{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T18:51:51Z","timestamp":1735584711786},"reference-count":73,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,8,1]],"date-time":"2020-08-01T00:00:00Z","timestamp":1596240000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100003128","name":"Ty\u00f6suojelurahasto","doi-asserted-by":"publisher","award":["118055"],"id":[{"id":"10.13039\/501100003128","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1016\/j.chb.2020.106363","type":"journal-article","created":{"date-parts":[[2020,4,5]],"date-time":"2020-04-05T15:48:46Z","timestamp":1586101726000},"page":"106363","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":63,"special_numbering":"C","title":["Cyberbullying victimization at work: Social media identity bubble approach"],"prefix":"10.1016","volume":"109","author":[{"given":"Atte","family":"Oksanen","sequence":"first","affiliation":[]},{"given":"Reetta","family":"Oksa","sequence":"additional","affiliation":[]},{"given":"Nina","family":"Savela","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Kaakinen","sequence":"additional","affiliation":[]},{"given":"Noora","family":"Ellonen","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.chb.2020.106363_bib1","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1080\/02678370412331319794","article-title":"Relationships between bullying, psychosocial work environment and individual stress reactions","volume":"18","author":"Agervold","year":"2004","journal-title":"Work & Stress"},{"issue":"6239","key":"10.1016\/j.chb.2020.106363_bib2","doi-asserted-by":"crossref","first-page":"1130","DOI":"10.1126\/science.aaa1160","article-title":"Exposure to ideologically diverse news and opinion on Facebook","volume":"348","author":"Bakshy","year":"2015","journal-title":"Science"},{"issue":"1","key":"10.1016\/j.chb.2020.106363_bib3","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1177\/1523422311410651","article-title":"Workplace bullying: An integrative literature review","volume":"13","author":"Bartlett","year":"2011","journal-title":"Advances in Developing Human Resources"},{"issue":"2","key":"10.1016\/j.chb.2020.106363_bib4","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1016\/j.im.2004.02.001","article-title":"Bullying on the net: Adverse behaviour on e-mail and its impact","volume":"42","author":"Baruch","year":"2005","journal-title":"Information & Management"},{"issue":"3","key":"10.1016\/j.chb.2020.106363_bib5","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1037\/0033-2909.117.3.497","article-title":"The need to belong: Desire for interpersonal attachments as a fundamental human motivation","volume":"117","author":"Baumeister","year":"1995","journal-title":"Psychological Bulletin"},{"issue":"1","key":"10.1016\/j.chb.2020.106363_bib6","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1177\/0894439315573926","article-title":"Solving the nonresponse problem with sample matching?","volume":"34","author":"Bethlehem","year":"2016","journal-title":"Social Science Computer Review"},{"issue":"5","key":"10.1016\/j.chb.2020.106363_bib7","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1037\/0021-9010.91.5.998","article-title":"Workplace harassment from the victim's perspective: A theoretical model and meta-analysis","volume":"91","author":"Bowling","year":"2006","journal-title":"Journal of Applied Psychology"},{"issue":"3","key":"10.1016\/j.chb.2020.106363_bib8","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1111\/j.1468-2370.2012.00339.x","article-title":"Workplace bullying, mobbing and general harassment: A review","volume":"15","author":"Branch","year":"2013","journal-title":"International Journal of Management Reviews"},{"issue":"4","key":"10.1016\/j.chb.2020.106363_bib9","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1016\/j.im.2017.11.004","article-title":"Cyberbullying impacts on victims' satisfaction with information and communication technologies: The role of Perceived Cyberbullying Severity","volume":"55","author":"Camacho","year":"2018","journal-title":"Information & Management"},{"key":"10.1016\/j.chb.2020.106363_bib10","article-title":"Consequences of cyberbullying and social overload while using SNSs: A study of users' discontinuous usage behavior in SNSs","author":"Cao","year":"2019","journal-title":"Information Systems Frontiers"},{"issue":"4","key":"10.1016\/j.chb.2020.106363_bib11","doi-asserted-by":"crossref","first-page":"1337","DOI":"10.1016\/j.chb.2010.07.028","article-title":"Online social networks: Why do students use Facebook?","volume":"27","author":"Cheung","year":"2011","journal-title":"Computers in Human Behavior"},{"issue":"October","key":"10.1016\/j.chb.2020.106363_bib12","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1016\/j.chb.2016.05.033","article-title":"Who views online extremism? Individual attributes leading to