<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1607-4041</journal-id>
<journal-title><![CDATA[Revista electrónica de investigación educativa]]></journal-title>
<abbrev-journal-title><![CDATA[REDIE]]></abbrev-journal-title>
<issn>1607-4041</issn>
<publisher>
<publisher-name><![CDATA[Universidad Autónoma de Baja California, Instituto de Investigación y Desarrollo Educativo]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1607-40412018000400036</article-id>
<article-id pub-id-type="doi">10.24320/redie.2018.20.4.1841</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Propiedades psicométricas de una escala para medir cibervictimización en universitarios]]></article-title>
<article-title xml:lang="en"><![CDATA[Psychometric Properties of a Scale Measuring Cyber-Victimization in University Students]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Valdés Cuervo]]></surname>
<given-names><![CDATA[Ángel Alberto]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Carlos Martínez]]></surname>
<given-names><![CDATA[Ernesto Alonso]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Torres Acuña]]></surname>
<given-names><![CDATA[Gisela Margarita]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Instituto Tecnológico de Sonora  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Instituto Tecnológico Superior de Cajeme  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2018</year>
</pub-date>
<volume>20</volume>
<numero>4</numero>
<fpage>36</fpage>
<lpage>48</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1607-40412018000400036&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1607-40412018000400036&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1607-40412018000400036&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Se analizaron las propiedades psicométricas de la escala para medir Cibervictimización en estudiantes de Educación Superior. Participaron 686 estudiantes, 380 hombres (M=19.92, DE=1.83 años) y 306 mujeres (M=18.5, DE=1.72 años) de seis instituciones de educación superior de un Estado del noroeste de México. Se encontró que el modelo bidimensional que mide denigración y usurpación de identidad presenta mejores índices de ajuste. El cuestionario mostró invariancia factorial para ambos sexos (configuracional y métrica parcial), evidencias de validez concurrente, ya que sus puntajes se relacionan con los de victimización tradicional, y adecuada fiabilidad. Se concluyó que la escala posee propiedades psicométricas que permiten su utilización en la medición de la cibervictimización en estudiantes de educación superior.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract This study analyzes the psychometric properties of a scale used to measure cyber-victimization in students of higher education. The research involved 686 students, of which 380 were male (M=19.92; SD=1.83 years) and 306 female (M=18.5; SD=1.72 years), from six higher education institutions in a state in northwestern Mexico. It was found that the bimensional model that measures denigration and identity theft showed better fit indices. The questionnaire showed factorial invariance for both sexes (configural and partial metric), evidence of concurrent validity - as its scores bear a relation to traditional victimization - and adequate reliability. The study concludes that the scale has psychometric properties that enable its use in measuring cyber-victimization in students of higher education.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Ciberacoso]]></kwd>
<kwd lng="es"><![CDATA[validez]]></kwd>
<kwd lng="es"><![CDATA[fiabilidad]]></kwd>
<kwd lng="es"><![CDATA[educación superior]]></kwd>
<kwd lng="en"><![CDATA[Cybervictimization]]></kwd>
<kwd lng="en"><![CDATA[validity]]></kwd>
<kwd lng="en"><![CDATA[reliability]]></kwd>
<kwd lng="en"><![CDATA[higher education]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Álvarez-García]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Barreiro]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Validation of the Cybervictimization Questionnaire (CYVIC) for adolescent]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2017</year>
<volume>70</volume>
<page-range>270-81</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baldry]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Farrington]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Sorrentino]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying in youth: a pattern of disruptive behavior]]></article-title>
<source><![CDATA[Psicología Educativa]]></source>
<year>2016</year>
<volume>22</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>19-26</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beran]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The relationships between cyberbullying and school bullying]]></article-title>
<source><![CDATA[Journal of Student Wellbeing]]></source>
<year>2007</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>15-33</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Berne]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Frisén]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Schultze-Krumbholz]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Scheithauer]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Naruskov]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Luik]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Katzer]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying assessment instruments: A systematic review]]></article-title>
<source><![CDATA[Aggression and Violent Behavior]]></source>
<year>2013</year>
<volume>18</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>320-34</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brown]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Confirmatory factor analysis for applied research]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[The Guilford Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Buelga]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Cava]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Musitu]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Validación de la escala de victimización entre adolescentes a través del teléfono móvil y de Internet]]></article-title>
<source><![CDATA[Revista Panamericana de Salud Pública]]></source>
<year>2012</year>
<volume>32</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>36-42</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cabero]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Marín]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Educational possibilities of social network and group work. University students&#8217; perceptions]]></article-title>
<source><![CDATA[Comunicar]]></source>
<year>2014</year>
<volume>21</volume>
<numero>42</numero>
<issue>42</issue>
<page-range>165-72</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Vellis]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Scale development. Theory and applications]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Escobar-Pérez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Cuervo-Martínez]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Validez de contenido y juicio de expertos: Una aproximación a su utilización]]></article-title>
<source><![CDATA[Avances en Medición]]></source>
<year>2008</year>
<volume>6</volume>
<page-range>27-36</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Festl]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Quandt]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The role of online communication in long-term cyberbullying involvement among girls and boys]]></article-title>
