{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T22:21:55Z","timestamp":1774563715302,"version":"3.50.1"},"reference-count":101,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2016,3,3]]},"DOI":"10.1080\/0144929x.2015.1135191","type":"journal-article","created":{"date-parts":[[2016,2,15]],"date-time":"2016-02-15T19:46:04Z","timestamp":1455565564000},"page":"210-224","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":21,"title":["Cyber neutralisation and flaming"],"prefix":"10.1080","volume":"35","author":[{"given":"Jiyeon","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Hwansoo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Keesung","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hangjung","family":"Zo","sequence":"additional","affiliation":[]},{"given":"Andrew P.","family":"Ciganek","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,2,15]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1994.tb01165.x"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1177\/0093854886013001005"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-7206(99)00036-1"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"CIT0005","volume-title":"Understanding Attitudes and Predicting Social Behaviour","author":"Ajzen I.","year":"1980"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.2307\/2094592"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9236(02)00190-2"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1348\/014466601164939"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1007\/BF02723327"},{"issue":"2","key":"CIT0010","doi-asserted-by":"crossref","first-page":"16","DOI":"10.21913\/JSW.v1i2.172","volume":"1","author":"Beran T.","year":"2008","journal-title":"The Journal of Student Wellbeing"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-0992(199803\/04)28:2<257::AID-EJSP871>3.0.CO;2-1"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcrimjus.2010.03.001"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1037\/0278-6133.26.2.136"},{"issue":"7","key":"CIT0014","first-page":"1","volume":"34","author":"Chen V. H. H.","year":"2013","journal-title":"Behaviour & Information Technology"},{"key":"CIT0015","volume-title":"The Partial Least Squares Approach for Structural Equation Modeling","author":"Chin W. W.","year":"1998"},{"key":"CIT0018","volume-title":"Delinquency and Opportunity","author":"Cloward R. A.","year":"1960"},{"key":"CIT0019","volume-title":"Delinquent Boys: The Subculture of the Gang","author":"Cohen A. K.","year":"1955"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1080\/713840271"},{"key":"CIT0021","volume-title":"Delinquency and Drift","author":"David M.","year":"1964"},{"key":"CIT0022","volume-title":"Self-Determination","author":"Deci E. L.","year":"1985"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1177\/0894439304271541"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.681069"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.2307\/3151312"},{"key":"CIT0026","doi-asserted-by":"crossref","DOI":"10.1515\/9781503621794","volume-title":"A General Theory of Crime","author":"Gottfredson M. R.","year":"1990"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1177\/0022427893030001002"},{"key":"CIT0028","volume-title":"Multivariate Data Analysis","author":"Hair J. F.","year":"2009"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1007\/BF00172380"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1080\/01639620490497947"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.sj.8350002"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.1986.tb00104.x"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1080\/01639620701457816"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1177\/109442819800100106"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1016\/0378-7206(95)00031-0"},{"key":"CIT0036","volume-title":"Handbook of Internet Crime","author":"Jewkes Y.","year":"2010"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(1998)49:12<1135::AID-ASI8>3.0.CO;2-W"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.39.10.1123"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(92)90047-B"},{"key":"CIT0041","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511843846"},{"key":"CIT0042","volume-title":"The Professional Fence","author":"Klockars C. B.","year":"1974"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v16i10.3665"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2013.864709"},{"key":"CIT0045","first-page":"89","volume-title":"Contexts of computer-mediated communication","author":"Lea M.","year":"1992"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1016\/0020-7373(91)90045-9"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1111\/j.1533-8525.2005.00017.x"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2008.11.006"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2009.0443"},{"key":"CIT0050","volume-title":"Primary and Secondary Deviation","author":"Lemert