to their attachment style.</p>
      </sec>
      <sec sec-type="methods">
        <title>Methods</title>
        <p>An online survey was conducted. Sociodemographic data, attachment style (Bielefeld questionnaire partnership expectations), symptoms of Internet addiction (scale for online addiction for adults), used Web-based services, and online relationship motives (Cyber Relationship Motive Scale, CRMS-D) were assessed. In order to confirm the findings, a study using the Rorschach test was also conducted.</p>
      </sec>
      <sec sec-type="results">
        <title>Results</title>
        <p>In total, 245 subjects were recruited. Participants with insecure attachment style showed a higher tendency to pathological Internet usage compared with securely attached participants. An ambivalent attachment style was particularly associated with pathological Internet usage. Escapist and social-compensatory motives played an important role for insecurely attached subjects. However, there were no significant effects with respect to Web-based services and apps used. Results of the analysis of the Rorschach protocol with 16 subjects corroborated these results. Users with pathological Internet use frequently showed signs of infantile relationship structures in the context of social groups. This refers to the results of the Web-based survey, in which interpersonal relationships were the result of an insecure attachment style.</p>
      </sec>
      <sec sec-type="conclusions">
        <title>Conclusions</title>
        <p>Pathological Internet use was a function of insecure attachment and limited interpersonal relationships.</p>
      </sec>
    </abstract>
    <kwd-group>
      <kwd>Internet</kwd>
      <kwd>addictive behavior</kwd>
      <kwd>surveys and questionnaires</kwd>
      <kwd>Rorschach test</kwd>
    </kwd-group></article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Nowadays the Internet is a central aspect of everyday life. There are many opportunities for online dating, problems can be discussed in thematically appropriate forums, and doctors can be consulted [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. Even university education is shifting toward the net. Due to the interactive options afforded, the Internet has firmly established itself within everyday life [<xref ref-type="bibr" rid="ref3">3</xref>]. However, negative aspects of the Internet are increasingly brought to the attention of the public [<xref ref-type="bibr" rid="ref4">4</xref>]. For instance, certain Web-based self-help forums on problematic areas such as suicidality [<xref ref-type="bibr" rid="ref5">5</xref>], self-injurious behavior [<xref ref-type="bibr" rid="ref6">6</xref>], cyberbullying [<xref ref-type="bibr" rid="ref7">7</xref>], or negative effects on health-related Internet use [<xref ref-type="bibr" rid="ref8">8</xref>], are controversially discussed both within the media and among professionals.</p>
      </sec>
      <sec>
        <title>Internet Addiction</title>
        <p>One of the clinically relevant problems Internet use may yield is Internet addiction. Even though most people use the Internet every day without problems, recent figures highlight that excessive Internet use is a significant problem [<xref ref-type="bibr" rid="ref9">9</xref>]. As a unified concept of the disorder and related diagnostic tools are not yet available [<xref ref-type="bibr" rid="ref10">10</xref>], prevalence estimates demonstrate high levels of variance with values ranging from 1.5-11.6%. A review article found an overall prevalence of 3-5% for computer game and Internet addiction.</p>
        <p>With regard to the many behaviors associated with the Internet, the question arises as to whether “Internet addiction” concerns a singular disorder, or whether the only commonality among various Internet-related behavior disorders is the use of the same medium (for the concept of specific Internet addiction, see Davis [<xref ref-type="bibr" rid="ref11">11</xref>]). Accordingly, excessive Internet use can refer to different Web-based services, such as Web-based computer games [<xref ref-type="bibr" rid="ref12">12</xref>], gambling [<xref ref-type="bibr" rid="ref13">13</xref>], sexual content [<xref ref-type="bibr" rid="ref14">14</xref>], or communicative apps such as chat or social networks [<xref ref-type="bibr" rid="ref15">15</xref>] that differ in their “addictive” potential. Of particular concern for addiction behaviors are Web-based role-play games and sexual content [<xref ref-type="bibr" rid="ref16">16</xref>].</p>
        <p>Another question relating to the independence of the disorder “Internet addiction” has been discussed for many years [<xref ref-type="bibr" rid="ref17">17</xref>]: Is “Internet addiction” an independent clinical disorder or rather a concomitant symptom of some other mental illness? Neurobiological research contributes to the answer by showing the equivalence of substance-related addictions and behavioral addictions [<xref ref-type="bibr" rid="ref18">18</xref>]. This finding is mainly based on the neurobiological correlations between substance-related and behavioral addictions [<xref ref-type="bibr" rid="ref19">19</xref>]. These results are part of a growing body of research that advocates Internet addiction as a behavioral addiction.</p>
        <p>Behavioral addiction is a relatively new term for excessive behavior, which depicts characteristics of psychological dependence [<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. The term “behavioral addiction” marks the behavior of the user, and not the medium as the pathological object. In the latest edition of the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition (DSM-5), behavioral addictions have been explicitly included; the chapter previously named “Substance-Related Disorders” was renamed into “Addiction and Related Disorders.” The diagnostic criteria of a behavioral addiction are based on the criteria known for substance dependencies, that is, development of tolerance, withdrawal symptoms, unsuccessful attempts to reduce consumption, neglecting other areas, and use despite negative consequences [<xref ref-type="bibr" rid="ref22">22</xref>]. Although Internet addiction does not constitute an autonomous clinical entity, Internet Gaming Disorder is listed in the appendix of DSM-5.</p>
        <p>The inclusion in Section III of DSM-5 outlines the importance of Internet-related addictions, emphasizing the need for further research in this area. Thus, further studies investigating the etiology and pathogenesis are necessary. Furthermore, it is crucial to identify variables and dispositions that determine the etiology of Internet addiction in order to develop effective therapeutic measures.</p>
      </sec>
      <sec>
        <title>Attachment Theory</title>
        <p>In line with integrative explanations for substance use disorders, complex etiopathogenic models are also employed for Internet addiction. For instance, Wölfling et al [<xref ref-type="bibr" rid="ref23">23</xref>] developed an integrative model with an emphasis on learning theory and neurobiological mechanisms in the context of personality traits. Additionally, Internet addiction can be explained using cognitive-behavioral [<xref ref-type="bibr" rid="ref24">24</xref>], psychodynamic approaches [<xref ref-type="bibr" rid="ref25">25</xref>], as well as cultural and social considerations [<xref ref-type="bibr" rid="ref26">26</xref>]. In this context, attachment theory can also make an important contribution to understanding preconditions associated with the development of behavior addictions, due to the widely documented relationship between attachment experiences and substance dependency [<xref ref-type="bibr" rid="ref27">27</xref>]. Similar mechanisms underlying substance dependence are therefore both feasible and plausible for Internet addictions. For example, bypassing situations where patterns of attachment are activated by excessively spending time on the Internet or replacing negative relationship experiences by rewarding Web-based activity [<xref ref-type="bibr" rid="ref28">28</xref>]. Overall, as a social medium and the relationship component contained therein, the Internet—compared with other addictive substances—provides even more possibilities to manage deficient attachment and relationship patterns. For example, online interaction in social networks, chats, and forums can dampen feelings of social isolation of people with an uncertain attachment style. In particular, the possibility of anonymous communication over the Internet plays a vital role in compensating social isolation via online contacts and relationships [<xref ref-type="bibr" rid="ref29">29</xref>].</p>
      </sec>
      <sec>
        <title>Research Question</title>
