<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>The Role of Social Media Apps and its Cyber Attacks in India</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>S. Shrilatha</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>K. Aruna</string-name>
          <email>arunasubu75@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Hepzibah Christinal</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Christian Medical College</institution>
          ,
          <addr-line>Katpadi, Vellore, 632001</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Cyber Attacks</institution>
          ,
          <addr-line>COVID, WhatsApp, Smartphone, Lockdown</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Karunya University</institution>
          ,
          <addr-line>Karunya Nagar, Coimbatore, 641114</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Luyckx, K. A.</institution>
          ,
          <addr-line>Klimstra, T., Goossens, L. (2014) As a result, events are correlated across overall</addr-line>
        </aff>
      </contrib-group>
      <fpage>59</fpage>
      <lpage>65</lpage>
      <abstract>
        <p>A cyber-attack is a malicious and deliberate attempt by cyber criminals to breach information against a single or multiple networks using one or more computers. The COVID - 19 pandemic is not only a health issue; it also leads to an increase in cyber-attacks on people who work from home during lockdown. According to a report on lockdown, 40 percent of society appears to be using data, including performing day-to-day tasks such as shopping, banking, watching content, and socializing. This research focuses on India, which has 77 internet users. According to the study's findings, users spend more than 4 hours per day on the internet with their smartphones. They primarily use the internet for entertainment purposes. The majority of respondents have always preferred to use WhatsApp messenger. In addition, respondents are aware of a phishing/hacking attack in the app during the lockdown period. Users strongly agree that the best way to avoid cyber-attacks is to install known/authenticated software on their smartphones/computers/tablets/laptops during the COVID lockdown period.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>2022 Copyright for this paper by its authors.
activities, entertainment and social activities. On April 28, 2020, cyber security researchers at the
UK-based Sophos has found out that the person hacking are now focusing the individuals across the
globe through the false e-mails, web link as Zoom HR and videos like organizing the meetings for
salary hike for getting access to their personal details.</p>
      <p>As a result, this research focuses on the role of social media apps and cyber-attacks in the digital
platform and during the Corona lockdown period.
1.1.</p>
    </sec>
    <sec id="sec-2">
      <title>Importance of the Study</title>
      <p>A cyber-attack is an attempt by cyber criminals to hack into each individual's data via various
systems all over the world. Morahan-Martin, J., Schumacher, P. (2003) Cyber attackers’ use different
plan of action to utilize, duplicate, and destroy many private as well as Government Sector detail in
the world of digitalization. In the modern era of digital world, businesspeople have to be vigilant of
increasing unprotected environment in terms of cyber threats and its security issues.
1.2.</p>
    </sec>
    <sec id="sec-3">
      <title>Statement of the Problem</title>
      <p>The present literature relating to the cyber-attacks in the automated world and during the
COVID19 lockdown period it has been considerably increased. This study identified the gap by creating an
awareness of the various cyber-attacks and few measures to the India Internet Users to avoid the
cyber-attacks during the pandemic lockdown period. Lee, K.-T., Noh, M.-J., Koo, D.-M. (2013) Thus,
this study has focused on the three important aspects of Internet Behavior as well as preference of
using the social media apps, awareness on cyber-attacks and measures to overcome the cyber-attacks
in this current situation.
1.3.</p>
      <p>Research Purpose
1. To analyze the frequency of preference to use various social media applications
on theinternet activities during COVID – 19 lockdown and normal period.
2. To know the level of awareness of cyber-attacks through the internet/ applications
duringCOVID – 19 Lockdown.
3. To identify the measures to overcome the cyber-attacks by the users during the
coronalockdown time at India.
1.4.</p>
    </sec>
    <sec id="sec-4">
      <title>Research Hypothesis</title>
      <p>•
•</p>
      <p>There is no association between the age of the respondents over the preference of the
usingthe WhatsApp during the lockdown period.</p>
      <p>There is no influence of the educational qualification over the measures to
overcome thecyber-attacks at the lockdown time.</p>
    </sec>
    <sec id="sec-5">
      <title>Methodology of the Study</title>
      <p>Study Area: This study is done in India.</p>
      <p>1. Sample Size: 77.
