{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T18:21:47Z","timestamp":1735582907301},"reference-count":86,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T00:00:00Z","timestamp":1330560000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1016\/j.chb.2011.10.014","type":"journal-article","created":{"date-parts":[[2011,11,11]],"date-time":"2011-11-11T19:13:04Z","timestamp":1321038784000},"page":"434-443","source":"Crossref","is-referenced-by-count":374,"title":["Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition"],"prefix":"10.1016","volume":"28","author":[{"given":"Noam","family":"Lapidot-Lefler","sequence":"first","affiliation":[]},{"given":"Azy","family":"Barak","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.chb.2011.10.014_b0005","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/S0167-9236(02)00190-2","article-title":"Flaming in electronic communication","volume":"36","author":"Alonzo","year":"2004","journal-title":"Decision Support System"},{"key":"10.1016\/j.chb.2011.10.014_b0010","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/S0378-7206(99)00036-1","article-title":"Flaming among first-time group support system users","volume":"37","author":"Aiken","year":"2000","journal-title":"Information and Management"},{"key":"10.1016\/j.chb.2011.10.014_b0015","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1111\/j.1468-2885.1998.tb00226.x","article-title":"To reveal or not to reveal: A theoretical model of anonymous communication","volume":"8","author":"Anonymous","year":"1998","journal-title":"Communication Theory"},{"key":"10.1016\/j.chb.2011.10.014_b0020","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1177\/0894439304271540","article-title":"Sexual harassment on the Internet","volume":"23","author":"Barak","year":"2005","journal-title":"Social Science Computer Review"},{"key":"10.1016\/j.chb.2011.10.014_b0025","series-title":"Oxford handbook of internet psychology","first-page":"303","article-title":"Phantom emotions: Psychological determinants of emotional experiences on the Internet","author":"Barak","year":"2007"},{"key":"10.1016\/j.chb.2011.10.014_b0030","doi-asserted-by":"crossref","first-page":"1867","DOI":"10.1016\/j.chb.2008.02.004","article-title":"Fostering empowerment in online support groups","volume":"24","author":"Barak","year":"2008","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0035","doi-asserted-by":"crossref","first-page":"1802","DOI":"10.1016\/j.chb.2008.02.007","article-title":"Internet use and personal empowerment of hearing-impaired adolescents","volume":"24","author":"Barak","year":"2008","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0040","series-title":"Psychological aspects of cyberspace. Theory, research, applications","first-page":"1","article-title":"Reflections on the psychology and social science of cyberspace","author":"Barak","year":"2008"},{"key":"10.1016\/j.chb.2011.10.014_b0045","first-page":"195","article-title":"The self, Online","volume":"Vol. 9","author":"Bargh","year":"2003"},{"key":"10.1016\/j.chb.2011.10.014_b0050","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1146\/annurev.psych.55.090902.141922","article-title":"The internet and social life","volume":"55","author":"Bargh","year":"2004","journal-title":"Annual Review of Psychology"},{"key":"10.1016\/j.chb.2011.10.014_b0055","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1111\/1540-4560.00247","article-title":"Can you see the real me? Activation and expression of the \u201ctrue self\u201d on the Internet","volume":"58","author":"Bargh","year":"2002","journal-title":"Journal of Social Issues"},{"key":"10.1016\/j.chb.2011.10.014_b0060","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1080\/09687590220139883","article-title":"Disability discourses for online identities","volume":"17","author":"Bowker","year":"2002","journal-title":"Disability & Society"},{"key":"10.1016\/j.chb.2011.10.014_b0065","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1177\/002383099403700101","article-title":"The effects of visibility on dialogue and performance in cooperative problem solving task","volume":"37","author":"Boyle","year":"1994","journal-title":"Language and Speech"},{"key":"10.1016\/j.chb.2011.10.014_b0070","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/10640260701190600","article-title":"Inside the \u201cPro-ana\u201d community: A covert online participant observation","volume":"15","author":"Brotsky","year":"2007","journal-title":"Eating Disorders"},{"key":"10.1016\/j.chb.2011.10.014_b0075","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1037\/0022-3514.63.3.452","article-title":"The aggression questionnaire","volume":"63","author":"Buss","year":"1992","journal-title":"Journal of Personality and Social Psychology"},{"key":"10.1016\/j.chb.2011.10.014_b0080","series-title":"The aggression questionnaire manual","author":"Buss","year":"2000"},{"key":"10.1016\/j.chb.2011.10.014_b0085","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/S0747-5632(00)00012-1","article-title":"The influence of familiarity among group