        <p>On the basis of the discussed findings, the aim of this study was to investigate the relationship between attachment style, motives for use, used services, and Internet addiction. It was hypothesized that, in comparison with securely attached users, significantly more insecurely attached users would display an Internet addiction. Furthermore, it was assumed that users with an insecure attachment style would differ in their motives for use compared with users with a secure attachment style. It was also hypothesized that users with an Internet addiction would report different motives for use compared with users without an Internet addiction. Finally, it was assumed that users with an insecure attachment style would use Web-based services more often than users with a secure attachment style.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Design</title>
        <p>A Web-based survey was carried out. The Web-based questionnaire was distributed both on Facebook and on 15 thematically different forums (ranging from parent-, travel-, computer- to craft- and comic platforms) to obtain the most heterogeneous sample possible. The survey period lasted for 6 weeks. For descriptive inferential data analysis and hypothesis testing, SPSS version 20 (IBM, Somers, NY, USA) was used.</p>
        <p>To rule out methodological artifacts in the first quantitative self-assessment study, a second qualitative study was conducted. In light of the limitations given in any self-evaluation study, the prior aim of this methodological triangulation study was to gain data that for sure could not be influenced by intentional or unintentional bias. Therapists in Austrian clinics as well as the University Clinic of Mainz were contacted to recruit possible participants for the Rorschach study.</p>
      </sec>
      <sec>
        <title>Sociodemographic Data</title>
        <p>Age, gender, relationship status, and the duration of the existing partnership, highest level of education as well as current job situation were assessed. Furthermore, information about duration and frequency of Internet usage was collected.</p>
        <sec>
          <title>Bielefelder Partnership Expectations Questionnaire</title>
          <p>The Bielefelder partnership expectations questionnaire was used to assess the attachment style of participants. This inventory consists of 31 items that are rated on a 5-point Likert scale ranging from 0 (<italic>completely disagree</italic>) to 4 (<italic>completely agree</italic>).</p>
          <p>The questionnaire evaluates the following five attachment styles: <italic>secure</italic>, <italic>conditionally secure</italic>, <italic>avoidant-closed</italic>, <italic>ambivalent-clingy</italic>, and <italic>ambivalent-closed</italic>. The reliability of the scales (Cronbach alpha=.77 to .89) is satisfactory.</p>
          <p>The Bielefeld questionnaire is different from others in two ways: (1) attachment style is operationalized as configurations of scale scores, which allow qualitative distinctions in terms of functioning and (2) five empirically identified attachment styles are distinguished. Nonetheless validation of the classifications with a German translation of the “Adult Attachment Scale (AAS)” yielded good results [<xref ref-type="bibr" rid="ref30">30</xref>].</p>
        </sec>
        <sec>
          <title>Online Addiction Scale</title>
          <p>The online addiction scale is a diagnostic tool consisting of 14 items about Internet addiction that are rated on a 5-point Likert scale with a maximum possible total score of 27 points. Cutoff values differentiate three different user types: <italic>normal</italic> (&#60;7 points), <italic>problematic</italic> (&#62;7 points and &#60;13 points), and <italic>pathological</italic> (&#62;13 points).</p>
          <p>In addition, the questionnaire assesses how frequently participants used the following 8 different Web-based services: Web-based games, shopping, chatting in forums, writing emails, Web-based sex services, Web-based gambling, Web-based communities, and information retrieval. The frequency of use is reported on a 4-point scale ranging from 0 (<italic>never</italic>) to 3 (<italic>very often</italic>).</p>
          <p>Reliability, validity, and utility of the instrument have been confirmed showing a good internal consistency of .88 and homogeneity of .34. An exploratory factor analysis yielded a one-way solution confirming factorial validity [<xref ref-type="bibr" rid="ref31">31</xref>].</p>
        </sec>
        <sec>
          <title>Cyber Relationship Motive Scale (CRMS-D)</title>
          <p>The Cyber Relationship Motive Scale is a self-evaluation of user’s relationship motives for going online. Survey respondents are prompted to rate how well each of the 27 possible items applied to their motives for Internet usage on a 5-point scale ranging from 0 (<italic>strongly agree</italic>) to 4 (<italic>strongly disagree</italic>): anonymity, opportunity to meet new people, simple communication, curiosity, emotional support, social contact, escape from the real-world, finding love or a sexual partner.</p>
          <p>A confirmatory factor analysis was conducted yielding a goodness-of-fit index of .90. On the basis of the factor loadings, acceptable validity could be determined [<xref ref-type="bibr" rid="ref32">32</xref>].</p>
        </sec>
        <sec>
          <title>Rorschach Inkblot Test</title>
          <p>The Rorschach Inkblot Test is a performance-based personality test. The test consists of 10 inkblot stimuli: 5 are achromatic and 5 include chromatic colors. Examinees look at each inkblot and say what it looks like or what it might be. Examinees can give one or more responses per inkblot. Following test administration, Rorschach responses are coded and tallied to form main variables, such as “Situational Stress,” “Affective Features,” “Interpersonal Perception,” or “Self-Perception.” The interpretation for each Rorschach variable is guided by interpretive paragraphs that are sequentially arranged in the test manual. The Rorschach variables are given a cutoff score that indicates which interpretive paragraph to choose. To determine the degree to which the results statistically deviate from the norm, the examiner must compare each of the variables with the relevant descriptive statistics that are reported in large normative tables [<xref ref-type="bibr" rid="ref33">33</xref>].</p>
          <p>The Rorschach test can be described as “immune” to any form of bias. This immunity is due to the fact that the evaluation of the Rorschach test is not carried out by an interpretation of the subject’s responses; instead responses are coded by established criteria. Although those established criteria differ based on the evaluation system applied, they generally follow the same basics: acquisition, the experience, and content [<xref ref-type="bibr" rid="ref34">34</xref>]. This complex evaluation strategy is by no means transparent for subjects; as such any attempt at influencing the interpretation is impossible. This criterion is impossible to be met by any questionnaire or any narrative projective test (like Thematic Apperception Test) but only by a performance-based test analyzing the performances of the client quantitatively [<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>].</p>
          <p>As the Rorschach Inkblot Method (RIM) had provoked numerous discussions about its reliability, validity, and utility, it has received a maybe more intensive level of scrutiny than any other personality test, summarized in a meta-analysis and reproved in an independent blue ribbon panel. Taken together, studies on reliability and validity of the RIM showed the same or even more valid results for the RIM as for other well-validated inventories [<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref37">37</xref>].</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Sample</title>
        <p>During the survey period, the Web-based questionnaire was accessed N=1009 times. Around 39,74% (401/1009) of participants did not proceed past the start page, another 28.35% (286/1009) had dropped out by page 3. However, as only a further few participants dropped out at later stages of the survey, the dropout rate can be deemed acceptable [<xref ref-type="bibr" rid="ref38">38</xref>].</p>
        <p>Overall, the questionnaire was completed 249 times, constituting 24.86% of total page views. After checking for plausibility of answers, 4 records were removed, resulting in a total sample of 245 participants (168 female, 77 male) aged 16-61 years (mean 29.6, SD 9.17).</p>
        <p>At the time of the survey, 78.8% (193/245) were in a partnership, with an average relationship duration of mean 77.2 months (SD 101.21). Less than half (40.81%) of subjects (100/245) were employed full-time or part-time, one-quarter of the sample consisted of students (62/245, 25.31%), a further 5.71% (14/245) were also working in addition to studying, a small fraction of the total sample were unemployed (16/245, 6.53%), few participants (16/245, 6.53%) were self-employed, and 2.86% were trainees (7/245). In total, 30 subjects (12.2%) reported “other” in terms of employment.</p>
        <p>The Rorschach Inkblot Test was conducted with a small sample of 16 voluntary male subjects. Although 8 participants showed abusive Internet usage and 3 of them met the criteria for Internet addiction, a control group of 8 subjects with nonabusive Internet usage was recruited. Participants were aged between 18 and 47 years (mean 31 years). Subjects were primarily students, full-time employees, or self-employed.</p>