2. Sample Technique: Simple Random and Convenient Sampling Technique. The popular
social media app is taken according to the study undertaken in Mobile App usage in
lock down. (Madhav Chanchani and Digbhijay Mishra)
3. Data Collection: Primary Data and Secondary Data. The Primary Data is collected
throughthe well-structured questionnaire created through Google form. The Secondary</p>
      <p>Data is collected from the News Article, Journals, Websites and Magazines.
4. Data Analysis: The statistical tools applied in this study are Percentage Analysis,
Chi</p>
      <p>Square, ANOVA, T-Test and Regression.
2.1.</p>
    </sec>
    <sec id="sec-6">
      <title>Results and Discussions</title>
      <p>95% Confidence
Interval of the</p>
      <p>Difference</p>
      <p>The table 1 reveals that apps 59.34, 44.31, 34.43, 28.92, 26.33, 25.19, 23.80, 22.76,21.93, and
21.49 are statistically significant at the 5 percent level. This indicates that the respondents are always
preferred to use Whatsapp (4.468) during the COVID 19 lockdown time and they also frequently
prefer to use to YouTube, Music Apps like Wynk, MX Player, Official/ Learning Apps (Byju,
Vedanta) and Ellison, N. B., Steinfield, C., Lampe, C. (2007) Facebook.</p>
      <p>Further, it reveals that the respondents are occasionally preferred to use Tiktok, Arogya Setu,
GPay, and Zoom app. Finally, the respondents rarely prefer to access the PUBG during the COVID
19 lockdown time since 24th March, 2020 till May 1st week. As per the data analyzed by Nielsen and
BARC the social media apps user base increased by 25% (Whatsapp tops by +27%). This study also
identified that the majority of the respondent preference is Whatsapp.
95% Confidence
Interval of the</p>
      <p>Difference
Phishing/Hacking
Spyware
Malware
Ransom ware
Denial of Service
2.68
2.48</p>
      <p>The table 2 denotes that 43.733, 33.70, 33.41, 25.77, and 20.61 are statistically significant at the 5
percent level. This implies that the respondents are well aware of Phishing/ Hacking in the social
media/ Mobile Apps during the lockdown period. Further, it denotes that the respondents are aware of
spyware, Malware and Denial of Service attacks in the social media/ Mobile Apps. Finally, the
respondents do not have much awareness towards Ransom ware attacks in the social media/ Mobile
Apps. Ledbetter, A. M., Mazer, J. P., DeGroot, J. M., Meyer, K. R., Mao, Y., Swafford, B. (2011) The
report released in the Times of India dated on 11th April, 2020 also identified that Phishing attacks
are increasing during the corona lockdown period in the Banking Transactions.</p>
      <p>It has given warning to the customers to protect their CVV/ PIN number against the Phishing.
Another report on 4th April, 2020 released by the Times of India has mentioned that Hackers are
attacking the employees working from home. Thus, this study has identified that the maximum
number of respondents is highly aware of Phishing/ Hacking during the corona lockdown period.</p>
      <p>Test Value = 0
95% Confidence
Interval of the</p>
      <p>Difference</p>
      <p>The table 3 indicated that 66.52, 64.95, 46.87, 46.25, 44.71, and 41.07 are statistically significant
at the 5 percent level. Hence, the respondents strongly agree that they should install the known/
authenticated security software’s in their Computers/ Smartphones, not to reveal their CVV/ PIN/
Account Number/ any other personal details to unknown people and do not download the unknown
attachments or files from the e-mails to avoid the cyber-attacks during normal days and especially
during a corona lockdown time. Carpenter, J. M., Green, M. C., LaFlam, J. (2011), Vogel, E. A., Rose,
J. P., Okdie, B. M., Eckles, K., Franz, B. (2015) It has also indicated that the respondents agree towards
reporting to the Bank official immediately about the suspicion/ doubtful calls, calling to the toll-free
numbers/ to cybercrime official for the cyber-attacks and avoiding to download unknown apps in the
mobile like any desk, quick support and so on to overcome the cyber-attacks during this lockdown
time.</p>
      <p>It is found from the above table that R= .346, R Square=.120, Adjusted R Square=.108, Std.
