{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T10:58:23Z","timestamp":1777546703953,"version":"3.51.4"},"reference-count":31,"publisher":"SAGE Publications","issue":"10","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.liebertpub.com\/nv\/resources-tools\/text-and-data-mining-policy\/121\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cyberpsychology, Behavior, and Social Networking"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1089\/cyber.2016.0134","type":"journal-article","created":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T16:25:21Z","timestamp":1476289521000},"page":"601-608","source":"Crossref","is-referenced-by-count":9,"title":["Associations Between Internet-Based Professional Social Networking and Emotional Distress"],"prefix":"10.1177","volume":"19","author":[{"given":"Jacquelynn R.","family":"Jones","sequence":"first","affiliation":[{"name":"Department of Behavioral and Community Health Sciences, University of Pittsburgh Graduate School of Public Health, Pittsburgh, Pennsylvania."},{"name":"Center for Research on Media, Technology, and Health, University of Pittsburgh, Pittsburgh, Pennsylvania."}]},{"given":"Jason B.","family":"Colditz","sequence":"additional","affiliation":[{"name":"Center for Research on Media, Technology, and Health, University of Pittsburgh, Pittsburgh, Pennsylvania."},{"name":"Division of General Internal Medicine, Department of Medicine, University of Pittsburgh School of Medicine, Pittsburgh, Pennsylvania."}]},{"given":"Ariel","family":"Shensa","sequence":"additional","affiliation":[{"name":"Center for Research on Media, Technology, and Health, University of Pittsburgh, Pittsburgh, Pennsylvania."},{"name":"Division of General Internal Medicine, Department of Medicine, University of Pittsburgh School of Medicine, Pittsburgh, Pennsylvania."}]},{"given":"Jaime E.","family":"Sidani","sequence":"additional","affiliation":[{"name":"Center for Research on Media, Technology, and Health, University of Pittsburgh, Pittsburgh, Pennsylvania."},{"name":"Division of General Internal Medicine, Department of Medicine, University of Pittsburgh School of Medicine, Pittsburgh, Pennsylvania."}]},{"given":"Liu Yi","family":"Lin","sequence":"additional","affiliation":[{"name":"Center for Research on Media, Technology, and Health, University of Pittsburgh, Pittsburgh, Pennsylvania."},{"name":"Division of General Internal Medicine, Department of Medicine, University of Pittsburgh School of Medicine, Pittsburgh, Pennsylvania."}]},{"given":"Martha Ann","family":"Terry","sequence":"additional","affiliation":[{"name":"Department of Behavioral and Community Health Sciences, University of Pittsburgh Graduate School of Public Health, Pittsburgh, Pennsylvania."}]},{"given":"Brian A.","family":"Primack","sequence":"additional","affiliation":[{"name":"Center for Research on Media, Technology, and Health, University of Pittsburgh, Pittsburgh, Pennsylvania."},{"name":"Division of General Internal Medicine, Department of Medicine, University of Pittsburgh School of Medicine, Pittsburgh, Pennsylvania."},{"name":"Division of Adolescent and Young Adult Medicine, Department of Pediatrics, University of Pittsburgh School of Medicine, Pittsburgh, Pennsylvania."}]}],"member":"179","reference":[{"key":"B9","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0070"},{"key":"B10","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.10.002"},{"key":"B11","doi-asserted-by":"publisher","DOI":"10.1177\/1461444808089415"},{"key":"B12","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.03.003"},{"key":"B13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.02.004"},{"key":"B14","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2011.0324"},{"key":"B15","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.11.083"},{"key":"B16","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.10.026"},{"key":"B17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2012.05.008"},{"key":"B18","doi-asserted-by":"publisher","DOI":"10.1521\/jscp.2014.33.8.701"},{"key":"B19","doi-asserted-by":"publisher","DOI":"10.2105\/AJPH.2013.301802"},{"key":"B22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclinepi.2010.04.011"},{"key":"B23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpsychires.2014.05.010"},{"key":"B24","doi-asserted-by":"publisher","DOI":"10.1007\/s11136-007-9204-6"},{"key":"B25","doi-asserted-by":"publisher","DOI":"10.1037\/a0035768"},{"key":"B26","doi-asserted-by":"publisher","DOI":"10.1177\/1073191111411667"},{"key":"B27","doi-asserted-by":"publisher","DOI":"10.1016\/j.janxdis.2013.11.006"},{"key":"B28","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0069841"},{"key":"B29","doi-asserted-by":"publisher","DOI":"10.1002\/da.22466"},{"key":"B30","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.10.053"},{"key":"B31","doi-asserted-by":"publisher","DOI":"10.1176\/appi.books.9780890425596"},{"key":"B32","doi-asserted-by":"publisher","DOI":"10.1515\/ijamh-2014-0068"},{"key":"B33","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2006.9.584"},{"key":"B34","doi-asserted-by":"publisher","DOI":"10.1007\/s10900-015-0128-8"},{"key":"B35","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00367.x"},{"key":"B36","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01474.x"},{"key":"B37","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2008.07.002"},{"key":"B38","doi-asserted-by":"publisher","DOI":"10.1089\/109493103321640329"},{"key":"B39","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2012.09.015"},{"key":"B40","doi-asserted-by":"publisher","DOI":"10.3109\/01612840.2012.718044"},{"key":"B41","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.55.5.469"}],"container-title":["Cyberpsychology, Behavior, and Social Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.liebertpub.com\/doi\/full-xml\/10.1089\/cyber.2016.0134","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.liebertpub.com\/doi\/pdf\/10.1089\/cyber.2016.0134","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T17:37:53Z","timestamp":1777397873000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.1089\/cyber.2016.0134"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":31,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["10.1089\/cyber.2016.0134"],"URL":"https:\/\/doi.org\/10.1089\/cyber.2016.0134","relation":{},"ISSN":["2152-2715","2152-2723"],"issn-type":[{"value":"2152-2715","type":"print"},{"value":"2152-2723","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10]]}}}