      </sec>
      <sec>
        <title>Duration and Frequency of Internet Use</title>
        <p>On average, study participants had used the Internet for over 10 years (mean 10.91, SD 3.92). The daily use of the Internet for private purpose amounted to an average of mean 4.35 h (SD 4.27), ranging from a minimum of 0.1 h up to 21 h a day. A majority of the sample (93.1%, 228/245) used the Internet daily, only 6.9% (17/245) went online 2-3 times per week. None of the subjects stated that they used the Internet once a week, once a month, or less.</p>
        <sec>
          <title>Online Services</title>
          <p>Subjects used the Internet mainly for online shopping (mean 2.32, SD 0.72). Other popular services included online research (mean 2.32, SD 0.72) and social platforms (mean 2.02, SD 1.11), emails (mean 2.02, SD 0.85), as well as chats and forums (mean 1.55, SD 1.06). In contrast, games (mean 0.70, SD 0.99), sexual content (mean 0.51, SD 0.79), and gambling (mean 0.12, SD 12.43) were less popular.</p>
        </sec>
        <sec>
          <title>Online Relationship Motives</title>
          <p>Simple communication (mean 3.47, SD 1.02) and the opportunity to find new friends (mean 3.20, SD 0.95) were the dominant motives for Internet use. Emotional support (mean 2.37, SD 0.94), anonymity (mean 2.04, SD 1.3), and escapism (mean 2.03, SD 1.17) appear to be motives of medium importance. The lowest, sexual (mean 1.59, SD 1.07), and social-compensatory motives (mean 1.69, SD 1.14), were less frequently reported as online relationship motives.</p>
        </sec>
        <sec>
          <title>Attachment Style</title>
          <p>More than half (50.6%, 124/245) of participants showed an insecure attachment style (<italic>ambivalent-closed</italic>, <italic>ambivalent-clingy</italic>, and <italic>avoidant-closed</italic>), whereas almost as many subjects showed a secure attachment style (<italic>conditionally secure</italic> and <italic>secure</italic>). Therefore, secure and insecure attachment style was equally represented in the sample (<xref ref-type="table" rid="table1">Table 1</xref>).</p>
          <table-wrap position="float" id="table1">
            <label>Table 1</label>
            <caption>
              <p>Frequency distribution of the variable attachment style.</p>
            </caption>
            <table width="400" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="30"/>
              <col width="330"/>
              <col width="0"/>
              <col width="60"/>
              <thead>
                <tr valign="top">
                  <td colspan="3">Attachment Style</td>
                  <td>Frequency, <break/>n (%)</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td colspan="3"><bold>Secure attachment</bold></td>
                  <td>121 (49.4)</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Secure</td>
                  <td colspan="2">25 (10.2)</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Conditionally secure</td>
                  <td colspan="2">96 (39.2)</td>
                </tr>
                <tr valign="top">
                  <td colspan="3"><bold>Insecure attachment</bold></td>
                  <td>124 (50.6)</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Avoidant-closed</td>
                  <td colspan="2">50 (20.4)</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Ambivalent-clingy</td>
                  <td colspan="2">36 (14.7)</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td>Ambivalent-closed</td>
                  <td colspan="2">38 (15.5)</td>
                </tr>
                <tr valign="top">
                  <td colspan="3">Overall</td>
                  <td>245 (100)</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
        </sec>
        <sec>
          <title>Internet Addiction</title>
          <p>Only 1.2% of subjects (3/245) could be classified as addicted Internet users. To allow for appropriate statistical analysis, the categories “pathological” and “problematic use” were merged to the variable <italic>Internet addiction tendency</italic> with 30 subjects. A majority (87.3%, 214/245) of users showed normal Internet use.</p>
        </sec>
        <sec>
          <title>Attachment Style and Internet Addiction</title>
          <p>It was hypothesized that, in comparison with securely attached users, significantly more insecurely attached users would display an Internet addiction. Descriptive data revealed that the majority of participants with a tendency for Internet addiction (n=24) were categorized as insecurely attached, and only a few (n=6) were securely attached. An opposite trend can be detected when considering subjects without Internet addiction tendencies. More subjects categorized as securely attached (n=115) showed no tendencies for an Internet addiction than insecurely attached subjects (n=99).</p>
          <p>A chi-square test was conducted. Unsurprisingly, it was found that insecurely attached subjects differ significantly from securely attached subjects in their tendency for Internet addiction (χ²<sub>1</sub>=12.0, <italic>P</italic>=.003). Furthermore, differences regarding Internet addiction tendencies between the five attachment categories were significant (χ²<sub>4</sub>=27.09, <italic>P</italic>=.004). Most strikingly, an ambivalent attachment style was associated with Internet addiction. More than two-third (n=21) of all subjects, who showed Internet addiction tendencies (n=30), could be allocated to this category, although occupation of this category was generally rather low (n=52).</p>
        </sec>
        <sec>
          <title>Attachment Style and Motives for Use</title>
          <p>A univariate test of between-subjects effects (analysis of variance, ANOVA) was conducted to investigate the relationships between attachment style and motives for Internet use. A significant result was found for two motives, that is, <italic>anonymity</italic> (<italic>F</italic><sub>4</sub>=2.82, <italic>P</italic>=.02) and <italic>emotional support</italic> (<italic>F</italic><sub>4</sub>=3.16, <italic>P</italic>=.03). For subjects with an insecure attachment, the motives “emotional support” (mean 2.66) and “anonymity” (mean 2.36) were significantly more important than for subjects with secure attachment (emotional support, mean 2.03; anonymity, mean 1.67). To check for significant differences between the three attachment styles, post hoc single comparisons were performed. Bonferroni correction was used to adjust the significance threshold for multiple comparisons. There were significant differences between users with the attachment style <italic>ambivalent-closed</italic> and <italic>conditionally secure</italic> (P <italic>&#60;</italic>.001) and <italic>secure</italic> (<italic>P</italic>=.02) with respect to the motives anonymity and <italic>emotional support</italic>. Ambivalent-closed participants showed significantly higher values in the motives <italic>anonymity</italic> (mean 2.84) and <italic>emotional support</italic> (mean 2.56) than <italic>conditionally secure</italic> (anonymity, mean 2.10; emotional support, mean 1.68) or <italic>secure</italic> users (anonymity, mean 1.79; emotional support, mean 1.63).</p>
        </sec>
        <sec>
          <title>Internet Addiction and Online Relationship Motives</title>
          <p>It was checked whether people with Internet addiction tendencies differed significantly in their online relationship motives compared with normal Internet users. A comparison of means revealed significant differences in the online relationship motives <italic>anonymity</italic> (<italic>t</italic><sub>159</sub>=−4.42, <italic>P</italic>=.003), <italic>simplified communication</italic> (<italic>t</italic><sub>39.72</sub>=−3.38, <italic>P</italic>=.006), <italic>emotional support</italic> (<italic>t</italic><sub>159</sub>=−3.74, <italic>P</italic>&#60;.001), <italic>social compensation</italic> (<italic>t</italic><sub>27.72</sub>=−2.13, <italic>P</italic>=.04), and <italic>escapism</italic> (<italic>t</italic><sub>159</sub>=−4.88, <italic>P</italic>&#60;.001).</p>
          <p>For all motives, participants with Internet addiction tendencies had higher mean values (see <xref ref-type="fig" rid="figure1">Figure 1</xref>).</p>
        </sec>
        <sec>
          <title>Attachment Style and Internet Services</title>
          <p>A multivariate analysis of variance (MANOVA) was performed to examine the relationship between attachment style and Web-based services. Using the conservative Pillai trace, no significant main effect for the factor attachment style could be found. Thus, the hypothesis that the use of various Web-based services and apps is associated with different binding styles can be rejected.</p>
        </sec>
        <sec>
          <title>Internet Addiction Tendencies and Internet Services</title>
