{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T19:25:15Z","timestamp":1776799515398,"version":"3.51.2"},"reference-count":59,"publisher":"Walter de Gruyter GmbH","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9,8]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>To address the topic of children\u2019s online aggression, this article explores a subsample from the EU Kids Online dataset (2017\u20132019) of 1404 children, aged 9\u201316, who reported having engaged in aggressive acts online in the previous year. Through a cluster analysis, respondents were classified into three groups. Findings emphasize the risk factors for aggression and how they relate to age-specific developmental tasks. Boys predominate, but the gender gap is not as wide as in offline contexts. For almost half of the children, aggression goes hand in hand with victimization. All the clusters share high levels of emotional deprivation. A sense of lacking social support, from both adults and peers, becomes more relevant among those children with high and more problematic engagement in online aggression. Results confirm that online aggression must be considered within the complex and fluid offline\u2013online continuum cutting across the social contexts in which children grow.<\/jats:p>","DOI":"10.1515\/commun-2021-0050","type":"journal-article","created":{"date-parts":[[2021,8,11]],"date-time":"2021-08-11T11:24:43Z","timestamp":1628681083000},"page":"419-445","source":"Crossref","is-referenced-by-count":5,"title":["Exploring European children\u02bcs self-reported data on online aggression"],"prefix":"10.1515","volume":"46","author":[{"given":"Cristina","family":"Ponte","sequence":"first","affiliation":[{"name":"NOVA Communication Institute (ICNOVA) School of Social Sciences and Humanities of the Universidade NOVA de Lisboa (NOVA FCSH) Lisboa Portugal"}]},{"given":"Maria Jo\u00e3o Leote de","family":"Carvalho","sequence":"additional","affiliation":[{"name":"Interdisciplinary Centre of Social Sciences (CICS.NOVA) School of Social Sciences and Humanities of the Universidade NOVA de Lisboa (NOVA FCSH) Lisboa Portugal"}]},{"given":"Susana","family":"Batista","sequence":"additional","affiliation":[{"name":"Interdisciplinary Centre of Social Sciences (CICS.NOVA) School of Social Sciences and Humanities of the Universidade NOVA de Lisboa (NOVA FCSH) Lisboa Portugal"}]}],"member":"374","published-online":{"date-parts":[[2021,9,11]]},"reference":[{"key":"2021091321274394168_j_commun-2021-0050_ref_001","doi-asserted-by":"crossref","unstructured":"Agbaria, Q. (2020). Internet addiction and aggression: The mediating roles of self-control and positive affect. International Journal Mental Health Addiction. doi:10.1007\/s11469-019-00220-z","DOI":"10.1007\/s11469-019-00220-z"},{"key":"2021091321274394168_j_commun-2021-0050_ref_002","unstructured":"Aiken, M.\u00a0P., Davidson, J., & Amann, P. (2016). Youth pathways into cybercrime. London: Paladin Capital Group."},{"key":"2021091321274394168_j_commun-2021-0050_ref_003","doi-asserted-by":"crossref","unstructured":"Amichai-Hamburger, Y. (2013). The social net: Understanding our online behavior. Oxford Scholarship Online.","DOI":"10.1093\/acprof:oso\/9780199639540.001.0001"},{"key":"2021091321274394168_j_commun-2021-0050_ref_004","doi-asserted-by":"crossref","unstructured":"Anderson, C.\u00a0A., & Bushman, B.\u00a0J. (2002). Human aggression. Annual of Review Psychology, 53, 27\u201351.","DOI":"10.1146\/annurev.psych.53.100901.135231"},{"key":"2021091321274394168_j_commun-2021-0050_ref_005","doi-asserted-by":"crossref","unstructured":"Ang, R.