callback( { "result":{ "query":":facetid:toc:\"db/journals/cbsn/cbsn17.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"196.28" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"143", "@dc":"143", "@oc":"143", "@id":"43439832", "text":":facetid:toc:db/journals/cbsn/cbsn17.bht" } }, "hits":{ "@total":"143", "@computed":"143", "@sent":"143", "@first":"0", "hit":[{ "@score":"1", "@id":"3710822", "info":{"authors":{"author":[{"@pid":"132/2524","text":"Dohyun Ahn"},{"@pid":"148/2862","text":"Youngnam Seo"},{"@pid":"21/8229-2","text":"Minkyung Kim 0002"},{"@pid":"118/4420","text":"Joung Huem Kwon"},{"@pid":"42/858","text":"Younbo Jung"},{"@pid":"146/1131","text":"Jungsun Ahn"},{"@pid":"35/4700","text":"Doohwang Lee"}]},"title":"The Effects of Actual Human Size Display and Stereoscopic Presentation on Users' Sense of Being Together with and of Psychological Immersion in a Virtual Character.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"7","pages":"483-487","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/AhnSKKJAL14","doi":"10.1089/CYBER.2013.0455","ee":"https://doi.org/10.1089/cyber.2013.0455","url":"https://dblp.org/rec/journals/cbsn/AhnSKKJAL14"}, "url":"URL#3710822" }, { "@score":"1", "@id":"3710823", "info":{"authors":{"author":[{"@pid":"146/3505","text":"Jenn Anderson"},{"@pid":"146/3374","text":"Mary Bresnahan"},{"@pid":"146/3585","text":"Catherine Musatics"}]},"title":"Combating Weight-Based Cyberbullying on Facebook with the Dissenter Effect.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"5","pages":"281-286","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/AndersonBM14","doi":"10.1089/CYBER.2013.0370","ee":"https://doi.org/10.1089/cyber.2013.0370","url":"https://dblp.org/rec/journals/cbsn/AndersonBM14"}, "url":"URL#3710823" }, { "@score":"1", "@id":"3710824", "info":{"authors":{"author":[{"@pid":"122/9100","text":"Antonia Barke"},{"@pid":"122/9054","text":"Nele Nyenhuis"},{"@pid":"122/9372","text":"Birgit Kröner-Herwig"}]},"title":"The German Version of the Generalized Pathological Internet Use Scale 2: A Validation Study.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"7","pages":"474-482","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/BarkeNK14","doi":"10.1089/CYBER.2013.0706","ee":"https://doi.org/10.1089/cyber.2013.0706","url":"https://dblp.org/rec/journals/cbsn/BarkeNK14"}, "url":"URL#3710824" }, { "@score":"1", "@id":"3710825", "info":{"authors":{"author":[{"@pid":"122/9623","text":"Fatih Canan"},{"@pid":"140/3407","text":"Osman Yildirim"},{"@pid":"122/9572","text":"Tuba Yildirim Ustunel"},{"@pid":"140/3165","text":"Gjergji Sinani"},{"@pid":"140/3108","text":"Arzu Hisarvant Kaleli"},{"@pid":"140/2996","text":"Cemalettin Gunes"},{"@pid":"122/9641","text":"Ahmet Ataoglu"}]},"title":"The Relationship Between Internet Addiction and Body Mass Index in Turkish Adolescents.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"1","pages":"40-45","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/CananYUSKGA14","doi":"10.1089/CYBER.2012.0733","ee":"https://doi.org/10.1089/cyber.2012.0733","url":"https://dblp.org/rec/journals/cbsn/CananYUSKGA14"}, "url":"URL#3710825" }, { "@score":"1", "@id":"3710826", "info":{"authors":{"author":{"@pid":"146/3589","text":"Terri H. Chan"}},"title":"Facebook and its Effects on Users' Empathic Social Skills and Life Satisfaction: A Double-Edged Sword Effect.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"5","pages":"276-280","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Chan14","doi":"10.1089/CYBER.2013.0466","ee":"https://doi.org/10.1089/cyber.2013.0466","url":"https://dblp.org/rec/journals/cbsn/Chan14"}, "url":"URL#3710826" }, { "@score":"1", "@id":"3710827", "info":{"authors":{"author":[{"@pid":"149/6758","text":"Sung-Wei Chen"},{"@pid":"149/6749","text":"Susan Shur-Fen Gau"},{"@pid":"149/6739","text":"Hynek Pikhart"},{"@pid":"149/6786","text":"Anne Peasey"},{"@pid":"74/6864","text":"Shih-Tse Chen"},{"@pid":"149/6827","text":"Ming-Chen Tsai"}]},"title":"Work Stress and Subsequent Risk of Internet Addiction Among Information Technology Engineers in Taiwan.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"8","pages":"542-550","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/ChenGPPCT14","doi":"10.1089/CYBER.2013.0686","ee":"https://doi.org/10.1089/cyber.2013.0686","url":"https://dblp.org/rec/journals/cbsn/ChenGPPCT14"}, "url":"URL#3710827" }, { "@score":"1", "@id":"3710828", "info":{"authors":{"author":[{"@pid":"42/1140","text":"Chi-Wen Chen"},{"@pid":"41/8523","text":"Chiun-Sin Lin"}]},"title":"Building a Sense of Virtual Community: The Role of the Features of Social Networking Sites.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"7","pages":"460-465","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/ChenL14","doi":"10.1089/CYBER.2013.0530","ee":"https://doi.org/10.1089/cyber.2013.0530","url":"https://dblp.org/rec/journals/cbsn/ChenL14"}, "url":"URL#3710828" }, { "@score":"1", "@id":"3710829", "info":{"authors":{"author":[{"@pid":"155/9502","text":"Cecilia Cheng"},{"@pid":"155/9501","text":"Angel Yee-lam Li"}]},"title":"Internet Addiction Prevalence and Quality of (Real) Life: A Meta-Analysis of 31 Nations Across Seven World Regions.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"12","pages":"755-760","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/ChengL14","doi":"10.1089/CYBER.2014.0317","ee":"https://doi.org/10.1089/cyber.2014.0317","url":"https://dblp.org/rec/journals/cbsn/ChengL14"}, "url":"URL#3710829" }, { "@score":"1", "@id":"3710830", "info":{"authors":{"author":[{"@pid":"97/7835","text":"Wen-Bin Chiou"},{"@pid":"142/3578","text":"Szu-Wei Chen"},{"@pid":"142/3567","text":"Da-Chi Liao"}]},"title":"Does Facebook Promote Self-Interest? Enactment of Indiscriminate One-to-Many Communication on Online Social Networking Sites Decreases Prosocial Behavior.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"2","pages":"68-73","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/ChiouCL14","doi":"10.1089/CYBER.2013.0035","ee":"https://doi.org/10.1089/cyber.2013.0035","url":"https://dblp.org/rec/journals/cbsn/ChiouCL14"}, "url":"URL#3710830" }, { "@score":"1", "@id":"3710831", "info":{"authors":{"author":[{"@pid":"151/6991","text":"Enrica Ciucci"},{"@pid":"151/7061","text":"Andrea Baroncelli"}]},"title":"Emotion-Related Personality Traits and Peer Social Standing: Unique and Interactive Effects in Cyberbullying Behaviors.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"9","pages":"584-590","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/CiucciB14","doi":"10.1089/CYBER.2014.0020","ee":"https://doi.org/10.1089/cyber.2014.0020","url":"https://dblp.org/rec/journals/cbsn/CiucciB14"}, "url":"URL#3710831" }, { "@score":"1", "@id":"3710832", "info":{"authors":{"author":{"@pid":"124/7888","text":"Russell B. Clayton"}},"title":"The Third Wheel: The Impact of Twitter Use on Relationship Infidelity and Divorce.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"7","pages":"425-430","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Clayton14","doi":"10.1089/CYBER.2013.0570","ee":"https://doi.org/10.1089/cyber.2013.0570","url":"https://dblp.org/rec/journals/cbsn/Clayton14"}, "url":"URL#3710832" }, { "@score":"1", "@id":"3710833", "info":{"authors":{"author":[{"@pid":"143/8227","text":"Rozane De Cock"},{"@pid":"143/7986","text":"Jolien Vangeel"},{"@pid":"143/8199","text":"Annabelle Klein"},{"@pid":"143/8226","text":"Pascal Minotte"},{"@pid":"143/8264","text":"Omar Rosas"},{"@pid":"13/9152","text":"Gert-Jan Meerkerk"}]},"title":"Compulsive Use of Social Networking Sites in Belgium: Prevalence, Profile, and the Role of Attitude Toward Work and School.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"3","pages":"166-171","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/CockVKMRM14","doi":"10.1089/CYBER.2013.0029","ee":"https://doi.org/10.1089/cyber.2013.0029","url":"https://dblp.org/rec/journals/cbsn/CockVKMRM14"}, "url":"URL#3710833" }, { "@score":"1", "@id":"3710834", "info":{"authors":{"author":[{"@pid":"149/6836","text":"Elizabeth L. Cohen"},{"@pid":"149/6735","text":"Alexander L. Lancaster"}]},"title":"Individual Differences in In-Person and Social Media Television Coviewing: The Role of Emotional Contagion, Need to Belong, and Coviewing Orientation.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"8","pages":"512-518","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/CohenL14","doi":"10.1089/CYBER.2013.0484","ee":"https://doi.org/10.1089/cyber.2013.0484","url":"https://dblp.org/rec/journals/cbsn/CohenL14"}, "url":"URL#3710834" }, { "@score":"1", "@id":"3710835", "info":{"authors":{"author":[{"@pid":"129/3810","text":"Emily Collins 0001"},{"@pid":"10/3792","text":"Jonathan Freeman"}]},"title":"Video Game Use and Cognitive Performance: Does It Vary with the Presence of Problematic Video Game Use?","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"3","pages":"153-159","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/CollinsF14","doi":"10.1089/CYBER.2012.0629","ee":"https://doi.org/10.1089/cyber.2012.0629","url":"https://dblp.org/rec/journals/cbsn/CollinsF14"}, "url":"URL#3710835" }, { "@score":"1", "@id":"3710836", "info":{"authors":{"author":[{"@pid":"140/3507","text":"Sarah M. Coyne"},{"@pid":"140/3102","text":"Laura M. Padilla-Walker"},{"@pid":"140/3238","text":"Randal D. Day"},{"@pid":"140/3303","text":"James Harper"},{"@pid":"140/3426","text":"Laura Stockdale"}]},"title":"A Friend Request from Dear Old Dad: Associations Between Parent-Child Social Networking and Adolescent Outcomes.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"1","pages":"8-13","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/CoynePDHS14","doi":"10.1089/CYBER.2012.0623","ee":"https://doi.org/10.1089/cyber.2012.0623","url":"https://dblp.org/rec/journals/cbsn/CoynePDHS14"}, "url":"URL#3710836" }, { "@score":"1", "@id":"3710837", "info":{"authors":{"author":[{"@pid":"16/9599","text":"Jo Cranwell"},{"@pid":"b/SteveBenford","text":"Steve Benford"},{"@pid":"02/5708","text":"Robert J. Houghton"},{"@pid":"41/8737","text":"Michael Golembewski"},{"@pid":"23/3543","text":"Joel E. Fischer"},{"@pid":"143/8036","text":"Martin S. Hagger"}]},"title":"Increasing Self-Regulatory Energy Using an Internet-Based Training Application Delivered by Smartphone Technology.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"3","pages":"181-186","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/CranwellBHGFH14","doi":"10.1089/CYBER.2013.0105","ee":"https://doi.org/10.1089/cyber.2013.0105","url":"https://dblp.org/rec/journals/cbsn/CranwellBHGFH14"}, "url":"URL#3710837" }, { "@score":"1", "@id":"3710838", "info":{"authors":{"author":[{"@pid":"149/6809","text":"Allyson Dale"},{"@pid":"149/6753","text":"Anthony Murkar"},{"@pid":"149/6794","text":"Nicolle Miller"},{"@pid":"149/6734","text":"Joshua Black"}]},"title":"Comparing the Effects of Real Versus Simulated Violence on Dream Imagery.