          <p>There were significant differences between groups with and without Internet addiction tendencies with regard to the use of Web-based sex services (<italic>t</italic><sub>32.219</sub>=−3.20, <italic>P</italic>=.002, <italic>d</italic>=0.84) and the use of chats and forums (<italic>t</italic><sub>242</sub>=−2.09, <italic>P</italic>=.04, <italic>d</italic>=0.40). The comparison of means showed that both services were more frequently used by subjects with Internet addiction tendencies (forums or chats: mean 2.93, SD 1.01; Web-based sex services: mean 2.1, SD 1.12) than by modest users (forums or chats: mean 2.5, SD 1.06; Web-based sex services: mean 1.43, SD 0.70).</p>
        </sec>
        <sec>
          <title>Rorschach Inkblot Test</title>
          <p>The analysis of the Rorschach protocols gave the following results: patients who reported a tendency to pathological Internet use showed a significantly lower degree of sociability (as measured by H% [percentage of human figures], <italic>P</italic>=.05, Mann-Whitney <italic>U</italic> test), whereas a higher level of accuracy of perception (measured on F+% [form level], <italic>P</italic>=.05, Mann-Whitney <italic>U</italic> test) occurred in the control group of patients who denied a tendency to pathological Internet use. Examination of the homogeneity of variance using Levene test proved the parameters of the percentage of intermediate figure responses (“S-responses”) that are seen as an indicator for the potential of aggression, as significant (<italic>P</italic>&#60;.001). In the group of abusive patients, the minimum percentage of S-responses was at 0% and the maximum at 38.6%, whereas in the group of inconspicuous Internet users, the minimum was at 10.64% and the maximum was at 25%. Therefore, the group of abusive Internet users can be regarded not only as particularly aggression-inhibited, but also as aggressive patients. Of particular interest in this context is the common assumption that the online world can both dissipate and fuel aggression.</p>
          <fig id="figure1" position="float">
            <label>Figure 1</label>
            <caption>
              <p>Internet addiction and online relationship motives.</p>
            </caption>
            <graphic xlink:href="jmir_v19i5e170_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
          </fig>
        </sec>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>Although a growing body of scientific literature highlights that Internet addiction is a serious health problem, there have been no etiopathological studies to support this claim. Since an association between secure or insecure attachment and substance dependence is well-documented, the aim of this study was to examine whether people differ in their Internet addiction tendencies in regards to their attachment style.</p>
        <p>The assumption that insecure attached people show higher Internet addiction tendencies could be confirmed. Ambivalent attachment styles were particularly associated with pathological Internet usage tendencies. For ambivalent-closed attached people, the motives <italic>anonymity</italic> and <italic>social support</italic> were significantly more important than for secure and conditionally secure users. Furthermore, participants with Internet addiction tendencies usage identified anonymity, emotional support, escapism, and social compensation as important relationship motives for Internet use.</p>
        <p>However, attachment styles were not associated with the Web-based services used. Nonetheless, there was a difference in the use of Web-based services with regards to the Internet addiction tendencies. In particular, participants with Internet addiction tendencies engaged significantly more in Web-based chats and forums than normal users. Thus, the possibility of Web-based communication seems to play a prevalent role in the context of pathological Internet use.</p>
        <p>It appears therefore that, in comparison with Web-based services used, motivational factors relating to online relationships can best explain this finding. In contrast, the relationship between the Web-based services used and the tendency toward Internet addiction can be attributed to the individual addictive potential of the particular Web-based service in question.</p>
        <p>Overall, the findings of the Rorschach Inkblot Test are in line with the results of the Web-based survey, in which abusive Internet use presents itself as a function of insecure attachment and impaired interpersonal relationships, that is, the preference for chats and forums by study participants with tendencies toward Internet addiction as a result of an infantile relationship that has not reached the level of group compatibility. Chats and forums offer fictional contact with a group, while communication between users remains in virtual space, which in turn significantly weakens the experience of group presence. Thus, communication in chat-rooms or forums is within the framework of a group constellation, however, always experienced at the level of primary intersubjectivity, that is, within the relationship between I and You. Considering interpersonal skills as an expression of attachment capability [<xref ref-type="bibr" rid="ref39">39</xref>], it is striking that the intersubjectivity of abusive Internet users has not reached the level of maturity of secondary intersubjectivity [<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref41">41</xref>].</p>
        <p>These results illustrate the escapist and social-compensatory function associated with pathological Internet usage. Although ambivalent-closed users demonstrate difficulties with acceptance and opening up to others, a parallel desire to connect with others also exists [<xref ref-type="bibr" rid="ref42">42</xref>]. The media-ecological framework model according to Döring [<xref ref-type="bibr" rid="ref3">3</xref>] and the uses and gratifications [<xref ref-type="bibr" rid="ref43">43</xref>] approach can help to understand these findings. On this basis, it can be assumed that the Internet offers specific opportunities for interaction that people with a high Internet addiction tendency do perceive as sufficient forms of communication. Consequently, they report Web-based communication to be more easily accessible and understandable. Apparently, these people appear to be able to use the medium to their advantage, they seem to be able to build a relationship world online in which they can experience emotional support and balance social restrictions. At the same time, the network offers the possibility to temporarily remove a burden from a distressed reality. The factor “anonymity” therefore takes a position of particular importance. The anonymity of the Internet allows for a new presentation of the self, whereby ambivalent-closed users are able to compensate for fears associated with acceptance. At the same time, however, the anonymity provides a platform for online disinhibition [<xref ref-type="bibr" rid="ref44">44</xref>], which may increase the willingness to open up to others. It appears that it is predominantly users with an ambivalent-closed style attachment who use the Internet in order to compensate for “real” deficits, demonstrating therefore the clearest trend toward pathological Internet use [<xref ref-type="bibr" rid="ref45">45</xref>]. The importance of relationship motives for this group supports the hypothesis that a socially compensatory component is key for a high Internet addiction tendency.</p>
        <p>The satisfaction of these motives is in line with the needs relevant in the context of media usage postulated in Schramm and Hasebrink [<xref ref-type="bibr" rid="ref46">46</xref>]. Above all, social needs, as well as the search for relaxation and escapism can be satisfied online. At the same time, the fulfillment of an existing need for social affection in the context of an otherwise unfavorable binding pattern plays a particular important role. At this point, it becomes clear to what extent the cognitive-behavioral model of the Internet addiction is appropriate in this context. Although on the one hand side attachment styles [<xref ref-type="bibr" rid="ref47">47</xref>] can have an unfavorable influence on the self-concept, on the other side online social support and social compensation can act as a reinforcing stimulus. This can result in cognitions suggested by Davis [<xref ref-type="bibr" rid="ref11">11</xref>], which view the self and others only online pleasantly. Strengthening of this experience might result in an abusive and even addictive Internet usage behavior.</p>
        <p>Overall, this study allows for important conclusions about the background of pathological Internet usage to be made. As a consequence, the presented findings are indicatory for future research regarding the etiopathology of Internet addiction.</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>Methodological issues limit the validity of the research results. For example, the lack of participants classified as “addicted” marks a key problem of this study. Therefore, conclusions can only be drawn for problematic, subclinical Internet use. In light of the generally low prevalence of the disorder of only 3-5% [<xref ref-type="bibr" rid="ref9">9</xref>], it is recommended to conduct another study with a specially selected sample. It is also important to point out that users of Web-based games, gambling, and sex services were not adequately represented in the sample. This one-sided sample composition can be explained by solely recruiting participants on forums and social networks. Moreover, it would be important to find out to what extent abusive and pathological Internet use differs (ie, regarding comorbidity, used Web-based services and further disease progression). A long-term monitoring of users with Internet addiction tendencies would be required to reveal whether attachment style can act as a disposition and consequently facilitate the development of an Internet addiction. As such, adequate preventive measures could then be applied at an early stage.</p>
