<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0188-2503</journal-id>
<journal-title><![CDATA[Revista mexicana de sociología]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. Mex. Sociol]]></abbrev-journal-title>
<issn>0188-2503</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Instituto de Investigaciones Sociales]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0188-25032021000200331</article-id>
<article-id pub-id-type="doi">10.22201/iis.01882503p.2021.2.60087</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Una tipología del ciberacoso en jóvenes]]></article-title>
<article-title xml:lang="en"><![CDATA[A typology of cyberbullying in youths]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Marín-Cortés]]></surname>
<given-names><![CDATA[Andrés]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Linne]]></surname>
<given-names><![CDATA[Joaquín]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de San Buenaventura  ]]></institution>
<addr-line><![CDATA[Medellín ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad de Buenos Aires  ]]></institution>
<addr-line><![CDATA[Buenos Aires ]]></addr-line>
<country>Argentina</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2021</year>
</pub-date>
<volume>83</volume>
<numero>2</numero>
<fpage>331</fpage>
<lpage>356</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S0188-25032021000200331&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S0188-25032021000200331&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S0188-25032021000200331&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: Este artículo tiene como objetivo describir y analizar los tipos de ciberacoso en jóvenes adultos. Para esto, se llevó a cabo una investigación cualitativa en la que se realizaron entrevistas abiertas y no estructuradas a 25 jóvenes adultos de Medellín, Colombia. Entre los resultados, se presenta una clasificación según seis tipos de ciberacoso: sonsacamiento de datos, difamación online, suplantación de identidad digital, ciberhostigamiento, sextorsión y pornovenganza. A la vez, se indaga sobre las motivaciones de los agresores y los efectos del ciberacoso en las víctimas.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: This article aims to describe and analyze the types of cyberbullying in young adults. For this, a qualitative research was carried out in which open and unstructured interviews were conducted with 25 young adults from Medellín, Colombia. One of the results is a classification of cyberbullying into six types: information theft, online defamation, digital impersonation, cyber harassment, sextortion and revenge porn. At the same time, the article explores the motivations of aggressors and the effects of cyberbullying on victims.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[ciberacoso]]></kwd>
<kwd lng="es"><![CDATA[tecnologías digitales]]></kwd>
<kwd lng="es"><![CDATA[jóvenes ciberagresores]]></kwd>
<kwd lng="es"><![CDATA[cibervíctimas]]></kwd>
<kwd lng="en"><![CDATA[cyberbullying]]></kwd>
<kwd lng="en"><![CDATA[digital technologies]]></kwd>
<kwd lng="en"><![CDATA[young cyber aggressors]]></kwd>
<kwd lng="en"><![CDATA[cyber victims]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Acquadro]]></surname>
<given-names><![CDATA[Daniela]]></given-names>
</name>
<name>
<surname><![CDATA[Begotti]]></surname>
<given-names><![CDATA[Tatiana]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Prevalence of cyberstalking and previous offline victimization in a sample of Italian university students]]></article-title>
<source><![CDATA[Social Sciences]]></source>
<year>2019</year>
<volume>8</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<collab>American Psychological Association</collab>
<source><![CDATA[Principios éticos de los psicólogos y código de conducta]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de Buenos Aires]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Area Moreira]]></surname>
<given-names><![CDATA[Manuel]]></given-names>
</name>
<name>
<surname><![CDATA[Borrás]]></surname>
<given-names><![CDATA[José]]></given-names>
</name>
<name>
<surname><![CDATA[San Nicolás]]></surname>
<given-names><![CDATA[Belén]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Educar a la generación de los millennials como ciudadanos cultos del ciberespacio. Apuntes para la alfabetización digital]]></article-title>
<source><![CDATA[Revista de Estudios de Juventud]]></source>
<year>2015</year>
<volume>109</volume>
<page-range>13-32</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bates]]></surname>
<given-names><![CDATA[Samantha]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Revenge porn and mental health: A qualitative analysis of the mental health effects of revenge porn on female survivors]]></article-title>
<source><![CDATA[Feminist Criminology]]></source>
<year>2017</year>
<volume>12</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>22-42</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bauman]]></surname>
<given-names><![CDATA[Sheri]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberbullying: What Counselors Need to Know]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Virginia ]]></publisher-loc>
