https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#Head
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM
http://www.nanopub.org/nschema#hasAssertion
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#assertion
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM
http://www.nanopub.org/nschema#hasProvenance
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#provenance
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM
http://www.nanopub.org/nschema#hasPublicationInfo
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#pubinfo
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.nanopub.org/nschema#Nanopublication
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#assertion
http://dx.doi.org/10.1089/cyber.2012.0265
http://prismstandard.org/namespaces/basic/2.1/doi
10.1089/cyber.2012.0265
http://dx.doi.org/10.1089/cyber.2012.0265
http://prismstandard.org/namespaces/basic/2.1/endingPage
182
http://dx.doi.org/10.1089/cyber.2012.0265
http://prismstandard.org/namespaces/basic/2.1/startingPage
175
http://dx.doi.org/10.1089/cyber.2012.0265
http://prismstandard.org/namespaces/basic/2.1/volume
16
http://dx.doi.org/10.1089/cyber.2012.0265
http://purl.org/dc/terms/creator
http://id.crossref.org/contributor/amy-hagerstrom-3p2axxi2rdebe
http://dx.doi.org/10.1089/cyber.2012.0265
http://purl.org/dc/terms/creator
http://id.crossref.org/contributor/anna-r-mcalister-3p2axxi2rdebe
http://dx.doi.org/10.1089/cyber.2012.0265
http://purl.org/dc/terms/creator
http://id.crossref.org/contributor/elizabeth-taylor-quilliam-3p2axxi2rdebe
http://dx.doi.org/10.1089/cyber.2012.0265
http://purl.org/dc/terms/creator
http://id.crossref.org/contributor/jef-i-richards-3p2axxi2rdebe
http://dx.doi.org/10.1089/cyber.2012.0265
http://purl.org/dc/terms/creator
http://id.crossref.org/contributor/nora-j-rifon-3p2axxi2rdebe
http://dx.doi.org/10.1089/cyber.2012.0265
http://purl.org/dc/terms/creator
http://id.crossref.org/contributor/saleem-alhabash-3p2axxi2rdebe
http://dx.doi.org/10.1089/cyber.2012.0265
http://purl.org/dc/terms/date
2013-03
http://dx.doi.org/10.1089/cyber.2012.0265
http://purl.org/dc/terms/identifier
10.1089/cyber.2012.0265
http://dx.doi.org/10.1089/cyber.2012.0265
http://purl.org/dc/terms/isPartOf
http://id.crossref.org/issn/2152-2715
http://dx.doi.org/10.1089/cyber.2012.0265
http://purl.org/dc/terms/publisher
Mary Ann Liebert Inc
http://dx.doi.org/10.1089/cyber.2012.0265
http://purl.org/dc/terms/title
Between Likes and Shares: Effects of Emotional Appeal and Virality on the Persuasiveness of Anticyberbullying Messages on Facebook
http://dx.doi.org/10.1089/cyber.2012.0265
http://purl.org/ontology/bibo/doi
10.1089/cyber.2012.0265
http://dx.doi.org/10.1089/cyber.2012.0265
http://purl.org/ontology/bibo/pageEnd
182
http://dx.doi.org/10.1089/cyber.2012.0265
http://purl.org/ontology/bibo/pageStart
175
http://dx.doi.org/10.1089/cyber.2012.0265
http://purl.org/ontology/bibo/volume
16
http://dx.doi.org/10.1089/cyber.2012.0265
http://www.w3.org/2002/07/owl#sameAs
doi:10.1089/cyber.2012.0265
http://dx.doi.org/10.1089/cyber.2012.0265
http://www.w3.org/2002/07/owl#sameAs
info:doi/10.1089/cyber.2012.0265
http://id.crossref.org/contributor/amy-hagerstrom-3p2axxi2rdebe
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://xmlns.com/foaf/0.1/Person
http://id.crossref.org/contributor/amy-hagerstrom-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/familyName
Hagerstrom
http://id.crossref.org/contributor/amy-hagerstrom-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/givenName
Amy
http://id.crossref.org/contributor/amy-hagerstrom-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/name
Amy Hagerstrom
http://id.crossref.org/contributor/anna-r-mcalister-3p2axxi2rdebe
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://xmlns.com/foaf/0.1/Person
http://id.crossref.org/contributor/anna-r-mcalister-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/familyName
McAlister
http://id.crossref.org/contributor/anna-r-mcalister-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/givenName
Anna R.