        <p>In all Web-based surveys, the sample composition constitutes another issue limiting the value of the found results [<xref ref-type="bibr" rid="ref48">48</xref>]. It may be that Internet users, who are striving to relativize the negative image of Internet dependency, predominantly responded to the survey. A related concern is the limited possibilities to gain information in a self-assessment process typical for Web-based studies. However, it should be noted that while the statistical evaluation can be regarded as objective, the analysis of values and their interpretation cannot be assumed for the data itself [<xref ref-type="bibr" rid="ref49">49</xref>], due to the fact that every form of self-evaluation has an intentional or unintentional bias. This can include self-deception, simulation or dissimulation, or indeed socially desirable answers [<xref ref-type="bibr" rid="ref41">41</xref>].</p>
        <p>For the Rorschach test, it has to be taken into account that projective techniques are differing from structured tests in stimulus and response and therefore remain “problematic instruments from a psychometric standpoint” [<xref ref-type="bibr" rid="ref50">50</xref>]. In projective techniques, the stimuli used are more ambiguous than in structured tests. Although items of structured personality tests based on self-observation also bear a certain degree of ambiguity, for example, by using the term “often,” that can be interpreted in various ways, projective techniques, in general, are providing a much wider freedom of response and consecutively provoking a much wider response variety in nature and number going together with a complex procedure of scoring. Therefore, they are much more vulnerable by interpreter´s scope of accuracy.</p>
      </sec>
      <sec>
        <title>Implications for Therapy</title>
        <p>A tendency to pathological Internet use was associated with an insecure attachment style and limited interpersonal relationships; it therefore seems plausible to take therapeutic measures to help patients address real-life deficits, that is, this can be achieved by a therapeutic relationship with the therapist as a “substitute attachment figure” [<xref ref-type="bibr" rid="ref28">28</xref>], or in a group therapy, where the therapeutic community can also provide corrective relationship experiences [<xref ref-type="bibr" rid="ref51">51</xref>], and finally the results of the Rorschach test highlight the need for secondary and tertiary intersubjectivity in patients [<xref ref-type="bibr" rid="ref52">52</xref>].</p>
      </sec>
    </sec>
  </body>
  <back>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">AAS</term>
          <def>
            <p>Adult Attachment Scale</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">ANOVA</term>
          <def>
            <p>analysis of variance</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">CRMS-D</term>
          <def>
            <p>Cyber Relationship Motive Scale</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">DSM-5</term>
          <def>
            <p>Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">MANOVA</term>
          <def>
            <p>multivariate analysis of variance</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">RIM</term>
          <def>
            <p>Rorschach Inkblot Method</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Czajka</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Mohr</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Internetnutzung in privaten Haushalten in Deutschland</article-title>
        <source>Wirtschaft und Statistik</source>  
        <year>2009</year>  
        <volume>6</volume>  
        <fpage>553</fpage>  
        <lpage>60</lpage> </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
        <source>InitiativeD21</source>  
        <year>2012</year>  
        <access-date>2017-04-20</access-date>
        <comment>(N)onliner Altlas- Eine Topographie des digitalen Grabens durch Deutschland 
        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.initiatived21.de/portfolio/nonliner-atlas">http://www.initiatived21.de/portfolio/nonliner-atlas</ext-link>
        <ext-link ext-link-type="webcite" xlink:href="6prVXIzpx"/></comment> </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Döring</surname>
            <given-names>N</given-names>
          </name>
        </person-group>
        <source>Sozialpsychologie des Internet: Die Bedeutung des Internet für Kommunikationsprozesse, Identitäten, soziale Beziehungen und Gruppen. 2. vollständig überarbeitete Ausg</source>  
        <year>2003</year>  
        <publisher-loc>Göttingen</publisher-loc>
        <publisher-name>Hogrefe</publisher-name></nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Eichenberg</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Kühne</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <source>Einführung Onlineberatung und -therapie: Grundlagen, Interventionen und Effekte der Internetnutzung</source>  
        <year>2014</year>  
        <publisher-loc>München</publisher-loc>
        <publisher-name>UTB</publisher-name></nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sueki</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Eichenberg</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>Suicide bulletin board systems comparison between Japan and Germany</article-title>
        <source>Death Stud</source>  
        <year>2012</year>  
        <month>07</month>  
        <volume>36</volume>  
        <issue>6</issue>  
        <fpage>565</fpage>  
        <lpage>80</lpage>  
        <pub-id pub-id-type="medline">24563935</pub-id></nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Eichenberg</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Schott</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>An empirical analysis of Internet message boards for self-harming behavior</article-title>
        <source>Arch Suicide Res</source>  
        <year>2016</year>  
        <volume>15</volume>  
        <fpage>1</fpage>  
        <lpage>15</lpage>  
        <pub-id pub-id-type="medline">27845618</pub-id></nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Perren</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Corcoran</surname>
            <given-names>L</given-names>
          </name>
          <name name-style="western">
            <surname>Cowie</surname>
            <given-names>H</given-names>
          </name>
        </person-group>
        <article-title>Tackling cyberbullying: review of empirical evidence regarding successful responses by students, parents, and schools</article-title>
        <source>Int J Conf Violence</source>  
        <year>2012</year>  
        <volume>6</volume>  
        <fpage>283</fpage>  
        <lpage>92</lpage>  
        <pub-id pub-id-type="doi">10.4119/UNIBI/ijcv.244</pub-id></nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Eichenberg</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Wolters</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>Gesundheitsängste und Internet? Cyberchondrie, ein modernes Symptom?</article-title>
        <source>Neurotransmitter</source>  
        <year>2013</year>  
        <volume>7</volume>  
        <fpage>28</fpage>  
        <lpage>32</lpage> </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Müller</surname>
            <given-names>KW</given-names>
          </name>
          <name name-style="western">
            <surname>Wölfling</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <article-title>Pathologische computerspiel- und internetnutzung: der forschungsstand zu phänomenologie, epidemiologie, diagnostik und komorbidität</article-title>
        <source>Suchtmed</source>  
        <year>2010</year>  
        <volume>12</volume>  
        <fpage>1</fpage>  
        <lpage>11</lpage> </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
        <name name-style="western">
        <surname>Ko</surname> 
        <given-names>CH</given-names></name> 
        <name name-style="western">
        <surname>Yen</surname> 
        <given-names>JY</given-names></name> 
        <name name-style="western">
        <surname>Yen</surname> 
        <given-names>CF</given-names></name> </person-group>
        <article-title>The association between internet addiction and psychiatric disorder: a review of the literature</article-title>
        <source>Eur Psychiatry</source> 
        <year>2013</year> 
        <volume>27</volume> 
        <fpage>1</fpage> 
        <lpage>8</lpage> 