\u00a0P. (2015). Adolescent cyberbullying: A review of characteristics, prevention and intervention strategies. Aggression & Violent Behavior, 25, 35\u201342. doi:10.1016\/j.avb.2015.07.011","DOI":"10.1016\/j.avb.2015.07.011"},{"key":"2021091321274394168_j_commun-2021-0050_ref_006","doi-asserted-by":"crossref","unstructured":"Bandura, A. (1973). Aggression: A social learning analysis. Prentice-Hall.","DOI":"10.2307\/1227918"},{"key":"2021091321274394168_j_commun-2021-0050_ref_007","doi-asserted-by":"crossref","unstructured":"Baraldi, C., & Cockburn, T. (Eds.) (2018). Theorising childhood: Citizenship, rights and participation. Basingstoke: Palgrave Macmillan.","DOI":"10.1007\/978-3-319-72673-1"},{"key":"2021091321274394168_j_commun-2021-0050_ref_008","doi-asserted-by":"crossref","unstructured":"Berg, M.\u00a0T., & Felson, R.\u00a0B. (2016). Why are offenders victimized so often? In C.\u00a0A. Cuevas & C.\u00a0M. Rennison (Eds.), The Wiley handbook on the psychology of violence (pp.\u00a049\u201365). West Sussex: John Wiley.","DOI":"10.1002\/9781118303092.ch3"},{"key":"2021091321274394168_j_commun-2021-0050_ref_009","unstructured":"Berkowitz, L. (1993). Aggression: Its causes, consequences and control. New York, NY: McGraw-Hill."},{"key":"2021091321274394168_j_commun-2021-0050_ref_010","doi-asserted-by":"crossref","unstructured":"Bossler, A.\u00a0M., & Holt, T.\u00a0J. (2010). The effect of self-control on victimization in the cyberworld. Journal of Criminal Justice, 38(3), 227\u2013236. doi:10.1016\/j.jcrimjus.2010.03.001","DOI":"10.1016\/j.jcrimjus.2010.03.001"},{"key":"2021091321274394168_j_commun-2021-0050_ref_011","unstructured":"boyd, d. (2014). It\u2019s complicated. The social lives of networked teens. New Haven: Yale University Press."},{"key":"2021091321274394168_j_commun-2021-0050_ref_012","unstructured":"Brewer, R., Cale, J., Goldsmith, A., & Holt, T. (2018). Young people, the internet, and emerging pathways into criminality: A study of Australian adolescents. International Journal of Cyber Criminology, 12(1), 115\u2013132. doi:10.5281\/zenodo.1467853"},{"key":"2021091321274394168_j_commun-2021-0050_ref_013","unstructured":"Couldry, N., & Hepp, A. (2017). The mediated construction of reality. Cambridge: Polity Press."},{"key":"2021091321274394168_j_commun-2021-0050_ref_014","doi-asserted-by":"crossref","unstructured":"Donner, C.\u00a0M., Jennings, W., & Banfield, J. (2015). The general nature of online and off-line offending among college students. Social Science Computer Review, 33(6), 663\u2013679. doi:10.1177\/0894439314555949","DOI":"10.1177\/0894439314555949"},{"key":"2021091321274394168_j_commun-2021-0050_ref_015","doi-asserted-by":"crossref","unstructured":"Dooley, J., Py\u017calski, J., & Cross, D. (2009). Cyberbullying versus face-to-face bullying. A theoretical and conceptual review. Journal of Psychology, 217, 182\u2013188. doi:0.1027\/0044-3409.217.4.182","DOI":"10.1027\/0044-3409.217.4.182"},{"key":"2021091321274394168_j_commun-2021-0050_ref_016","unstructured":"Eisner, M.\u00a0P., & Malti, T. (2015). Aggressive and violent behavior. In M.\u00a0E. Lamb (vol. ed.) & R.\u00a0M. Lerner (series ed.), Handbook of child psychology and developmental science, vol. 3: Social, emotional and personality development (7th ed.) (pp.\u00a0795\u2013884). New York: Wiley."