https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#Head https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM http://www.nanopub.org/nschema#hasAssertion https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#assertion https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM http://www.nanopub.org/nschema#hasProvenance https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#provenance https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM http://www.nanopub.org/nschema#hasPublicationInfo https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#pubinfo https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://www.nanopub.org/nschema#Nanopublication https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#assertion http://dx.doi.org/10.1089/cyber.2012.0265 http://prismstandard.org/namespaces/basic/2.1/doi 10.1089/cyber.2012.0265 http://dx.doi.org/10.1089/cyber.2012.0265 http://prismstandard.org/namespaces/basic/2.1/endingPage 182 http://dx.doi.org/10.1089/cyber.2012.0265 http://prismstandard.org/namespaces/basic/2.1/startingPage 175 http://dx.doi.org/10.1089/cyber.2012.0265 http://prismstandard.org/namespaces/basic/2.1/volume 16 http://dx.doi.org/10.1089/cyber.2012.0265 http://purl.org/dc/terms/creator http://id.crossref.org/contributor/amy-hagerstrom-3p2axxi2rdebe http://dx.doi.org/10.1089/cyber.2012.0265 http://purl.org/dc/terms/creator http://id.crossref.org/contributor/anna-r-mcalister-3p2axxi2rdebe http://dx.doi.org/10.1089/cyber.2012.0265 http://purl.org/dc/terms/creator http://id.crossref.org/contributor/elizabeth-taylor-quilliam-3p2axxi2rdebe http://dx.doi.org/10.1089/cyber.2012.0265 http://purl.org/dc/terms/creator http://id.crossref.org/contributor/jef-i-richards-3p2axxi2rdebe http://dx.doi.org/10.1089/cyber.2012.0265 http://purl.org/dc/terms/creator http://id.crossref.org/contributor/nora-j-rifon-3p2axxi2rdebe http://dx.doi.org/10.1089/cyber.2012.0265 http://purl.org/dc/terms/creator http://id.crossref.org/contributor/saleem-alhabash-3p2axxi2rdebe http://dx.doi.org/10.1089/cyber.2012.0265 http://purl.org/dc/terms/date 2013-03 http://dx.doi.org/10.1089/cyber.2012.0265 http://purl.org/dc/terms/identifier 10.1089/cyber.2012.0265 http://dx.doi.org/10.1089/cyber.2012.0265 http://purl.org/dc/terms/isPartOf http://id.crossref.org/issn/2152-2715 http://dx.doi.org/10.1089/cyber.2012.0265 http://purl.org/dc/terms/publisher Mary Ann Liebert Inc http://dx.doi.org/10.1089/cyber.2012.0265 http://purl.org/dc/terms/title Between Likes and Shares: Effects of Emotional Appeal and Virality on the Persuasiveness of Anticyberbullying Messages on Facebook http://dx.doi.org/10.1089/cyber.2012.0265 http://purl.org/ontology/bibo/doi 10.1089/cyber.2012.0265 http://dx.doi.org/10.1089/cyber.2012.0265 http://purl.org/ontology/bibo/pageEnd 182 http://dx.doi.org/10.1089/cyber.2012.0265 http://purl.org/ontology/bibo/pageStart 175 http://dx.doi.org/10.1089/cyber.2012.0265 http://purl.org/ontology/bibo/volume 16 http://dx.doi.org/10.1089/cyber.2012.0265 http://www.w3.org/2002/07/owl#sameAs doi:10.1089/cyber.2012.0265 http://dx.doi.org/10.1089/cyber.2012.0265 http://www.w3.org/2002/07/owl#sameAs info:doi/10.1089/cyber.2012.0265 http://id.crossref.org/contributor/amy-hagerstrom-3p2axxi2rdebe http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://xmlns.com/foaf/0.1/Person http://id.crossref.org/contributor/amy-hagerstrom-3p2axxi2rdebe http://xmlns.com/foaf/0.1/familyName Hagerstrom http://id.crossref.org/contributor/amy-hagerstrom-3p2axxi2rdebe http://xmlns.com/foaf/0.1/givenName Amy http://id.crossref.org/contributor/amy-hagerstrom-3p2axxi2rdebe http://xmlns.com/foaf/0.1/name Amy Hagerstrom http://id.crossref.org/contributor/anna-r-mcalister-3p2axxi2rdebe http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://xmlns.com/foaf/0.1/Person http://id.crossref.org/contributor/anna-r-mcalister-3p2axxi2rdebe http://xmlns.com/foaf/0.1/familyName McAlister http://id.crossref.org/contributor/anna-r-mcalister-3p2axxi2rdebe http://xmlns.com/foaf/0.1/givenName Anna