members, group atmosphere, and assertiveness on uninhibited behavior through three different communication media","volume":"16","author":"Castell\u00e1","year":"2000","journal-title":"Computer in Human Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0090","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.ijhcs.2006.08.009","article-title":"Mining communities and their relationships in blogs: A study of online hate groups","volume":"65","author":"Chau","year":"2007","journal-title":"International Journal of Human-Computer Studies"},{"key":"10.1016\/j.chb.2011.10.014_b0095","doi-asserted-by":"crossref","first-page":"3038","DOI":"10.1016\/j.chb.2006.09.001","article-title":"The positive and negative implications of anonymity in Internet social interactions: \u2018\u2018On the Internet, nobody knows you\u2019re a dog\u2019\u2019","volume":"23","author":"Christopherson","year":"2007","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0100","doi-asserted-by":"crossref","first-page":"710","DOI":"10.1016\/j.ijhcs.2010.06.001","article-title":"The impact of anonymity on weblog credibility","volume":"68","author":"Chesney","year":"2010","journal-title":"International Journal of Human-Computer Studies"},{"key":"10.1016\/j.chb.2011.10.014_b0105","series-title":"The Oxford handbook of internet psychology","first-page":"223","article-title":"Impression management and identity online","author":"Chester","year":"2007"},{"key":"10.1016\/j.chb.2011.10.014_b0110","first-page":"547","article-title":"Adolescents\u2019 sexual self-disclosure on the Internet: Deindividuation and impression management","volume":"41","author":"Chiou","year":"2006","journal-title":"Adolescence"},{"key":"10.1016\/j.chb.2011.10.014_b0115","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1089\/cpb.2007.9984","article-title":"Staging on the Internet: Research on online photo album users in Taiwan with the spectacle\/performance paradigm","volume":"10","author":"Chiung-Wen","year":"2007","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0120","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.ijhcs.2004.11.008","article-title":"Manipulation of non-verbal interaction style and demographic embodiment to increase anthropomorphic computer character credibility","volume":"62","author":"Cowell","year":"2005","journal-title":"International Journal of Human-Computer Studies"},{"key":"10.1016\/j.chb.2011.10.014_b0125","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1177\/0149206307302549","article-title":"Situation invisibility and attribution in distributed collaborations","volume":"33","author":"Cramton","year":"2007","journal-title":"Journal of Management"},{"key":"10.1016\/j.chb.2011.10.014_b0130","doi-asserted-by":"crossref","first-page":"862","DOI":"10.1016\/j.chb.2007.02.022","article-title":"Endowment heterogeneity and identifiability in the information-exchange dilemma","volume":"24","author":"Cress","year":"2008","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0135","doi-asserted-by":"crossref","first-page":"766","DOI":"10.1016\/j.chb.2007.04.004","article-title":"The role of emotion in computer-mediated communication: A review","volume":"24","author":"Derks","year":"2008","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0140","series-title":"Self disclosure","author":"Derlega","year":"1993"},{"key":"10.1016\/j.chb.2011.10.014_b0145","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1037\/1076-898X.3.2.105","article-title":"Face-to-face and video-mediated communication: A comparison of dialogue structure and task performance","volume":"3","author":"Doherty-Sneddon","year":"1997","journal-title":"Journal of Experimental Psychology-Applied"},{"key":"10.1016\/j.chb.2011.10.014_b0150","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1348\/014466601164894","article-title":"Identifiability and self-representation: Computer mediated communication and intergroup interaction","volume":"40","author":"Douglas","year":"2001","journal-title":"British Journal of Social Psychology"},{"key":"10.1016\/j.chb.2011.10.014_b0155","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1177\/0275074005276350","article-title":"Virtual jungles: Survival, accountability, and governance in online communities","volume":"35","author":"Dumont","year":"2005","journal-title":"American Review of Public Administration"},{"key":"10.1016\/j.chb.2011.10.014_b0160","series-title":"People and computers X","first-page":"289","article-title":"What\u2019s the flaming problem? or computer mediated communication\u2013deindividuating or disinhibiting?","author":"Dyer","year":"1995"},{"key":"10.1016\/j.chb.2011.10.014_b0170","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1177\/0093650202029001004","article-title":"Computer-mediated group work: The interaction of member sex and anonymity","volume":"29","author":"Flanagin","year":"2002","journal-title":"Communication Research"},{"key":"10.1016\/j.chb.2011.10.014_b0175","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1037\/0096-1523.33.3.705","article-title":"Are you looking at me? Measuring