exposure","volume":"63","author":"Costello","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"7","key":"10.1016\/j.chb.2020.106363_bib13","doi-asserted-by":"crossref","first-page":"945","DOI":"10.1080\/09585192.2015.1116454","article-title":"Understanding the relationship between experiencing workplace cyberbullying, employee mental strain and job satisfaction: A disempowerment approach","volume":"28","author":"Coyne","year":"2017","journal-title":"International Journal of Human Resource Management"},{"issue":"6","key":"10.1016\/j.chb.2020.106363_bib14","doi-asserted-by":"crossref","first-page":"1191","DOI":"10.1111\/j.1467-6494.2004.00295.x","article-title":"When the social self is threatened: Shame, physiology, and health","volume":"72","author":"Dickerson","year":"2004","journal-title":"Journal of Personality"},{"issue":"3","key":"10.1016\/j.chb.2020.106363_bib15","doi-asserted-by":"crossref","first-page":"355","DOI":"10.1037\/0033-2909.130.3.355","article-title":"Acute stressors and cortisol responses: A theoretical integration and synthesis of laboratory research","volume":"130","author":"Dickerson","year":"2004","journal-title":"Psychological Bulletin"},{"key":"10.1016\/j.chb.2020.106363_bib68","series-title":"Organizational identity: A reader","first-page":"56","article-title":"An integrative theory of intergroup conflict","author":"Tajfel","year":"1979"},{"key":"10.1016\/j.chb.2020.106363_bib16","series-title":"The network society","author":"van Dijk","year":"2012"},{"key":"10.1016\/j.chb.2020.106363_bib18","series-title":"Research methods in criminal justice and criminology: An interdisciplinary approach","author":"Ellis","year":"2010"},{"issue":"1","key":"10.1016\/j.chb.2020.106363_bib19","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1177\/0002764214540510","article-title":"The use of enterprise social network sites for knowledge sharing in distributed organization: The role of organizational affordances","volume":"59","author":"Ellison","year":"2015","journal-title":"American Behavioral Scientist"},{"key":"10.1016\/j.chb.2020.106363_bib20","series-title":"Concepts, approaches and methods. Handbooks of workplace bullying, emotional abuse and harassment","first-page":"1","article-title":"Cyberbullying at work: Understanding the influence of technology","author":"Farley","year":"2018"},{"issue":"4","key":"10.1016\/j.chb.2020.106363_bib21","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1111\/medu.12666","article-title":"Exploring the impact of workplace cyberbullying on trainee doctors","volume":"49","author":"Farley","year":"2015","journal-title":"Medical Education"},{"issue":"S1","key":"10.1016\/j.chb.2020.106363_bib22","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1093\/poq\/nfw006","article-title":"Filter bubbles, echo chambers, and online news consumption","volume":"80","author":"Flaxman","year":"2016","journal-title":"Public Opinion Quarterly"},{"issue":"May","key":"10.1016\/j.chb.2020.106363_bib23","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1016\/j.chb.2016.01.003","article-title":"Exploring cyberbullying and face-to-face bullying in working life\u2013Prevalence, targets and expressions","volume":"58","author":"Forssell","year":"2016","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2020.106363_bib24","series-title":"The international journal of human resource management","article-title":"Gender and organisational position: Predicting victimisation of cyberbullying behaviour in working life","author":"Forssell","year":"2018"},{"issue":"3","key":"10.1016\/j.chb.2020.106363_bib25","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1027\/1864-1105\/a000119","article-title":"Identification processes in online groups: Identity motives in the virtual realm of MMORPGs","volume":"26","author":"Gabbiadini","year":"2014","journal-title":"Journal of Media Psychology"},{"issue":"5","key":"10.1016\/j.chb.2020.106363_bib26","doi-asserted-by":"crossref","first-page":"448","DOI":"10.3390\/ijerph13050448","article-title":"Predictors of workplace bullying and cyber-bullying in New Zealand","volume":"13","author":"Gardner","year":"2016","journal-title":"International Journal of Environmental Research and Public Health"},{"issue":"February","key":"10.1016\/j.chb.2020.106363_bib27","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1016\/j.paid.2016.10.063","article-title":"Which personality traits are related to traditional bullying and cyberbullying? A study with the big five, dark triad and sadism","volume":"106","author":"van Geel","year":"2017","journal-title":"Personality and Individual Differences"},{"key":"10.1016\/j.chb.2020.106363_bib28","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1002\/ab.21742","article-title":"A meta\u2010analysis of the differential relations of traditional and cyber\u2010victimization with internalizing problems","volume":"44","author":"Gini","year":"2018","journal-title":"Aggressive