Error=1.102. This shows that the awareness of Phishing/ Hacking by the respondents created a
variance of 10.8%. This leads to the following ANOVA table.</p>
      <p>From the above table it is observed that F=10.179; P=.002 is statistically significant at the 5
percent level. It indicates that the respondents are aware of the Phishing/ Hacking attacks. This leads
to following coefficient table.</p>
      <p>Df
1
75
76</p>
      <p>It is inferred from the above table that the level of awareness towards Phishing/ hacking attack
(Beta=.346; B=3.190; P=.002) is statistically significant at the 5 percent level. This indicates the
respondents always accessing the Facebook are highly aware towards the Phishing/ Hacking attacks
during the corona lockdown period. Bessière, K., Kiesler, S., Kraut, R., Boneva, B. S. (2008) The
level of Phishing/ Hacking awareness varies according to the respondent preference towards access
the Facebook.</p>
      <p>Model</p>
      <p>Variables
1</p>
      <p>Regression
Residual
Total</p>
      <p>Sum of
Squares</p>
    </sec>
    <sec id="sec-7">
      <title>Suggestions</title>
      <p>These are suggested recommendations from this study:
•
•
•
•</p>
      <p>More awareness has to be created regarding the ransom ware attacks and Denial of
Service(DOS) for those who are working from home.</p>
      <p>The customers must be educated to approach Bank officials in case of any suspicious
call/ doubtful call regarding inquiry of account details.</p>
      <p>The cybercrime cell has to frequently announce its toll-free numbers/ helpline numbers
in case of any cyber-attacks. The customers must be encouraged to report to the
cybercrime toll numbers/ websites immediately regarding the cyber-attacks.
The customers must be constantly informed about the various mobile apps being
attacked by the hackers.</p>
    </sec>
    <sec id="sec-8">
      <title>Conclusion</title>
      <p>The cybercrime and cyber-attacks are started increasing in the last decade due to the entrance of
technology like computer, internet, automation, online payments, and so on. This paved the way to
increase in the user rate of the technology and utilization of automated/ digital products. Hence, the
cyber-attacks are started increasing as the penetration of internet, smartphone, social media apps users
rate are increasing. The people are also started to work from home during the COVID 19 lock down
period, so the hackers/ phishing, ransom ware increased and they started focusing on people who are
working from home as well as operating banking transactions through online/ mobile. Thus, this study
focus is to analyze the internet behaviours of India consumers and creates awareness of various
cyberattacks. Finally, this study suggests few measures to overcome these attacks during this pandemic
lockdown and normal period.</p>
      <p>The profile of the India internet users consists of the female. Most of the consumers were in
between the age group of 21-30 years, possessing an educational qualification of post-Graduation.
They are working in the Private Organizations/ Sector/ Banks in the area of Finance, Research
Analyst, and Travels and so on. Their annual income is less than Rs. 5,00,000 and marital status is
single.</p>
      <p>The internet behaviours of India people are spending more than 4 hours per day; they are accessing
the internet through their smartphones/ mobile phones and the main reason for the using theinternet is
entertainment. The respondents always prefer to use the Whatsapp. White, J. B., Langer, E. J., Yariv,
L., Welch, J. C. (2006) They are highly aware of phishing/ hacking attacks of the social media app.
