{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T10:51:07Z","timestamp":1777546267405,"version":"3.51.4"},"reference-count":0,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T00:00:00Z","timestamp":1291161600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cyberpsychology, Behavior, and Social Networking"],"published-print":{"date-parts":[[2010,12,1]]},"DOI":"10.1089\/cyber.2010.1506","type":"journal-article","created":{"date-parts":[[2010,12,13]],"date-time":"2010-12-13T23:39:37Z","timestamp":1292283577000},"page":"715-718","source":"Crossref","is-referenced-by-count":0,"title":["CyberSightings"],"prefix":"10.1177","volume":"13","author":[{"given":"Andrea","family":"Gaggioli","sequence":"first","affiliation":[]}],"member":"179","published-online":{"date-parts":[[2010,12,13]]},"container-title":["Cyberpsychology, Behavior, and Social Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1089\/cyber.2010.1506","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1089\/cyber.2010.1506","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1089\/cyber.2010.1506","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T17:36:23Z","timestamp":1777397783000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1089\/cyber.2010.1506"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,1]]},"references-count":0,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2010,12,1]]}},"alternative-id":["10.1089\/cyber.2010.1506"],"URL":"https:\/\/doi.org\/10.1089\/cyber.2010.1506","relation":{},"ISSN":["2152-2715","2152-2723"],"issn-type":[{"value":"2152-2715","type":"print"},{"value":"2152-2723","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12,1]]}}}