Behavior"},{"issue":"1","key":"10.1016\/j.chb.2020.106363_bib29","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1017\/S0033291796004242","article-title":"The validity of two versions of the GHQ in the WHO study of mental illness in general health care","volume":"27","author":"Goldberg","year":"1997","journal-title":"Psychological Medicine"},{"issue":"1","key":"10.1016\/j.chb.2020.106363_bib30","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1017\/S0033291700021644","article-title":"A scaled version of the general health Questionnaire","volume":"9","author":"Goldberg","year":"1979","journal-title":"Psychological Medicine"},{"issue":"1","key":"10.1016\/j.chb.2020.106363_bib31","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1016\/j.jvb.2006.02.003","article-title":"Avoiding depletion in virtual work: Telework and the intervening impact of work exhaustion on commitment and turnover intentions","volume":"69","author":"Golden","year":"2006","journal-title":"Journal of Vocational Behavior"},{"issue":"3","key":"10.1016\/j.chb.2020.106363_bib32","doi-asserted-by":"crossref","first-page":"604","DOI":"10.1016\/j.chb.2012.11.017","article-title":"Face-to-face or Facebook: Can social connectedness be derived online?","volume":"29","author":"Grieve","year":"2013","journal-title":"Computers in Human Behavior"},{"issue":"6","key":"10.1016\/j.chb.2020.106363_bib33","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1016\/j.jsp.2005.11.001","article-title":"Burnout and work engagement among teachers","volume":"43","author":"Hakanen","year":"2006","journal-title":"Journal of School Psychology"},{"issue":"1","key":"10.1016\/j.chb.2020.106363_bib34","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1016\/j.jpsychores.2005.06.078","article-title":"Bullying at work, health outcomes, and physiological stress response","volume":"60","author":"Hansen","year":"2006","journal-title":"Journal of Psychosomatic Research"},{"issue":"4","key":"10.1016\/j.chb.2020.106363_bib35","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1111\/1469-7610.00629","article-title":"Twenty years' research on peer victimization and psychosocial maladjustment: A meta-analytic review of cross-sectional studies","volume":"41","author":"Hawker","year":"2000","journal-title":"The Journal of Child Psychology and Psychiatry and Allied Disciplines"},{"issue":"3","key":"10.1016\/j.chb.2020.106363_bib36","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1002\/poi3.173","article-title":"How does social capital associate with being a victim of online hate? Survey evidence from the US, UK, Germany and Finland","volume":"10","author":"Kaakinen","year":"2018","journal-title":"Policy & Internet"},{"issue":"1","key":"10.1016\/j.chb.2020.106363_bib37","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1080\/15213269.2018.1544910","article-title":"Shared Identity and Shared Information in Social Media: Development and Validation of the Identity Bubble Reinforcement Scale","volume":"23","author":"Kaakinen","year":"2020","journal-title":"Media Psychology"},{"issue":"1","key":"10.1016\/j.chb.2020.106363_bib38","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1002\/smi.993","article-title":"A confirmatory factor analysis of the General Health Questionnaire-12","volume":"20","author":"Kalliath","year":"2004","journal-title":"Stress and Health"},{"key":"10.1016\/j.chb.2020.106363_bib39","series-title":"Online hate and harmful content: Cross-national perspectives","author":"Keipi","year":"2017"},{"issue":"4","key":"10.1016\/j.chb.2020.106363_bib40","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1002\/poi3.211","article-title":"The role of political activity in the formation of online identity bubbles","volume":"11","author":"Koivula","year":"2019","journal-title":"Policy & Internet"},{"issue":"4","key":"10.1016\/j.chb.2020.106363_bib41","doi-asserted-by":"crossref","first-page":"1073","DOI":"10.1037\/a0035618","article-title":"Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth","volume":"140","author":"Kowalski","year":"2014","journal-title":"Psychological Bulletin"},{"issue":"6","key":"10.1016\/j.chb.2020.106363_bib42","doi-asserted-by":"crossref","first-page":"S22","DOI":"10.1016\/j.jadohealth.2007.08.017","article-title":"Electronic bullying among middle school students","volume":"41","author":"Kowalski","year":"2007","journal-title":"Journal of Adolescent Health"},{"issue":"1","key":"10.1016\/j.chb.2020.106363_bib43","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1080\/00224545.2017.1302402","article-title":"Bullying and cyberbullying in adulthood and the workplace","volume":"158","author":"Kowalski","year":"2018","journal-title":"The Journal of Social Psychology"},{"issue":"6","key":"10.1016\/j.chb.2020.106363_bib44","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1089\/cyber.2011.0588","article-title":"Cyberbullying: The challenge to