Moreover, the respondents strongly agree to install the known/ authenticated security software’s in
their Smartphones/ Tablets/ Laptop/ Computers. The Facebook users are aware of the phishing/
hacking attacks. Chou, H.-T. G., Edge, N. (2012) There is no association between the respondents age
over the usage of Whatsapp. There is no influence of educational qualification over the measures to
overcome the cyber-attacks.</p>
    </sec>
    <sec id="sec-9">
      <title>Scope for Future Research References</title>
      <p>•
•</p>
      <p>The similar research of cyber-attacks can be carried in the Banking Sector.</p>
      <p>The Cyber Crime research can be done in the future as an individual study on social media,
Mobile Apps, and e-mails.
[1] Baumeister, R. F., Leary, M. R. (1995). The need to belong: Desire for interpersonal attachments
as a fundamental human motivation. Psychological Bulletin, 117, 497–529. doi:</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          https://doi.org/10.1037/
          <fpage>0033</fpage>
          -
          <lpage>2909</lpage>
          .
          <year>117</year>
          .3.
          <issue>497</issue>
          [2]
          <string-name>
            <surname>Bessière</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kiesler</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kraut</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Boneva</surname>
            ,
            <given-names>B. S.</given-names>
          </string-name>
          (
          <year>2008</year>
          ).
          <article-title>Effects of Internet use and social</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>resources on changes in depression</article-title>
          .
          <source>Information, Communication &amp; Society</source>
          ,
          <volume>11</volume>
          ,
          <fpage>47</fpage>
          -
          <lpage>70</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          https://doi.org/10.1080/13691180701858851 . [3]
          <string-name>
            <surname>Carpenter</surname>
            ,
            <given-names>J. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Green</surname>
            ,
            <given-names>M. C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>LaFlam</surname>
          </string-name>
          , J. (
          <year>2011</year>
          ).
          <article-title>People or profiles: Individual differences in</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>online social networking use</article-title>
          .
          <source>Personality and Individual Differences</source>
          ,
          <volume>50</volume>
          ,
          <fpage>538</fpage>
          -
          <lpage>541</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          https://doi.org/10.1016/j.paid.
          <year>2010</year>
          .
          <volume>11</volume>
          .
          <issue>006</issue>
          [4]
          <string-name>
            <surname>Shrilatha</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aruna</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bhagavathy</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chellaiah</surname>
            <given-names>G.</given-names>
          </string-name>
          ,
          <article-title>Gupta A. Future of electric vehicles with</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>reference to national electric mobility mission plan at Tamil Nadu (</article-title>
          <year>2021</year>
          ) AIP Conference
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Proceedings</surname>
          </string-name>
          , doi: https://doi.org/10.1063/5.0066282 [5]
          <string-name>
            <surname>Kasinathan</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kasthurirangan</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Bhagavathy</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2022</year>
          ).
          <article-title>The Prevalence</article-title>
          and Predominance
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          206-
          <fpage>220</fpage>
          ).
          <source>IGI Global</source>
          . Doi: https://doi.org/10.4018/978-1-
          <fpage>7998</fpage>
          -8786-7.
          <year>ch013</year>
          [6]
          <string-name>
            <surname>Chou</surname>
          </string-name>
          , H.-T. G.,
          <string-name>
            <surname>Edge</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          (
          <year>2012</year>
          ).
          <article-title>“They are happier and having better lives than I am”: The</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>Social</given-names>
            <surname>Networking</surname>
          </string-name>
          ,
          <volume>15</volume>
          ,
          <fpage>117</fpage>
          -
          <lpage>121</lpage>
          . doi: https://doi.org/10.1089/cyber.
          <year>2011</year>
          .
          <volume>0324</volume>
          [7]
          <string-name>
            <surname>Ellison</surname>
            ,
            <given-names>N. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Steinfield</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lampe</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2007</year>
          ).
          <article-title>The benefits of Facebook “friends”: Social</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Communication</surname>
          </string-name>
          ,
          <volume>12</volume>
          ,
          <fpage>1143</fpage>
          -
          <lpage>1168</lpage>
          . doi: https://doi.org/10.1111/j.1083-
          <fpage>6101</fpage>
          .
          <year>2007</year>
          .
