[ { "@graph" : [ { "@id" : "https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM", "@type" : [ "http://www.nanopub.org/nschema#Nanopublication" ], "http://www.nanopub.org/nschema#hasAssertion" : [ { "@id" : "https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#assertion" } ], "http://www.nanopub.org/nschema#hasProvenance" : [ { "@id" : "https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#provenance" } ], "http://www.nanopub.org/nschema#hasPublicationInfo" : [ { "@id" : "https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#pubinfo" } ] } ], "@id" : "https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#Head" }, { "@graph" : [ { "@id" : "http://dx.doi.org/10.1089/cyber.2012.0265", "http://prismstandard.org/namespaces/basic/2.1/doi" : [ { "@value" : "10.1089/cyber.2012.0265" } ], "http://prismstandard.org/namespaces/basic/2.1/endingPage" : [ { "@value" : "182" } ], "http://prismstandard.org/namespaces/basic/2.1/startingPage" : [ { "@value" : "175" } ], "http://prismstandard.org/namespaces/basic/2.1/volume" : [ { "@value" : "16" } ], "http://purl.org/dc/terms/creator" : [ { "@id" : "http://id.crossref.org/contributor/amy-hagerstrom-3p2axxi2rdebe" }, { "@id" : "http://id.crossref.org/contributor/anna-r-mcalister-3p2axxi2rdebe" }, { "@id" : "http://id.crossref.org/contributor/elizabeth-taylor-quilliam-3p2axxi2rdebe" }, { "@id" : "http://id.crossref.org/contributor/jef-i-richards-3p2axxi2rdebe" }, { "@id" : "http://id.crossref.org/contributor/nora-j-rifon-3p2axxi2rdebe" }, { "@id" : "http://id.crossref.org/contributor/saleem-alhabash-3p2axxi2rdebe" } ], "http://purl.org/dc/terms/date" : [ { "@type" : "http://www.w3.org/2001/XMLSchema#gYearMonth", "@value" : "2013-03" } ], "http://purl.org/dc/terms/identifier" : [ { "@value" : "10.1089/cyber.2012.0265" } ], "http://purl.org/dc/terms/isPartOf" : [ { "@id" : "http://id.crossref.org/issn/2152-2715" } ], "http://purl.org/dc/terms/publisher" : [ { "@value" : "Mary Ann Liebert Inc" } ], "http://purl.org/dc/terms/title" : [ { "@value" : "Between Likes and Shares: Effects of Emotional Appeal and Virality on the Persuasiveness of Anticyberbullying Messages on Facebook" } ], "http://purl.org/ontology/bibo/doi" : [ { "@value" : "10.1089/cyber.2012.0265" } ], "http://purl.org/ontology/bibo/pageEnd" : [ { "@value" : "182" } ], "http://purl.org/ontology/bibo/pageStart" : [ { "@value" : "175" } ], "http://purl.org/ontology/bibo/volume" : [ { "@value" : "16" } ], "http://www.w3.org/2002/07/owl#sameAs" : [ { "@id" : "doi:10.1089/cyber.2012.0265" }, { "@id" : "info:doi/10.1089/cyber.2012.0265" } ] }, { "@id" : "http://id.crossref.org/contributor/amy-hagerstrom-3p2axxi2rdebe", "@type" : [ "http://xmlns.com/foaf/0.1/Person" ], "http://xmlns.com/foaf/0.1/familyName" : [ { "@value" : "Hagerstrom" } ], "http://xmlns.com/foaf/0.1/givenName" : [ { "@value" : "Amy" } ], "http://xmlns.com/foaf/0.1/name" : [ { "@value" : "Amy Hagerstrom" } ] }, { "@id" : "http://id.crossref.org/contributor/anna-r-mcalister-3p2axxi2rdebe", "@type" : [ "http://xmlns.com/foaf/0.1/Person" ], "http://xmlns.com/foaf/0.1/familyName" : [ { "@value" : "McAlister" } ], "http://xmlns.com/foaf/0.1/givenName" : [ { "@value" : "Anna R." } ], "http://xmlns.com/foaf/0.1/name" : [ { "@value" : "Anna R. McAlister" } ] }, { "@id" : "http://id.crossref.org/contributor/elizabeth-taylor-quilliam-3p2axxi2rdebe", "@type" : [ "http://xmlns.com/foaf/0.1/Person" ], "http://xmlns.com/foaf/0.1/familyName" : [ { "@value" : "Quilliam" } ], "http://xmlns.com/foaf/0.1/givenName" : [ { "@value" : "Elizabeth Taylor" } ], "http://xmlns.com/foaf/0.1/name" : [ { "@value" : "Elizabeth Taylor Quilliam" } ] }, { "@id" : "http://id.crossref.org/contributor/jef-i-richards-3p2axxi2rdebe", "@type" : [ "http://xmlns.com/foaf/0.1/Person" ], "http://xmlns.com/foaf/0.1/familyName" : [ { "@value" : "Richards" } ], "http://xmlns.com/foaf/0.1/givenName" : [ { "@value" : "Jef I." } ], "http://xmlns.com/foaf/0.1/name" : [ { "@value" : "Jef I. Richards" } ] }, { "@id" : "http://id.crossref.org/contributor/nora-j-rifon-3p2axxi2rdebe", "@type" : [ "http://xmlns.com/foaf/0.1/Person" ], "http://xmlns.com/foaf/0.1/familyName" : [ { "@value" : "Rifon" } ], "http://xmlns.com/foaf/0.1/givenName" : [ { "@value" : "Nora J." } ], "http://xmlns.com/foaf/0.1/name" : [ { "@value" : "Nora J. Rifon" } ] }, { "@id" : "http://id.crossref.org/contributor/saleem-alhabash-3p2axxi2rdebe", "@type" : [ "http://xmlns.com/foaf/0.1/Person" ], "http://xmlns.com/foaf/0.1/familyName" : [ { "@value" : "Alhabash" } ], "http://xmlns.com/foaf/0.1/givenName" : [ { "@value" : "Saleem" } ], "http://xmlns.com/foaf/0.1/name" : [ { "@value" : "Saleem Alhabash" } ] }, { "@id" : "http://id.crossref.org/issn/2152-2715", "@type" : [ "http://purl.org/ontology/bibo/Journal" ], "http://prismstandard.org/namespaces/basic/2.1/issn" : [ { "@value" : "2152-2715" }, { "@value" : "2152-2723" } ], "http://purl.org/dc/terms/title" : [ { "@value" : "Cyberpsychology, Behavior, and Social Networking" } ], "http://purl.org/ontology/bibo/issn" : [ { "@value" : "2152-2715" }, { "@value" : "2152-2723" } ], "http://www.w3.org/2002/07/owl#sameAs" : [ { "@value" : "urn:issn:2152-2715" }, { "@value" : "urn:issn:2152-2723" } ] } ], "@id" : "https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#assertion" }, { "@graph" : [ { "@id" : "https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#assertion", "http://www.w3.org/ns/prov#wasDerivedFrom" : [ { "@id" : "https://doi.org/10.1089/cyber.2012.0265" } ] } ], "@id" : "https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#provenance" }, { "@graph" : [ { "@id" : "https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM", "http://purl.org/dc/terms/created" : [ { "@type" : "http://www.w3.org/2001/XMLSchema#dateTime", "@value" : "2021-09-20T12:48:17.385+02:00" } ], "http://purl.org/dc/terms/creator" : [ { "@id" : "https://orcid.org/0000-0002-1267-0234" }, { "@id" : "https://orcid.org/0000-0002-2363-5880" }, { "@id" : "https://orcid.org/0000-0002-3429-2879" }, { "@id" : "https://orcid.org/0000-0003-1460-8757" }, { "@id" : "https://orcid.org/0000-0003-2929-3815" } ], "http://purl.org/dc/terms/license" : [ { "@id" : "https://creativecommons.org/share-your-work/public-domain/cc0/" } ] } ], "@id" : "https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#pubinfo" } ]