{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T21:04:55Z","timestamp":1724447095462},"reference-count":55,"publisher":"Mary Ann Liebert Inc","issue":"1","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.liebertpub.com\/nv\/resources-tools\/text-and-data-mining-policy\/121\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cyberpsychology, Behavior, and Social Networking"],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1089\/cyber.2016.0418","type":"journal-article","created":{"date-parts":[[2016,12,15]],"date-time":"2016-12-15T16:55:07Z","timestamp":1481820907000},"page":"10-16","source":"Crossref","is-referenced-by-count":23,"title":["When Virtual Muscularity Enhances Physical Endurance: Masculinity Threat and Compensatory Avatar Customization Among Young Male Adults"],"prefix":"10.1089","volume":"20","author":[{"given":"Roselyn J.","family":"Lee-Won","sequence":"first","affiliation":[{"name":"School of Communication, The Ohio State University, Columbus, Ohio."}]},{"given":"Wai Yen","family":"Tang","sequence":"additional","affiliation":[{"name":"Department of Communication Science (IfK), University of M\u00fcnster, M\u00fcnster, Germany."}]},{"given":"Mackenzie R.","family":"Kibbe","sequence":"additional","affiliation":[{"name":"School of Communication, The Ohio State University, Columbus, Ohio."}]}],"member":"278","reference":[{"key":"B1","doi-asserted-by":"publisher","DOI":"10.1037\/a0029826"},{"key":"B2","doi-asserted-by":"publisher","DOI":"10.1037\/a0012453"},{"key":"B3","doi-asserted-by":"publisher","DOI":"10.1027\/1864-9335\/a000239"},{"key":"B4","doi-asserted-by":"publisher","DOI":"10.2466\/pr0.1976.38.3.699"},{"key":"B5","doi-asserted-by":"publisher","DOI":"10.1037\/0022-006X.47.2.252"},{"key":"B6","doi-asserted-by":"publisher","DOI":"10.1086\/668417"},{"key":"B7","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.11.007"},{"key":"B8","doi-asserted-by":"publisher","DOI":"10.1080\/15213260902849943"},{"key":"B9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.08.015"},{"key":"B10","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.03.040"},{"key":"B11","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2958.2007.00299.x"},{"key":"B12","doi-asserted-by":"publisher","DOI":"10.1177\/0093650208330254"},{"key":"B13","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.09.038"},{"key":"B14","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12151"},{"key":"B15","doi-asserted-by":"publisher","DOI":"10.1002\/9781118426456.ch3"},{"key":"B16","first-page":"58","volume-title":"Mediated interpersonal communication","author":"Sundar SS","year":"2008"},{"key":"B17","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.60.5.656"},{"key":"B18","doi-asserted-by":"publisher","DOI":"10.1177\/0891243204265269"},{"key":"B19","doi-asserted-by":"publisher","DOI":"10.1037\/a0027087"},{"key":"B20","doi-asserted-by":"publisher","DOI":"10.1177\/0146167208331161"},{"key":"B21","doi-asserted-by":"publisher","DOI":"10.1016\/j.bodyim.2013.02.007"},{"key":"B22","doi-asserted-by":"publisher","DOI":"10.1037\/0278-6133.22.1.39"},{"key":"B23","doi-asserted-by":"publisher","DOI":"10.3149\/jmh.0402.187"},{"key":"B24","doi-asserted-by":"publisher","DOI":"10.1177\/0146167207303022"},{"key":"B25","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018714006829"},{"key":"B26","doi-asserted-by":"publisher","DOI":"10.1080\/00913367.1996.10673509"},{"key":"B27","doi-asserted-by":"publisher","DOI":"10.3149\/jmh.0701.72"},{"key":"B28","doi-asserted-by":"publisher","DOI":"10.1016\/j.bodyim.2005.11.001"},{"key":"B29","doi-asserted-by":"publisher","DOI":"10.3149\/jms.1701.57"},{"key":"B30","doi-asserted-by":"publisher","DOI":"10.1016\/j.bodyim.2010.10.002"},{"key":"B31","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0356"},{"key":"B32","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.02.021"},{"key":"B33","doi-asserted-by":"publisher","DOI":"10.4101\/jvwr.v1i2.352"},{"key":"B34","doi-asserted-by":"publisher","DOI":"10.1016\/j.bodyim.2013.11.005"},{"key":"B35","doi-asserted-by":"publisher","DOI":"10.1177\/0093650209346802"},{"key":"B36","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979054"},{"key":"B37","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.2011.01380.x"},{"key":"B38","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.05.018"},{"key":"B39","doi-asserted-by":"publisher","DOI":"10.1080\/15213269.2013.853618"},{"key":"B40","doi-asserted-by":"publisher","DOI":"10.1037\/1524-9220.4.1.3"},{"key":"B41","doi-asserted-by":"publisher","DOI":"10.1037\/a0038494"},{"key":"B42","doi-asserted-by":"publisher","DOI":"10.1037\/a0024839"},{"key":"B43","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.74.3.774"},{"key":"B44","doi-asserted-by":"publisher","DOI":"10.1007\/s11199-011-9948-x"},{"key":"B45","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2015.09.008"},{"key":"B46","doi-asserted-by":"publisher","DOI":"10.1037\/a0015481"},{"key":"B47","doi-asserted-by":"publisher","DOI":"10.1037\/a0023837"},{"key":"B48","doi-asserted-by":"publisher","DOI":"10.1007\/s11199-010-9760-z"},{"key":"B49","doi-asserted-by":"publisher","DOI":"10.2466\/pms.1993.76.3c.1155"},{"key":"B50","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2009.05.004"},{"key":"B51","doi-asserted-by":"publisher","DOI":"10.1111\/jsm.12199"},{"key":"B52","doi-asserted-by":"publisher","DOI":"10.1080\/15213269.2012.674917"},{"key":"B54","doi-asserted-by":"publisher","DOI":"10.1080\/00273171.2014.962683"},{"key":"B55","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr0101_6"},{"key":"B56","doi-asserted-by":"publisher","DOI":"10.1207\/S15327957PSPR0503_4"}],"container-title":["Cyberpsychology, Behavior, and Social Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.liebertpub.com\/doi\/full-xml\/10.1089\/cyber.2016.0418","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.liebertpub.com\/doi\/pdf\/10.1089\/cyber.2016.0418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,30]],"date-time":"2018-07-30T23:24:35Z","timestamp":1532993075000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.liebertpub.com\/doi\/10.1089\/cyber.2016.0418"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["10.1089\/cyber.2016.0418"],"URL":"http:\/\/dx.doi.org\/10.1089\/cyber.2016.0418","relation":{},"ISSN":["2152-2715","2152-2723"],"issn-type":[{"value":"2152-2715","type":"print"},{"value":"2152-2723","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1]]}}}