{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T06:03:46Z","timestamp":1726466626029},"reference-count":24,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2012,5,1]],"date-time":"2012-05-01T00:00:00Z","timestamp":1335830400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1016\/j.chb.2011.12.005","type":"journal-article","created":{"date-parts":[[2012,1,10]],"date-time":"2012-01-10T03:00:49Z","timestamp":1326164449000},"page":"861-867","source":"Crossref","is-referenced-by-count":86,"title":["Anonymity and roles associated with aggressive posts in an online forum"],"prefix":"10.1016","volume":"28","author":[{"given":"Michael J.","family":"Moore","sequence":"first","affiliation":[]},{"given":"Tadashi","family":"Nakano","sequence":"additional","affiliation":[]},{"given":"Akihiro","family":"Enomoto","sequence":"additional","affiliation":[]},{"given":"Tatsuya","family":"Suda","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.chb.2011.12.005_b0005","article-title":"Moral panic and alternative identity construction in usenet","volume":"7","author":"Baker","year":"2001","journal-title":"Journal of Computer-Mediated Communication"},{"key":"10.1016\/j.chb.2011.12.005_b0010","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1002\/ab.10043","article-title":"Links between social information processing in middle childhood and involvement in bullying","volume":"29","author":"Camodeca","year":"2003","journal-title":"Aggressive Behavior"},{"key":"10.1016\/j.chb.2011.12.005_b0015","doi-asserted-by":"crossref","first-page":"S1","DOI":"10.1016\/j.jadohealth.2007.08.020","article-title":"Electronic media, violence, and adolescents: An emerging public health problem","volume":"41","author":"David-Ferdon","year":"2007","journal-title":"Journal of Adolescent Health"},{"key":"10.1016\/j.chb.2011.12.005_b0020","first-page":"182","article-title":"Cyberbullying versus face-to-face bullying: A theoretical and conceptual review","volume":"217","author":"Dooley","year":"2009","journal-title":"Journal of Psychology"},{"key":"10.1016\/j.chb.2011.12.005_b0025","unstructured":"Hay, M., Miklau, G., Jensen, D., Weis, P., & Srivastava, S. (2007). Anonymizing Social Networks. Technical Report, No. 07-19, University of Massachusetts Amherst, Computer Science Department."},{"key":"10.1016\/j.chb.2011.12.005_b0030","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1080\/13811118.2010.494133","article-title":"Bullying, cyberbullying, and suicide","volume":"41","author":"Hinduja","year":"2010","journal-title":"Archives of Suicide Research"},{"key":"10.1016\/j.chb.2011.12.005_b0035","doi-asserted-by":"crossref","first-page":"S22","DOI":"10.1016\/j.jadohealth.2007.08.017","article-title":"Electronic bullying among middle school students","volume":"41","author":"Kowalski","year":"2007","journal-title":"Journal of Adolescent Health"},{"year":"2010","series-title":"Teenage insults, scrawled on web, not on walls","author":"Lewin","key":"10.1016\/j.chb.2011.12.005_b0040"},{"key":"10.1016\/j.chb.2011.12.005_b0045","doi-asserted-by":"crossref","first-page":"1777","DOI":"10.1016\/j.chb.2005.10.005","article-title":"New bottle but old wine: A research of cyberbullying in schools","volume":"23","author":"Li","year":"2007","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.12.005_b0050","first-page":"315","article-title":"Social network predictors of bullying and victimization","volume":"39","author":"Mouttapa","year":"2004","journal-title":"Adolescence"},{"key":"10.1016\/j.chb.2011.12.005_b0055","doi-asserted-by":"crossref","unstructured":"Narayanan, A., & Shmatikov, V. (2009). De-anonymizing social networks. In 30th IEEE symposium on security and privacy (pp. 173\u2013187).","DOI":"10.1109\/SP.2009.22"},{"key":"10.1016\/j.chb.2011.12.005_b0060","unstructured":"Olweus, D. (1990). Health hazards in adolescence (pp. 259\u2013296). Walter De Gruyter Inc."