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"8","pages":"536-541","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/DaleMMB14","doi":"10.1089/CYBER.2013.0494","ee":"https://doi.org/10.1089/cyber.2013.0494","url":"https://dblp.org/rec/journals/cbsn/DaleMMB14"}, "url":"URL#3710838" }, { "@score":"1", "@id":"3710839", "info":{"authors":{"author":[{"@pid":"138/5724","text":"Ann DeSmet"},{"@pid":"144/8816","text":"Charlene Veldeman"},{"@pid":"34/7740","text":"Karolien Poels"},{"@pid":"138/5626","text":"Sara Bastiaensens"},{"@pid":"115/9926","text":"Katrien Van Cleemput"},{"@pid":"115/9931","text":"Heidi Vandebosch"},{"@pid":"60/9159","text":"Ilse De Bourdeaudhuij"}]},"title":"Determinants of Self-Reported Bystander Behavior in Cyberbullying Incidents Amongst Adolescents.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"4","pages":"207-215","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/DeSmetVPBCVB14","doi":"10.1089/CYBER.2013.0027","ee":"https://doi.org/10.1089/cyber.2013.0027","url":"https://dblp.org/rec/journals/cbsn/DeSmetVPBCVB14"}, "url":"URL#3710839" }, { "@score":"1", "@id":"3710840", "info":{"authors":{"author":[{"@pid":"142/3628","text":"Pawel Dobrowolski"},{"@pid":"142/3565","text":"Grzegorz Pochwatko"},{"@pid":"142/3661","text":"Maciek Skorko"},{"@pid":"142/3586","text":"Maksymilian Bielecki"}]},"title":"The Effects of Virtual Experience on Attitudes Toward Real Brands.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"2","pages":"125-128","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/DobrowolskiPSB14","doi":"10.1089/CYBER.2012.0613","ee":"https://doi.org/10.1089/cyber.2012.0613","url":"https://dblp.org/rec/journals/cbsn/DobrowolskiPSB14"}, "url":"URL#3710840" }, { "@score":"1", "@id":"3710841", "info":{"authors":{"author":[{"@pid":"144/9622","text":"Rebecca Dredge"},{"@pid":"146/3420","text":"John F. M. Gleeson"},{"@pid":"144/9663","text":"Xochitl de la Piedad Garcia"}]},"title":"Risk Factors Associated with Impact Severity of Cyberbullying Victimization: A Qualitative Study of Adolescent Online Social Networking.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"5","pages":"287-291","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/DredgeGG14","doi":"10.1089/CYBER.2013.0541","ee":"https://doi.org/10.1089/cyber.2013.0541","url":"https://dblp.org/rec/journals/cbsn/DredgeGG14"}, "url":"URL#3710841" }, { "@score":"1", "@id":"3710842", "info":{"authors":{"author":[{"@pid":"142/3570","text":"Harald Dreßing"},{"@pid":"142/3595","text":"Josef Bailer"},{"@pid":"142/3643","text":"Anne Anders"},{"@pid":"142/3594","text":"Henriette Wagner"},{"@pid":"142/3583","text":"Christine Gallas"}]},"title":"Cyberstalking in a Large Sample of Social Network Users: Prevalence, Characteristics, and Impact Upon Victims.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"2","pages":"61-67","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/DressingBAWG14","doi":"10.1089/CYBER.2012.0231","ee":"https://doi.org/10.1089/cyber.2012.0231","url":"https://dblp.org/rec/journals/cbsn/DressingBAWG14"}, "url":"URL#3710842" }, { "@score":"1", "@id":"3710843", "info":{"authors":{"author":[{"@pid":"117/8352","text":"Anna Felnhofer"},{"@pid":"84/9147","text":"Oswald D. Kothgassner"},{"@pid":"146/3427","text":"Thomas Hetterle"},{"@pid":"117/8395","text":"Leon Beutl"},{"@pid":"48/3001","text":"Helmut Hlavacs"},{"@pid":"12/4705","text":"Ilse Kryspin-Exner"}]},"title":"Afraid to Be There? Evaluating the Relation Between Presence, Self-Reported Anxiety, and Heart Rate in a Virtual Public Speaking Task.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"5","pages":"310-316","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/FelnhoferKHBHK14","doi":"10.1089/CYBER.2013.0472","ee":"https://doi.org/10.1089/cyber.2013.0472","url":"https://dblp.org/rec/journals/cbsn/FelnhoferKHBHK14"}, "url":"URL#3710843" }, { "@score":"1", "@id":"3710844", "info":{"authors":{"author":[{"@pid":"137/0878","text":"Thomas A. Fergus"},{"@pid":"155/9577","text":"Sara L. Dolan"}]},"title":"Problematic Internet Use and Internet Searches for Medical Information: The Role of Health Anxiety.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"12","pages":"761-765","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/FergusD14","doi":"10.1089/CYBER.2014.0169","ee":"https://doi.org/10.1089/cyber.2014.0169","url":"https://dblp.org/rec/journals/cbsn/FergusD14"}, "url":"URL#3710844" }, { "@score":"1", "@id":"3710845", "info":{"authors":{"author":[{"@pid":"58/10554-1","text":"Georgios Floros 0001"},{"@pid":"122/9333","text":"Konstantinos Siomos"},{"@pid":"151/7054","text":"Ariadni Stogiannidou"},{"@pid":"151/6958","text":"Ioannis Giouzepas"},{"@pid":"151/7052","text":"Georgios Garyfallos"}]},"title":"The Relationship Between Personality, Defense Styles, Internet Addiction Disorder, and Psychopathology in College Students.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"10","pages":"672-676","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/FlorosSSGG14","doi":"10.1089/CYBER.2014.0182","ee":"https://doi.org/10.1089/cyber.2014.0182","url":"https://dblp.org/rec/journals/cbsn/FlorosSSGG14"}, "url":"URL#3710845" }, { "@score":"1", "@id":"3710846", "info":{"authors":{"author":[{"@pid":"23/3350","text":"Jesse Fox"},{"@pid":"155/9555","text":"Courtney Anderegg"}]},"title":"Romantic Relationship Stages and Social Networking Sites: Uncertainty Reduction Strategies and Perceived Relational Norms on Facebook.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"11","pages":"685-691","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/FoxA14","doi":"10.1089/CYBER.2014.0232","ee":"https://doi.org/10.1089/cyber.2014.0232","url":"https://dblp.org/rec/journals/cbsn/FoxA14"}, "url":"URL#3710846" }, { "@score":"1", "@id":"3710847", "info":{"authors":{"author":[{"@pid":"23/3350","text":"Jesse Fox"},{"@pid":"125/8951","text":"Katie M. Warber"}]},"title":"Social Networking Sites in Romantic Relationships: Attachment, Uncertainty, and Partner Surveillance on Facebook.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"1","pages":"3-7","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/FoxW14","doi":"10.1089/CYBER.2012.0667","ee":"https://doi.org/10.1089/cyber.2012.0667","url":"https://dblp.org/rec/journals/cbsn/FoxW14"}, "url":"URL#3710847" }, { "@score":"1", "@id":"3710848", "info":{"authors":{"author":[{"@pid":"146/3485","text":"Héctor Fuster"},{"@pid":"146/3413","text":"Andrés Chamarro"},{"@pid":"03/9153","text":"Xavier Carbonell"},{"@pid":"123/0392","text":"Robert J. Vallerand"}]},"title":"Relationship Between Passion and Motivation for Gaming in Players of Massively Multiplayer Online Role-Playing Games.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"5","pages":"292-297","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/FusterCCV14","doi":"10.1089/CYBER.2013.0349","ee":"https://doi.org/10.1089/cyber.2013.0349","url":"https://dblp.org/rec/journals/cbsn/FusterCCV14"}, "url":"URL#3710848" }, { "@score":"1", "@id":"3710849", "info":{"authors":{"author":{"@pid":"43/625","text":"Andrea Gaggioli"}},"title":"CyberSightings.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"1","pages":"59","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Gaggioli14","doi":"10.1089/CYBER.2013.1535","ee":"https://doi.org/10.1089/cyber.2013.1535","url":"https://dblp.org/rec/journals/cbsn/Gaggioli14"}, "url":"URL#3710849" }, { "@score":"1", "@id":"3710850", "info":{"authors":{"author":{"@pid":"43/625","text":"Andrea Gaggioli"}},"title":"CyberSightings.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"2","pages":"129","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Gaggioli14a","doi":"10.1089/CYBER.2014.1500","ee":"https://doi.org/10.1089/cyber.2014.1500","url":"https://dblp.org/rec/journals/cbsn/Gaggioli14a"}, "url":"URL#3710850" }, { "@score":"1", "@id":"3710851", "info":{"authors":{"author":{"@pid":"43/625","text":"Andrea Gaggioli"}},"title":"CyberSightings.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"3","pages":"196","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Gaggioli14b","doi":"10.1089/CYBER.2014.1503","ee":"https://doi.org/10.1089/cyber.2014.1503","url":"https://dblp.org/rec/journals/cbsn/Gaggioli14b"}, "url":"URL#3710851" }, { "@score":"1", "@id":"3710852", "info":{"authors":{"author":{"@pid":"43/625","text":"Andrea Gaggioli"}},"title":"CyberSightings.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"4","pages":"268","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Gaggioli14c","doi":"10.1089/CYBER.2014.1505","ee":"https://doi.org/10.1089/cyber.2014.1505","url":"https://dblp.org/rec/journals/cbsn/Gaggioli14c"}, "url":"URL#3710852" }, { "@score":"1", "@id":"3710853", "info":{"authors":{"author":{"@pid":"43/625","text":"Andrea Gaggioli"}},"title":"CyberSightings.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"5","pages":"327","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Gaggioli14d","doi":"10.1089/CYBER.2014.1507","ee":"https://doi.org/10.1089/cyber.2014.1507","url":"https://dblp.org/rec/journals/cbsn/Gaggioli14d"}, "url":"URL#3710853" }, { "@score":"1", "@id":"3710854", "info":{"authors":{"author":{"@pid":"43/625","text":"Andrea Gaggioli"}},"title":"CyberSightings.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"423","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Gaggioli14e","doi":"10.1089/CYBER.2014.1510","ee":"https://doi.org/10.1089/cyber.2014.1510","url":"https://dblp.org/rec/journals/cbsn/Gaggioli14e"}, "url":"URL#3710854" }, { "@score":"1", "@id":"3710855", "info":{"authors":{"author":{"@pid":"43/625","text":"Andrea Gaggioli"}},"title":"CyberSightings.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"7","pages":"496","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Gaggioli14f","doi":"10.1089/CYBER.2014.1515","ee":"https://doi.org/10.1089/cyber.2014.1515","url":"https://dblp.org/rec/journals/cbsn/Gaggioli14f"}, "url":"URL#3710855" }, { "@score":"1", "@id":"3710856", "info":{"authors":{"author":{"@pid":"43/625","text":"Andrea Gaggioli"}},"title":"CyberSightings.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"8","pages":"567","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Gaggioli14g","doi":"10.1089/CYBER.2014.1517","ee":"https://doi.org/10.1089/cyber.2014.1517","url":"https://dblp.org/rec/journals/cbsn/Gaggioli14g"}, "url":"URL#3710856" }, { "@score":"1", "@id":"3710857", "info":{"authors":{"author":{"@pid":"43/625","text":"Andrea Gaggioli"}},"title":"CyberSightings.