        <pub-id pub-id-type="doi">10.1016/j.eurpsy.2010.04.011</pub-id>
        <pub-id pub-id-type="medline">22153731</pub-id></nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Davis</surname>
            <given-names>RA</given-names>
          </name>
        </person-group>
        <article-title>A cognitive-bahvioral model of pathological internet use</article-title>
        <source>Comput Human Behav</source>  
        <year>2001</year>  
        <volume>17</volume>  
        <fpage>187</fpage>  
        <lpage>95</lpage>  
        <pub-id pub-id-type="doi">10.1016/S0747-5632(00)00041-8</pub-id></nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Festl</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Scharkow</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Quandt</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>Problematic computer game use among adolescents, younger and older adults</article-title>
        <source>Addiction</source>  
        <year>2013</year>  
        <month>03</month>  
        <volume>108</volume>  
        <issue>3</issue>  
        <fpage>592</fpage>  
        <lpage>9</lpage>  
        <pub-id pub-id-type="doi">10.1111/add.12016</pub-id>
        <pub-id pub-id-type="medline">23078146</pub-id></nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Gainsbury</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <source>Internet gambling: Current research findings and implications</source>  
        <year>2012</year>  
        <publisher-loc>New York</publisher-loc>
        <publisher-name>Springer Science &#38; Business Media</publisher-name></nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Dhuffar</surname>
            <given-names>MK</given-names>
          </name>
          <name name-style="western">
            <surname>Griffiths</surname>
            <given-names>MD</given-names>
          </name>
        </person-group>
        <article-title>A systematic review of online sex addiction and clinical treatments using CONSORT evaluation</article-title>
        <source>Curr Addict Rep</source>  
        <year>2015</year>  
        <volume>2</volume>  
        <fpage>163</fpage>  
        <lpage>74</lpage>  
        <pub-id pub-id-type="doi">10.1007/s40429-015-0055-x</pub-id></nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Kuss</surname>
            <given-names>DJ</given-names>
          </name>
          <name name-style="western">
            <surname>Griffiths</surname>
            <given-names>MD</given-names>
          </name>
        </person-group>
        <article-title>Online social networking and addiction--a review of the psychological literature</article-title>
        <source>Int J Environ Res Public Health</source>  
        <year>2011</year>  
        <month>09</month>  
        <volume>8</volume>  
        <issue>9</issue>  
        <fpage>3528</fpage>  
        <lpage>52</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.mdpi.com/resolver?pii=ijerph-08-03528"/>
        </comment>  
        <pub-id pub-id-type="doi">10.3390/ijerph8093528</pub-id>
        <pub-id pub-id-type="medline">22016701</pub-id>
        <pub-id pub-id-type="pii">ijerph-08-03528</pub-id>
        <pub-id pub-id-type="pmcid">PMC3194102</pub-id></nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Meerkerk</surname>
            <given-names>GJ</given-names>
          </name>
          <name name-style="western">
            <surname>Van Den Eijnden</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Garretsen</surname>
            <given-names>Hf</given-names>
          </name>
        </person-group>
        <article-title>Predicting compulsive internet use: it's all about sex!</article-title>
        <source>Cyberpsychol Behav</source>  
        <year>2006</year>  
        <month>02</month>  
        <volume>9</volume>  
        <issue>1</issue>  
        <fpage>95</fpage>  
        <lpage>103</lpage>  
        <pub-id pub-id-type="doi">10.1089/cpb.2006.9.95</pub-id>
        <pub-id pub-id-type="medline">16497122</pub-id></nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Eichenberg</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Klemme</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Theimann</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>Internetsuchtin neues störungsbild? ein überblick zu neueren befunden</article-title>
        <source>Psychomed</source>  
        <year>2003</year>  
        <volume>2</volume>  
        <fpage>100</fpage>  
        <lpage>5</lpage> </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Ko</surname>
            <given-names>CH</given-names>
          </name>
          <name name-style="western">
            <surname>Liu</surname>
            <given-names>GC</given-names>
          </name>
          <name name-style="western">
            <surname>Hsiao</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Yen</surname>
            <given-names>J</given-names>
          </name>
          <name name-style="western">
            <surname>Yang</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Lin</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Yen</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Chen</surname>
            <given-names>C</given-names>
          </name>
        </person-group>
        <article-title>Brain activities associated with gaming urge of online gaming addiction</article-title>
        <source>J Psychiatr Res</source>  
        <year>2009</year>  
        <month>04</month>  
        <volume>43</volume>  
        <issue>7</issue>  
        <fpage>739</fpage>  
        <lpage>47</lpage>  
        <pub-id pub-id-type="doi">10.1016/j.jpsychires.2008.09.012</pub-id>
        <pub-id pub-id-type="medline">18996542</pub-id>
        <pub-id pub-id-type="pii">S0022-3956(08)00229-X</pub-id></nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Weinstein</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Lejoyeux</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>New developments on the neurobiological and pharmaco-genetic mechanisms underlying internet and videogame addiction</article-title>
        <source>Am J Addict</source>  
        <year>2015</year>  
        <month>03</month>  
        <volume>24</volume>  
        <issue>2</issue>  
        <fpage>117</fpage>  
        <lpage>25</lpage>  
        <pub-id pub-id-type="doi">10.1111/ajad.12110</pub-id>
        <pub-id pub-id-type="medline">25864599</pub-id></nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Burkett</surname>
            <given-names>JP</given-names>
          </name>
          <name name-style="western">
            <surname>Young</surname>
            <given-names>LJ</given-names>
          </name>
        </person-group>
        <article-title>The behavioral, anatomical and pharmacological parallels between social attachment, love and addiction</article-title>
        <source>Psychopharmacology (Berl)</source>  
        <year>2012</year>  
        <month>11</month>  
        <volume>224</volume>  
        <issue>1</issue>  
        <fpage>1</fpage>  
        <lpage>26</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/22885871"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1007/s00213-012-2794-x</pub-id>
        <pub-id pub-id-type="medline">22885871</pub-id>
        <pub-id pub-id-type="pmcid">PMC3469771</pub-id></nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Grüßer-Sinopoli</surname>
            <given-names>SM</given-names>
          </name>
          <name name-style="western">
            <surname>Thalemann</surname>
            <given-names>CN</given-names>
          </name>
        </person-group>
        <source>Verhaltenssucht: Diagnostik, Therapie, Forschung</source>  
        <year>2006</year>  
        <publisher-loc>Bern</publisher-loc>
        <publisher-name>Huber</publisher-name></nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <collab>American Psychiatric Association</collab>
        </person-group>
        <source>Diagnostic and statistical manual of mental disorders. 5th edition</source>  
        <year>2006</year>  
        <publisher-loc>Arlington</publisher-loc>
        <publisher-name>American Psychiatric Publishing</publisher-name></nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Wölfling</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Jo</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Bengesser</surname>
            <given-names>I</given-names>
          </name>
        </person-group>
        <source>Computerspiel-und Internetsucht. Ein kognitiv-behaviorales Behandlungsmanual</source>  
        <year>2013</year>  
        <publisher-loc>Stuttgart</publisher-loc>
        <publisher-name>Kohlhammer</publisher-name></nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>King</surname>
            <given-names>DL</given-names>
          </name>
          <name name-style="western">
            <surname>Delfabbro</surname>
            <given-names>PH</given-names>
          </name>
        </person-group>
        <article-title>The cognitive psychology of internet gaming disorder</article-title>
        <source>Clin Psychol Rev</source>  
        <year>2014</year>  
        <month>06</month>  