          <volume>00367</volume>
          .x [8]
          <string-name>
            <surname>Ledbetter</surname>
            ,
            <given-names>A. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mazer</surname>
            ,
            <given-names>J. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>DeGroot</surname>
            , J. M., Meyer,
            <given-names>K. R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mao</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Swafford</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <article-title>communication and relational closeness</article-title>
          .
          <source>Communication Research</source>
          ,
          <volume>38</volume>
          ,
          <fpage>27</fpage>
          -
          <lpage>53</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          https://doi.org/10.1177/0093650210365537 [9]
          <string-name>
            <surname>Lee</surname>
          </string-name>
          , K.-T.,
          <string-name>
            <surname>Noh</surname>
          </string-name>
          , M.-J.,
          <string-name>
            <surname>Koo</surname>
            ,
            <given-names>D.-M.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Lonely people are no longer lonely on social</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Behavior</surname>
          </string-name>
          , and Social Networking,
          <volume>16</volume>
          ,
          <fpage>413</fpage>
          -
          <lpage>418</lpage>
          . doi: https://doi.org/10.1089/cyber.
          <year>2012</year>
          .
          <volume>0553</volume>
          [10]
          <string-name>
            <surname>Morahan-Martin</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Schumacher</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2003</year>
          ).
          <article-title>Loneliness and social uses of the Internet</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <source>Computers in Human Behavior</source>
          ,
          <volume>19</volume>
          ,
          <fpage>659</fpage>
          -
          <lpage>671</lpage>
          . doi: https://doi.org/10.1016/S0747-
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <volume>5632</volume>
          (
          <issue>03</issue>
          )
          <fpage>00040</fpage>
          -
          <lpage>2</lpage>
          . [11]
          <string-name>
            <surname>Nie</surname>
            ,
            <given-names>N. H.</given-names>
          </string-name>
          (
          <year>2001</year>
          ).
          <article-title>Sociability, interpersonal relations, and the Internet: Reconciling conflicting</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          findings. American Behavioral Scientist,
          <volume>45</volume>
          ,
          <fpage>420</fpage>
          -
          <lpage>435</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          https://doi.org/10.1177/00027640121957277 [12]
          <string-name>
            <surname>Teppers</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Luyckx</surname>
            ,
            <given-names>K. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klimstra</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goossens</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>Loneliness and Facebook motives</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <article-title>in adolescence: A longitudinal inquiry into directionality of effect</article-title>
          .
          <source>Journal of Adolescence</source>
          ,
          <volume>37</volume>
          ,
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          691-
          <fpage>699</fpage>
          . doi: https://doi.org/10.1016/j.adolescence.
          <year>2013</year>
          .
          <volume>11</volume>
          .
          <volume>003</volume>
          [13]
          <string-name>
            <surname>Vogel</surname>
            ,
            <given-names>E. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rose</surname>
            ,
            <given-names>J. P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Okdie</surname>
            ,
            <given-names>B. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Eckles</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Franz</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Who compares and</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <surname>Personality</surname>
            and
            <given-names>Individual</given-names>
          </string-name>
          <string-name>
            <surname>Differences</surname>
          </string-name>
          ,
          <volume>86</volume>
          ,
          <fpage>249</fpage>
          -
          <lpage>256</lpage>
          . doi:
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          https://doi.org/10.1016/j.paid.
          <year>2015</year>
          .
          <volume>06</volume>
          .
          <volume>026</volume>
          [14]
          <string-name>
            <surname>White</surname>
            ,
            <given-names>J. B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Langer</surname>
            ,
            <given-names>E. J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yariv</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Welch</surname>
            ,
            <given-names>J. C.</given-names>
          </string-name>
          (
          <year>2006</year>
          ).
          <article-title>Frequent social comparisons and</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <surname>Development</surname>
          </string-name>
          ,
          <volume>13</volume>
          ,
          <fpage>36</fpage>
          -
          <lpage>44</lpage>
          . doi: https://doi.org/10.1007/s10804-006-9005-0
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>