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"9","pages":"630-631","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Gaggioli14h","doi":"10.1089/CYBER.2014.1519","ee":"https://doi.org/10.1089/cyber.2014.1519","url":"https://dblp.org/rec/journals/cbsn/Gaggioli14h"}, "url":"URL#3710857" }, { "@score":"1", "@id":"3710858", "info":{"authors":{"author":{"@pid":"43/625","text":"Andrea Gaggioli"}},"title":"CyberSightings.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"10","pages":"682","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Gaggioli14i","doi":"10.1089/CYBER.2014.1522","ee":"https://doi.org/10.1089/cyber.2014.1522","url":"https://dblp.org/rec/journals/cbsn/Gaggioli14i"}, "url":"URL#3710858" }, { "@score":"1", "@id":"3710859", "info":{"authors":{"author":{"@pid":"43/625","text":"Andrea Gaggioli"}},"title":"CyberSightings.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"11","pages":"729","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Gaggioli14j","doi":"10.1089/CYBER.2014.1524","ee":"https://doi.org/10.1089/cyber.2014.1524","url":"https://dblp.org/rec/journals/cbsn/Gaggioli14j"}, "url":"URL#3710859" }, { "@score":"1", "@id":"3710860", "info":{"authors":{"author":{"@pid":"43/625","text":"Andrea Gaggioli"}},"title":"CyberSightings.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"12","pages":"779","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Gaggioli14k","doi":"10.1089/CYBER.2014.1527","ee":"https://doi.org/10.1089/cyber.2014.1527","url":"https://dblp.org/rec/journals/cbsn/Gaggioli14k"}, "url":"URL#3710860" }, { "@score":"1", "@id":"3710861", "info":{"authors":{"author":{"@pid":"155/9529","text":"Manuel Gámez-Guadix"}},"title":"Depressive Symptoms and Problematic Internet Use Among Adolescents: Analysis of the Longitudinal Relationships from the Cognitive-Behavioral Model.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"11","pages":"714-719","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Gamez-Guadix14","doi":"10.1089/CYBER.2014.0226","ee":"https://doi.org/10.1089/cyber.2014.0226","url":"https://dblp.org/rec/journals/cbsn/Gamez-Guadix14"}, "url":"URL#3710861" }, { "@score":"1", "@id":"3710862", "info":{"authors":{"author":[{"@pid":"122/9589","text":"Pedro Gamito"},{"@pid":"59/10499-1","text":"Jorge Oliveira 0001"},{"@pid":"131/7094","text":"André Baptista"},{"@pid":"122/9581","text":"Diogo Morais"},{"@pid":"90/6583","text":"Paulo Lopes"},{"@pid":"157/3484","text":"Pedro J. Rosa"},{"@pid":"07/967","text":"Nuno Santos"},{"@pid":"129/6147","text":"Rodrigo Brito"}]},"title":"Eliciting Nicotine Craving with Virtual Smoking Cues.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"8","pages":"556-561","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/GamitoOBMLRSB14","doi":"10.1089/CYBER.2013.0329","ee":"https://doi.org/10.1089/cyber.2013.0329","url":"https://dblp.org/rec/journals/cbsn/GamitoOBMLRSB14"}, "url":"URL#3710862" }, { "@score":"1", "@id":"3710863", "info":{"authors":{"author":[{"@pid":"149/6803","text":"Matthew Grizzard"},{"@pid":"31/8835","text":"Ron Tamborini"},{"@pid":"149/6754","text":"Robert J. Lewis"},{"@pid":"49/3800","text":"Lu Wang"},{"@pid":"149/6731","text":"Sujay Prabhu"}]},"title":"Being Bad in a Video Game Can Make Us Morally Sensitive.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"8","pages":"499-504","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/GrizzardTLWP14","doi":"10.1089/CYBER.2013.0658","ee":"https://doi.org/10.1089/cyber.2013.0658","url":"https://dblp.org/rec/journals/cbsn/GrizzardTLWP14"}, "url":"URL#3710863" }, { "@score":"1", "@id":"3710864", "info":{"authors":{"author":[{"@pid":"123/1129","text":"John M. Grohol"},{"@pid":"144/8749","text":"Joseph Slimowicz"},{"@pid":"144/8775","text":"Rebecca Granda"}]},"title":"The Quality of Mental Health Information Commonly Searched for on the Internet.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"4","pages":"216-221","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/GroholSG14","doi":"10.1089/CYBER.2013.0258","ee":"https://doi.org/10.1089/cyber.2013.0258","url":"https://dblp.org/rec/journals/cbsn/GroholSG14"}, "url":"URL#3710864" }, { "@score":"1", "@id":"3710865", "info":{"authors":{"author":{"@pid":"85/9487","text":"Frederik De Grove"}},"title":"Youth, Friendship, and Gaming: A Network Perspective.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"9","pages":"603-608","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Grove14","doi":"10.1089/CYBER.2014.0088","ee":"https://doi.org/10.1089/cyber.2014.0088","url":"https://dblp.org/rec/journals/cbsn/Grove14"}, "url":"URL#3710865" }, { "@score":"1", "@id":"3710866", "info":{"authors":{"author":[{"@pid":"140/3151","text":"Diana Guertler"},{"@pid":"140/3548","text":"Anja Broda"},{"@pid":"140/3066","text":"Anja Bischof"},{"@pid":"140/3045","text":"Nadin Kastirke"},{"@pid":"13/9152","text":"Gert-Jan Meerkerk"},{"@pid":"23/4723","text":"Ulrich John"},{"@pid":"51/5621-5","text":"Christian Meyer 0005"},{"@pid":"140/3542","text":"Hans-Juergen Rumpf"}]},"title":"Factor Structure of the Compulsive Internet Use Scale.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"1","pages":"46-51","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/GuertlerBBKMJMR14","doi":"10.1089/CYBER.2013.0076","ee":"https://doi.org/10.1089/cyber.2013.0076","url":"https://dblp.org/rec/journals/cbsn/GuertlerBBKMJMR14"}, "url":"URL#3710866" }, { "@score":"1", "@id":"3710867", "info":{"authors":{"author":[{"@pid":"53/382-5","text":"Yu Guo 0005"},{"@pid":"48/9884","text":"Yiwei Li"},{"@pid":"124/9154","text":"Naoya Ito"}]},"title":"Exploring the Predicted Effect of Social Networking Site Use on Perceived Social Capital and Psychological Well-Being of Chinese International Students in Japan.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"1","pages":"52-58","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/GuoLI14","doi":"10.1089/CYBER.2012.0537","ee":"https://doi.org/10.1089/cyber.2012.0537","url":"https://dblp.org/rec/journals/cbsn/GuoLI14"}, "url":"URL#3710867" }, { "@score":"1", "@id":"3710868", "info":{"authors":{"author":[{"@pid":"140/3010","text":"David Hagström"},{"@pid":"123/1483","text":"Viktor Kaldo"}]},"title":"Escapism Among Players of MMORPGs - Conceptual Clarification, Its Relation to Mental Health Factors, and Development of a New Measure.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"1","pages":"19-25","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/HagstromK14","doi":"10.1089/CYBER.2012.0222","ee":"https://doi.org/10.1089/cyber.2012.0222","url":"https://dblp.org/rec/journals/cbsn/HagstromK14"}, "url":"URL#3710868" }, { "@score":"1", "@id":"3710869", "info":{"authors":{"author":{"@pid":"115/8851","text":"Jeffrey A. Hall"}},"title":"First Comes Social Networking, Then Comes Marriage? Characteristics of Americans Married 2005-2012 Who Met Through Social Networking Sites.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"5","pages":"322-326","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Hall14","doi":"10.1089/CYBER.2013.0408","ee":"https://doi.org/10.1089/cyber.2013.0408","url":"https://dblp.org/rec/journals/cbsn/Hall14"}, "url":"URL#3710869" }, { "@score":"1", "@id":"3710870", "info":{"authors":{"author":[{"@pid":"142/3652","text":"Anouk den Hamer"},{"@pid":"19/3388","text":"Elly A. Konijn"},{"@pid":"142/3612","text":"Micha G. Keijer"}]},"title":"Cyberbullying Behavior and Adolescents' Use of Media with Antisocial Content: A Cyclic Process Model.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"2","pages":"74-81","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/HamerKK14","doi":"10.1089/CYBER.2012.0307","ee":"https://doi.org/10.1089/cyber.2012.0307","url":"https://dblp.org/rec/journals/cbsn/HamerKK14"}, "url":"URL#3710870" }, { "@score":"1", "@id":"3710871", "info":{"authors":{"author":[{"@pid":"39/7191","text":"Béatrice S. Hasler"},{"@pid":"155/9499","text":"Gilad Hirschberger"},{"@pid":"154/2579","text":"Tal Shani-Sherman"},{"@pid":"12/1793","text":"Doron A. Friedman"}]},"title":"Virtual Peacemakers: Mimicry Increases Empathy in Simulated Contact with Virtual Outgroup Members.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"12","pages":"766-771","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/HaslerHSF14","doi":"10.1089/CYBER.2014.0213","ee":"https://doi.org/10.1089/cyber.2014.0213","url":"https://dblp.org/rec/journals/cbsn/HaslerHSF14"}, "url":"URL#3710871" }, { "@score":"1", "@id":"3710872", "info":{"authors":{"author":[{"@pid":"127/3756","text":"Rocio Herrero"},{"@pid":"68/411","text":"Azucena García-Palacios"},{"@pid":"11/1180","text":"Diana Castilla"},{"@pid":"146/3516","text":"Guadalupe Molinari"},{"@pid":"02/405","text":"Cristina Botella"}]},"title":"Virtual Reality for the Induction of Positive Emotions in the Treatment of Fibromyalgia: A Pilot Study over Acceptability, Satisfaction, and the Effect of Virtual Reality on Mood.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"379-384","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/HerreroGCMB14","doi":"10.1089/CYBER.2014.0052","ee":"https://doi.org/10.1089/cyber.2014.0052","url":"https://dblp.org/rec/journals/cbsn/HerreroGCMB14"}, "url":"URL#3710872" }, { "@score":"1", "@id":"3710873", "info":{"authors":{"author":[{"@pid":"84/5032","text":"Hunter G. Hoffman"},{"@pid":"146/3484","text":"Walter J. Meyer III"},{"@pid":"146/3415","text":"Maribel Ramirez"},{"@pid":"38/264-3","text":"Linda Roberts 0003"},{"@pid":"87/5807","text":"Eric J. Seibel"},{"@pid":"146/3536","text":"Barbara Atzori"},{"@pid":"30/6774","text":"Sam R. Sharar"},{"@pid":"45/2514-1","text":"David R. Patterson 0001"}]},"title":"Feasibility of Articulated Arm Mounted Oculus Rift Virtual Reality Goggles for Adjunctive Pain Control During Occupational Therapy in Pediatric Burn Patients.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"397-401","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/HoffmanMRRSASP14","doi":"10.1089/CYBER.2014.0058","ee":"https://doi.org/10.1089/cyber.2014.0058","url":"https://dblp.org/rec/journals/cbsn/HoffmanMRRSASP14"}, "url":"URL#3710873" }, { "@score":"1", "@id":"3710874", "info":{"authors":{"author":{"@pid":"130/6032","text":"Matt C. Howard"}},"title":"Creation of a Computer Self-Efficacy Measure: Analysis of Internal Consistency, Psychometric Properties, and Validity.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"10","pages":"677-681","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Howard14","doi":"10.1089/CYBER.2014.0255","ee":"https://doi.org/10.1089/cyber.2014.0255","url":"https://dblp.org/rec/journals/cbsn/Howard14"}, "url":"URL#3710874" }, { "@score":"1", "@id":"3710875", "info":{"authors":{"author":[{"@pid":"59/9534","text":"Won-Moo Hur"},{"@pid":"132/8044","text":"Hanna Kim"},{"@pid":"140/3376","text":"Wan-Min Kim"}]},"title":"The Moderating Roles of Gender and Age in Tablet Computer Adoption.