the cone of gaze","volume":"33","author":"Gamer","year":"2007","journal-title":"Journal of Experimental Psychology: Human Perception and Performance"},{"key":"10.1016\/j.chb.2011.10.014_b0180","first-page":"129","article-title":"Deviance in the dark","volume":"7","author":"Gergen","year":"1973","journal-title":"Psychology Today"},{"key":"10.1016\/j.chb.2011.10.014_b0185","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1348\/014466605X53596","article-title":"Constructing identities in cyberspace. The case of eating disorders","volume":"45","author":"Giles","year":"2006","journal-title":"British Journal of Social Psychology"},{"key":"10.1016\/j.chb.2011.10.014_b0190","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1080\/00332747.1983.11024189","article-title":"Eye contact: The core of interpersonal relatedness","volume":"46","author":"Grumet","year":"1983","journal-title":"Psychiatry"},{"key":"10.1016\/j.chb.2011.10.014_b0195","doi-asserted-by":"crossref","first-page":"1581","DOI":"10.1016\/j.chb.2010.06.005","article-title":"An analysis of multiple factors of cyberbullying among junior high school students in Taiwan","volume":"26","author":"Huang","year":"2010","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0200","series-title":"Psychology and the internet: Intrapersonal, interpersonal, and transpersonal implications","first-page":"43","article-title":"Causes and implication of disinhibited behavior on the Internet","author":"Joinson","year":"1998"},{"key":"10.1016\/j.chb.2011.10.014_b0205","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1002\/ejsp.36","article-title":"Self-disclosure in computer-mediated communication: The role of self-awareness and visual anonymity","volume":"31","author":"Joinson","year":"2001","journal-title":"European Journal of Social Psychology"},{"key":"10.1016\/j.chb.2011.10.014_b0210","series-title":"Understanding the psychology of internet behavior: Virtual worlds, real lives","author":"Joinson","year":"2003"},{"key":"10.1016\/j.chb.2011.10.014_b0215","series-title":"Psychology and the internet: Intrapersonal, interpersonal and transpersonal implications","first-page":"76","article-title":"Disinhibition and the Internet","author":"Joinson","year":"2007"},{"key":"10.1016\/j.chb.2011.10.014_b0220","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1037\/h0029388","article-title":"Experimenter-subject \u201cdistance\u201d and self-disclosure","volume":"15","author":"Jourard","year":"1970","journal-title":"Journal of Personality and Social Psychology"},{"key":"10.1016\/j.chb.2011.10.014_b0225","unstructured":"Kabay, M. E. (1998, March). Anonymity and pseudonymity in cyberspace: Deindividuation, incivility and lawlessness verses freedom and privacy. Paper presented at the Annual Conference of the European Institute for Computers Anti-virus Research (EICAR), Munich, Germany."},{"key":"10.1016\/j.chb.2011.10.014_b0230","doi-asserted-by":"crossref","first-page":"1123","DOI":"10.1037\/0003-066X.39.10.1123","article-title":"Social psychological aspects of computer-mediated communication","volume":"39","author":"Kiesler","year":"1984","journal-title":"American Psychologist"},{"key":"10.1016\/j.chb.2011.10.014_b0235","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1016\/j.ijhcs.2007.06.002","article-title":"An interactional perspective on group awareness: Alleviating the information-exchange dilemma (for everybody?)","volume":"65","author":"Kimmerle","year":"2007","journal-title":"International Journal of Human-Computer Studies"},{"key":"10.1016\/j.chb.2011.10.014_b0240","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1037\/0033-2909.100.1.78","article-title":"Gaze and eye-contact: A research review","volume":"100","author":"Kleinke","year":"1986","journal-title":"Psychological Bulletin"},{"key":"10.1016\/j.chb.2011.10.014_b0245","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1111\/j.1533-8525.2005.00017.x","article-title":"Behavioral strategies for dealing with flaming in an online forum","volume":"46","author":"Lee","year":"2005","journal-title":"Sociological Quarterly"},{"key":"10.1016\/j.chb.2011.10.014_b0250","series-title":"The social net: Human behavior in cyberspace","first-page":"163","article-title":"The internet and aggression: Motivation, disinhibitory, and opportunity aspects","author":"Malamuth","year":"2005"},{"key":"10.1016\/j.chb.2011.10.014_b0260","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1037\/1089-2699.6.1.116","article-title":"Virtual group dynamics","volume":"6","author":"McKenna","year":"2002","journal-title":"Group Dynamics"},{"key":"10.1016\/j.chb.2011.10.014_b0265","series-title":"Cognitive technology","first-page":"89","article-title":"Social identity and the self: Getting connected online","author":"McKenna","year":"2005"},{"key":"10.1016\/j.chb.2011.10.014_b0270","doi-asserted-by":"crossref","first-page":"1536","DOI":"10.1016\/j.chb.2010.05.023","article-title":"Flaming on YouTube","volume":"26","author":"Moor","year":"2010","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0275","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1016\/S0747-5632(03)00040-2","article-title":"Loneliness