},{"key":"10.1016\/j.chb.2011.12.005_b0065","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1177\/1541204006286288","article-title":"Bullies move beyond the schoolyard: A preliminary look at cyberbullying","volume":"4","author":"Patchin","year":"2006","journal-title":"Youth Violence and Juvenile Justice"},{"key":"10.1016\/j.chb.2011.12.005_b0070","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/(SICI)1098-2337(1996)22:1<1::AID-AB1>3.0.CO;2-T","article-title":"Bullying as a group process: Participant roles and their relations to social status within the group","volume":"22","author":"Salmivalli","year":"1996","journal-title":"Aggressive Behavior"},{"key":"10.1016\/j.chb.2011.12.005_b0075","doi-asserted-by":"crossref","unstructured":"Singh, L., & Zhan, J. (2007). Measuring topological anonymity in social networks. In IEEE international conference on granular computing (pp. 770\u2013774).","DOI":"10.1109\/GrC.2007.31"},{"key":"10.1016\/j.chb.2011.12.005_b0080","doi-asserted-by":"crossref","first-page":"1119","DOI":"10.1111\/1467-8624.00461","article-title":"Definitions of bullying: A comparison of terms used, and age and gender differences, in a fourteen-country international comparison","volume":"73","author":"Smith","year":"2002","journal-title":"Child Development"},{"key":"10.1016\/j.chb.2011.12.005_b0085","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1111\/j.1469-7610.2007.01846.x","article-title":"Cyberbullying: its nature and impact in secondary school pupils","volume":"49","author":"Smith","year":"2008","journal-title":"Journal of Child Psychology and Psychiatry"},{"key":"10.1016\/j.chb.2011.12.005_b0090","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1002\/(SICI)1098-2337(1999)25:2<97::AID-AB3>3.0.CO;2-7","article-title":"Bullying as a group process: An adaptation of the participant role approach","volume":"25","author":"Sutton","year":"1999","journal-title":"Aggressive Behavior"},{"key":"10.1016\/j.chb.2011.12.005_b0095","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1142\/S0218488502001648","article-title":"k-anonymity: A model for protecting privacy","volume":"10","author":"Sweeny","year":"2002","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"},{"key":"10.1016\/j.chb.2011.12.005_b0100","article-title":"A new definition and scales for indirect aggression in schools: Results from the longitudinal comparative survey among five countries","author":"Taki","year":"2008","journal-title":"International Journal of Violence and School"},{"key":"10.1016\/j.chb.2011.12.005_b0105","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s11218-006-9009-4","article-title":"A classmate in distress: schoolchildren as bystanders and their reasons for how they act","volume":"10","author":"Thornberg","year":"2007","journal-title":"Social Psychology of Education"},{"key":"10.1016\/j.chb.2011.12.005_b0110","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/j.adolescence.2004.03.007","article-title":"Youth engaging in online harassment: associations with caregiverchild relationships, internet use, and personal characteristics","volume":"27","author":"Ybarra","year":"2004","journal-title":"Journal of Adolescence"},{"key":"10.1016\/j.chb.2011.12.005_b0115","doi-asserted-by":"crossref","first-page":"e1169","DOI":"10.1542\/peds.2006-0815","article-title":"Examining characteristics and associated distress related to internet harassment: Findings from the second youth internet safety survey","volume":"118","author":"Ybarra","year":"2006","journal-title":"Pediatrics"},{"key":"10.1016\/j.chb.2011.12.005_b0120","unstructured":"Yin, D., Davison, B. D., Xue, Z., Hong, L., Kontostathis, A., & Edwards, L. (2009). Detection of harassment on web 2.0. In Proceedings of the content analysis in the Web 2.0."}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563211002731?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563211002731?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,22]],"date-time":"2019-06-22T04:30:34Z","timestamp":1561177834000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563211002731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,5]]}},"alternative-id":["S0747563211002731"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2011.12.005","relation":{},"ISSN":["0747-5632"],"issn-type":[{"type":"print","value":"0747-5632"}],"subject":[],"published":{"date-parts":[[2012,5]]}}}