{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T23:49:52Z","timestamp":1726444192793},"reference-count":53,"publisher":"Mary Ann Liebert Inc","issue":"10","license":[{"start":{"date-parts":[[2013,10,1]],"date-time":"2013-10-01T00:00:00Z","timestamp":1380585600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.liebertpub.com\/nv\/resources-tools\/text-and-data-mining-policy\/121\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cyberpsychology, Behavior, and Social Networking"],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1089\/cyber.2012.0272","type":"journal-article","created":{"date-parts":[[2013,6,7]],"date-time":"2013-06-07T14:19:00Z","timestamp":1370614740000},"page":"728-734","source":"Crossref","is-referenced-by-count":191,"title":["Sharing, Liking, Commenting, and Distressed? The Pathway Between Facebook Interaction and Psychological Distress"],"prefix":"10.1089","volume":"16","author":[{"given":"Wenhong","family":"Chen","sequence":"first","affiliation":[{"name":"Department of Radio\u2013Television\u2013Film, College of Communication, University of Texas at Austin, Austin, Texas."}]},{"given":"Kye-Hyoung","family":"Lee","sequence":"additional","affiliation":[{"name":"Department of Educational Administration, College of Education, University of Texas at Austin, Austin, Texas."}]}],"member":"278","reference":[{"key":"B2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1099-0860.2009.00243.x"},{"key":"B3","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2006.9.584"},{"key":"B4","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6237.2011.00760.x"},{"key":"B5","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2008.0327"},{"key":"B6","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2009.0217"},{"key":"B7","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00248"},{"key":"B8","doi-asserted-by":"publisher","DOI":"10.1037\/0012-1649.44.3.655"},{"key":"B9","doi-asserted-by":"publisher","DOI":"10.1080\/01972240600677805"},{"key":"B10","doi-asserted-by":"publisher","DOI":"10.1080\/01463370009385579"},{"key":"B11","doi-asserted-by":"publisher","DOI":"10.1089\/109493102753770552"},{"key":"B12","doi-asserted-by":"publisher","DOI":"10.1080\/03601270290099921"},{"key":"B13","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01499.x"},{"key":"B14","doi-asserted-by":"publisher","DOI":"10.1080\/13691180701858851"},{"key":"B16","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0374"},{"key":"B17","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0140"},{"key":"B19","volume-title":"Internet and society: a preliminary report","author":"Nie NH","year":"2000"},{"key":"B20","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.53.9.1017"},{"key":"B21","doi-asserted-by":"publisher","DOI":"10.1177\/0894439309335230"},{"key":"B22","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0991-116"},{"key":"B23","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.2005.tb03019.x"},{"key":"B24","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2009.0257"},{"key":"B25","first-page":"487","volume":"52","author":"Carpenter CJ","year":"2011","journal-title":"Personality and Individual Differences"},{"key":"B26","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2011.0324"},{"key":"B27","doi-asserted-by":"publisher","DOI":"10.1016\/S0277-9536(98)00400-6"},{"key":"B28","volume-title":"Communicating and organizing","author":"Farace RV","year":"1977"},{"key":"B29","doi-asserted-by":"publisher","DOI":"10.1016\/S0268-4012(99)00051-1"},{"key":"B30","first-page":"99","volume":"90","author":"Deutsch KW","year":"1961","journal-title":"Daedalus"},{"key":"B31","doi-asserted-by":"publisher","DOI":"10.2307\/3203338"},{"key":"B32","doi-asserted-by":"publisher","DOI":"10.1016\/0361-3682(90)90005-F"},{"key":"B33","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.3.2.e20"},{"key":"B34","doi-asserted-by":"publisher","DOI":"10.1080\/01972240490507974"},{"key":"B36","doi-asserted-by":"publisher","DOI":"10.1177\/0893318909335417"},{"key":"B37","doi-asserted-by":"publisher","DOI":"10.1080\/00909882.2010.536847"},{"key":"B38","volume-title":"MacArthur Foundation Series on Digital Learning\u2014Youth, identity, and digital media volume","author":"boyd dm","year":"2007"},{"key":"B40","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.08.014"},{"key":"B41","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.86.1.80"},{"key":"B42","doi-asserted-by":"publisher","DOI":"10.2307\/2096350"},{"key":"B43","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0167.49.1.117"},{"key":"B44","unstructured":"44. Mitchell WS. Social and psychological factors associated with Internet use in the home: a uses and gratifications theory. Doctoral dissertation, Bowling Green State University, 1999."},{"key":"B45","doi-asserted-by":"publisher","DOI":"10.1207\/s15327698jfc0602_2"},{"key":"B46","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2009.0411"},{"key":"B47","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2010.0061"},{"key":"B48","volume-title":"Paper presented at the 41st Annual Meeting of the International Communication Association","author":"Chung CJ","year":"1991"},{"key":"B50","volume-title":"Social causes of psychological distress","author":"Mirowsky J","year":"2003","edition":"2"},{"key":"B51","volume-title":"Principles and practice of structural equation modeling","author":"Kline RB","year":"2010","edition":"3"},{"key":"B52","doi-asserted-by":"publisher","DOI":"10.1002\/9781118619179"},{"key":"B53","doi-asserted-by":"publisher","DOI":"10.1080\/10705519909540118"},{"key":"B54","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.1.2.130"},{"key":"B55","doi-asserted-by":"publisher","DOI":"10.1080\/03610919708813451"},{"key":"B56","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.307"},{"key":"B57","first-page":"59","volume-title":"A networked self: identity, community, and culture on social network sites","author":"LaRose R","year":"2010"},{"key":"B58","doi-asserted-by":"publisher","DOI":"10.2307\/2390963"},{"key":"B59","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2008.07.002"}],"container-title":["Cyberpsychology, Behavior, and Social Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.liebertpub.com\/doi\/full-xml\/10.1089\/cyber.2012.0272","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.liebertpub.com\/doi\/pdf\/10.1089\/cyber.2012.0272","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,30]],"date-time":"2018-07-30T23:42:27Z","timestamp":1532994147000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.liebertpub.com\/doi\/10.1089\/cyber.2012.0272"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":53,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2013,10]]}},"alternative-id":["10.1089\/cyber.2012.0272"],"URL":"https:\/\/doi.org\/10.1089\/cyber.2012.0272","relation":{},"ISSN":["2152-2715","2152-2723"],"issn-type":[{"value":"2152-2715","type":"print"},{"value":"2152-2723","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10]]}}}