},{"key":"2021091321274394168_j_commun-2021-0050_ref_017","doi-asserted-by":"crossref","unstructured":"Farrington, D. (2020). The importance of risk factors for bullying perpetration and victimization. Jornal de Pediatria (Vers\u00e3o em Portugu\u00eas), 96, 667\u2013669. doi:10.1016\/j.jpedp.2020.05.001","DOI":"10.1016\/j.jpedp.2020.05.001"},{"key":"2021091321274394168_j_commun-2021-0050_ref_018","doi-asserted-by":"crossref","unstructured":"Finkelhor, D. (2008). Childhood victimization. Oxford University Press.","DOI":"10.1093\/acprof:oso\/9780195342857.001.0001"},{"key":"2021091321274394168_j_commun-2021-0050_ref_019","unstructured":"Floridi, L. (2017). We are neither online nor offline, but onlife. Retrieved July, 8th, 2020 from https:\/\/www.chalmers.se\/en\/areas-of-advance\/ict\/news\/Pages\/Luciano-Floridi.aspx."},{"key":"2021091321274394168_j_commun-2021-0050_ref_020","doi-asserted-by":"crossref","unstructured":"Gaffney, H., Farrington, D., Espelage, D., & Ttofi, M. (2019). Are cyberbullying intervention and prevention programs effective? A systematic and meta-analytical review. Aggression and Violent Behavior, 45, 134\u2013153.","DOI":"10.1016\/j.avb.2018.07.002"},{"key":"2021091321274394168_j_commun-2021-0050_ref_021","doi-asserted-by":"crossref","unstructured":"Goldsmith, A., & Brewer, R. (2015). Digital drift and the criminal interaction order. Theoretical Criminology, 19(1), 112\u2013130.doi:10.1177\/1362480614538645","DOI":"10.1177\/1362480614538645"},{"key":"2021091321274394168_j_commun-2021-0050_ref_022","doi-asserted-by":"crossref","unstructured":"Goldsmith, A., & Wall, D. (2019). The seductions of cybercrime: Adolescence and the thrills of digital transgression. European Journal of Criminology, 1\u201320. doi:10.1177\/1477370819887305","DOI":"10.1177\/1477370819887305"},{"key":"2021091321274394168_j_commun-2021-0050_ref_023","doi-asserted-by":"crossref","unstructured":"Goldstein, S.\u00a0E. (2015). Parental regulation of online behavior and cyber aggression: Adolescents\u2019 experiences and perspectives. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 9(4), article 2. doi:10.5817\/CP2015-4-2","DOI":"10.5817\/CP2015-4-2"},{"key":"2021091321274394168_j_commun-2021-0050_ref_024","doi-asserted-by":"crossref","unstructured":"G\u00f6rzig, A., & \u00d3lafsson, K. (2013). What makes a bully a cyberbully? Unravelling the characteristics of cyberbullies across 25\u00a0European countries. Journal of Children and Media, 7(1), 9\u201327. doi:10.1080\/17482798.2012.739756","DOI":"10.1080\/17482798.2012.739756"},{"key":"2021091321274394168_j_commun-2021-0050_ref_025","unstructured":"Hartup, W.\u00a0W. (2005). The development of aggression: Where do we stand? In R.\u00a0E. Tremblay, W.\u00a0W. Hartup & J. Archer (Eds.), Developmental origins of aggression (pp.\u00a03\u201322). New York: Guilford Press."},{"key":"2021091321274394168_j_commun-2021-0050_ref_026","unstructured":"Havighurst, R.\u00a0J. (1972[1948]). Developmental tasks and education. New York: Longman."},{"key":"2021091321274394168_j_commun-2021-0050_ref_027","unstructured":"Heirman, W., & Walrave, M. (2008). Assessing Concerns and issues about the mediation of technology in cyberbullying. Cyberpsychology, 2, 1\u201312."},{"key":"2021091321274394168_j_commun-2021-0050_ref_028","doi-asserted-by":"crossref","unstructured":"Heymans, P.\u00a0G. (1994). Developmental tasks: A cultural analysis of human development. In J.\u00a0J. F. ter Laak, P.\u00a0G. Heymans & A.\u00a0I. Podolskij (Eds.), Development tasks: Towards a cultural analysis of human development (pp.