http://id.crossref.org/contributor/anna-r-mcalister-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/name
Anna R. McAlister
http://id.crossref.org/contributor/elizabeth-taylor-quilliam-3p2axxi2rdebe
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://xmlns.com/foaf/0.1/Person
http://id.crossref.org/contributor/elizabeth-taylor-quilliam-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/familyName
Quilliam
http://id.crossref.org/contributor/elizabeth-taylor-quilliam-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/givenName
Elizabeth Taylor
http://id.crossref.org/contributor/elizabeth-taylor-quilliam-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/name
Elizabeth Taylor Quilliam
http://id.crossref.org/contributor/jef-i-richards-3p2axxi2rdebe
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://xmlns.com/foaf/0.1/Person
http://id.crossref.org/contributor/jef-i-richards-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/familyName
Richards
http://id.crossref.org/contributor/jef-i-richards-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/givenName
Jef I.
http://id.crossref.org/contributor/jef-i-richards-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/name
Jef I. Richards
http://id.crossref.org/contributor/nora-j-rifon-3p2axxi2rdebe
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://xmlns.com/foaf/0.1/Person
http://id.crossref.org/contributor/nora-j-rifon-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/familyName
Rifon
http://id.crossref.org/contributor/nora-j-rifon-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/givenName
Nora J.
http://id.crossref.org/contributor/nora-j-rifon-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/name
Nora J. Rifon
http://id.crossref.org/contributor/saleem-alhabash-3p2axxi2rdebe
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://xmlns.com/foaf/0.1/Person
http://id.crossref.org/contributor/saleem-alhabash-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/familyName
Alhabash
http://id.crossref.org/contributor/saleem-alhabash-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/givenName
Saleem
http://id.crossref.org/contributor/saleem-alhabash-3p2axxi2rdebe
http://xmlns.com/foaf/0.1/name
Saleem Alhabash
http://id.crossref.org/issn/2152-2715
http://prismstandard.org/namespaces/basic/2.1/issn
2152-2715
http://id.crossref.org/issn/2152-2715
http://prismstandard.org/namespaces/basic/2.1/issn
2152-2723
http://id.crossref.org/issn/2152-2715
http://purl.org/dc/terms/title
Cyberpsychology, Behavior, and Social Networking
http://id.crossref.org/issn/2152-2715
http://purl.org/ontology/bibo/issn
2152-2715
http://id.crossref.org/issn/2152-2715
http://purl.org/ontology/bibo/issn
2152-2723
http://id.crossref.org/issn/2152-2715
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://purl.org/ontology/bibo/Journal
http://id.crossref.org/issn/2152-2715
http://www.w3.org/2002/07/owl#sameAs
urn:issn:2152-2715
http://id.crossref.org/issn/2152-2715
http://www.w3.org/2002/07/owl#sameAs
urn:issn:2152-2723
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#provenance
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#assertion
http://www.w3.org/ns/prov#wasDerivedFrom
https://doi.org/10.1089/cyber.2012.0265
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM#pubinfo
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM
http://purl.org/dc/terms/created
2021-09-20T12:48:17.385+02:00
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM
http://purl.org/dc/terms/creator
https://orcid.org/0000-0002-1267-0234
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM
http://purl.org/dc/terms/creator
https://orcid.org/0000-0002-2363-5880
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM
http://purl.org/dc/terms/creator
https://orcid.org/0000-0002-3429-2879
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM
http://purl.org/dc/terms/creator
https://orcid.org/0000-0003-1460-8757
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM
http://purl.org/dc/terms/creator
https://orcid.org/0000-0003-2929-3815
https://w3id.org/livingreviews/np/paper-bib/cyber.2012.0265/RAMIWEpo4WAE2ZAbo5H-GJsd-4BUPGdbWAhJPECSt-IzM
http://purl.org/dc/terms/license
https://creativecommons.org/share-your-work/public-domain/cc0/