{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T15:53:10Z","timestamp":1726501990105},"reference-count":31,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":3357,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1111\/j.1083-6101.1997.tb00197.x","type":"journal-article","created":{"date-parts":[[2010,8,13]],"date-time":"2010-08-13T13:11:45Z","timestamp":1281705105000},"page":"0-0","source":"Crossref","is-referenced-by-count":32,"title":["Conduct Control on Usenet"],"prefix":"10.1093","volume":"2","author":[{"given":"Christine B.","family":"Smith","sequence":"first","affiliation":[]},{"given":"Margaret L.","family":"McLaughlin","sequence":"additional","affiliation":[]},{"given":"Kerry K.","family":"Osborne","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2006,6,23]]},"reference":[{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB1|cit1","article-title":"Women's access to on-line discussions about feminism","volume":"3","author":"Balka","year":"1993","journal-title":"Electronic Journal of Communications\/La Revue Electronique de Communication"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB2|cit2","first-page":"138","volume-title":"Cybersociety","author":"Baym","year":"1995"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB3|cit3","unstructured":"Braaten , D. O. Cody , M. J. Bell , K. 1990, June Account episodes in organizations: Remedial work and impression management"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB4|cit4","unstructured":"Coates. J 1993, November Innkeeping in cyberspace"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB5|cit5","first-page":"225","volume-title":"Explaining One's Self to Others: Reason-Giving in a Social Context","author":"Cody","year":"1992"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB6|cit6","volume-title":"The Psychology of Tactical Communication","year":"1990a"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB7|cit7","first-page":"227","volume-title":"The Handbook of Language and Social Psychology","author":"Cody","year":"1990b"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB8|cit8","first-page":"113","volume-title":"Analyzing Everyday Explanation: A Casebook of Methods","author":"Cody","year":"1988"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB9|cit9","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1037\/0022-3514.58.4.610","article-title":"Pardon my gaffe: Effects of sex, status, and consequence severity on accounts","volume":"58","author":"Gonzales","year":"1990","journal-title":"Journal of Personality and Social Psychology"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB10|cit10","volume-title":"Syntax and Semantics: Vol. 3. Speech Acts","author":"Grice","year":"1975"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB11|cit11","unstructured":"Hardy , H. E. 1993 The history of the net Master's thesis Grand Valley State University"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB12|cit12","unstructured":"Kramarae , C. Taylor , H. J. 1992 Electronic networks: Safe for women? The electronic salon: Feminism meets infotech: in connection with the 11th Annual Gender Studies Symposium. Speech Communication and Sociology"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB13|cit13","first-page":"112","volume-title":"Cybersociety","author":"MacKinnon","year":"1995"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB14|cit14","first-page":"137","article-title":"Computer friends and foes: Contents of undergraduates' electronic mail","volume":"7","author":"McCormick","year":"1992","journal-title":"Computers in Human Behavior"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB15|cit15","first-page":"209","article-title":"The management of failure events: Some contextual determinants of accounting behavior","volume":"9","author":"McLaughlin","year":"1983","journal-title":"Human Communication Research"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB16|cit16","volume-title":"Explaining One's Self to Others: Reason-giving in a Social Context","year":"1992"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB17|cit17","first-page":"90","volume-title":"Cybersociety","author":"McLaughlin","year":"1995"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB18|cit18","unstructured":"Moraes , M. 1994a, September Usenet software: History and sources news.answers and news.misc"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB19|cit19","unstructured":"Moraes , M. 1994b, September Emily Postnews answers your questions on netiquette news.announce.newusers and news.answers"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB20|cit20","volume-title":"The Virtual Community: Homesteading on the Electronic Frontier","author":"Rheingold","year":"1993"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB21|cit21","volume-title":"Impression Management","author":"Schlenker","year":"1980"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB22|cit22","volume-title":"Account Episodes: The Management or Escalation of Conflict","author":"Schonbach","year":"1990"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB23|cit23","doi-asserted-by":"crossref","first-page":"46","DOI":"10.2307\/2092239","article-title":"Accounts","volume":"33","author":"Scott","year":"1968","journal-title":"American Sociological Review"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB24|cit24","volume-title":"Netiquette. With a forward by G. Kawasaki","author":"Shea","year":"1994"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB25|cit25","volume-title":"Network and Netplay: Virtual Groups on the Internet","author":"Smith","year":"1997"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB26|cit26","unstructured":"Spafford , G. 1993 Rules for posting to Usenet http:\/\/www.rtfm.mit.edu http:\/\/www.\/pub\/usenet\/news.answers\/posting-rules"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB27|cit27","first-page":"A13","article-title":"Messages in questionable taste on computer networks pose thorny problems for college administrators","author":"Turner","year":"1990, January 24","journal-title":"Chronicle of Higher Education"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB28|cit28","volume-title":"Gender issues in on-line communications","author":"Truong","year":"1993"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB29|cit29","unstructured":"Von Rospach , C. 1993 A primer on how to work with the Usenet community http:\/\/pub\/usenet\/news.answers\/usenet-primer"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB30|cit30","first-page":"A2","article-title":"Censoring electronic messages","author":"Wilson","year":"1993, May 12","journal-title":"Chronicle of Higher Education"},{"key":"10.1111\/j.1083-6101.1997.tb00197.x-BIB31|cit31","volume-title":"Network and Netplay: Virtual Groups on the Internet","author":"Witmer","year":"1997"}],"container-title":["Journal of Computer-Mediated Communication"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1111%2Fj.1083-6101.1997.tb00197.x","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,3]],"date-time":"2019-03-03T14:13:21Z","timestamp":1551622401000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/jcmc\/article\/4584388"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,6,23]]},"references-count":31,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1111\/j.1083-6101.1997.tb00197.x","relation":{},"ISSN":["1083-6101"],"issn-type":[{"value":"1083-6101","type":"print"}],"subject":[],"published":{"date-parts":[[2006,6,23]]}}}