{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T10:47:51Z","timestamp":1777546071945,"version":"3.51.4"},"reference-count":51,"publisher":"SAGE Publications","issue":"11","license":[{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.liebertpub.com\/nv\/resources-tools\/text-and-data-mining-policy\/121\/"},{"start":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T00:00:00Z","timestamp":1761955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Cyberpsychology, Behavior, and Social Networking"],"published-print":{"date-parts":[[2025,11,1]]},"DOI":"10.1177\/21522715251393008","type":"journal-article","created":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T10:47:42Z","timestamp":1762771662000},"page":"749-755","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["Does Comparing with Generative Artificial Intelligence Harm Self-Esteem? Testing a Model Linking Social Comparison Orientation to Rejection-Identification Process"],"prefix":"10.1177","volume":"28","author":[{"given":"Yangkun","family":"Huang","sequence":"first","affiliation":[{"name":"School of Journalism and Communication, Tsinghua University, Beijing, China."}]},{"given":"Yuan","family":"Gao","sequence":"additional","affiliation":[{"name":"School of Media and Communication, Shanghai Jiao Tong University, Shanghai, China."}]},{"given":"Xucheng","family":"Cao","sequence":"additional","affiliation":[{"name":"Department of Media and Communication, City University of Hong Kong, Hong Kong, China."}]}],"member":"179","reference":[{"key":"B1","doi-asserted-by":"publisher","DOI":"10.1109\/HRI61500.2025.10973842"},{"key":"B2","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2021.1969974"},{"key":"B3","doi-asserted-by":"publisher","DOI":"10.1017\/jdm.2023.37"},{"key":"B4","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2023.2247596"},{"key":"B5","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2017.00771"},{"key":"B6","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2019.101240"},{"key":"B7","doi-asserted-by":"publisher","DOI":"10.1007\/s12144-023-04989-0"},{"key":"B8","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.12.008"},{"key":"B9","doi-asserted-by":"publisher","DOI":"10.1007\/s12144-024-06347-0"},{"key":"B10","doi-asserted-by":"publisher","DOI":"10.4135\/9781446249215.n23"},{"key":"B11","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.07.049"},{"key":"B12","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2017.03.037"},{"key":"B13","doi-asserted-by":"publisher","DOI":"10.1037\/ppm0000047"},{"key":"B14","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2016.0247"},{"issue":"4","key":"B15","first-page":"697","volume":"25","author":"Reyes ME","year":"2023","journal-title":"North Am J Psychol"},{"key":"B16","doi-asserted-by":"publisher","DOI":"10.1177\/001872675400700202"},{"key":"B17","doi-asserted-by":"publisher","DOI":"10.1037\/\/0022-3514.76.1.129"},{"key":"B18","doi-asserted-by":"publisher","DOI":"10.1007\/s11205-012-0227-1"},{"key":"B19","doi-asserted-by":"publisher","DOI":"10.1007\/s10964-017-0801-6"},{"key":"B20","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2018.1545049"},{"key":"B21","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2024.123389"},{"key":"B22","volume-title":"The Media Equation: How People Treat Computers, Television, and New Media Like Real People and Places","author":"Reeves B","year":"1996"},{"key":"B23","doi-asserted-by":"publisher","DOI":"10.1177\/0146167284102005"},{"key":"B24","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.77.1.135"},{"key":"B25","doi-asserted-by":"publisher","DOI":"10.1111\/j.1464-0597.2008.00384.x"},{"key":"B26","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2024.101872"},{"key":"B27","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.2420050102"},{"key":"B28","first-page":"35","volume":"77","author":"Branscombe NR","year":"1999","journal-title":"Soc Identity Context Commit Content"},{"key":"B29","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2024.104093"},{"key":"B30","first-page":"477","volume":"57","author":"Kim J","year":"2024","journal-title":"Proc Annu Hawaii Int Conf Syst Sci"},{"key":"B31","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2022\/17961"},{"key":"B33","doi-asserted-by":"publisher","DOI":"10.1007\/s12144-021-01835-z"},{"key":"B34","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.79.3.398"},{"key":"B35","doi-asserted-by":"publisher","DOI":"10.1080\/15205436.2024.2390618"},{"key":"B36","doi-asserted-by":"publisher","DOI":"10.35152\/snusjb.2007.13.1.003"},{"key":"B37","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2023.107972"},{"key":"B38","doi-asserted-by":"publisher","DOI":"10.19742\/j.cnki.50-1164\/C.220504"},{"key":"B39","volume-title":"Multivariate data analysis","author":"Hair JF","year":"2009","edition":"7"},{"key":"B40","doi-asserted-by":"publisher","DOI":"10.1007\/s10490-023-09871-y"},{"key":"B41","doi-asserted-by":"publisher","DOI":"10.1207\/S15328007SEM0902_5"},{"key":"B42","doi-asserted-by":"publisher","DOI":"10.1080\/10705510701301834"},{"key":"B43","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2024.0407"},{"key":"B44","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2025.2508311"},{"key":"B45","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2021.101694"},{"key":"B46","doi-asserted-by":"publisher","DOI":"10.1080\/14792779343000040"},{"key":"B47","doi-asserted-by":"publisher","DOI":"10.1007\/s10212-012-0134-5"},{"key":"B48","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2023.2210688"},{"key":"B49","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.98.2.224"},{"key":"B50","doi-asserted-by":"publisher","DOI":"10.1007\/s00146-022-01393-3"},{"key":"B51","doi-asserted-by":"publisher","DOI":"10.3321\/j.issn:1000-6729.2006.05.008"},{"key":"B52","doi-asserted-by":"publisher","DOI":"10.4337\/9780857933409.00015"}],"container-title":["Cyberpsychology, Behavior, and Social Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/21522715251393008","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.liebertpub.com\/doi\/full-xml\/10.1177\/21522715251393008","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.liebertpub.com\/doi\/pdf\/10.1177\/21522715251393008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T17:35:44Z","timestamp":1777397744000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.1177\/21522715251393008"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,1]]},"references-count":51,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2025,11,1]]}},"alternative-id":["10.1177\/21522715251393008"],"URL":"https:\/\/doi.org\/10.1177\/21522715251393008","relation":{},"ISSN":["2152-2715","2152-2723"],"issn-type":[{"value":"2152-2715","type":"print"},{"value":"2152-2723","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,1]]}}}