<source><![CDATA[Journal of Youth and Adolescence]]></source>
<year>2016</year>
<volume>45</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>1931-45</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Furr]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bacharach]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Psychometrics. An introduction]]></source>
<year>2014</year>
<edition>2</edition>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Borrajo]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Almendros]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risky online behaviors adolescents: Longitudinal relations among problematic Internet use, cyberbullying perpetration, and meeting strangers online]]></article-title>
<source><![CDATA[Journal of Behavioral Addictions]]></source>
<year>2016</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>100-7</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kline]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Principles and practice of structural equation modeling]]></source>
<year>2016</year>
<edition>4</edition>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[The Guilford Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Propiedades psicométricas de un instrumento de acoso cibernético en estudiantes universitarios mexicanos]]></article-title>
<source><![CDATA[Actualidades Investigativas en Educación]]></source>
<year>2016</year>
<volume>16</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-19</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Navarro-González]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Lorenzo-Seva]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Vigil-Colet]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How response bias affects the factorial structure of personality self-reports]]></article-title>
<source><![CDATA[Psicothema]]></source>
<year>2016</year>
<volume>29</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>465-70</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ortega-Ruíz]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Del Rey]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Casas]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evaluar el bullying y el cyberbullying validación española del EBPI-Q y ECIP-Q]]></article-title>
<source><![CDATA[Psicología Educativa]]></source>
<year>2016</year>
<volume>22</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>71-9</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Palladino]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Nocentini]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Menesini]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Psychometric properties of the Florence Cybervictimization Scales]]></article-title>
<source><![CDATA[Cyberpsychology Behaviors, and Social Networking]]></source>
<year>2015</year>
<volume>18</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>112-9</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Prieto]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Carrillo]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lucio]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Violencia virtual y acoso escolar entre estudiantes universitarios: el lado oscuro de las redes sociales]]></article-title>
<source><![CDATA[Innovación Educativa]]></source>
<year>2015</year>
<volume>15</volume>
<numero>68</numero>
<issue>68</issue>
<page-range>33-47</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Puc]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying: Una exploración descriptiva en estudiantes universitarios]]></article-title>
<source><![CDATA[Lenguas en contexto]]></source>
<year>2015</year>
<edition>especial</edition>
<page-range>38-46</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[&#350;ahin]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Aydin]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Sari]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber bullying, cyber victimization and psychological symptoms: a study in adolescents]]></article-title>
<source><![CDATA[Faculty of Education Journal]]></source>
<year>2012</year>
<volume>41</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>53-9</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Selkie]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Kota]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Chan]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Moreno]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying, depression, and problem alcohol use in female college students: a multisite study]]></article-title>
<source><![CDATA[Cyberpsychology, Behavior, and Social Networking]]></source>
<year>2015</year>
<volume>18</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>79-86</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Slonje]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying: Another main type of bullying?]]></article-title>
<source><![CDATA[Scandinavian Journal of Psychology]]></source>
<year>2008</year>
<volume>49</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>147-54</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Slovak]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Crabbs]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Stryffeler]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Perceptions and experiences of cyberbullying at a faith-based university]]></article-title>
<source><![CDATA[Social Work &amp; Christianity]]></source>
<year>2015</year>
<volume>42</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>149-64</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sumter]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Valkenburg]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Baumgartner]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Peter]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Van der Hof]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Development and validation of the Multidimensional Offline and Online Peer Victimization Scale]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2015</year>
<volume>46</volume>
<page-range>114-22</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Valdés]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Carlos]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Tanori]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wendlandt]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Differences in types and technological means by which mexican high schools students perform cyberbullying: it&#8217;s relationship with traditional bullying]]></article-title>
<source><![CDATA[Journal of Educational and Developmental Psychology]]></source>
<year>2014</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>105-13</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Willard]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberbullying and cyberthreats. Responding to the challenge of online social aggression, threats, and distress]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Champaign, IL ]]></publisher-loc>
<publisher-name><![CDATA[Research Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zumbo]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Gaderman]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Zeissen]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ordinal version of coefficients Alpha and Theta for Likert rating scales]]></article-title>
<source><![CDATA[Journal of Modern Applied Statistical Methods]]></source>
<year>2007</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>21-9</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