\u00a03\u201333). Boston: Kluwer Academic Publishers.","DOI":"10.1007\/978-94-015-8108-0_1"},{"key":"2021091321274394168_j_commun-2021-0050_ref_029","doi-asserted-by":"crossref","unstructured":"Holt, T., Brewer, R., & Goldsmith, A. (2019). Digital drift and the \u201csense of injustice\u201d: Counter-productive policing of youth cybercrime. Deviant Behavior, 40(9), 1144\u20131156. doi:10.1080\/01639625.2018.1472927","DOI":"10.1080\/01639625.2018.1472927"},{"key":"2021091321274394168_j_commun-2021-0050_ref_030","doi-asserted-by":"crossref","unstructured":"Jennings, W., Piquero, A., & Reingle, J. (2012). On the overlap between victimization and offending: A review of the literature. Aggression and Violent Behavior, 17(1), 16\u201326. doi:10.1016\/j.avb.2011.09.003","DOI":"10.1016\/j.avb.2011.09.003"},{"key":"2021091321274394168_j_commun-2021-0050_ref_031","doi-asserted-by":"crossref","unstructured":"Kruttschnitt, C. (2013). Gender and crime. The Annual Review of Sociology, 39, 291\u2013308. doi:10.1146\/annurev-soc-071312-145605","DOI":"10.1146\/annurev-soc-071312-145605"},{"key":"2021091321274394168_j_commun-2021-0050_ref_032","unstructured":"Lauritsen, J., & Laub, J.\u00a0H. (2007). Understanding the link between victimization and offending: New reflections on an old idea. Crime Prevention Studies, 22, 5\u201375."},{"key":"2021091321274394168_j_commun-2021-0050_ref_033","doi-asserted-by":"crossref","unstructured":"Leukfeldt, R., & Holt, T. (Eds.) (2020). The human factor of cybercrime. London: Routledge.","DOI":"10.4324\/9780429460593"},{"key":"2021091321274394168_j_commun-2021-0050_ref_034","doi-asserted-by":"crossref","unstructured":"Leukfeldt, R.\u00a0E., Jansen, J., & Stol, W.\u00a0P. (2014). Child pornography, the internet and juvenile suspects, Journal of Social Welfare and Family Law, 36(1), 3\u201313. doi:10.1080\/09649069.2013.851178","DOI":"10.1080\/09649069.2013.851178"},{"key":"2021091321274394168_j_commun-2021-0050_ref_035","doi-asserted-by":"crossref","unstructured":"Little, T., Henrich, C., Jones, S., & Hawley, P. (2003). Disentangling the \u201cwhys\u201d from the \u201cwhats\u201d of aggressive behaviour? International Journal of Behavioral Development, 27, 122\u2013133. doi:10.1080\/01650250244000128","DOI":"10.1080\/01650250244000128"},{"key":"2021091321274394168_j_commun-2021-0050_ref_036","unstructured":"Livingstone, S., Haddon, L., G\u00f6rzig, A., & \u00d3lafsson, K. (2011). EU Kids Online: Final report 2011. EU Kids Online, Deliverable D8.3. London: EU Kids Online Network."},{"key":"2021091321274394168_j_commun-2021-0050_ref_037","doi-asserted-by":"crossref","unstructured":"Livingstone, S., \u00d3lafsson, K., Helsper, E.\u00a0J., Folkvord, F., Lupianez-Villanueva, F., & Veltri, G. (2017). Maximizing opportunities and minimizing risks for children online: The role of digital skills in emerging strategies of parental mediation. Journal of Communication, 67(1), 82\u2013105. doi:10.1111\/jcom.12277","DOI":"10.1111\/jcom.12277"},{"key":"2021091321274394168_j_commun-2021-0050_ref_038","doi-asserted-by":"crossref","unstructured":"Mart\u00ednez-Ferrer, B., Moreno, D., & Musitu, G. (2018). Are adolescents engaged in the problematic use of social networking sites more involved in peer aggression and victimization? Frontiers in Psychology, 9, 801. doi:10.3389\/fpsyg.2018.00801","DOI":"10.3389\/fpsyg.2018.00801"},{"key":"2021091321274394168_j_commun-2021-0050_ref_039","unstructured":"Matza, D. (1964). Delinquency and drift. New York: Wiley."},{"key":"2021091321274394168_j_commun-2021-0050_ref_040","doi-asserted-by":"crossref","unstructured":"Mesch, G., & Talmud, I. (2010). Wired youth. The social world of adolescence in the information age. London: Routledge.","DOI":"10.4324\/9780203855102"},{"key":"2021091321274394168_j_commun-2021-0050_ref_041","unstructured":"Noble, K.