{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,17]],"date-time":"2024-08-17T14:32:36Z","timestamp":1723905156445},"reference-count":56,"publisher":"Mary Ann Liebert Inc","issue":"11","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.liebertpub.com\/nv\/resources-tools\/text-and-data-mining-policy\/121\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cyberpsychology, Behavior, and Social Networking"],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1089\/cyber.2022.0046","type":"journal-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T17:53:50Z","timestamp":1666029230000},"page":"744-751","source":"Crossref","is-referenced-by-count":2,"title":["Online Disinhibition and Online Trolling Among Chinese College Students: The Mediation of the Dark Triad and the Moderation of Gender"],"prefix":"10.1089","volume":"25","author":[{"given":"Biyun","family":"Wu","sequence":"first","affiliation":[{"name":"Department of Psychology, Jiangxi Normal University, Nanchang, China."}]},{"given":"Li","family":"Zhou","sequence":"additional","affiliation":[{"name":"Department of Psychology, Jiangxi Normal University, Nanchang, China."}]},{"given":"Yuanyuan","family":"Deng","sequence":"additional","affiliation":[{"name":"Department of Psychology, Jiangxi Normal University, Nanchang, China."}]},{"given":"Jun","family":"Zhao","sequence":"additional","affiliation":[{"name":"Department of Psychology, Jiangxi Normal University, Nanchang, China."}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3010-7290","authenticated-orcid":false,"given":"Mingfan","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Psychology, Jiangxi Normal University, Nanchang, China."},{"name":"Center of Mental Health Education and Research, Jiangxi Normal University, Nanchang, China."}]}],"member":"278","reference":[{"key":"B1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2014.01.016"},{"key":"B2","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2019.01.001"},{"key":"B3","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2019.06.018"},{"key":"B4","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2018.0210"},{"key":"B5","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2016.06.043"},{"key":"B6","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.12.016"},{"key":"B7","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.070"},{"key":"B8","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998213"},{"key":"B9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jad.2022.01.023"},{"key":"B10","doi-asserted-by":"publisher","DOI":"10.1002\/ab.22013"},{"key":"B11","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2018.0210"},{"key":"B12","doi-asserted-by":"publisher","DOI":"10.1080\/0305724022014322"},{"key":"B13","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2019.02.027"},{"key":"B14","doi-asserted-by":"publisher","DOI":"10.1016\/S0092-6566(02)00505-6"},{"key":"B15","doi-asserted-by":"publisher","DOI":"10.1089\/1094931041291295"},{"key":"B16","doi-asserted-by":"publisher","DOI":"10.1177\/0886260520961877"},{"key":"B17","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.10.022"},{"key":"B18","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.03.027"},{"key":"B19","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2018.04.001"},{"key":"B20","doi-asserted-by":"publisher","DOI":"10.1515\/JPLR.2010.011"},{"key":"B21","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph15092030"},{"key":"B22","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2017.02372"},{"key":"B23","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0670"},{"key":"B24","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.09.036"},{"key":"B25","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2021.106066"},{"key":"B26","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106534"},{"key":"B27","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.08.036"},{"key":"B28","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2011.04.011"},{"key":"B29","doi-asserted-by":"publisher","DOI":"10.1037\/a0022400"},{"key":"B30","doi-asserted-by":"publisher","DOI":"10.1177\/0886260519889930"},{"key":"B31","doi-asserted-by":"publisher","DOI":"10.1177\/0886260519877950"},{"key":"B33","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2017.01.025"},{"key":"B34","doi-asserted-by":"publisher","DOI":"10.1177\/1073191113514105"},{"key":"B35","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2017.06.038"},{"key":"B36","doi-asserted-by":"publisher","DOI":"10.1111\/jopy.12393"},{"key":"B37","unstructured":"37. Postmes T, Spears R, Lea M. Social identity, normative content, and \u201cdeindividuation\u201d in computer-mediated groups. In: Social Identity: Context, Commitment, Content. (Ellemers N, Spears R, Doosje B. eds.) Blackwell Science: Oxford; 1999; pp. 164\u2013183."},{"key":"B38","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.05.025"},{"key":"B39","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2019.06.020"},{"key":"B40","doi-asserted-by":"publisher","DOI":"10.1177\/1745691616666070"},{"key":"B41","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2020.105119"},{"key":"B42","doi-asserted-by":"publisher","DOI":"10.1177\/0886260519865970"},{"key":"B43","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2019.01.008"},{"key":"B44","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2017.01476"},{"key":"B45","doi-asserted-by":"publisher","DOI":"10.1111\/ajpy.12198"},{"key":"B46","doi-asserted-by":"publisher","DOI":"10.3758\/BRM.41.4.1149"},{"key":"B47","doi-asserted-by":"publisher","DOI":"10.1007\/s12144-019-00272-3"},{"key":"B48","unstructured":"48. Hayes AF. Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-Based Approach (2nd ed.). Guilford Press: New York; 2018."},{"key":"B49","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2017.11.047"},{"key":"B50","doi-asserted-by":"publisher","DOI":"10.1007\/s12144-021-01402-6"},{"key":"B51","doi-asserted-by":"publisher","DOI":"10.1177\/0894439314533169"},{"key":"B52","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2018.01.004"},{"key":"B53","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2011.12.003"},{"key":"B54","doi-asserted-by":"publisher","DOI":"10.1037\/a0027914"},{"key":"B55","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2010.05.031"},{"key":"B56","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.06.020"},{"key":"B57","doi-asserted-by":"publisher","DOI":"10.1037\/ebs0000150"}],"container-title":["Cyberpsychology, Behavior, and Social Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.liebertpub.com\/doi\/full-xml\/10.1089\/cyber.2022.0046","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.liebertpub.com\/doi\/pdf\/10.1089\/cyber.2022.0046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,14]],"date-time":"2022-11-14T20:13:49Z","timestamp":1668456829000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.liebertpub.com\/doi\/10.1089\/cyber.2022.0046"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":56,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2022,11,1]]}},"alternative-id":["10.1089\/cyber.2022.0046"],"URL":"https:\/\/doi.org\/10.1089\/cyber.2022.0046","relation":{},"ISSN":["2152-2715","2152-2723"],"issn-type":[{"value":"2152-2715","type":"print"},{"value":"2152-2723","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,1]]}}}