and social use of the Internet","volume":"19","author":"Morahan-Martin","year":"2003","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0280","doi-asserted-by":"crossref","first-page":"1660","DOI":"10.1016\/j.chb.2005.09.002","article-title":"Anonymity effects in computer-mediated communication in the case of minority influence","volume":"23","author":"Moral-Toranzo","year":"2007","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0285","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1016\/j.chb.2004.02.023","article-title":"Differences between \u2018talking about\u2019 and \u2018admitting\u2019 sensitive behavior in anonymous and non-anonymous Web-based interviews","volume":"21","author":"M\u00fchlenfeld","year":"2005","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0290","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1037\/1089-2699.6.1.3","article-title":"Intergroup differentiation in computer-mediated communication: Effects of depersonalization","volume":"6","author":"Postmes","year":"2002","journal-title":"Group Dynamics"},{"key":"10.1016\/j.chb.2011.10.014_b0295","doi-asserted-by":"crossref","first-page":"1428","DOI":"10.1111\/j.1083-6101.2007.00380.x","article-title":"Anonymity and self-disclosure on Weblogs","volume":"12","author":"Qian","year":"2007","journal-title":"Journal of Computer-Mediated Communication"},{"key":"10.1016\/j.chb.2011.10.014_b0300","doi-asserted-by":"crossref","first-page":"2124","DOI":"10.1016\/j.chb.2007.10.003","article-title":"The impact of emotionality and self-disclosure on online dating versus traditional dating","volume":"24","author":"Rosen","year":"2008","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0305","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1080\/01650250143000571","article-title":"The contribution of adults\u2019 nonverbal cues and children\u2019s shyness to the development of rapport between adults and preschool children","volume":"27","author":"Rotenberg","year":"2003","journal-title":"International Journal of Behavioral Development"},{"key":"10.1016\/j.chb.2011.10.014_b0310","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1080\/10570319909374654","article-title":"The impact of physical and discursive anonymity on group members\u2019 multiple identifications during computer-supported decision making","volume":"63","author":"Scott","year":"1999","journal-title":"Western Journal of Communication"},{"key":"10.1016\/j.chb.2011.10.014_b0315","doi-asserted-by":"crossref","first-page":"768","DOI":"10.1016\/j.chb.2010.01.014","article-title":"Exploring and mitigating social loafing in online communities","volume":"26","author":"Shiue","year":"2010","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0320","series-title":"The social psychology of telecommunication","author":"Short","year":"1976"},{"key":"10.1016\/j.chb.2011.10.014_b0325","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1007\/BF01067964","article-title":"Speaking without seeing, or the effect of interviewer absence on interviewee disclosure time","volume":"12","author":"Siegman","year":"1983","journal-title":"Journal of Psycholinguistic Research"},{"key":"10.1016\/j.chb.2011.10.014_b0330","series-title":"Oxford handbook of internet psychology","first-page":"253","article-title":"Computer-mediated communication and social identity","author":"Spears","year":"2007"},{"key":"10.1016\/j.chb.2011.10.014_b0335","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1111\/1540-4560.00250","article-title":"When are net effects gross products? The power of influence and the influence of power in computer-mediated communication","volume":"58","author":"Spears","year":"2002","journal-title":"Journal of Social Issues"},{"key":"10.1016\/j.chb.2011.10.014_b0345","unstructured":"Suler, J. (1999). Cyberspace as psychological space. Retrieved 20.10.10."},{"key":"10.1016\/j.chb.2011.10.014_b0350","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1089\/1094931041291295","article-title":"The online disinhibition effect","volume":"7","author":"Suler","year":"2004","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0355","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1002\/aps.42","article-title":"Contemporary Media Forum","volume":"2","author":"Suler","year":"2005","journal-title":"International Journal of Applied Psychoanalytic Studies"},{"key":"10.1016\/j.chb.2011.10.014_b0360","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1089\/cpb.2007.0153","article-title":"Image, word, action: Interpersonal dynamics in a photo-sharing community","volume":"11","author":"Suler","year":"2008","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0365","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1089\/cpb.1998.1.275","article-title":"The bad boys of cyberspace. Deviant behavior in a multimedia chat community","volume":"1","author":"Suler","year":"1998","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0370","doi-asserted-by":"crossref","first-page":"955","DOI":"10.1016\/j.chb.2005.08.004","article-title":"Tow