{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T13:52:43Z","timestamp":1722433963163},"reference-count":41,"publisher":"Mary Ann Liebert Inc","issue":"8","license":[{"start":{"date-parts":[[2022,8,1]],"date-time":"2022-08-01T00:00:00Z","timestamp":1659312000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.liebertpub.com\/nv\/resources-tools\/text-and-data-mining-policy\/121\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cyberpsychology, Behavior, and Social Networking"],"published-print":{"date-parts":[[2022,8,1]]},"DOI":"10.1089\/cyber.2021.0351","type":"journal-article","created":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T15:08:46Z","timestamp":1654009726000},"page":"489-495","source":"Crossref","is-referenced-by-count":6,"title":["A Dyadic Examination of Interpersonal Electronic Surveillance"],"prefix":"10.1089","volume":"25","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-8822-7071","authenticated-orcid":false,"given":"Dana M.","family":"Litt","sequence":"first","affiliation":[{"name":"Department of Health Behavior and Health Systems, School of Public Health, University of North Texas Health Science Center, Fort Worth, Texas, USA."}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7594-3546","authenticated-orcid":false,"given":"Lindsey M.","family":"Rodriguez","sequence":"additional","affiliation":[{"name":"University of South Florida, St Petersburg, Florida, USA."}]}],"member":"278","reference":[{"key":"B2","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-015-0380-3"},{"key":"B4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-6278-2"},{"key":"B5","doi-asserted-by":"publisher","DOI":"10.1037\/0012-1649.42.3.395"},{"key":"B6","doi-asserted-by":"publisher","DOI":"10.1891\/0886-6708.26.4.410"},{"key":"B7","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2019.08.018"},{"key":"B8","doi-asserted-by":"publisher","DOI":"10.1891\/1946-6560.5.3.323"},{"key":"B9","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2009.0221"},{"key":"B10","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-013-9922-8"},{"key":"B11","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-013-0047-x"},{"key":"B12","doi-asserted-by":"publisher","DOI":"10.1016\/j.puhe.2016.02.011"},{"key":"B13","doi-asserted-by":"publisher","DOI":"10.1037\/a0039442"},{"key":"B14","doi-asserted-by":"publisher","DOI":"10.1891\/1946-6560.8.2.127"},{"key":"B15","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2020.0669"},{"key":"B16","doi-asserted-by":"publisher","DOI":"10.1177\/1077801216646277"},{"key":"B17","doi-asserted-by":"publisher","DOI":"10.1080\/15564886.2018.1557092"},{"key":"B18","doi-asserted-by":"publisher","DOI":"10.1007\/s12103-021-09653-6"},{"key":"B19","doi-asserted-by":"publisher","DOI":"10.1177\/0886260518815725"},{"key":"B20","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.03.050"},{"key":"B21","doi-asserted-by":"publisher","DOI":"10.1177\/1077801216630143"},{"key":"B22","first-page":"92","volume":"70","author":"Baker CK","year":"2011","journal-title":"Hawaii Medical Journal"},{"key":"B23","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6171.2010.00235.x"},{"key":"B24","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-016-0568-1"},{"key":"B25","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2017.05.015"},{"key":"B26","first-page":"1","volume":"0","author":"Toplu-Demirtas E","year":"2020","journal-title":"Journal of Interpersonal Violence"},{"key":"B27","doi-asserted-by":"publisher","DOI":"10.1177\/0886109914522627"},{"key":"B28","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.08.042"},{"key":"B29","doi-asserted-by":"publisher","DOI":"10.5817\/CP2020-1-1"},{"key":"B30","doi-asserted-by":"publisher","DOI":"10.1520\/JFS15514J"},{"key":"B31","doi-asserted-by":"publisher","DOI":"10.1007\/s12144-017-9715-4"},{"key":"B32","doi-asserted-by":"publisher","DOI":"10.1891\/0886-6708.15.4.407"},{"key":"B33","doi-asserted-by":"publisher","DOI":"10.1080\/14616730600774433"},{"key":"B34","doi-asserted-by":"publisher","DOI":"10.1891\/0886-6708.11-00145"},{"key":"B35","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2014.06.005"},{"key":"B36","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016005312091"},{"key":"B37","doi-asserted-by":"publisher","DOI":"10.2307\/351903"},{"key":"B38","doi-asserted-by":"publisher","DOI":"10.1177\/026540758900600203"},{"key":"B39","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.70.1.79"},{"key":"B40","doi-asserted-by":"publisher","DOI":"10.1037\/fam0000098"},{"key":"B41","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2005.07.001"},{"key":"B42","volume-title":"Dyadic data analysis","author":"Kenny DA","year":"2020"},{"key":"B43","doi-asserted-by":"publisher","DOI":"10.1016\/j.jad.2018.02.043"}],"container-title":["Cyberpsychology, Behavior, and Social Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.liebertpub.com\/doi\/full-xml\/10.1089\/cyber.2021.0351","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.liebertpub.com\/doi\/pdf\/10.1089\/cyber.2021.0351","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,10]],"date-time":"2022-08-10T14:46:12Z","timestamp":1660142772000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.liebertpub.com\/doi\/10.1089\/cyber.2021.0351"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,1]]},"references-count":41,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2022,8,1]]}},"alternative-id":["10.1089\/cyber.2021.0351"],"URL":"https:\/\/doi.org\/10.1089\/cyber.2021.0351","relation":{},"ISSN":["2152-2715","2152-2723"],"issn-type":[{"value":"2152-2715","type":"print"},{"value":"2152-2723","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,8,1]]}}}