E. M.","year":"1969"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1177\/089124168101000103"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2011.12.008"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.12.029"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1086\/655355"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1177\/089443939000800102"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.2307\/2090200"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(00)00045-7"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1177\/0022427898035003001"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.2307\/2084686"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1177\/002242788101800206"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.05.023"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1177\/0734016812456548"},{"key":"CIT0063","volume-title":"A new Environment for Communication Play: On-Line Play","author":"Myers D.","year":"1987"},{"issue":"3","key":"CIT0064","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1002\/asi.21278","volume":"61","author":"Nov O.","year":"2010","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1177\/1461444803005001908"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.ps.44.020193.001001"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(00)00012-1"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1177\/1541204006286288"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.2307\/3054128"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1080\/17405629.2011.643168"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1525\/sop.2003.46.2.149"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.1998.tb01244.x"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.88.5.879"},{"key":"CIT0075","doi-asserted-by":"publisher","DOI":"10.1177\/014920638501100106"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1177\/0143034311401700"},{"key":"CIT0077","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.123.3.238"},{"key":"CIT0078","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-9125.2000.tb00911.x"},{"key":"CIT0079","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2009.0025"},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.1086\/208780"},{"key":"CIT0081","doi-asserted-by":"publisher","DOI":"10.1006\/ceps.1999.1020"},{"key":"CIT0082","doi-asserted-by":"publisher","DOI":"10.1080\/016396290968326"},{"key":"CIT0083","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(86)90050-6"},{"key":"CIT0084","doi-asserted-by":"publisher","DOI":"10.2307\/2094253"},{"key":"CIT0085","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.06.004"},{"key":"CIT0086","doi-asserted-by":"publisher","DOI":"10.3200\/SOCP.148.3.311-334"},{"key":"CIT0087","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.32.11.1492"},{"key":"CIT0088","volume-title":"Principles of Criminology","author":"Sutherland E. H.","year":"1947","edition":"4"},{"key":"CIT0089","doi-asserted-by":"publisher","DOI":"10.2307\/2089195"},{"key":"CIT0090","doi-asserted-by":"publisher","DOI":"10.1287\/isre.6.2.144"},{"key":"CIT0092","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2004.03.005"},{"key":"CIT0093","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0483(98)00028-0"},{"key":"CIT0094","author":"Thompsen P. A.","year":"1996","journal-title":"In Communication and Cyberspace: Social Interaction in an Electronic Environment"},{"key":"CIT0095","doi-asserted-by":"publisher","DOI":"10.1016\/0747-5632(96)00004-0"},{"key":"CIT0096","doi-asserted-by":"publisher","DOI":"10.1080\/01639625.1984.9967646"},{"key":"CIT0097","doi-asserted-by":"publisher","DOI":"10.1111\/j.0011-1348.2005.00024.x"},{"key":"CIT0098","doi-asserted-by":"publisher","DOI":"10.1111\/j.1475-682X.2006.00167.x"},{"key":"CIT0099","volume-title":"Causes of Delinquency","author":"Travis H.","year":"1969"},{"key":"CIT0100","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00385.x"},{"issue":"3","key":"CIT0101","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"Venkatesh V.","year":"2003","journal-title":"MIS Quarterly"},{"key":"CIT0102","doi-asserted-by":"publisher","DOI":"10.1177\/009365096023001001"},{"key":"CIT0103","doi-asserted-by":"publisher","DOI":"10.1177\/009365094021004002"},{"key":"CIT0104","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-4560.1969.tb00619.x"},{"key":"CIT0105","doi-asserted-by":"publisher","DOI":"10.1080\/10683160500254953"},{"key":"CIT0106","first-page":"237","volume-title":"Nebraska Symposium on Motivation","author":"Zimbardo P. G.","year":"1969"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2015.1135191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T11:11:52Z","timestamp":1718363512000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2015.1135191"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2,15]]},"references-count":101,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,4,24]]},"published-print":{"date-parts":[[2016,3,3]]}},"alternative-id":["10.1080\/0144929X.2015.1135191"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2015.1135191","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,2,15]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}