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"1","pages":"33-39","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/HurKK14","doi":"10.1089/CYBER.2012.0435","ee":"https://doi.org/10.1089/cyber.2012.0435","url":"https://dblp.org/rec/journals/cbsn/HurKK14"}, "url":"URL#3710875" }, { "@score":"1", "@id":"3710876", "info":{"authors":{"author":[{"@pid":"142/3638","text":"In Jeong Hwang"},{"@pid":"21/2979","text":"Bong Gyou Lee"},{"@pid":"28/7675","text":"Ki Youn Kim"}]},"title":"Information Asymmetry, Social Networking Site Word of Mouth, and Mobility Effects on Social Commerce in Korea.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"2","pages":"117-124","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/HwangLK14","doi":"10.1089/CYBER.2012.0566","ee":"https://doi.org/10.1089/cyber.2012.0566","url":"https://dblp.org/rec/journals/cbsn/HwangLK14"}, "url":"URL#3710876" }, { "@score":"1", "@id":"3710877", "info":{"authors":{"author":[{"@pid":"55/3505","text":"Noor Ismawati Jaafar"},{"@pid":"155/9594","text":"Bobby Darmawan"},{"@pid":"155/9582","text":"Mohd Yahya Mohamed Ariffin"}]},"title":"Face-to-Face or Not-to-Face: A Technology Preference for Communication.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"11","pages":"702-708","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/JaafarDA14","doi":"10.1089/CYBER.2014.0098","ee":"https://doi.org/10.1089/cyber.2014.0098","url":"https://dblp.org/rec/journals/cbsn/JaafarDA14"}, "url":"URL#3710877" }, { "@score":"1", "@id":"3710878", "info":{"authors":{"author":[{"@pid":"41/11483","text":"S. Mo Jang"},{"@pid":"01/1272","text":"Hoon Lee"},{"@pid":"56/7533","text":"Yong Jin Park"}]},"title":"The More Friends, the Less Political Talk? Predictors of Facebook Discussions Among College Students.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"5","pages":"271-275","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/JangLP14","doi":"10.1089/CYBER.2013.0477","ee":"https://doi.org/10.1089/cyber.2013.0477","url":"https://dblp.org/rec/journals/cbsn/JangLP14"}, "url":"URL#3710878" }, { "@score":"1", "@id":"3710879", "info":{"authors":{"author":[{"@pid":"146/3590","text":"Bomyi Jeon"},{"@pid":"146/3520","text":"Sungkun Cho"},{"@pid":"03/3642","text":"Jang-Han Lee"}]},"title":"Application of Virtual Body Swapping to Patients with Complex Regional Pain Syndrome: A Pilot Study.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"366-370","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/JeonCL14","doi":"10.1089/CYBER.2014.0046","ee":"https://doi.org/10.1089/cyber.2014.0046","url":"https://dblp.org/rec/journals/cbsn/JeonCL14"}, "url":"URL#3710879" }, { "@score":"1", "@id":"3710880", "info":{"authors":{"author":[{"@pid":"144/5498","text":"Yeon Kyoung Joo"},{"@pid":"88/10602","text":"Jong-Eun Roselyn Lee"}]},"title":"Can "The Voices in the Car" Persuade Drivers to Go Green?: Effects of Benefit Appeals from In-Vehicle Voice Agents and the Role of Drivers' Affective States on Eco-Driving.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"4","pages":"255-261","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/JooL14","doi":"10.1089/CYBER.2013.0157","ee":"https://doi.org/10.1089/cyber.2013.0157","url":"https://dblp.org/rec/journals/cbsn/JooL14"}, "url":"URL#3710880" }, { "@score":"1", "@id":"3710881", "info":{"authors":{"author":[{"@pid":"146/3490","text":"Lukasz D. Kaczmarek"},{"@pid":"146/3552","text":"Dariusz Drazkowski"}]},"title":"MMORPG Escapism Predicts Decreased Well-Being: Examination of Gaming Time, Game Realism Beliefs, and Online Social Support for Offline Problems.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"5","pages":"298-302","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/KaczmarekD14","doi":"10.1089/CYBER.2013.0595","ee":"https://doi.org/10.1089/cyber.2013.0595","url":"https://dblp.org/rec/journals/cbsn/KaczmarekD14"}, "url":"URL#3710881" }, { "@score":"1", "@id":"3710882", "info":{"authors":{"author":[{"@pid":"140/2930","text":"Snezhanka Kazakova"},{"@pid":"122/9264","text":"Veroline Cauberghe"},{"@pid":"89/4988","text":"Mario Pandelaere"},{"@pid":"122/9097","text":"Patrick De Pelsmacker"}]},"title":"Players' Expertise and Competition with Others Shape the Satisfaction of Competence Needs, Gaming Gratifications, and Contingent Self-Esteem in a Gaming Context.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"1","pages":"26-32","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/KazakovaCPP14","doi":"10.1089/CYBER.2012.0413","ee":"https://doi.org/10.1089/cyber.2012.0413","url":"https://dblp.org/rec/journals/cbsn/KazakovaCPP14"}, "url":"URL#3710882" }, { "@score":"1", "@id":"3710883", "info":{"authors":{"author":[{"@pid":"66/5635","text":"Yoonkyung Kim"},{"@pid":"40/494","text":"Young Min Baek"}]},"title":"When Is Selective Self-Presentation Effective? An Investigation of the Moderation Effects of "Self-Esteem" and "Social Trust".","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"11","pages":"697-701","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/KimB14","doi":"10.1089/CYBER.2014.0321","ee":"https://doi.org/10.1089/cyber.2014.0321","url":"https://dblp.org/rec/journals/cbsn/KimB14"}, "url":"URL#3710883" }, { "@score":"1", "@id":"3710884", "info":{"authors":{"author":[{"@pid":"151/6977","text":"Hyondong Kim"},{"@pid":"151/7095","text":"Yang Woon Chung"}]},"title":"The Use of Social Networking Services and Their Relationship with the Big Five Personality Model and Job Satisfaction in Korea.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"10","pages":"658-663","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/KimC14","doi":"10.1089/CYBER.2014.0109","ee":"https://doi.org/10.1089/cyber.2014.0109","url":"https://dblp.org/rec/journals/cbsn/KimC14"}, "url":"URL#3710884" }, { "@score":"1", "@id":"3710885", "info":{"authors":{"author":[{"@pid":"58/4991","text":"Yoojung Kim"},{"@pid":"58/4344","text":"Wei-Na Lee"}]},"title":"Networking for Philanthropy: Increasing Volunteer Behavior via Social Networking Sites.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"3","pages":"160-165","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/KimL14","doi":"10.1089/CYBER.2012.0415","ee":"https://doi.org/10.1089/cyber.2012.0415","url":"https://dblp.org/rec/journals/cbsn/KimL14"}, "url":"URL#3710885" }, { "@score":"1", "@id":"3710886", "info":{"authors":{"author":[{"@pid":"85/6302","text":"Kiho Kim"},{"@pid":"155/9575","text":"Kevin Kiwon Park"},{"@pid":"03/3642","text":"Jang-Han Lee"}]},"title":"The Influence of Arousal and Expectation on Eyewitness Memory in a Virtual Environment.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"11","pages":"709-713","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/KimPL14","doi":"10.1089/CYBER.2013.0638","ee":"https://doi.org/10.1089/cyber.2013.0638","url":"https://dblp.org/rec/journals/cbsn/KimPL14"}, "url":"URL#3710886" }, { "@score":"1", "@id":"3710887", "info":{"authors":{"author":[{"@pid":"80/9495","text":"Ki Joon Kim"},{"@pid":"25/3880","text":"S. Shyam Sundar"}]},"title":"Does Screen Size Matter for Smartphones? Utilitarian and Hedonic Effects of Screen Size on Smartphone Adoption.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"7","pages":"466-473","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/KimS14","doi":"10.1089/CYBER.2013.0492","ee":"https://doi.org/10.1089/cyber.2013.0492","url":"https://dblp.org/rec/journals/cbsn/KimS14"}, "url":"URL#3710887" }, { "@score":"1", "@id":"3710888", "info":{"authors":{"author":[{"@pid":"155/9503","text":"Orsolya Király"},{"@pid":"83/6863","text":"Mark D. Griffiths 0001"},{"@pid":"122/9158","text":"Róbert Urbán"},{"@pid":"126/2810","text":"Judit Farkas"},{"@pid":"122/9198","text":"Gyöngyi Kökönyei"},{"@pid":"131/4155","text":"Zsuzsanna Elekes"},{"@pid":"155/9568","text":"Domokos Tamás"},{"@pid":"122/9300","text":"Zsolt Demetrovics"}]},"title":"Problematic Internet Use and Problematic Online Gaming Are Not the Same: Findings from a Large Nationally Representative Adolescent Sample.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"12","pages":"749-754","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/KiralyGUFKETD14","doi":"10.1089/CYBER.2014.0475","ee":"https://doi.org/10.1089/cyber.2014.0475","url":"https://dblp.org/rec/journals/cbsn/KiralyGUFKETD14"}, "url":"URL#3710888" }, { "@score":"1", "@id":"3710889", "info":{"authors":{"author":[{"@pid":"128/2404","text":"Rachel Kowert"},{"@pid":"143/4507","text":"Emese Domahidi"},{"@pid":"52/9459","text":"Thorsten Quandt"}]},"title":"The Relationship Between Online Video Game Involvement and Gaming-Related Friendships Among Emotionally Sensitive Individuals.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"7","pages":"447-453","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/KowertDQ14","doi":"10.1089/CYBER.2013.0656","ee":"https://doi.org/10.1089/cyber.2013.0656","url":"https://dblp.org/rec/journals/cbsn/KowertDQ14"}, "url":"URL#3710889" }, { "@score":"1", "@id":"3710890", "info":{"authors":{"author":[{"@pid":"128/2404","text":"Rachel Kowert"},{"@pid":"143/4496","text":"Ruth Festl"},{"@pid":"52/9459","text":"Thorsten Quandt"}]},"title":"Unpopular, Overweight, and Socially Inept: Reconsidering the Stereotype of Online Gamers.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"3","pages":"141-146","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/KowertFQ14","doi":"10.1089/CYBER.2013.0118","ee":"https://doi.org/10.1089/cyber.2013.0118","url":"https://dblp.org/rec/journals/cbsn/KowertFQ14"}, "url":"URL#3710890" }, { "@score":"1", "@id":"3710891", "info":{"authors":{"author":[{"@pid":"151/7039","text":"Michael Laakasuo"},{"@pid":"151/7093","text":"Jussi Palomäki"},{"@pid":"151/6990","text":"Mikko Salmela"}]},"title":"Experienced Poker Players Are Emotionally Stable.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"10","pages":"668-671","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/LaakasuoPS14","doi":"10.1089/CYBER.2014.0147","ee":"https://doi.org/10.1089/cyber.2014.0147","url":"https://dblp.org/rec/journals/cbsn/LaakasuoPS14"}, "url":"URL#3710891" }, { "@score":"1", "@id":"3710892", "info":{"authors":{"author":[{"@pid":"122/9125","text":"Christian Laier"},{"@pid":"149/6719","text":"Jaro Pekal"},{"@pid":"83/2865","text":"Matthias Brand"}]},"title":"Cybersex Addiction in Heterosexual Female Users of Internet Pornography Can Be Explained by Gratification Hypothesis.