define","volume":"15","author":"Langos","year":"2012","journal-title":"Cyberpsychology, Behavior, and Social Networking"},{"issue":"1","key":"10.1016\/j.chb.2020.106363_bib45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/jcc4.12029","article-title":"Enterprise social media: Definition, history and prospects for the study of social technologies in organizations","volume":"19","author":"Leonardi","year":"2013","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"February","key":"10.1016\/j.chb.2020.106363_bib46","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.copsyc.2019.06.022","article-title":"Two social lives: How differences between online and offline interaction influence social outcomes","volume":"31","author":"Lieberman","year":"2020","journal-title":"Current Opinion in Psychology"},{"issue":"6","key":"10.1016\/j.chb.2020.106363_bib47","doi-asserted-by":"crossref","first-page":"837","DOI":"10.1111\/j.1467-6486.2007.00715.x","article-title":"Burned by bullying in the American workplace: Prevalence, perception, degree and impact","volume":"44","author":"Lutgen\u2010Sandvik","year":"2007","journal-title":"Journal of Management Studies"},{"key":"10.1016\/j.chb.2020.106363_bib48","series-title":"Maslach Burnout inventory manual","author":"Maslach","year":"2018"},{"issue":"1","key":"10.1016\/j.chb.2020.106363_bib49","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1146\/annurev.soc.27.1.415","article-title":"Birds of a feather: Homophily in social networks","volume":"27","author":"McPherson","year":"2001","journal-title":"Annual Review of Sociology"},{"issue":"4","key":"10.1016\/j.chb.2020.106363_bib50","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1177\/1748895816679866","article-title":"Do routine activities help predict young adults' online harassment: A multi-nation study","volume":"17","author":"N\u00e4si","year":"2017","journal-title":"Criminology and Criminal Justice"},{"key":"10.1016\/j.chb.2020.106363_bib51","doi-asserted-by":"crossref","first-page":"38","DOI":"10.5271\/sjweh.3178","article-title":"Longitudinal relationships between workplace bullying and psychological distress","author":"Nielsen","year":"2012","journal-title":"Scandinavian Journal of Work, Environment & Health"},{"issue":"1","key":"10.1016\/j.chb.2020.106363_bib52","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1146\/annurev-clinpsy-050212-185516","article-title":"School bullying: Development and some important challenges","volume":"9","author":"Olweus","year":"2013","journal-title":"Annual Review of Clinical Psychology"},{"key":"10.1016\/j.chb.2020.106363_bib53","series-title":"Aggression and violence: A social psychological perspective","first-page":"225","article-title":"Cyberbullying: A critical overview","author":"Olweus","year":"2017"},{"key":"10.1016\/j.chb.2020.106363_bib54","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.copsyc.2017.04.012","article-title":"Some problems with cyberbullying research","volume":"19","author":"Olweus","year":"2018","journal-title":"Current Opinion in Psychology"},{"key":"10.1016\/j.chb.2020.106363_bib55","series-title":"The filter bubble: What the Internet is hiding from you","author":"Pariser","year":"2011"},{"issue":"8","key":"10.1016\/j.chb.2020.106363_bib56","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1177\/0044118X15617401","article-title":"Old wine, new bottle? Comparing interpersonal bullying and cyberbullying victimization","volume":"49","author":"Payne","year":"2017","journal-title":"Youth & Society"},{"key":"10.1016\/j.chb.2020.106363_bib57","doi-asserted-by":"crossref","first-page":"424","DOI":"10.1016\/j.chb.2015.06.028","article-title":"Cyberbullying victimization: Do victims' personality and risky social network behaviors contribute to the problem?","volume":"52","author":"Peluchette","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"6","key":"10.1016\/j.chb.2020.106363_bib58","doi-asserted-by":"crossref","first-page":"2758","DOI":"10.1016\/j.chb.2013.07.020","article-title":"Cyberbullying: Eliciting harm without consequence","volume":"29","author":"Pettalia","year":"2013","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"10.1016\/j.chb.2020.106363_bib59","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1089\/cpb.2009.0025","article-title":"Cyberbullying: The new face of workplace bullying?","volume":"12","author":"Privitera","year":"2009","journal-title":"CyberPsychology and Behavior"},{"issue":"4","key":"10.1016\/j.chb.2020.106363_bib60","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1287\/isre.1070.0165","article-title":"The consequences of technostress for end users in organizations: Conceptual development and empirical validation","volume":"19","author":"Ragu-Nathan","year":"2008","journal-title":"Information Systems Research"},{"issue":"1","key":"10.1016\/j.chb.2020.106363_bib61","first-page":"JCMC10110","article-title":"Virtual community attraction: Why people hang out