<publisher-name><![CDATA[American Counseling Association]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Begotti]]></surname>
<given-names><![CDATA[Tatiana]]></given-names>
</name>
<name>
<surname><![CDATA[Maran]]></surname>
<given-names><![CDATA[Daniela]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Characteristics of cyberstalking behaviour, consequences, and coping strategies: A cross-sectional study in a sample of Italian university students]]></article-title>
<source><![CDATA[Future Internet]]></source>
<year>2019</year>
<volume>18</volume>
<numero>120</numero>
<issue>120</issue>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Calderón]]></surname>
<given-names><![CDATA[Daniela]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Technological capital and digital divide among young people: An intersectional approach]]></article-title>
<source><![CDATA[Journal of Youth Studies]]></source>
<year>2019</year>
<volume>22</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>941-58</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Castells]]></surname>
<given-names><![CDATA[Manuel]]></given-names>
</name>
</person-group>
<source><![CDATA[La sociedad red: una visión global]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[Alianza Editorial]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chan]]></surname>
<given-names><![CDATA[Stephanie]]></given-names>
</name>
<name>
<surname><![CDATA[Khader]]></surname>
<given-names><![CDATA[Majeed]]></given-names>
</name>
<name>
<surname><![CDATA[Ang]]></surname>
<given-names><![CDATA[Jansen]]></given-names>
</name>
<name>
<surname><![CDATA[Tan]]></surname>
<given-names><![CDATA[Eunice]]></given-names>
</name>
<name>
<surname><![CDATA[Khoo]]></surname>
<given-names><![CDATA[Katharine]]></given-names>
</name>
<name>
<surname><![CDATA[Chin]]></surname>
<given-names><![CDATA[Jeffery]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding &#8216;happy slapping]]></article-title>
<source><![CDATA[International Journal of Police Science &amp; Management]]></source>
<year>2012</year>
<volume>14</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>42-57</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Charmaraman]]></surname>
<given-names><![CDATA[Linda]]></given-names>
</name>
<name>
<surname><![CDATA[Chan]]></surname>
<given-names><![CDATA[Huiying]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Stephen]]></given-names>
</name>
<name>
<surname><![CDATA[Richer]]></surname>
<given-names><![CDATA[Amanda]]></given-names>
</name>
<name>
<surname><![CDATA[Ramanudom]]></surname>
<given-names><![CDATA[Budnampet]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Asian American social media use: From cyber dependence and cyber harassment to saving face]]></article-title>
<source><![CDATA[Asian American Journal of Psychology]]></source>
<year>2018</year>
<volume>9</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>72-86</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cole]]></surname>
<given-names><![CDATA[Tessa]]></given-names>
</name>
<name>
<surname><![CDATA[Policastro]]></surname>
<given-names><![CDATA[Christina]]></given-names>
</name>
<name>
<surname><![CDATA[Crittenden]]></surname>
<given-names><![CDATA[Courtney]]></given-names>
</name>
<name>
<surname><![CDATA[McGuffee]]></surname>
<given-names><![CDATA[Karen]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Freedom to post or invasion of privacy?]]></article-title>
<source><![CDATA[Analysis of U.S. Revenge Porn State Statutes, Victims &amp; Offenders]]></source>
<year>2020</year>
<volume>15</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>483-98</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[DeKeseredy]]></surname>
<given-names><![CDATA[Walter]]></given-names>
</name>
<name>
<surname><![CDATA[Schwartz]]></surname>
<given-names><![CDATA[Martin]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Thinking sociologically about image-based sexual abuse: The contribution of male peer support theory]]></article-title>
<source><![CDATA[Sexualization, Media &amp; Society]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Delgado]]></surname>
<given-names><![CDATA[Beatriz]]></given-names>
</name>
<name>
<surname><![CDATA[Escortell]]></surname>
<given-names><![CDATA[Raquel]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sex and grade differences in cyber- bullying of Spanish students of 5th and 6th grade of Primary Education]]></article-title>
<source><![CDATA[Anales de Psicología]]></source>
<year>2018</year>
<volume>34</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>472-81</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Domínguez]]></surname>
<given-names><![CDATA[José]]></given-names>
</name>
<name>
<surname><![CDATA[Portela]]></surname>
<given-names><![CDATA[Iago]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Violencia a través de las TIC: comportamientos diferenciados por género]]></article-title>
<source><![CDATA[Revista Iberoamericana de Educación a Distancia]]></source>
<year>2020</year>
<volume>23</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>273-86</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Durán]]></surname>
<given-names><![CDATA[Mercedes]]></given-names>
</name>
<name>
<surname><![CDATA[Martínez-Pecino]]></surname>
