Computers in Human Behavior, Volume 130 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 130, May 2022
Regular Articles

Beatrice Hayes
, Alana I. James, Ravinder Barn, Dawn Watling
:
Children's risk and benefit behaviours on social networking sites. 107147

Qian Fu, Inma Rodríguez-Ardura
, Antoni Meseguer-Artola
, Peng Wu
:
Self-disclosure during the COVID-19 emergency: Effects of narcissism traits, time perspective, virtual presence, and hedonic gratification. 107154

Atsushi Nakagomi
, Koichiro Shiba, Ichiro Kawachi, Kazushige Ide, Yuiko Nagamine, Naoki Kondo
, Masamichi Hanazato
, Katsunori Kondo:
Internet use and subsequent health and well-being in older adults: An outcome-wide analysis. 107156

Christopher J. Hand
, Graham G. Scott
:
Beautiful victims: How the halo of attractiveness impacts judgments of celebrity and lay victims of online abuse. 107157

Kaat Iterbeke
, Wouter Schelfhout, Kristof De Witte
:
The role of students' interests during computer-assisted learning: A field experiment. 107168

Maren Oberländer
, Tanja Bipp
:
Do digital competencies and social support boost work engagement during the COVID-19 pandemic? 107172

Xin Wang, Fan Chao
, Guang Yu, Kaihang Zhang:
Factors influencing fake news rebuttal acceptance during the COVID-19 pandemic and the moderating effect of cognitive ability. 107174

Kevin Koban
, Ariadne Neureiter
, Anja Stevic, Jörg Matthes
:
The COVID-19 infodemic at your fingertips. Reciprocal relationships between COVID-19 information FOMO, bedtime smartphone news engagement, and daytime tiredness over time. 107175

Andreawan Honora
, Kai-Yu Wang, Wen-Hai Chih:
How does information overload about COVID-19 vaccines influence individuals' vaccination intentions? The roles of cyberchondria, perceived risk, and vaccine skepticism. 107176

Ling Zhao, Cuicui Cao, Yuni Li, Yuan Li:
Determinants of the digital outcome divide in E-learning between rural and urban students: Empirical evidence from the COVID-19 pandemic based on capital theory. 107177

Jiaxin Zhang
, Yan Luximon
, Qingchuan Li:
Seeking medical advice in mobile applications: How social cue design and privacy concerns influence trust and behavioral intention in impersonal patient-physician interactions. 107178
Article from the Special Issue on Human-Automation Interaction in the Workplace: Beyond automation-as-tool Edited by Jenny S. Wesche, Markus Langer, Andreas Sonderegger & Richard N.Landers
Regular Articles

Karissa Leduc, Pooja Megha Nagar, Oksana Caivano, Victoria Talwar:
"The thing is, it follows you everywhere": Child and adolescent conceptions of cyberbullying. 107180

Vasileia Karasavva, Jessie Swanek
, Audrey Smodis, Adelle E. Forth:
Expectations VS reality: Expected and actual affective reactions to unsolicited sexual images. 107181

Luye Bao
, Nicole M. Krause
, Mikhaila N. Calice
, Dietram A. Scheufele
, Christopher D. Wirz
, Dominique Brossard, Todd P. Newman, Michael A. Xenos:
Whose AI? How different publics think about AI and its social impacts. 107182

Anne Schmitz
, Ana M. Díaz-Martín, M. Jesús Yagüe Guillén:
Modifying UTAUT2 for a cross-country comparison of telemedicine adoption. 107183

Rujing Zha
, Ran Tao, Qingmei Kong, Huan Li, Ying Liu, Ruiqi Huang, Zhengde Wei, Wei Hong, Ying Wang, Daren Zhang, Andreas J. Fallgatter, Yihong Yang, Xiaochu Zhang
, Peipeng Liang, Hengyi Rao:
Impulse control differentiates Internet gaming disorder from non-disordered but heavy Internet gaming use: Evidence from multiple behavioral and multimodal neuroimaging data. 107184

Xue-Chen Zhang, Xiao-Wei Chu
, Cui-Ying Fan, Frank Andrasik
, Hui-Fen Shi, Xiangen Hu
:
Sensation seeking and cyberbullying among Chinese adolescents: Examining the mediating roles of boredom experience and antisocial media exposure. 107185
Article from the Special Issue on Situating the Human in Cybercrime Edited by Thomas Holt & Benoit Dupont

Marleen Weulen Kranenbarg
:
When do they offend together? Comparing co-offending between different types of cyber-offenses and traditional offenses. 107186
Regular Articles
Review Articles

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