R. http://id.crossref.org/contributor/anna-r-mcalister-3p2axxi2rdebe http://xmlns.com/foaf/0.1/name Anna R. McAlister http://id.crossref.org/contributor/elizabeth-taylor-quilliam-3p2axxi2rdebe http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://xmlns.com/foaf/0.1/Person http://id.crossref.org/contributor/elizabeth-taylor-quilliam-3p2axxi2rdebe http://xmlns.com/foaf/0.1/familyName Quilliam http://id.crossref.org/contributor/elizabeth-taylor-quilliam-3p2axxi2rdebe http://xmlns.com/foaf/0.1/givenName Elizabeth Taylor http://id.crossref.org/contributor/elizabeth-taylor-quilliam-3p2axxi2rdebe http://xmlns.com/foaf/0.1/name Elizabeth Taylor Quilliam http://id.crossref.org/contributor/jef-i-richards-3p2axxi2rdebe http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://xmlns.com/foaf/0.1/Person http://id.crossref.org/contributor/jef-i-richards-3p2axxi2rdebe http://xmlns.com/foaf/0.1/familyName Richards http://id.crossref.org/contributor/jef-i-richards-3p2axxi2rdebe http://xmlns.com/foaf/0.1/givenName Jef I. http://id.crossref.org/contributor/jef-i-richards-3p2axxi2rdebe http://xmlns.com/foaf/0.1/name Jef I. Richards http://id.crossref.org/contributor/nora-j-rifon-3p2axxi2rdebe http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://xmlns.com/foaf/0.1/Person http://id.crossref.org/contributor/nora-j-rifon-3p2axxi2rdebe http://xmlns.com/foaf/0.1/familyName Rifon http://id.crossref.org/contributor/nora-j-rifon-3p2axxi2rdebe http://xmlns.com/foaf/0.1/givenName Nora J. http://id.crossref.org/contributor/nora-j-rifon-3p2axxi2rdebe http://xmlns.com/foaf/0.1/name Nora J. Rifon http://id.crossref.org/contributor/saleem-alhabash-3p2axxi2rdebe http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://xmlns.com/foaf/0.1/Person http://id.crossref.org/contributor/saleem-alhabash-3p2axxi2rdebe http://xmlns.com/foaf/0.1/familyName Alhabash http://id.crossref.org/contributor/saleem-alhabash-3p2axxi2rdebe http://xmlns.com/foaf/0.1/givenName Saleem http://id.crossref.org/contributor/saleem-alhabash-3p2axxi2rdebe http://xmlns.com/foaf/0.1/name Saleem Alhabash http://id.crossref.org/issn/2152-2715 http://prismstandard.org/namespaces/basic/2.1/issn 2152-2715 http://id.crossref.org/issn/2152-2715 http://prismstandard.org/namespaces/basic/2.1/issn 2152-2723 http://id.crossref.org/issn/2152-2715 http://purl.org/dc/terms/title Cyberpsychology, Behavior, and Social Networking http://id.crossref.org/issn/2152-2715 http://purl.org/ontology/bibo/issn 2152-2715 http://id.crossref.org/issn/2152-2715 http://purl.org/ontology/bibo/issn 2152-2723 http://id.crossref.org/issn/2152-2715 http://www.w3.org/1999/02/22-rdf-syntax-ns#type http://purl.org/ontology/bibo/Journal http://id.crossref.org/issn/2152-2715 http://www.w3.org/2002/07/owl#sameAs urn:issn:2152-2715 http://id.crossref.org/issn/2152-2715 http://www.w3.org/2002/07/owl#sameAs urn:issn:2152-2723 https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#provenance https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#assertion http://www.w3.org/ns/prov#wasDerivedFrom https://doi.org/10.1089/cyber.2012.0265 https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#pubinfo https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM http://purl.org/dc/terms/created 2021-09-20T12:48:17.385+02:00 https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM http://purl.org/dc/terms/creator https://orcid.org/0000-0002-1267-0234 https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM http://purl.org/dc/terms/creator https://orcid.org/0000-0002-2363-5880 https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM http://purl.org/dc/terms/creator https://orcid.org/0000-0002-3429-2879 https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM http://purl.org/dc/terms/creator https://orcid.org/0000-0003-1460-8757 https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM http://purl.org/dc/terms/creator https://orcid.org/0000-0003-2929-3815 https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM http://purl.org/dc/terms/license https://creativecommons.org/share-your-work/public-domain/cc0/