<given-names><![CDATA[Roberto]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ciberacoso mediante teléfono móvil e Internet en las relaciones de noviazgo entre jóvenes]]></article-title>
<source><![CDATA[Comunicar]]></source>
<year>2015</year>
<volume>44</volume>
<numero>22</numero>
<issue>22</issue>
<page-range>159-67</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Eaton]]></surname>
<given-names><![CDATA[Asia]]></given-names>
</name>
<name>
<surname><![CDATA[Noori]]></surname>
<given-names><![CDATA[Sofia]]></given-names>
</name>
<name>
<surname><![CDATA[Bonomi]]></surname>
<given-names><![CDATA[Amy]]></given-names>
</name>
<name>
<surname><![CDATA[Stephens]]></surname>
<given-names><![CDATA[Dionne]]></given-names>
</name>
<name>
<surname><![CDATA[Gillum]]></surname>
<given-names><![CDATA[Tameka]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Nonconsensual porn as a form of intimate partner violence: Using the power and control wheel to understand nonconsensual porn perpetration in intimate relationships]]></article-title>
<source><![CDATA[Trauma, Violence &amp; Abuse]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ehman]]></surname>
<given-names><![CDATA[Anandi]]></given-names>
</name>
<name>
<surname><![CDATA[Gross]]></surname>
<given-names><![CDATA[Alan]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sexual cyberbullying: Review, critique, and future directions]]></article-title>
<source><![CDATA[Aggression and Violent Behavior]]></source>
<year>2019</year>
<volume>44</volume>
<page-range>80-7</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Festl]]></surname>
<given-names><![CDATA[Ruth]]></given-names>
</name>
<name>
<surname><![CDATA[Quandt]]></surname>
<given-names><![CDATA[Thorsten]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The role of online communication in long-term cyberbullying involvement among girls and boys]]></article-title>
<source><![CDATA[Journal of Youth and Adolescence]]></source>
<year>2016</year>
<volume>45</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>1931-45</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Flach]]></surname>
<given-names><![CDATA[Roberta]]></given-names>
</name>
<name>
<surname><![CDATA[Deslandes]]></surname>
<given-names><![CDATA[Suely]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Abuso digital nos relacionamentos afetivo-sexuais: uma análise bibliográfica]]></article-title>
<source><![CDATA[Cadernos de Saúde Pública]]></source>
<year>2017</year>
<volume>33</volume>
<numero>7</numero>
<issue>7</issue>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fullchange]]></surname>
<given-names><![CDATA[Aileen]]></given-names>
</name>
<name>
<surname><![CDATA[Furlong]]></surname>
<given-names><![CDATA[Michael]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An exploration of effects of bullying victimization from a complete mental health perspective]]></article-title>
<source><![CDATA[Sage Open]]></source>
<year>2016</year>
<page-range>1-2</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Garaigordobil]]></surname>
<given-names><![CDATA[Maite]]></given-names>
</name>
<name>
<surname><![CDATA[Mollo-Torrico]]></surname>
<given-names><![CDATA[Juan]]></given-names>
</name>
<name>
<surname><![CDATA[Larrain]]></surname>
<given-names><![CDATA[Enara]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Prevalencia de bullying y cyberbullying en Latinoamérica: una revisión]]></article-title>
<source><![CDATA[Revista Iberoamericana de Psicología]]></source>
<year>2019</year>
<volume>11</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1-18</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hazelwood]]></surname>
<given-names><![CDATA[Steven]]></given-names>
</name>
<name>
<surname><![CDATA[Koon-Magnin]]></surname>
<given-names><![CDATA[Sarah]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber stalking and cyber harassment legislation in the United States: A qualitative analysis]]></article-title>
<source><![CDATA[International Journal of Cyber Criminology]]></source>
<year>2013</year>
<volume>7</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>155-68</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hendricks]]></surname>
<given-names><![CDATA[Kayla]]></given-names>
</name>
<name>
<surname><![CDATA[Tsibolane]]></surname>
<given-names><![CDATA[Pitso]]></given-names>
</name>
<name>
<surname><![CDATA[van Belle]]></surname>
<given-names><![CDATA[Jean-Paul]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber-harassment victimization among South African LGBTQIA+ youth]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Hattingh]]></surname>
<given-names><![CDATA[Marié]]></given-names>
</name>
<name>
<surname><![CDATA[Machdel]]></surname>
<given-names><![CDATA[Matthee]]></given-names>
</name>
<name>
<surname><![CDATA[Smuts]]></surname>
<given-names><![CDATA[Hanlie]]></given-names>
</name>
<name>
<surname><![CDATA[Pappas]]></surname>
<given-names><![CDATA[Ilias]]></given-names>
</name>
<name>
<surname><![CDATA[Dwivedi]]></surname>
<given-names><![CDATA[Yodes]]></given-names>
</name>
<name>
<surname><![CDATA[Mäntymäki]]></surname>
<given-names><![CDATA[Matti]]></given-names>
</name>
</person-group>