        <volume>34</volume>  
        <issue>4</issue>  
        <fpage>298</fpage>  
        <lpage>308</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S0272-7358(14)00065-8"/>
        </comment>  
        <pub-id pub-id-type="doi">10.1016/j.cpr.2014.03.006</pub-id>
        <pub-id pub-id-type="medline">24786896</pub-id>
        <pub-id pub-id-type="pii">S0272-7358(14)00065-8</pub-id></nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Essig</surname>
            <given-names>T</given-names>
          </name>
        </person-group>
        <article-title>The addiction concept and technology: diagnosis, metaphor, or something else? a psychodynamic point of view</article-title>
        <source>J Clin Psychol</source>  
        <year>2012</year>  
        <month>11</month>  
        <volume>68</volume>  
        <issue>11</issue>  
        <fpage>1175</fpage>  
        <lpage>84</lpage>  
        <pub-id pub-id-type="doi">10.1002/jclp.21917</pub-id>
        <pub-id pub-id-type="medline">22976153</pub-id></nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Dau</surname>
            <given-names>W</given-names>
          </name>
          <name name-style="western">
            <surname>Hoffmann</surname>
            <given-names>JDG</given-names>
          </name>
          <name name-style="western">
            <surname>Banger</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Montag</surname>
            <given-names>C</given-names>
          </name>
          <name name-style="western">
            <surname>Reuter</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Therapeutic interventions in the treatment of problematic internet use? experiences from Germany</article-title>
        <source>Internet Addiction</source>  
        <year>2015</year>  
        <publisher-loc>Switzerland</publisher-loc>
        <publisher-name>Springer International Publishing</publisher-name>
        <fpage>183</fpage>  
        <lpage>217</lpage> </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Borhani</surname>
            <given-names>Y</given-names>
          </name>
        </person-group>
        <article-title>substance abuse and insecure attachment styles: a relational study</article-title>
        <source>Lux</source>  
        <year>2013</year>  
        <volume>2</volume>  
        <issue>1</issue>  
        <fpage>1</fpage>  
        <lpage>13</lpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://scholarship.claremont.edu/lux/vol2/iss1/4/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.5642/lux.201301.04</pub-id></nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Schindler</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Urban</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Hartmann</surname>
            <given-names>HP</given-names>
          </name>
        </person-group>
        <article-title>Bindung und Sucht</article-title>
        <source>Bindungstheorie in der Psychiatrie</source>  
        <year>2005</year>  
        <publisher-loc>Göttingen</publisher-loc>
        <publisher-name>Vadenhoeck &#38; Ruprecht</publisher-name>
        <fpage>96</fpage>  
        <lpage>106</lpage> </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Te Wildt</surname>
            <given-names>BT</given-names>
          </name>
          <name name-style="western">
            <surname>Putzig</surname>
            <given-names>I</given-names>
          </name>
          <name name-style="western">
            <surname>Vikicevic</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <article-title>Störungen von Selbsterleben und Beziehungsverhalten bei Menschen mit Internetabhängigkeit</article-title>
        <source>Sucht</source>  
        <year>2011</year>  
        <volume>57</volume>  
        <fpage>17</fpage>  
        <lpage>26</lpage> </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Höger</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Buschkämper</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Der bielefelder fragebogen zu partnerschaftserwartungen</article-title>
        <source>J Individ Differ</source>  
        <year>2002</year>  
        <volume>1</volume>  
        <fpage>83</fpage>  
        <lpage>98</lpage> </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Wölfling</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Müller</surname>
            <given-names>KW</given-names>
          </name>
          <name name-style="western">
            <surname>Beutel</surname>
            <given-names>ME</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Muecken</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Teske</surname>
            <given-names>A</given-names>
          </name>
          <name name-style="western">
            <surname>Rehbein</surname>
            <given-names>F</given-names>
          </name>
        </person-group>
        <article-title>Skala zum Onlinesuchtverhalten (OSV-S)</article-title>
        <source>Prävention, Diagnostik und Therapie von Computerspielabhängigkeit</source>  
        <year>2010</year>  
        <publisher-loc>Lengerich</publisher-loc>
        <publisher-name>Pabst Science Publishers</publisher-name></nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Wang</surname>
            <given-names>CC</given-names>
          </name>
          <name name-style="western">
            <surname>Chang</surname>
            <given-names>YT</given-names>
          </name>
        </person-group>
        <article-title>Cyber relationship motivescale development and validation</article-title>
        <source>Soc Behav Pers</source>  
        <year>2010</year>  
        <volume>38</volume>  
        <fpage>289</fpage>  
        <lpage>300</lpage> </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Mihura</surname>
            <given-names>JL</given-names>
          </name>
          <name name-style="western">
            <surname>Meyer</surname>
            <given-names>GJ</given-names>
          </name>
          <name name-style="western">
            <surname>Dumitrascu</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Bombel</surname>
            <given-names>G</given-names>
          </name>
        </person-group>
        <article-title>The validity of individual Rorschach variables: systematic reviews and meta-analyses of the comprehensive system</article-title>
        <source>Psychol Bull</source>  
        <year>2013</year>  
        <month>05</month>  
        <volume>139</volume>  
        <issue>3</issue>  
        <fpage>548</fpage>  
        <lpage>605</lpage>  
        <pub-id pub-id-type="doi">10.1037/a0029406</pub-id>
        <pub-id pub-id-type="medline">22925137</pub-id>
        <pub-id pub-id-type="pii">2012-23139-001</pub-id></nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Rorschach</surname>
            <given-names>H</given-names>
          </name>
        </person-group>
        <source>Psychodiagnostik</source>  
        <year>1948</year>  
        <publisher-loc>Bern</publisher-loc>
        <publisher-name>Presses Universitaires de France</publisher-name></nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Bohm</surname>
            <given-names>E</given-names>
          </name>
        </person-group>
        <source>Lehrbuch der Rorschach-Psychodiagnostik für Psychologen, Ärzte und Pädagogen</source>  
        <year>1990</year>  
        <publisher-loc>Bern</publisher-loc>
        <publisher-name>Verlag Hans Huber</publisher-name></nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Rosenthal</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Hiller</surname>
            <given-names>JB</given-names>
          </name>
          <name name-style="western">
            <surname>Bornstein</surname>
            <given-names>RF</given-names>
          </name>
          <name name-style="western">
            <surname>Berry</surname>
            <given-names>DT</given-names>
          </name>
          <name name-style="western">
            <surname>Brunell-Neuleib</surname>
            <given-names>S</given-names>
          </name>
        </person-group>
        <article-title>Meta-analytic methods, the Rorschach, and the MMPI</article-title>
        <source>Psychol Assess</source>  
        <year>2001</year>  
        <month>12</month>  
        <volume>13</volume>  
        <issue>4</issue>  
        <fpage>449</fpage>  
        <lpage>51</lpage>  
        <pub-id pub-id-type="medline">11793890</pub-id></nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
        <collab>Society for Personality Assessment</collab> </person-group>
        <article-title>The status of the rorschach in clinical and forensic practice: an official statement by the board of trustees of the society for personality assessment</article-title>
        <source>‎J Pers Assess</source> 
        <year>2005</year> 
        <volume>85</volume> 
        <issue>2</issue> 
        <fpage>219</fpage> 
        <lpage>37</lpage> 
        <pub-id pub-id-type="doi">10.1207/s15327752jpa8502_16</pub-id>
        <pub-id pub-id-type="medline">16171424</pub-id></nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Sax</surname>
            <given-names>LJ</given-names>
          </name>
