{"id":4870,"date":"2008-08-29T06:46:55","date_gmt":"2008-08-29T13:46:55","guid":{"rendered":"http:\/\/www.dfcint.com\/dossier\/?post_type=news&#038;p=4870"},"modified":"2014-10-28T16:32:21","modified_gmt":"2014-10-28T23:32:21","slug":"10-of-chinese-teens-net-addicted","status":"publish","type":"post","link":"https:\/\/www.dfcint.com\/dossier\/10-of-chinese-teens-net-addicted\/","title":{"rendered":"10% of China Teens Net-Addicted"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"alignleft size-full wp-image-12436\" alt=\"China Emblem-L\" src=\"http:\/\/www.dfcint.com\/dossier\/wp-content\/uploads\/2008\/08\/China-Emblem-L.jpg\" width=\"261\" height=\"290\" \/>AUG. 29, 2008 \u2022 Around 10 percent of Chinese teenagers were &#8220;Internet-addicted,&#8221; according to Li Jianguo, vice chairman of the standing committee of the National People&#8217;s Congress. Li&#8217;s committee has called for stricter monitoring of inappropriate content. Already since 2006, players of Internet games in China have been required to provide their true names and identity numbers.<\/p>\n<p><span style=\"color: #3366ff;\"><em>Impact: Piracy and price are no longer the leading impediments to console expansion into China. With a population already heavily wedded to computers and online play, consumer preferences for micro-transaction MMOs will remain solid for the long-term. That said, the Chinese are also enamored with their mobile phones, which leaves the door open for trendy devices like the iPhone, and the games that will appear on it.<\/em><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AUG. 29, 2008 \u2022 Around 10 percent of Chinese teenagers were &#8220;Internet-addicted,&#8221; according to Li Jianguo, vice chairman of the standing committee of the National People&#8217;s Congress. Li&#8217;s committee has called for stricter monitoring of inappropriate content. Already since 2006, players of Internet games in China have been required to provide their true names and [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[],"tags":[],"_links":{"self":[{"href":"https:\/\/www.dfcint.com\/dossier\/wp-json\/wp\/v2\/posts\/4870"}],"collection":[{"href":"https:\/\/www.dfcint.com\/dossier\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dfcint.com\/dossier\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dfcint.com\/dossier\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dfcint.com\/dossier\/wp-json\/wp\/v2\/comments?post=4870"}],"version-history":[{"count":6,"href":"https:\/\/www.dfcint.com\/dossier\/wp-json\/wp\/v2\/posts\/4870\/revisions"}],"predecessor-version":[{"id":12437,"href":"https:\/\/www.dfcint.com\/dossier\/wp-json\/wp\/v2\/posts\/4870\/revisions\/12437"}],"wp:attachment":[{"href":"https:\/\/www.dfcint.com\/dossier\/wp-json\/wp\/v2\/media?parent=4870"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dfcint.com\/dossier\/wp-json\/wp\/v2\/categories?post=4870"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dfcint.com\/dossier\/wp-json\/wp\/v2\/tags?post=4870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}