\u00a0G. (2017). Poverty and the adolescent brain. In N. Balvin & P. Banati (Eds.), The adolescent brain: A second window of opportunity\u00a0\u2013 A compendium (pp.\u00a049\u201353). Florence: UNICEF Office of Research\u00a0\u2013 Innocenti."},{"key":"2021091321274394168_j_commun-2021-0050_ref_042","unstructured":"Olweus, D., Limber, S., & Mihalic, S. (1999). Blueprints for violence prevention: Book nine\u00a0\u2013 Bullying Prevention Program. Bureau of Justice Assistance."},{"key":"2021091321274394168_j_commun-2021-0050_ref_043","doi-asserted-by":"crossref","unstructured":"Ousey, G.\u00a0C., Wilcox, P., & Fisher, B.\u00a0S. (2011). Something old, something new: Revisiting competing hypotheses of the victimization-offending relationship among adolescents. Journal of Quantitative Criminology, 27, 53\u201384. doi:10.1007\/s10940-010-9099-1","DOI":"10.1007\/s10940-010-9099-1"},{"key":"2021091321274394168_j_commun-2021-0050_ref_044","doi-asserted-by":"crossref","unstructured":"Piquero, A.\u00a0R., Carriaga, M.\u00a0L., Diamond, B., Kazemian, L., & Farrington, D. (2012). Stability in aggression revisited. Aggression and Violent Behavior, 17, 365\u2013372. doi:10.1016\/j.avb.2012.04.001","DOI":"10.1016\/j.avb.2012.04.001"},{"key":"2021091321274394168_j_commun-2021-0050_ref_045","doi-asserted-by":"crossref","unstructured":"Rieffe, C., Broekhof, E., Kouwenberg, M., Faber, J., Tsutsui, M., & G\u00fcro\u011flu, B. (2016). Disentangling proactive and reactive aggression in children using self-report. European Journal of Developmental Psychology, 13(4), 439\u2013451. doi:10.1080\/17405629.2015.1109506","DOI":"10.1080\/17405629.2015.1109506"},{"key":"2021091321274394168_j_commun-2021-0050_ref_046","doi-asserted-by":"crossref","unstructured":"Salvatore, C., & Markowitz, M. (2014). Do life course transitions and social bonds influence males and females differently? Gender contrasts and criminality. Deviant Behavior, 35(8), 628\u2013653. doi:10.1080\/01639625.2013.867727","DOI":"10.1080\/01639625.2013.867727"},{"key":"2021091321274394168_j_commun-2021-0050_ref_047","doi-asserted-by":"crossref","unstructured":"Seetharaman, P., & Bhatt, E. (2019). Online peer victimization. Journal of Information Technology Case and Application Research, 21(3\u20134), 115\u2013123. doi:10.1080\/15228053.2019.1667665","DOI":"10.1080\/15228053.2019.1667665"},{"key":"2021091321274394168_j_commun-2021-0050_ref_048","unstructured":"Smahel, D., Machackova, H., Mascheroni, G., Dedkova, L., Staksrud, E., \u00d3lafsson, K.,\u00a0\u2026, & Hasebrink, U. (2020). EU Kids Online 2020: Survey results from 19 countries. EU Kids Online. doi:10.21953\/lse.47fdeqj01ofo"},{"key":"2021091321274394168_j_commun-2021-0050_ref_049","unstructured":"Smahel, D., & Wright, M.\u00a0F. (2014). The meaning of online problematic situations for children: Results of qualitative cross-cultural investigation in nine European countries. London: EU Kids Online, London School of Economics and Political Science."},{"key":"2021091321274394168_j_commun-2021-0050_ref_050","doi-asserted-by":"crossref","unstructured":"Sorrentino, A., Baldry, C., Farrington, D., & Blaya, C. (2012). Epidemiology of Cyberbullying across Europe: Differences between countries and genders. Educational Sciences: Theory & Practice, 19(2), 74\u201391. doi:10.12738\/estp.2019.2.005","DOI":"10.12738\/estp.2019.2.005"},{"key":"2021091321274394168_j_commun-2021-0050_ref_051","doi-asserted-by":"crossref","unstructured":"Staksrud, E. (2009). Problematic conduct: Juvenile delinquency on the internet. In S. Livingstone & L. Haddon (Eds.), Kids online: Opportunities and risks for children (pp.