online","volume":"10","author":"Ridings","year":"2004","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"3","key":"10.1016\/j.chb.2020.106363_bib62","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1080\/02678370903227357","article-title":"Cross-lagged relationships between workplace bullying, job satisfaction and engagement: Two longitudinal studies","volume":"23","author":"Rodr\u00edguez-Mu\u00f1oz","year":"2009","journal-title":"Work & Stress"},{"issue":"3","key":"10.1016\/j.chb.2020.106363_bib63","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1080\/00207594.2012.680460","article-title":"The dark side of technologies: Technostress among users of information and communication technologies","volume":"48","author":"Salanova","year":"2013","journal-title":"International Journal of Psychology"},{"issue":"1","key":"10.1016\/j.chb.2020.106363_bib64","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/j.respol.2012.05.003","article-title":"Increasing web survey response rates in innovation research: An experimental study of static and dynamic contact design features","volume":"42","author":"Sauermann","year":"2013","journal-title":"Research Policy"},{"issue":"2","key":"10.1016\/j.chb.2020.106363_bib65","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1111\/j.1467-9450.2007.00611.x","article-title":"Cyberbullying: Another main type of bullying?","volume":"49","author":"Slonje","year":"2008","journal-title":"Scandinavian Journal of Psychology"},{"issue":"4","key":"10.1016\/j.chb.2020.106363_bib66","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1111\/j.1469-7610.2007.01846.x","article-title":"Cyberbullying: Its nature and impact in secondary school pupils","volume":"49","author":"Smith","year":"2008","journal-title":"Journal of Child Psychology and Psychiatry"},{"issue":"December","key":"10.1016\/j.chb.2020.106363_bib67","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/j.chb.2015.06.050","article-title":"Cyberbullying at work: The mediating role of optimism between cyberbullying and job outcomes","volume":"53","author":"Snyman","year":"2015","journal-title":"Computers in Human Behavior"},{"issue":"8","key":"10.1016\/j.chb.2020.106363_bib69","doi-asserted-by":"crossref","DOI":"10.1371\/journal.pone.0135225","article-title":"Workplace bullying and mental health: A meta-analysis on cross-sectional and longitudinal data","volume":"10","author":"Verkuil","year":"2015","journal-title":"PloS One"},{"key":"10.1016\/j.chb.2020.106363_bib70","series-title":"Handbook of identity theory and research","first-page":"403","article-title":"Identity motives","author":"Vignoles","year":"2011"},{"issue":"April","key":"10.1016\/j.chb.2020.106363_bib71","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1016\/j.chb.2016.12.055","article-title":"The dark side of working online: Towards a definition and an emotion reaction model of workplace cyberbullying","volume":"69","author":"Vranjes","year":"2017","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2020.106363_bib72","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1007\/s00787-017-0954-6","article-title":"Cyberbullying: A storm in a teacup?","volume":"26","author":"Wolke","year":"2017","journal-title":"European Child & Adolescent Psychiatry"},{"issue":"1","key":"10.1016\/j.chb.2020.106363_bib73","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.jadohealth.2011.12.031","article-title":"Defining and measuring cyberbullying within the larger context of bullying victimization","volume":"51","author":"Ybarra","year":"2011","journal-title":"Journal of Adolescent Health"},{"issue":"July\u2013August","key":"10.1016\/j.chb.2020.106363_bib74","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.avb.2015.10.001","article-title":"Systematic review of theoretical studies on bullying and cyberbullying: Facts, knowledge, prevention, and intervention","volume":"23","author":"Zych","year":"2015","journal-title":"Aggression and Violent Behavior"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563220301163?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0747563220301163?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T10:44:51Z","timestamp":1695984291000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0747563220301163"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8]]},"references-count":73,"alternative-id":["S0747563220301163"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2020.106363","relation":{},"ISSN":["0747-5632"],"issn-type":[{"value":"0747-5632","type":"print"}],"subject":[],"published":{"date-parts":[[2020,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Cyberbullying victimization at work: Social media identity bubble approach","name":"articletitle","label":"Article Title"},{"value":"Computers in Human Behavior","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.chb.2020.106363","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"106363"}}