{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,10]],"date-time":"2024-08-10T00:57:30Z","timestamp":1723251450642},"reference-count":58,"publisher":"Mary Ann Liebert Inc","issue":"10","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.liebertpub.com\/nv\/resources-tools\/text-and-data-mining-policy\/121\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cyberpsychology, Behavior, and Social Networking"],"published-print":{"date-parts":[[2022,10,1]]},"DOI":"10.1089\/cyber.2022.0065","type":"journal-article","created":{"date-parts":[[2022,9,13]],"date-time":"2022-09-13T16:57:54Z","timestamp":1663088274000},"page":"634-640","source":"Crossref","is-referenced-by-count":1,"title":["Deviant Peer Affiliation: A Newly Verified Mechanism by Which Violent Video Game Exposure Affect Aggressive and Prosocial Behavior"],"prefix":"10.1089","volume":"25","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4467-1274","authenticated-orcid":false,"given":"Shuai","family":"Chen","sequence":"first","affiliation":[{"name":"Research Center of Mental Health Education, Faculty of Psychology, Southwest University, Chongqing, China."}]},{"given":"Zhenshuo","family":"Yi","sequence":"additional","affiliation":[{"name":"Research Center of Mental Health Education, Faculty of Psychology, Southwest University, Chongqing, China."}]},{"given":"Mingchen","family":"Wei","sequence":"additional","affiliation":[{"name":"Research Center of Mental Health Education, Faculty of Psychology, Southwest University, Chongqing, China."}]},{"given":"Yanling","family":"Liu","sequence":"additional","affiliation":[{"name":"Research Center of Mental Health Education, Faculty of Psychology, Southwest University, Chongqing, China."}]}],"member":"278","reference":[{"key":"B2","doi-asserted-by":"publisher","DOI":"10.1037\/a0040413"},{"key":"B3","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9280.00366"},{"key":"B4","doi-asserted-by":"publisher","DOI":"10.1177\/0146167217703064"},{"key":"B5","doi-asserted-by":"publisher","DOI":"10.1037\/dev0000624"},{"key":"B6","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.2009.02287.x"},{"key":"B7","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-012-9742-2"},{"key":"B8","doi-asserted-by":"publisher","DOI":"10.1037\/a0018251"},{"key":"B9","doi-asserted-by":"publisher","DOI":"10.1177\/0146167213520459"},{"key":"B10","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.200373"},{"key":"B11","doi-asserted-by":"publisher","DOI":"10.1177\/1745691620927666"},{"key":"B12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1037\/ppm0000337","volume":"10","author":"Bushman BJ","year":"2021","journal-title":"Psychology of Popular Media"},{"key":"B13","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.53.100901.135231"},{"key":"B14","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2017.03.034"},{"key":"B15","first-page":"363","volume-title":"Playing Video Games: Motives, Responses, and Consequences","author":"Buckley KE","year":"2006"},{"key":"B16","doi-asserted-by":"publisher","DOI":"10.1177\/0146167209333045"},{"key":"B17","doi-asserted-by":"publisher","DOI":"10.1111\/josi.12275"},{"key":"B18","doi-asserted-by":"publisher","DOI":"10.1002\/ab.21519"},{"key":"B19","doi-asserted-by":"publisher","DOI":"10.1001\/jamapediatrics.2014.63"},{"key":"B20","doi-asserted-by":"publisher","DOI":"10.1111\/cdev.12112"},{"key":"B21","doi-asserted-by":"publisher","DOI":"10.1007\/s10802-013-9761-9"},{"key":"B22","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.11.022"},{"key":"B23","doi-asserted-by":"publisher","DOI":"10.1002\/ab.21857"},{"key":"B24","doi-asserted-by":"publisher","DOI":"10.1002\/ab.21748"},{"key":"B25","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2019.0776"},{"key":"B26","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2021.106225"},{"key":"B27","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.102.3.458"},{"key":"B28","volume-title":"Social learning theory","author":"Bandura A","year":"1977"},{"key":"B29","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2014.02.009"},{"key":"B30","doi-asserted-by":"publisher","DOI":"10.1037\/dev0000118"},{"key":"B31","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8624.2012.01763.x"},{"key":"B32","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2019.00358"},{"key":"B33","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2017.08.004"},{"key":"B34","doi-asserted-by":"publisher","DOI":"10.1177\/0265407520941611"},{"key":"B35","doi-asserted-by":"publisher","DOI":"10.1111\/jora.12523"},{"key":"B36","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2020.0030"},{"key":"B37","doi-asserted-by":"publisher","DOI":"10.1177\/1948550617715068"},{"key":"B38","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.78.4.772"},{"key":"B39","doi-asserted-by":"publisher","DOI":"10.1002\/ab.21507"},{"key":"B40","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-7610.1997.tb01545.x"},{"key":"B41","volume-title":"Principles and practice of structural equation modeling","author":"Kline RB","year":"2015"},{"key":"B42","doi-asserted-by":"publisher","DOI":"10.1037\/a0016997"},{"key":"B43","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.04.003"},{"key":"B44","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0088"},{"key":"B45","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.03.035"},{"key":"B46","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcrimjus.2019.101655"},{"key":"B47","doi-asserted-by":"publisher","DOI":"10.1111\/jora.12173"},{"key":"B48","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.2019.1696733"},{"key":"B49","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.71.2.364"},{"key":"B50","doi-asserted-by":"publisher","DOI":"10.1002\/ab.21502"},{"key":"B51","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-021-01518-9"},{"key":"B52","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2020.110489"},{"key":"B53","doi-asserted-by":"publisher","DOI":"10.1002\/pchj.348"},{"key":"B54","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0091"},{"key":"B55","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2020.0049"},{"key":"B56","doi-asserted-by":"publisher","DOI":"10.1002\/ab.21956"},{"key":"B57","doi-asserted-by":"publisher","DOI":"10.1177\/0886260520918586"},{"key":"B58","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106641"},{"key":"B59","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.10.023"}],"container-title":["Cyberpsychology, Behavior, and Social Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.liebertpub.com\/doi\/full-xml\/10.1089\/cyber.2022.0065","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.liebertpub.com\/doi\/pdf\/10.1089\/cyber.2022.0065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T14:07:18Z","timestamp":1666274838000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.liebertpub.com\/doi\/10.1089\/cyber.2022.0065"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,1]]},"references-count":58,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,10,1]]}},"alternative-id":["10.1089\/cyber.2022.0065"],"URL":"https:\/\/doi.org\/10.1089\/cyber.2022.0065","relation":{},"ISSN":["2152-2715","2152-2723"],"issn-type":[{"value":"2152-2715","type":"print"},{"value":"2152-2723","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,10,1]]}}}