faces of anonymity: Paradoxical effects of cues to identity in CMC","volume":"23","author":"Tanis","year":"2007","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0375","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0747-5632(02)00032-8","article-title":"Humanizing self-administered surveys: Experiments on social presence in web and IVR surveys","volume":"19","author":"Tourangeau","year":"2003","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0380","series-title":"Life on the screen: Identity in the age of the Internet","author":"Turkle","year":"1995"},{"key":"10.1016\/j.chb.2011.10.014_b0385","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1037\/0736-9735.21.1.16","article-title":"Whither psychoanalysis in computer culture?","volume":"21","author":"Turkle","year":"2004","journal-title":"Psychoanalytic Psychology"},{"key":"10.1016\/j.chb.2011.10.014_b0390","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1111\/j.1083-6101.2007.00385.x","article-title":"Email flaming behaviors and organizational conflict","volume":"13","author":"Turnage","year":"2008","journal-title":"Journal of Computer-Mediated Communication"},{"key":"10.1016\/j.chb.2011.10.014_b0395","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1177\/1461444805052282","article-title":"Adolescents\u2019 identity experiments on the Internet","volume":"7","author":"Valkenburg","year":"2005","journal-title":"New Media & Society"},{"key":"10.1016\/j.chb.2011.10.014_b0400","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1177\/1470357207084865","article-title":"Digital photography: Communication, identity, memory","volume":"7","author":"van Dijck","year":"2008","journal-title":"Visual Communication"},{"key":"10.1016\/j.chb.2011.10.014_b0405","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/009365096023001001","article-title":"Computer-mediated communication: Impersonal, interpersonal, and hyperpersonal interaction","volume":"23","author":"Walther","year":"1996","journal-title":"Communication Research"},{"key":"10.1016\/j.chb.2011.10.014_b0410","unstructured":"Walther, J. B. (1999, May). Visual cues and computer-mediated communication: Don\u2019t look before you leap. In Paper presented at the Annual Meeting of the International Communication Association, San Francisco."},{"key":"10.1016\/j.chb.2011.10.014_b0415","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1177\/0093650208321783","article-title":"Validation and application of electronic propinquity theory to computer-mediated communication in groups","volume":"35","author":"Walther","year":"2008","journal-title":"Communication Research"},{"key":"10.1016\/j.chb.2011.10.014_b0420","series-title":"The power of the eyes","author":"Webbink","year":"1986"},{"key":"10.1016\/j.chb.2011.10.014_b0425","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1080\/03637750500111781","article-title":"Internet fantasy violence. A test of aggression in an online game","volume":"72","author":"Williams","year":"2005","journal-title":"Communication Monographs"},{"key":"10.1016\/j.chb.2011.10.014_b0430","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1089\/cyber.2009.0383","article-title":"Does the type of anonymity matter? The impact of visualization on information sharing in online groups","volume":"14","author":"Wodzicki","year":"2011","journal-title":"CyberPsychology, Behavior, and Social Networking"},{"key":"10.1016\/j.chb.2011.10.014_b0435","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1089\/cpb.2006.9984","article-title":"The unbearable likeness of being Digital: The persistence of nonverbal social norms in online virtual environments","volume":"10","author":"Yee","year":"2007","journal-title":"CyberPsychology & Behavior"},{"key":"10.1016\/j.chb.2011.10.014_b0440","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1089\/cyber.2009.0105","article-title":"Predicting the determinants of users\u2019 intentions for using Youtube to share video: Moderating gender effects","volume":"13","author":"Yang","year":"2010","journal-title":"CyberPsychology, Behavior, and Social Networking"},{"key":"10.1016\/j.chb.2011.10.014_b0445","first-page":"237","article-title":"The human choice. Individuation, reason, and order vs. deindividuation, impulse and chaos","volume":"17","author":"Zimbardo","year":"1969","journal-title":"Nebraska Symposium on Motivation"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563211002317?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563211002317?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,6,11]],"date-time":"2023-06-11T02:36:06Z","timestamp":1686450966000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563211002317"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3]]},"references-count":86,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["S0747563211002317"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2011.10.014","relation":{},"ISSN":["0747-5632"],"issn-type":[{"value":"0747-5632","type":"print"}],"subject":[],"published":{"date-parts":[[2012,3]]}}}