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"8","pages":"505-511","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/LaierPB14","doi":"10.1089/CYBER.2013.0396","ee":"https://doi.org/10.1089/cyber.2013.0396","url":"https://dblp.org/rec/journals/cbsn/LaierPB14"}, "url":"URL#3710892" }, { "@score":"1", "@id":"3710893", "info":{"authors":{"author":{"@pid":"151/7087","text":"Jayeon Lee"}},"title":"Are Some People Less Influenced by Others' Opinions? The Role of Internal Political Self-Efficacy and Need for Cognition in Impression Formation on Social Networking Sites.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"9","pages":"571-577","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Lee14","doi":"10.1089/CYBER.2013.0713","ee":"https://doi.org/10.1089/cyber.2013.0713","url":"https://dblp.org/rec/journals/cbsn/Lee14"}, "url":"URL#3710893" }, { "@score":"1", "@id":"3710894", "info":{"authors":{"author":[{"@pid":"143/8268","text":"Chun-Lin Lee"},{"@pid":"143/8107","text":"Ming-Kuei Huang"}]},"title":"The Influence of Computer Literacy and Computer Anxiety on Computer Self-Efficacy: The Moderating Effect of Gender.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"3","pages":"172-180","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/LeeH14","doi":"10.1089/CYBER.2012.0029","ee":"https://doi.org/10.1089/cyber.2012.0029","url":"https://dblp.org/rec/journals/cbsn/LeeH14"}, "url":"URL#3710894" }, { "@score":"1", "@id":"3710895", "info":{"authors":{"author":[{"@pid":"88/10602","text":"Jong-Eun Roselyn Lee"},{"@pid":"n/CliffordNass","text":"Clifford I. Nass"},{"@pid":"80/467","text":"Jeremy N. Bailenson"}]},"title":"Does the Mask Govern the Mind?: Effects of Arbitrary Gender Representation on Quantitative Task Performance in Avatar-Represented Virtual Groups.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"4","pages":"248-254","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/LeeNB14","doi":"10.1089/CYBER.2013.0358","ee":"https://doi.org/10.1089/cyber.2013.0358","url":"https://dblp.org/rec/journals/cbsn/LeeNB14"}, "url":"URL#3710895" }, { "@score":"1", "@id":"3710896", "info":{"authors":{"author":{"@pid":"149/6750","text":"Eric Rutger Leukfeldt"}},"title":"Phishing for Suitable Targets in The Netherlands: Routine Activity Theory and Phishing Victimization.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"8","pages":"551-555","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Leukfeldt14","doi":"10.1089/CYBER.2014.0008","ee":"https://doi.org/10.1089/cyber.2014.0008","url":"https://dblp.org/rec/journals/cbsn/Leukfeldt14"}, "url":"URL#3710896" }, { "@score":"1", "@id":"3710897", "info":{"authors":{"author":[{"@pid":"76/1275","text":"Jinhui Li"},{"@pid":"78/4473","text":"Yin-Leng Theng"},{"@pid":"f/SchubertFoo","text":"Schubert Foo"}]},"title":"Game-Based Digital Interventions for Depression Therapy: A Systematic Review and Meta-Analysis.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"8","pages":"519-527","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/LiTF14","doi":"10.1089/CYBER.2013.0481","ee":"https://doi.org/10.1089/cyber.2013.0481","url":"https://dblp.org/rec/journals/cbsn/LiTF14"}, "url":"URL#3710897" }, { "@score":"1", "@id":"3710898", "info":{"authors":{"author":[{"@pid":"202/0089","text":"Yajun Li"},{"@pid":"29/6130","text":"Xinghui Zhang"},{"@pid":"142/3592","text":"Furong Lu"},{"@pid":"45/47","text":"Qin Zhang"},{"@pid":"36/3235","text":"Yun Wang"}]},"title":"Internet Addiction Among Elementary and Middle School Students in China: A Nationally Representative Sample Study.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"2","pages":"111-116","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/LiZLZW14","doi":"10.1089/CYBER.2012.0482","ee":"https://doi.org/10.1089/cyber.2012.0482","url":"https://dblp.org/rec/journals/cbsn/LiZLZW14"}, "url":"URL#3710898" }, { "@score":"1", "@id":"3710899", "info":{"authors":{"author":[{"@pid":"144/8760","text":"Adam Lobel"},{"@pid":"144/8736","text":"Isabela Granic"},{"@pid":"144/8758","text":"Rutger C. M. E. Engels"}]},"title":"Stressful Gaming, Interoceptive Awareness, and Emotion Regulation Tendencies: A Novel Approach.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"4","pages":"222-227","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/LobelGE14","doi":"10.1089/CYBER.2013.0296","ee":"https://doi.org/10.1089/cyber.2013.0296","url":"https://dblp.org/rec/journals/cbsn/LobelGE14"}, "url":"URL#3710899" }, { "@score":"1", "@id":"3710900", "info":{"authors":{"author":[{"@pid":"144/8760","text":"Adam Lobel"},{"@pid":"144/8736","text":"Isabela Granic"},{"@pid":"151/7029","text":"Lisanne L. Stone"},{"@pid":"144/8758","text":"Rutger C. M. E. Engels"}]},"title":"Stressful Gaming, Interoceptive Awareness, and Emotion Regulation Tendencies: A Novel Approach.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"10","pages":"639-643","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/LobelGSE14","doi":"10.1089/CYBER.2014.0128","ee":"https://doi.org/10.1089/cyber.2014.0128","url":"https://dblp.org/rec/journals/cbsn/LobelGSE14"}, "url":"URL#3710900" }, { "@score":"1", "@id":"3710901", "info":{"authors":{"author":[{"@pid":"98/4095","text":"Karen Long"},{"@pid":"49/4478","text":"Xiao Zhang"}]},"title":"The Role of Self-Construal in Predicting Self-Presentational Motives for Online Social Network Use in the UK and Japan.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"7","pages":"454-459","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/LongZ14","doi":"10.1089/CYBER.2013.0506","ee":"https://doi.org/10.1089/cyber.2013.0506","url":"https://dblp.org/rec/journals/cbsn/LongZ14"}, "url":"URL#3710901" }, { "@score":"1", "@id":"3710902", "info":{"authors":{"author":[{"@pid":"14/7200","text":"Olatz Lopez-Fernandez"},{"@pid":"127/3759","text":"Maria Luisa Honrubia-Serrano"},{"@pid":"127/3707","text":"Montserrat Freixa-Blanxart"},{"@pid":"99/3668","text":"William Gibson"}]},"title":"Prevalence of Problematic Mobile Phone Use in British Adolescents.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"2","pages":"91-98","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Lopez-FernandezHFG14","doi":"10.1089/CYBER.2012.0260","ee":"https://doi.org/10.1089/cyber.2012.0260","url":"https://dblp.org/rec/journals/cbsn/Lopez-FernandezHFG14"}, "url":"URL#3710902" }, { "@score":"1", "@id":"3710903", "info":{"authors":{"author":[{"@pid":"146/3379","text":"Desirée Loreto-Quijada"},{"@pid":"10/2269","text":"José Gutiérrez-Maldonado"},{"@pid":"146/3432","text":"Rubén Nieto"},{"@pid":"75/6274","text":"Olga Gutiérrez-Martínez"},{"@pid":"78/8144","text":"Marta Ferrer-García"},{"@pid":"35/5114","text":"Carmina Saldaña"},{"@pid":"146/3372","text":"Adela Fusté-Escolano"},{"@pid":"146/3494","text":"Liudmila Liutsko"}]},"title":"Differential Effects of Two Virtual Reality Interventions: Distraction Versus Pain Control.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"353-358","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Loreto-QuijadaGNGFSFL14","doi":"10.1089/CYBER.2014.0057","ee":"https://doi.org/10.1089/cyber.2014.0057","url":"https://dblp.org/rec/journals/cbsn/Loreto-QuijadaGNGFSFL14"}, "url":"URL#3710903" }, { "@score":"1", "@id":"3710904", "info":{"authors":{"author":{"@pid":"26/11032","text":"Robert Madelin"}},"title":"Personalizing Therapy.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"333","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Madelin14","doi":"10.1089/CYBER.2014.1513","ee":"https://doi.org/10.1089/cyber.2014.1513","url":"https://dblp.org/rec/journals/cbsn/Madelin14"}, "url":"URL#3710904" }, { "@score":"1", "@id":"3710905", "info":{"authors":{"author":[{"@pid":"155/9528","text":"Kwok-Kei Mak"},{"@pid":"155/9567","text":"Ching-Man Lai"},{"@pid":"155/9590","text":"Hiroko Watanabe"},{"@pid":"21/4915","text":"Dong-Il Kim"},{"@pid":"155/9508","text":"Norharlina Bahar"},{"@pid":"155/9548","text":"Milen S. Ramos"},{"@pid":"155/9595","text":"Kimberly S. Young"},{"@pid":"155/9565","text":"Roger C. M. Ho"},{"@pid":"155/9526","text":"Na-Rae Aum"},{"@pid":"155/9502","text":"Cecilia Cheng"}]},"title":"Epidemiology of Internet Behaviors and Addiction Among Adolescents in Six Asian Countries.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"11","pages":"720-728","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/MakLWKBRYHAC14","doi":"10.1089/CYBER.2014.0139","ee":"https://doi.org/10.1089/cyber.2014.0139","url":"https://dblp.org/rec/journals/cbsn/MakLWKBRYHAC14"}, "url":"URL#3710905" }, { "@score":"1", "@id":"3710906", "info":{"authors":{"author":[{"@pid":"17/11101","text":"Robert N. McLay"},{"@pid":"148/2816","text":"Vasudha Ram"},{"@pid":"65/11101","text":"Jennifer Webb-Murphy"},{"@pid":"98/11101","text":"James L. Spira"},{"@pid":"17/11100","text":"Dennis Patrick Wood"},{"@pid":"05/2849","text":"Mark D. Wiederhold"},{"@pid":"83/7004","text":"Brenda K. Wiederhold"},{"@pid":"00/11101","text":"Scott Johnston"},{"@pid":"123/1520","text":"Dennis Reeves"}]},"title":"Effect of Virtual Reality PTSD Treatment on Mood and Neurocognitive Outcomes.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"7","pages":"439-446","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/McLayRWSWWWJR14","doi":"10.1089/CYBER.2013.0383","ee":"https://doi.org/10.1089/cyber.2013.0383","url":"https://dblp.org/rec/journals/cbsn/McLayRWSWWWJR14"}, "url":"URL#3710906" }, { "@score":"1", "@id":"3710907", "info":{"authors":{"author":[{"@pid":"144/8774","text":"Evelyn P. Meier"},{"@pid":"05/7385","text":"James Gray"}]},"title":"Facebook Photo Activity Associated with Body Image Disturbance in Adolescent Girls.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"4","pages":"199-206","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/MeierG14","doi":"10.1089/CYBER.2013.0305","ee":"https://doi.org/10.1089/cyber.2013.0305","url":"https://dblp.org/rec/journals/cbsn/MeierG14"}, "url":"URL#3710907" }, { "@score":"1", "@id":"3710908", "info":{"authors":{"author":[{"@pid":"29/9917","text":"Olivia Metcalf"},{"@pid":"74/9917","text":"Kristen Pammer"}]},"title":"Impulsivity and Related Neuropsychological Features in Regular and Addictive First Person Shooter Gaming.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"3","pages":"147-152","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/MetcalfP14","doi":"10.1089/CYBER.2013.0024","ee":"https://doi.org/10.1089/cyber.2013.0024","url":"https://dblp.org/rec/journals/cbsn/MetcalfP14"}, "url":"URL#3710908" }, { "@score":"1", "@id":"3710909", "info":{"authors":{"author":[{"@pid":"155/9566","text":"Joseph Miller"},{"@pid":"155/9550","text":"Ivanka Prichard"},{"@pid":"155/9514","text":"Amanda Hutchinson"},{"@pid":"87/11278","text":"Carlene Wilson"}]},"title":"The Relationship Between Exposure to Alcohol-Related Content on Facebook and Predictors of Alcohol Consumption Among Female Emerging Adults.