{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T10:49:56Z","timestamp":1769597396478,"version":"3.49.0"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319151670","type":"print"},{"value":"9783319151687","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-15168-7_26","type":"book-chapter","created":{"date-parts":[[2015,2,27]],"date-time":"2015-02-27T13:30:58Z","timestamp":1425043858000},"page":"209-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Linguistic Analysis of Toxic Behavior in an Online Video Game"],"prefix":"10.1007","author":[{"given":"Haewoon","family":"Kwak","sequence":"first","affiliation":[]},{"given":"Jeremy","family":"Blackburn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,2,28]]},"reference":[{"issue":"1","key":"26_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1002\/casp.2137","volume":"23","author":"J Barli\u0144ska","year":"2013","unstructured":"Barli\u0144ska, J., Szuster, A., Winiewski, M.: Cyberbullying among adolescent bystanders: role of the communication medium, form of violence, and empathy. Journal of Community & Applied Social Psychology 23(1), 37\u201351 (2013)","journal-title":"Journal of Community & Applied Social Psychology"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Blackburn, J., Kwak, H.: STFU NOOB!: Predicting crowdsourced decisions on toxic behavior in online games. In: Proceedings of the 23rd International Conference on World Wide Web, WWW 2014, pp. 877\u2013888 (2014)","DOI":"10.1145\/2566486.2567987"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Chen, V.H.-H., Duh, H.B.-L., Ng, C.W. : Players who play to make others cry: The influence of anonymity and immersion. In: Proceedings of the International Conference on Advances in Computer Entertainment Technology, ACE 2009, pp. 341\u2013344 (2009)","DOI":"10.1145\/1690388.1690454"},{"issue":"6","key":"26_CR4","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1111\/j.1365-2575.2009.00330.x","volume":"19","author":"T Chesney","year":"2009","unstructured":"Chesney, T., Coyne, I., Logan, B., Madden, N.: Griefing in virtual worlds: causes, casualties and coping strategies. Information Systems Journal 19(6), 525\u2013548 (2009)","journal-title":"Information Systems Journal"},{"key":"26_CR5","unstructured":"Conmy, O.B.: Trash Talk in a Competitive Setting: Impact on Self-efficacy, Affect, and Performance. In: ProQuest (2008)"},{"key":"26_CR6","unstructured":"Lin, H., Sun, C.-T.: The \u201cwhite-eyed\u201d player culture: Grief play and construction of deviance in MMORPGs. In: Proceedings of DiGRA 2005 Conference (2005)"},{"issue":"3","key":"26_CR7","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1089\/1094931041291295","volume":"7","author":"J Suler","year":"2004","unstructured":"Suler, J.: The online disinhibition effect. Cyberpsychology & Behavior 7(3), 321\u2013326 (2004)","journal-title":"Cyberpsychology & Behavior"},{"key":"26_CR8","unstructured":"Thompson, P.: Whats fueling the flames in cyberspace? a social influence model. Communication and Cyberspace: Social Interaction in an Electronic Environment, 293\u2013311 (1996)"}],"container-title":["Lecture Notes in Computer Science","Social Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-15168-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T05:03:15Z","timestamp":1674190995000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-15168-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319151670","9783319151687"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-15168-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 February 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}