          <name name-style="western">
            <surname>Gilmartin</surname>
            <given-names>SK</given-names>
          </name>
          <name name-style="western">
            <surname>Bryant</surname>
            <given-names>AN</given-names>
          </name>
        </person-group>
        <article-title>Assessing response rates and nonresponse bias in web and paper surveys</article-title>
        <source>Res High Educ</source>  
        <year>2003</year>  
        <volume>44</volume>  
        <fpage>409</fpage>  
        <lpage>32</lpage> </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Bowlby</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <source>The Making and Breaking of Affectional Bonds</source>  
        <year>2005</year>  
        <publisher-loc>New York</publisher-loc>
        <publisher-name>Routledge</publisher-name></nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Rieken</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Sindelar</surname>
            <given-names>B</given-names>
          </name>
          <name name-style="western">
            <surname>Stephenson</surname>
            <given-names>Tp</given-names>
          </name>
        </person-group>
        <article-title>Individualpsychologische Entwicklungstheorie und Krankheitslehre</article-title>
        <source>Psychoanalytische Individualpsychologie in Theorie und Praxis: Psychotherapie, Pädagogik, Gesellschaft (German Edition)</source>  
        <year>2011</year>  
        <publisher-loc>Wien</publisher-loc>
        <publisher-name>Springer</publisher-name></nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Fonagy</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <source>Attachment Theory and Psychoanalysis</source>  
        <year>2001</year>  
        <publisher-loc>New York</publisher-loc>
        <publisher-name>Other Press LLC</publisher-name></nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Müller</surname>
            <given-names>K</given-names>
          </name>
        </person-group>
        <source>Spielwiese Internet. Sucht ohne Suchtmittel</source>  
        <year>2013</year>  
        <publisher-loc>Berlin, Heidelberg</publisher-loc>
        <publisher-name>Springer</publisher-name></nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Aelker</surname>
            <given-names>L</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Krämer</surname>
            <given-names>N</given-names>
          </name>
          <name name-style="western">
            <surname>Schwan</surname>
            <given-names>S</given-names>
          </name>
          <name name-style="western">
            <surname>Unz</surname>
            <given-names>D</given-names>
          </name>
          <name name-style="western">
            <surname>Suckfüll</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Der uses-gratifications ansatz</article-title>
        <source>Medienpsychologiechlüsselbegriffe und Konzepte</source>  
        <year>2008</year>  
        <publisher-loc>Stuttgart</publisher-loc>
        <publisher-name>Kohlhammer</publisher-name>
        <fpage>17</fpage>  
        <lpage>22</lpage> </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Suler</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>The online disinhibition effect</article-title>
        <source>Cyberpsychol Behav</source>  
        <year>2004</year>  
        <month>06</month>  
        <volume>7</volume>  
        <issue>3</issue>  
        <fpage>321</fpage>  
        <lpage>6</lpage>  
        <pub-id pub-id-type="doi">10.1089/1094931041291295</pub-id>
        <pub-id pub-id-type="medline">15257832</pub-id></nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Schuhler</surname>
            <given-names>P</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Perty</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Bindungsdynamische Sichtweise</article-title>
        <source>Dysfunktionaler und Pathologischer PC-Gebrauch</source>  
        <year>2010</year>  
        <publisher-loc>Göttingen</publisher-loc>
        <publisher-name>Hogrefe</publisher-name>
        <fpage>57</fpage>  
        <lpage>64</lpage> </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Schramm</surname>
            <given-names>H</given-names>
          </name>
          <name name-style="western">
            <surname>Hasebrink</surname>
            <given-names>U</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Mangold</surname>
            <given-names>R</given-names>
          </name>
          <name name-style="western">
            <surname>Vorderer</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Bente</surname>
            <given-names>G</given-names>
          </name>
        </person-group>
        <article-title>Fernsehnutzung und Fernsehwirkung</article-title>
        <source>Lehrbuch der Medienpsychologie</source>  
        <year>2004</year>  
        <publisher-loc>Göttingen</publisher-loc>
        <publisher-name>Hogrefe</publisher-name>
        <fpage>465</fpage>  
        <lpage>92</lpage> </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Bartholomew</surname>
            <given-names>K</given-names>
          </name>
          <name name-style="western">
            <surname>Horowitz</surname>
            <given-names>LM</given-names>
          </name>
        </person-group>
        <article-title>Attachment styles among young adults: a test of a four-category model</article-title>
        <source>J Pers Soc Psychol</source>  
        <year>1991</year>  
        <volume>61</volume>  
        <issue>2</issue>  
        <fpage>226</fpage>  
        <lpage>44</lpage> </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Eysenbach</surname>
            <given-names>G</given-names>
          </name>
          <name name-style="western">
            <surname>Wyatt</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Using the internet for surveys and health research</article-title>
        <source>J Med Internet Res</source>  
        <year>2002</year>  
        <volume>4</volume>  
        <issue>2</issue>  
        <fpage>e13</fpage>  
        <comment>
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2002/2/e13/"/>
        </comment>  
        <pub-id pub-id-type="doi">10.2196/jmir.4.2.e13</pub-id>
        <pub-id pub-id-type="medline">12554560</pub-id>
        <pub-id pub-id-type="pmcid">PMC1761932</pub-id></nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Bowlby</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <source>The Making and Breaking of Affectional Bonds</source>  
        <year>2005</year>  
        <publisher-loc>New York</publisher-loc>
        <publisher-name>Routledge</publisher-name></nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Lilienfeld</surname>
            <given-names>SO</given-names>
          </name>
          <name name-style="western">
            <surname>Wood</surname>
            <given-names>JM</given-names>
          </name>
          <name name-style="western">
            <surname>Garb</surname>
            <given-names>HN</given-names>
          </name>
        </person-group>
        <article-title>The Scientific Status of Projective Techniques</article-title>
        <source>Psychol Sci Public Interest</source>  
        <year>2009</year>  
        <volume>1</volume>  
        <issue>2</issue>  
        <fpage>27</fpage>  
        <lpage>66</lpage> </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="book">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Schindler</surname>
            <given-names>A</given-names>
          </name>
        </person-group>
        <person-group person-group-type="editor">
          <name name-style="western">
            <surname>Hartmann</surname>
            <given-names>HP</given-names>
          </name>
          <name name-style="western">
            <surname>Urban</surname>
            <given-names>M</given-names>
          </name>
        </person-group>
        <article-title>Bindung und Sucht</article-title>
        <source>Bindungstheorie in der Psychiatrie</source>  
        <year>2005</year>  
        <publisher-loc>Göttingen</publisher-loc>
        <publisher-name>Vadenhoeck &#38; Ruprecht</publisher-name>
        <fpage>96</fpage>  
        <lpage>106</lpage> </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
        <person-group person-group-type="author">
          <name name-style="western">
            <surname>Schuhler</surname>
            <given-names>P</given-names>
          </name>
          <name name-style="western">
            <surname>Vogelsang</surname>
            <given-names>M</given-names>
          </name>
          <name name-style="western">
            <surname>Perty</surname>
            <given-names>J</given-names>
          </name>
        </person-group>
        <article-title>Pathologischer PC-/Internetgebrauch: krankheitsmodell, diagnostische und therapeutische ansätze</article-title>
        <source>Psychotherapeut</source>  
        <year>2009</year>  
        <volume>54</volume>  
        <fpage>187</fpage>  
        <lpage>92</lpage> </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