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"12","pages":"735-741","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/MillerPHW14","doi":"10.1089/CYBER.2014.0337","ee":"https://doi.org/10.1089/cyber.2014.0337","url":"https://dblp.org/rec/journals/cbsn/MillerPHW14"}, "url":"URL#3710909" }, { "@score":"1", "@id":"3710910", "info":{"authors":{"author":[{"@pid":"123/0173","text":"José Luis Mosso-Vázquez"},{"@pid":"146/3573","text":"Kenneth Gao"},{"@pid":"83/7004","text":"Brenda K. Wiederhold"},{"@pid":"05/2849","text":"Mark D. Wiederhold"}]},"title":"Virtual Reality for Pain Management in Cardiac Surgery.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"371-378","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Mosso-VazquezGWW14","doi":"10.1089/CYBER.2014.0198","ee":"https://doi.org/10.1089/cyber.2014.0198","url":"https://dblp.org/rec/journals/cbsn/Mosso-VazquezGWW14"}, "url":"URL#3710910" }, { "@score":"1", "@id":"3710911", "info":{"authors":{"author":[{"@pid":"151/6975","text":"Christin R. Müller"},{"@pid":"122/9210","text":"Jan Pfetsch"},{"@pid":"151/7034","text":"Angela Ittel"}]},"title":"Ethical Media Competence as a Protective Factor Against Cyberbullying and Cybervictimization Among German School Students.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"10","pages":"644-651","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/MullerPI14","doi":"10.1089/CYBER.2014.0168","ee":"https://doi.org/10.1089/cyber.2014.0168","url":"https://dblp.org/rec/journals/cbsn/MullerPI14"}, "url":"URL#3710911" }, { "@score":"1", "@id":"3710912", "info":{"authors":{"author":[{"@pid":"93/99","text":"Antti Oulasvirta"},{"@pid":"42/9545","text":"Tiia Suomalainen"},{"@pid":"121/2964","text":"Juho Hamari"},{"@pid":"97/1342","text":"Airi Lampinen"},{"@pid":"13/1970","text":"Kristiina Karvonen"}]},"title":"Transparency of Intentions Decreases Privacy Concerns in Ubiquitous Surveillance.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"10","pages":"633-638","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/OulasvirtaSHLK14","doi":"10.1089/CYBER.2013.0585","ee":"https://doi.org/10.1089/cyber.2013.0585","url":"https://dblp.org/rec/journals/cbsn/OulasvirtaSHLK14"}, "url":"URL#3710912" }, { "@score":"1", "@id":"3710913", "info":{"authors":{"author":[{"@pid":"155/9564","text":"Joris Van Ouytsel"},{"@pid":"127/3731","text":"Koen Ponnet"},{"@pid":"09/3937","text":"Michel Walrave"}]},"title":"The Associations Between Adolescents' Consumption of Pornography and Music Videos and Their Sexting Behavior.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"12","pages":"772-778","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/OuytselPW14","doi":"10.1089/CYBER.2014.0365","ee":"https://doi.org/10.1089/cyber.2014.0365","url":"https://dblp.org/rec/journals/cbsn/OuytselPW14"}, "url":"URL#3710913" }, { "@score":"1", "@id":"3710914", "info":{"authors":{"author":{"@pid":"151/7098","text":"Igor Pantic"}},"title":"Online Social Networking and Mental Health.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"10","pages":"652-657","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Pantic14","doi":"10.1089/CYBER.2014.0070","ee":"https://doi.org/10.1089/cyber.2014.0070","url":"https://dblp.org/rec/journals/cbsn/Pantic14"}, "url":"URL#3710914" }, { "@score":"1", "@id":"3710915", "info":{"authors":{"author":[{"@pid":"144/8770","text":"Chan-Bin Park"},{"@pid":"122/9364","text":"Jung-Seok Choi"},{"@pid":"144/8670","text":"Su Mi Park"},{"@pid":"28/1412-2","text":"Jun-Young Lee 0002"},{"@pid":"122/9229","text":"Hee Yeon Jung"},{"@pid":"144/8764","text":"Jin-Mi Seol"},{"@pid":"128/7412","text":"Jae Yeon Hwang"},{"@pid":"144/8859","text":"Ah Reum Gwak"},{"@pid":"88/7359","text":"Jun Soo Kwon"}]},"title":"Comparison of the Effectiveness of Virtual Cue Exposure Therapy and Cognitive Behavioral Therapy for Nicotine Dependence.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"4","pages":"262-267","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/ParkCPLJSHGK14","doi":"10.1089/CYBER.2013.0253","ee":"https://doi.org/10.1089/cyber.2013.0253","url":"https://dblp.org/rec/journals/cbsn/ParkCPLJSHGK14"}, "url":"URL#3710915" }, { "@score":"1", "@id":"3710916", "info":{"authors":{"author":{"@pid":"151/7032","text":"Aditi Paul"}},"title":"Is Online Better Than Offline for Meeting Partners? Depends: Are You Looking to Marry or to Date?","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"10","pages":"664-667","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Paul14","doi":"10.1089/CYBER.2014.0302","ee":"https://doi.org/10.1089/cyber.2014.0302","url":"https://dblp.org/rec/journals/cbsn/Paul14"}, "url":"URL#3710916" }, { "@score":"1", "@id":"3710917", "info":{"authors":{"author":{"@pid":"86/7523","text":"Gregor Petric"}},"title":"Perceived Quality of Conversations in Online Communities: Conceptual Framework, Scale Development, and Empirical Validation.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"2","pages":"82-90","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Petric14","doi":"10.1089/CYBER.2012.0483","ee":"https://doi.org/10.1089/cyber.2012.0483","url":"https://dblp.org/rec/journals/cbsn/Petric14"}, "url":"URL#3710917" }, { "@score":"1", "@id":"3710918", "info":{"authors":{"author":[{"@pid":"73/651","text":"James G. Phillips"},{"@pid":"155/9589","text":"James Sargeant"},{"@pid":"132/6095","text":"Rowan P. Ogeil"},{"@pid":"27/1663","text":"Yang-Wai Chow"},{"@pid":"14/9917","text":"Alex Blaszczynski"}]},"title":"Self-Reported Gambling Problems and Digital Traces.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"12","pages":"742-748","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/PhillipsSOCB14","doi":"10.1089/CYBER.2014.0369","ee":"https://doi.org/10.1089/cyber.2014.0369","url":"https://dblp.org/rec/journals/cbsn/PhillipsSOCB14"}, "url":"URL#3710918" }, { "@score":"1", "@id":"3710919", "info":{"authors":{"author":[{"@pid":"146/3500","text":"Wendy A. Powell"},{"@pid":"17/7681","text":"Maureen J. Simmonds"}]},"title":"Virtual Reality and Musculoskeletal Pain: Manipulating Sensory Cues to Improve Motor Performance During Walking.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"390-396","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/PowellS14","doi":"10.1089/CYBER.2014.0061","ee":"https://doi.org/10.1089/cyber.2014.0061","url":"https://dblp.org/rec/journals/cbsn/PowellS14"}, "url":"URL#3710919" }, { "@score":"1", "@id":"3710920", "info":{"authors":{"author":{"@pid":"122/9362","text":"Andrew K. Przybylski"}},"title":"Who Believes Electronic Games Cause Real World Aggression?","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"4","pages":"228-234","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Przybylski14","doi":"10.1089/CYBER.2013.0245","ee":"https://doi.org/10.1089/cyber.2013.0245","url":"https://dblp.org/rec/journals/cbsn/Przybylski14"}, "url":"URL#3710920" }, { "@score":"1", "@id":"3710921", "info":{"authors":{"author":[{"@pid":"124/7803","text":"Shannon M. Rauch"},{"@pid":"143/7999","text":"Cara Strobel"},{"@pid":"143/8136","text":"Megan Bella"},{"@pid":"143/8006","text":"Zachary Odachowski"},{"@pid":"143/8212","text":"Christopher Bloom"}]},"title":"Face to Face Versus Facebook: Does Exposure to Social Networking Web Sites Augment or Attenuate Physiological Arousal Among the Socially Anxious?","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"3","pages":"187-190","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/RauchSBOB14","doi":"10.1089/CYBER.2012.0498","ee":"https://doi.org/10.1089/cyber.2012.0498","url":"https://dblp.org/rec/journals/cbsn/RauchSBOB14"}, "url":"URL#3710921" }, { "@score":"1", "@id":"3710922", "info":{"authors":{"author":[{"@pid":"08/3180","text":"Patrice Renaud"},{"@pid":"128/9772","text":"Dominique Trottier"},{"@pid":"144/8838","text":"Kévin Nolet"},{"@pid":"123/1306","text":"Joanne L. Rouleau"},{"@pid":"128/9927","text":"Mathieu Goyette"},{"@pid":"07/1462","text":"Stéphane Bouchard"}]},"title":"Sexual Self-Regulation and Cognitive Absorption as Factors of Sexual Response Toward Virtual Characters.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"4","pages":"241-247","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/RenaudTNRGB14","doi":"10.1089/CYBER.2013.0165","ee":"https://doi.org/10.1089/cyber.2013.0165","url":"https://dblp.org/rec/journals/cbsn/RenaudTNRGB14"}, "url":"URL#3710922" }, { "@score":"1", "@id":"3710923", "info":{"authors":{"author":{"@pid":"91/5273","text":"Giuseppe Riva 0001"}},"title":"CyberEurope.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"1","pages":"60","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Riva14","doi":"10.1089/CYBER.2013.1536","ee":"https://doi.org/10.1089/cyber.2013.1536","url":"https://dblp.org/rec/journals/cbsn/Riva14"}, "url":"URL#3710923" }, { "@score":"1", "@id":"3710924", "info":{"authors":{"author":{"@pid":"91/5273","text":"Giuseppe Riva 0001"}},"title":"CyberEurope.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"2","pages":"130","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Riva14a","doi":"10.1089/CYBER.2014.1501","ee":"https://doi.org/10.1089/cyber.2014.1501","url":"https://dblp.org/rec/journals/cbsn/Riva14a"}, "url":"URL#3710924" }, { "@score":"1", "@id":"3710925", "info":{"authors":{"author":{"@pid":"91/5273","text":"Giuseppe Riva 0001"}},"title":"CyberEurope.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"3","pages":"197-198","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Riva14b","doi":"10.1089/CYBER.2014.1504","ee":"https://doi.org/10.1089/cyber.2014.1504","url":"https://dblp.org/rec/journals/cbsn/Riva14b"}, "url":"URL#3710925" }, { "@score":"1", "@id":"3710926", "info":{"authors":{"author":{"@pid":"91/5273","text":"Giuseppe Riva 0001"}},"title":"CyberEurope.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"4","pages":"269-270","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Riva14c","doi":"10.1089/CYBER.2014.1506","ee":"https://doi.org/10.1089/cyber.2014.1506","url":"https://dblp.org/rec/journals/cbsn/Riva14c"}, "url":"URL#3710926" }, { "@score":"1", "@id":"3710927", "info":{"authors":{"author":{"@pid":"91/5273","text":"Giuseppe Riva 0001"}},"title":"CyberEurope.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"5","pages":"328","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Riva14d","doi":"10.1089/CYBER.2014.1508","ee":"https://doi.org/10.1089/cyber.2014.1508","url":"https://dblp.org/rec/journals/cbsn/Riva14d"}, "url":"URL#3710927" }, { "@score":"1", "@id":"3710928", "info":{"authors":{"author":{"@pid":"91/5273","text":"Giuseppe Riva 0001"}},"title":"CyberEurope.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"424","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Riva14e","doi":"10.1089/CYBER.2014.1511","ee":"https://doi.org/10.1089/cyber.2014.1511","url":"https://dblp.org/rec/journals/cbsn/Riva14e"}, "url":"URL#3710928" }, { "@score":"1", "@id":"3710929", "info":{"authors":{"author":{"@pid":"91/5273","text":"Giuseppe Riva 0001"}},"title":"CyberEurope.