\u00a0147\u2013157). Bristol: Policy Press.","DOI":"10.1332\/policypress\/9781847424396.003.0012"},{"key":"2021091321274394168_j_commun-2021-0050_ref_052","doi-asserted-by":"crossref","unstructured":"Steinberg, L. (2017). Adolescent brain science and juvenile justice policymaking. Psychology, Public Policy, and Law, 23(4), 410\u2013420. doi:10.1037\/law0000128","DOI":"10.1037\/law0000128"},{"key":"2021091321274394168_j_commun-2021-0050_ref_053","doi-asserted-by":"crossref","unstructured":"Subrahmanyam, K., & Smahel, D. (2011). Digital youth. The role of media in development. New York: Springer.","DOI":"10.1007\/978-1-4419-6278-2"},{"key":"2021091321274394168_j_commun-2021-0050_ref_054","doi-asserted-by":"crossref","unstructured":"Ttofi, M., & Farrington, D. (2012). Bullying prevention programs: The importance of peer intervention, disciplinary methods and age variations. Journal of Experimental Criminology, 8, 443\u2013462.","DOI":"10.1007\/s11292-012-9161-0"},{"key":"2021091321274394168_j_commun-2021-0050_ref_055","doi-asserted-by":"crossref","unstructured":"Valkenburg, P.\u00a0M., & Peter, J. (2011). Online communication among adolescents: An integrated model of its attraction, opportunities, and risks. Journal of Adolescent Health, 48, 121\u2013127. doi:10.1016\/j.jadohealth.2010.08.020","DOI":"10.1016\/j.jadohealth.2010.08.020"},{"key":"2021091321274394168_j_commun-2021-0050_ref_056","doi-asserted-by":"crossref","unstructured":"Valkenburg, P.\u00a0M., & Piotrowski, J. (2017). Plugged in: How media attract and affect youth. New Haven: Yale University Press.","DOI":"10.12987\/yale\/9780300218879.001.0001"},{"key":"2021091321274394168_j_commun-2021-0050_ref_057","doi-asserted-by":"crossref","unstructured":"Van Gelder, J.\u00a0L., Averdijk, M., Eisner, M., & Ribeaud, D. (2015). Unpacking the victim-offender overlap: On role differentiation and socio-psychological characteristics. Journal of Quantitative Criminology, 31(4), 653\u2013675. doi:10.1007\/s10940-014-9244-3","DOI":"10.1007\/s10940-014-9244-3"},{"key":"2021091321274394168_j_commun-2021-0050_ref_058","doi-asserted-by":"crossref","unstructured":"Ybarra M., boyd, d., Korchmaros J., & Oppenheim, J. (2012). Defining and measuring cyberbullying within the larger context of bullying victimization. Journal of Adolescent Health, 51(1), 53\u201358. doi:10.1016\/j.jadohealth.2011.12.031","DOI":"10.1016\/j.jadohealth.2011.12.031"},{"key":"2021091321274394168_j_commun-2021-0050_ref_059","doi-asserted-by":"crossref","unstructured":"Zych, I., Llorent, V., Ttofi, M., Farrington, D., Ribeaud, D., & Eisner, M. (2020). A longitudinal study on stability and transitions among bullying roles. Child Development, 91(2), 527\u2013545. doi:10.1111\/cdev.13195","DOI":"10.1111\/cdev.13195"}],"container-title":["Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/commun-2021-0050\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/commun-2021-0050\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T23:01:58Z","timestamp":1631574118000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/commun-2021-0050\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,1]]},"references-count":59,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2021,9,11]]},"published-print":{"date-parts":[[2021,9,8]]}},"alternative-id":["10.1515\/commun-2021-0050"],"URL":"https:\/\/doi.org\/10.1515\/commun-2021-0050","relation":{},"ISSN":["1613-4087","0341-2059"],"issn-type":[{"value":"1613-4087","type":"electronic"},{"value":"0341-2059","type":"print"}],"subject":[],"published":{"date-parts":[[2021,9,1]]}}}