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"7","pages":"497","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Riva14f","doi":"10.1089/CYBER.2014.1516","ee":"https://doi.org/10.1089/cyber.2014.1516","url":"https://dblp.org/rec/journals/cbsn/Riva14f"}, "url":"URL#3710929" }, { "@score":"1", "@id":"3710930", "info":{"authors":{"author":{"@pid":"91/5273","text":"Giuseppe Riva 0001"}},"title":"CyberEurope.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"8","pages":"568","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Riva14g","doi":"10.1089/CYBER.2014.1518","ee":"https://doi.org/10.1089/cyber.2014.1518","url":"https://dblp.org/rec/journals/cbsn/Riva14g"}, "url":"URL#3710930" }, { "@score":"1", "@id":"3710931", "info":{"authors":{"author":{"@pid":"91/5273","text":"Giuseppe Riva 0001"}},"title":"CyberEurope.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"9","pages":"632","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Riva14h","doi":"10.1089/CYBER.2014.1520","ee":"https://doi.org/10.1089/cyber.2014.1520","url":"https://dblp.org/rec/journals/cbsn/Riva14h"}, "url":"URL#3710931" }, { "@score":"1", "@id":"3710932", "info":{"authors":{"author":{"@pid":"91/5273","text":"Giuseppe Riva 0001"}},"title":"CyberEurope.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"10","pages":"683","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Riva14i","doi":"10.1089/CYBER.2014.1523","ee":"https://doi.org/10.1089/cyber.2014.1523","url":"https://dblp.org/rec/journals/cbsn/Riva14i"}, "url":"URL#3710932" }, { "@score":"1", "@id":"3710933", "info":{"authors":{"author":{"@pid":"91/5273","text":"Giuseppe Riva 0001"}},"title":"CyberEurope.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"11","pages":"730","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Riva14j","doi":"10.1089/CYBER.2014.1525","ee":"https://doi.org/10.1089/cyber.2014.1525","url":"https://dblp.org/rec/journals/cbsn/Riva14j"}, "url":"URL#3710933" }, { "@score":"1", "@id":"3710934", "info":{"authors":{"author":{"@pid":"91/5273","text":"Giuseppe Riva 0001"}},"title":"CyberEurope.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"12","pages":"780","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Riva14k","doi":"10.1089/CYBER.2014.1528","ee":"https://doi.org/10.1089/cyber.2014.1528","url":"https://dblp.org/rec/journals/cbsn/Riva14k"}, "url":"URL#3710934" }, { "@score":"1", "@id":"3710935", "info":{"authors":{"author":[{"@pid":"155/9534","text":"Annika Scholl"},{"@pid":"123/1206","text":"Kai Sassenberg"}]},"title":""While You Still Think, I Already Type": Experienced Social Power Reduces Deliberation During E-Mail Communication.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"11","pages":"692-696","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/SchollS14","doi":"10.1089/CYBER.2014.0293","ee":"https://doi.org/10.1089/cyber.2014.0293","url":"https://dblp.org/rec/journals/cbsn/SchollS14"}, "url":"URL#3710935" }, { "@score":"1", "@id":"3710936", "info":{"authors":{"author":[{"@pid":"144/9502","text":"Graham G. Scott"},{"@pid":"149/6837","text":"Jason Sinclair"},{"@pid":"122/1481","text":"Emma Short"},{"@pid":"149/6726","text":"Gillian Bruce"}]},"title":"It's Not What You Say, It's How You Say It: Language Use on Facebook Impacts Employability But Not Attractiveness.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"8","pages":"562-566","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/ScottSSB14","doi":"10.1089/CYBER.2013.0584","ee":"https://doi.org/10.1089/cyber.2013.0584","url":"https://dblp.org/rec/journals/cbsn/ScottSSB14"}, "url":"URL#3710936" }, { "@score":"1", "@id":"3710937", "info":{"authors":{"author":[{"@pid":"151/6951","text":"Diana C. M. Seitz"},{"@pid":"151/6953","text":"Christine Knaevelsrud"},{"@pid":"151/7026","text":"Gabriele Duran"},{"@pid":"151/7001","text":"Sabine Waadt"},{"@pid":"151/7004","text":"Lutz Goldbeck"}]},"title":"Internet-Based Psychotherapy in Young Adult Survivors of Pediatric Cancer: Feasibility and Participants' Satisfaction.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"9","pages":"624-629","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/SeitzKDWG14","doi":"10.1089/CYBER.2014.0066","ee":"https://doi.org/10.1089/cyber.2014.0066","url":"https://dblp.org/rec/journals/cbsn/SeitzKDWG14"}, "url":"URL#3710937" }, { "@score":"1", "@id":"3710938", "info":{"authors":{"author":[{"@pid":"115/7811","text":"Yukari Seko"},{"@pid":"151/7042","text":"Sean Kidd"},{"@pid":"127/5026","text":"David Wiljer"},{"@pid":"151/7089","text":"Kwame McKenzie"}]},"title":"Youth Mental Health Interventions via Mobile Phones: A Scoping Review.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"9","pages":"591-602","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/SekoKWM14","doi":"10.1089/CYBER.2014.0078","ee":"https://doi.org/10.1089/cyber.2014.0078","url":"https://dblp.org/rec/journals/cbsn/SekoKWM14"}, "url":"URL#3710938" }, { "@score":"1", "@id":"3710939", "info":{"authors":{"author":[{"@pid":"115/7860","text":"Wonsun Shin"},{"@pid":"151/7027","text":"Nurzali Ismail"}]},"title":"Exploring the Role of Parents and Peers in Young Adolescents' Risk Taking on Social Networking Sites.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"9","pages":"578-583","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/ShinI14","doi":"10.1089/CYBER.2014.0095","ee":"https://doi.org/10.1089/cyber.2014.0095","url":"https://dblp.org/rec/journals/cbsn/ShinI14"}, "url":"URL#3710939" }, { "@score":"1", "@id":"3710940", "info":{"authors":{"author":[{"@pid":"146/3465","text":"Camelia Sulea"},{"@pid":"146/3398","text":"Ahmad Soomro"},{"@pid":"146/3510","text":"Chelsie Boyd"},{"@pid":"83/7004","text":"Brenda K. Wiederhold"}]},"title":"Pain Management in Virtual Reality: A Comprehensive Research Chart.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"402-413","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/SuleaSBW14","doi":"10.1089/CYBER.2014.1514","ee":"https://doi.org/10.1089/cyber.2014.1514","url":"https://dblp.org/rec/journals/cbsn/SuleaSBW14"}, "url":"URL#3710940" }, { "@score":"1", "@id":"3710941", "info":{"authors":{"author":{"@pid":"83/4480","text":"David A. Thomas"}},"title":"Virtual Reality Research Continues to Progress at the National Institutes of Health.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"334","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Thomas14","doi":"10.1089/CYBER.2014.1509","ee":"https://doi.org/10.1089/cyber.2014.1509","url":"https://dblp.org/rec/journals/cbsn/Thomas14"}, "url":"URL#3710941" }, { "@score":"1", "@id":"3710942", "info":{"authors":{"author":[{"@pid":"48/7339","text":"Susan Tortolero"},{"@pid":"29/7338","text":"Melissa Peskin"},{"@pid":"151/6989","text":"Elizabeth R. Baumler"},{"@pid":"151/7018","text":"Paula M. Cuccaro"},{"@pid":"151/7014","text":"Marc N. Elliott"},{"@pid":"151/6952","text":"Susan L. Davies"},{"@pid":"151/7022","text":"Terri H. Lewis"},{"@pid":"151/7070","text":"Stephen W. Banspach"},{"@pid":"151/7065","text":"David E. Kanouse"},{"@pid":"151/7015","text":"Mark A. Schuster"}]},"title":"Daily Violent Video Game Playing and Depression in Preadolescent Youth.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"9","pages":"609-615","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/TortoleroPBCEDLBKS14","doi":"10.1089/CYBER.2014.0091","ee":"https://doi.org/10.1089/cyber.2014.0091","url":"https://dblp.org/rec/journals/cbsn/TortoleroPBCEDLBKS14"}, "url":"URL#3710942" }, { "@score":"1", "@id":"3710943", "info":{"authors":{"author":[{"@pid":"141/5662","text":"Stefano Triberti"},{"@pid":"99/11197","text":"Claudia Repetto"},{"@pid":"91/5273","text":"Giuseppe Riva 0001"}]},"title":"Psychological Factors Influencing the Effectiveness of Virtual Reality-Based Analgesia: A Systematic Review.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"335-345","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/TribertiRR14","doi":"10.1089/CYBER.2014.0054","ee":"https://doi.org/10.1089/cyber.2014.0054","url":"https://dblp.org/rec/journals/cbsn/TribertiRR14"}, "url":"URL#3710943" }, { "@score":"1", "@id":"3710944", "info":{"authors":{"author":[{"@pid":"123/0135","text":"Artemis Tsitsika"},{"@pid":"149/6830","text":"Mari Janikian"},{"@pid":"122/9142","text":"Tim M. Schoenmakers"},{"@pid":"149/6778","text":"Eleni C. Tzavela"},{"@pid":"121/5336","text":"Kjartan Ólafsson"},{"@pid":"149/6805","text":"Szymon Wójcik"},{"@pid":"149/6777","text":"George Florian Macarie"},{"@pid":"149/6762","text":"Chara Tzavara"},{"@pid":"149/6779","text":"Clive Richardson"}]},"title":"Internet Addictive Behavior in Adolescence: A Cross-Sectional Study in Seven European Countries.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"8","pages":"528-535","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/TsitsikaJSTOWMTR14","doi":"10.1089/CYBER.2013.0382","ee":"https://doi.org/10.1089/cyber.2013.0382","url":"https://dblp.org/rec/journals/cbsn/TsitsikaJSTOWMTR14"}, "url":"URL#3710944" }, { "@score":"1", "@id":"3710945", "info":{"authors":{"author":[{"@pid":"124/7898","text":"Mao H. Vang"},{"@pid":"23/3350","text":"Jesse Fox"}]},"title":"Race in Virtual Environments: Competitive Versus Cooperative Games with Black or White Avatars.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"4","pages":"235-240","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/VangF14","doi":"10.1089/CYBER.2013.0289","ee":"https://doi.org/10.1089/cyber.2013.0289","url":"https://dblp.org/rec/journals/cbsn/VangF14"}, "url":"URL#3710945" }, { "@score":"1", "@id":"3710946", "info":{"authors":{"author":[{"@pid":"143/8090","text":"Wim Veling"},{"@pid":"22/1365","text":"Willem-Paul Brinkman"},{"@pid":"143/7989","text":"Emily Dorrestijn"},{"@pid":"143/8112","text":"Mark Van Der Gaag"}]},"title":"Virtual Reality Experiments Linking Social Environment and Psychosis: A Pilot Study.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"3","pages":"191-195","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/VelingBDG14","doi":"10.1089/CYBER.2012.0497","ee":"https://doi.org/10.1089/cyber.2012.0497","url":"https://dblp.org/rec/journals/cbsn/VelingBDG14"}, "url":"URL#3710946" }, { "@score":"1", "@id":"3710947", "info":{"authors":{"author":[{"@pid":"133/6620","text":"Lotte Vermeulen"},{"@pid":"142/4513","text":"Elena Patricia Núñez Castellar"},{"@pid":"47/1035","text":"Jan Van Looy"}]},"title":"Challenging the Other: Exploring the Role of Opponent Gender in Digital Game Competition for Female Players.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"5","pages":"303-309","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/VermeulenCL14","doi":"10.1089/CYBER.2013.0331","ee":"https://doi.org/10.1089/cyber.2013.0331","url":"https://dblp.org/rec/journals/cbsn/VermeulenCL14"}, "url":"URL#3710947" }, { "@score":"1", "@id":"3710948", "info":{"authors":{"author":[{"@pid":"36/7316","text":"Santosh Vijaykumar"},{"@pid":"148/2954","text":"Ricardo J. Wray"},{"@pid":"148/2993","text":"Trent Buskirk"},{"@pid":"148/2844","text":"Himakshi Piplani"},{"@pid":"148/2931","text":"Joya Banerjee"},{"@pid":"148/2753","text":"Michael Furdyk"},{"@pid":"148/2961","text":"Reshma Pattni"}]},"title":"Youth, New Media, and HIV/AIDS: Determinants of Participation in an Online Health Social Movement.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"7","pages":"488-495","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/VijaykumarWBPBFP14","doi":"10.1089/CYBER.2013.0124","ee":"https://doi.org/10.1089/cyber.2013.0124","url":"https://dblp.org/rec/journals/cbsn/VijaykumarWBPBFP14"}, "url":"URL#3710948" }, { "@score":"1", "@id":"3710949", "info":{"authors":{"author":[{"@pid":"122/9355","text":"Emily K. Vraga"},{"@pid":"29/10689","text":"Leticia Bode"},{"@pid":"10/2958","text":"Chris Wells"},{"@pid":"50/6405-2","text":"Kevin Driscoll 0002"},{"@pid":"63/8834","text":"Kjerstin Thorson"}]},"title":"The Rules of Engagement: Comparing Two Social Protest Movements on YouTube.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"3","pages":"133-140","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/VragaBWDT14","doi":"10.1089/CYBER.2013.0117","ee":"https://doi.org/10.1089/cyber.2013.0117","url":"https://dblp.org/rec/journals/cbsn/VragaBWDT14"}, "url":"URL#3710949" }, { "@score":"1", "@id":"3710950", "info":{"authors":{"author":[{"@pid":"151/7020","text":"Birte Walther"},{"@pid":"151/7003","text":"Reiner Hanewinkel"},{"@pid":"151/6988","text":"Matthis Morgenstern"}]},"title":"Effects of a Brief School-Based Media Literacy Intervention on Digital Media Use in Adolescents: Cluster Randomized Controlled Trial.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"9","pages":"616-623","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/WaltherHM14","doi":"10.1089/CYBER.2014.0173","ee":"https://doi.org/10.1089/cyber.2014.0173","url":"https://dblp.org/rec/journals/cbsn/WaltherHM14"}, "url":"URL#3710950" }, { "@score":"1", "@id":"3710951", "info":{"authors":{"author":[{"@pid":"140/3188","text":"Lutz Wartberg"},{"@pid":"06/483","text":"Rudolf Kammerl"},{"@pid":"140/3070","text":"Moritz Rosenkranz"},{"@pid":"140/3509","text":"Lena Hirschhäuser"},{"@pid":"140/3320","text":"Sandra Hein"},{"@pid":"140/3423","text":"Christiane Schwinge"},{"@pid":"140/3415","text":"Kay-Uwe Petersen"},{"@pid":"140/3000","text":"Rainer Thomasius"}]},"title":"The Interdependence of Family Functioning and Problematic Internet Use in a Representative Quota Sample of Adolescents.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"1","pages":"14-18","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/WartbergKRDHDHDSDPT14","doi":"10.1089/CYBER.2012.0494","ee":"https://doi.org/10.1089/cyber.2012.0494","url":"https://dblp.org/rec/journals/cbsn/WartbergKRDHDHDSDPT14"}, "url":"URL#3710951" }, { "@score":"1", "@id":"3710952", "info":{"authors":{"author":[{"@pid":"140/3188","text":"Lutz Wartberg"},{"@pid":"140/3415","text":"Kay-Uwe Petersen"},{"@pid":"06/483","text":"Rudolf Kammerl"},{"@pid":"140/3070","text":"Moritz Rosenkranz"},{"@pid":"140/3000","text":"Rainer Thomasius"}]},"title":"Psychometric Validation of a German Version of the Compulsive Internet Use Scale.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"2","pages":"99-103","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/WartbergPKRT14","doi":"10.1089/CYBER.2012.0689","ee":"https://doi.org/10.1089/cyber.2012.0689","url":"https://dblp.org/rec/journals/cbsn/WartbergPKRT14"}, "url":"URL#3710952" }, { "@score":"1", "@id":"3710953", "info":{"authors":{"author":{"@pid":"83/7004","text":"Brenda K. Wiederhold"}},"title":"How Can More Women-Owned Technology Businesses Get Funding?","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"1","pages":"1-2","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Wiederhold14","doi":"10.1089/CYBER.2013.1537","ee":"https://doi.org/10.1089/cyber.2013.1537","url":"https://dblp.org/rec/journals/cbsn/Wiederhold14"}, "url":"URL#3710953" }, { "@score":"1", "@id":"3710954", "info":{"authors":{"author":{"@pid":"83/7004","text":"Brenda K. Wiederhold"}},"title":"The Role of Psychology in Enhancing Cybersecurity.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"3","pages":"131-132","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Wiederhold14a","doi":"10.1089/CYBER.2014.1502","ee":"https://doi.org/10.1089/cyber.2014.1502","url":"https://dblp.org/rec/journals/cbsn/Wiederhold14a"}, "url":"URL#3710954" }, { "@score":"1", "@id":"3710955", "info":{"authors":{"author":{"@pid":"83/7004","text":"Brenda K. Wiederhold"}},"title":"Cyberbullying and LGBTQ Youth: A Deadly Combination.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"9","pages":"569-570","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Wiederhold14b","doi":"10.1089/CYBER.2014.1521","ee":"https://doi.org/10.1089/cyber.2014.1521","url":"https://dblp.org/rec/journals/cbsn/Wiederhold14b"}, "url":"URL#3710955" }, { "@score":"1", "@id":"3710956", "info":{"authors":{"author":{"@pid":"83/7004","text":"Brenda K. Wiederhold"}},"title":"Social Networking: A Force for Good in Responsible Research.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"12","pages":"733-734","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Wiederhold14c","doi":"10.1089/CYBER.2014.1526","ee":"https://doi.org/10.1089/cyber.2014.1526","url":"https://dblp.org/rec/journals/cbsn/Wiederhold14c"}, "url":"URL#3710956" }, { "@score":"1", "@id":"3710957", "info":{"authors":{"author":[{"@pid":"83/7004","text":"Brenda K. Wiederhold"},{"@pid":"146/3573","text":"Kenneth Gao"},{"@pid":"20/5349","text":"Lingjun Kong"},{"@pid":"05/2849","text":"Mark D. Wiederhold"}]},"title":"Mobile Devices as Adjunctive Pain Management Tools.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"385-389","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/WiederholdGKW14","doi":"10.1089/CYBER.2014.0202","ee":"https://doi.org/10.1089/cyber.2014.0202","url":"https://dblp.org/rec/journals/cbsn/WiederholdGKW14"}, "url":"URL#3710957" }, { "@score":"1", "@id":"3710958", "info":{"authors":{"author":[{"@pid":"83/7004","text":"Brenda K. Wiederhold"},{"@pid":"146/3573","text":"Kenneth Gao"},{"@pid":"146/3465","text":"Camelia Sulea"},{"@pid":"05/2849","text":"Mark D. Wiederhold"}]},"title":"Virtual Reality as a Distraction Technique in Chronic Pain Patients.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"346-352","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/WiederholdGSW14","doi":"10.1089/CYBER.2014.0207","ee":"https://doi.org/10.1089/cyber.2014.0207","url":"https://dblp.org/rec/journals/cbsn/WiederholdGSW14"}, "url":"URL#3710958" }, { "@score":"1", "@id":"3710959", "info":{"authors":{"author":[{"@pid":"05/2849","text":"Mark D. Wiederhold"},{"@pid":"146/3573","text":"Kenneth Gao"},{"@pid":"83/7004","text":"Brenda K. Wiederhold"}]},"title":"Clinical Use of Virtual Reality Distraction System to Reduce Anxiety and Pain in Dental Procedures.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"359-365","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/WiederholdGW14","doi":"10.1089/CYBER.2014.0203","ee":"https://doi.org/10.1089/cyber.2014.0203","url":"https://dblp.org/rec/journals/cbsn/WiederholdGW14"}, "url":"URL#3710959" }, { "@score":"1", "@id":"3710960", "info":{"authors":{"author":[{"@pid":"83/7004","text":"Brenda K. Wiederhold"},{"@pid":"91/5273","text":"Giuseppe Riva 0001"},{"@pid":"05/2849","text":"Mark D. Wiederhold"}]},"title":"How Can Virtual Reality Interventions Help Reduce Prescription Opioid Drug Misuse?","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"331-332","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/WiederholdRW14","doi":"10.1089/CYBER.2014.1512","ee":"https://doi.org/10.1089/cyber.2014.1512","url":"https://dblp.org/rec/journals/cbsn/WiederholdRW14"}, "url":"URL#3710960" }, { "@score":"1", "@id":"3710961", "info":{"authors":{"author":[{"@pid":"83/7004","text":"Brenda K. Wiederhold"},{"@pid":"146/3398","text":"Ahmad Soomro"},{"@pid":"91/5273","text":"Giuseppe Riva 0001"},{"@pid":"05/2849","text":"Mark D. Wiederhold"}]},"title":"Future Directions: Advances and Implications of Virtual Environments Designed for Pain Management.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"6","pages":"414-422","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/WiederholdSRW14","doi":"10.1089/CYBER.2014.0197","ee":"https://doi.org/10.1089/cyber.2014.0197","url":"https://dblp.org/rec/journals/cbsn/WiederholdSRW14"}, "url":"URL#3710961" }, { "@score":"1", "@id":"3710962", "info":{"authors":{"author":{"@pid":"84/9916","text":"Michelle F. Wright"}},"title":"Predictors of Anonymous Cyber Aggression: The Role of Adolescents' Beliefs About Anonymity, Aggression, and the Permanency of Digital Content.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"7","pages":"431-438","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/Wright14","doi":"10.1089/CYBER.2013.0457","ee":"https://doi.org/10.1089/cyber.2013.0457","url":"https://dblp.org/rec/journals/cbsn/Wright14"}, "url":"URL#3710962" }, { "@score":"1", "@id":"3710963", "info":{"authors":{"author":[{"@pid":"80/1458","text":"Mike Z. Yao"},{"@pid":"85/93","text":"Jing He"},{"@pid":"142/3629","text":"Deborah M. Ko"},{"@pid":"142/3603","text":"Kaichung Pang"}]},"title":"The Influence of Personality, Parental Behaviors, and Self-Esteem on Internet Addiction: A Study of Chinese College Students.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"2","pages":"104-110","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/YaoHKP14","doi":"10.1089/CYBER.2012.0710","ee":"https://doi.org/10.1089/cyber.2012.0710","url":"https://dblp.org/rec/journals/cbsn/YaoHKP14"}, "url":"URL#3710963" }, { "@score":"1", "@id":"3710964", "info":{"authors":{"author":[{"@pid":"22/6900","text":"Sean D. Young"},{"@pid":"146/3382","text":"Abbas Shakiba"},{"@pid":"146/3478","text":"Justin Kwok"},{"@pid":"146/3440","text":"Mohammad Sadegh Montazeri"}]},"title":"The Influence of Social Networking Technologies on Female Religious Veil-Wearing Behavior in Iran.","venue":"Cyberpsychology Behav. Soc. Netw.","volume":"17","number":"5","pages":"317-321","year":"2014","type":"Journal Articles","access":"closed","key":"journals/cbsn/YoungSKM14","doi":"10.1089/CYBER.2013.0338","ee":"https://doi.org/10.1089/cyber.2013.0338","url":"https://dblp.org/rec/journals/cbsn/YoungSKM14"}, "url":"URL#3710964" } ] } } } )