<source><![CDATA[Responsible Design, Implementation and Use of Information and Communication Technology]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Herrera]]></surname>
<given-names><![CDATA[Mauricio]]></given-names>
</name>
<name>
<surname><![CDATA[Romera]]></surname>
<given-names><![CDATA[Eva]]></given-names>
</name>
<name>
<surname><![CDATA[Ortega-Ruiz]]></surname>
<given-names><![CDATA[Rosario]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bullying y cyber-bullying en Colombia; coocurrencia en adolescentes escolarizados]]></article-title>
<source><![CDATA[Revista Latinoamericana de Psicología]]></source>
<year>2017</year>
<volume>49</volume>
<page-range>163-72</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Huesmann]]></surname>
<given-names><![CDATA[L. Rowell]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The impact of electronic media violence: Scientific theory and research]]></article-title>
<source><![CDATA[Journal of Adolescent Health]]></source>
<year>2007</year>
<volume>41</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>S6-S13</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Illouz]]></surname>
<given-names><![CDATA[Eva]]></given-names>
</name>
</person-group>
<source><![CDATA[Por qué duele el amor]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Katz]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jenaro]]></surname>
<given-names><![CDATA[Cristina]]></given-names>
</name>
<name>
<surname><![CDATA[Flórez]]></surname>
<given-names><![CDATA[Noelia]]></given-names>
</name>
<name>
<surname><![CDATA[Frías]]></surname>
<given-names><![CDATA[Cinthia]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Systematic review of empirical studies on cyberbullying in adults: What we know and what we should investigate]]></article-title>
<source><![CDATA[Aggression and Violent Behavior]]></source>
<year>2018</year>
<volume>38</volume>
<page-range>113-22</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kamal]]></surname>
<given-names><![CDATA[Mudasir]]></given-names>
</name>
<name>
<surname><![CDATA[Newman]]></surname>
<given-names><![CDATA[William]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Revenge pornography: Mental health implications and related legislation]]></article-title>
<source><![CDATA[Journal of the American Academy of Psychiatry and the Law]]></source>
<year>2016</year>
<volume>44</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>359-67</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Laer]]></surname>
<given-names><![CDATA[Tom van]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The means to justify the end: Combating cyber harassment in social media]]></article-title>
<source><![CDATA[Journal of Business Ethics]]></source>
<year>2014</year>
<volume>123</volume>
<page-range>85-98</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lanzillotti]]></surname>
<given-names><![CDATA[Alejandra]]></given-names>
</name>
<name>
<surname><![CDATA[Korman]]></surname>
<given-names><![CDATA[Guido]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Motivos del maltrato escolar y del cyberbullying desde la perspectiva de los estudiantes. Estudio con adolescentes de Buenos Aires]]></article-title>
<source><![CDATA[Hallazgos]]></source>
<year>2020</year>
<volume>215</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>11-33</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Ley 1090]]></article-title>
<source><![CDATA[Diario Oficial de la República de Colombia]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Ley 1885]]></article-title>
<source><![CDATA[Diario Oficial de la República de Colombia]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Linne]]></surname>
<given-names><![CDATA[Joaquín]]></given-names>
</name>
<name>
<surname><![CDATA[Angilletta]]></surname>
<given-names><![CDATA[Florencia]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Violencia en la red social: una indagación de expresiones online en adolescentes de sectores populares marginalizados del Área Metropolitana de Buenos Aires]]></article-title>
<source><![CDATA[Salud Colectiva]]></source>
<year>2016</year>
<volume>12</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>279-94</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lucas-Molina]]></surname>
<given-names><![CDATA[Beatriz]]></given-names>
</name>
<name>
<surname><![CDATA[Pérez-Albéniz]]></surname>
<given-names><![CDATA[Alicia]]></given-names>
</name>
<name>
<surname><![CDATA[Giménez-Dasí]]></surname>
<given-names><![CDATA[Marta]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La evaluación del ciberbullying: situación actual y retos futuros]]></article-title>
<source><![CDATA[Papeles del Psicólogo]]></source>
<year>2016</year>
<volume>37</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>27-35</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lucio]]></surname>
<given-names><![CDATA[Luis]]></given-names>
</name>
<name>
<surname><![CDATA[Prieto]]></surname>
<given-names><![CDATA[Teresa]]></given-names>
</name>
<name>
<surname><![CDATA[Carrillo]]></surname>
<given-names><![CDATA[José]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Manifestaciones de violencias entre alumnos de educación superior: los usos del WhatsApp]]></article-title>
<source><![CDATA[Alteridad. Revista de Educación]]></source>
<year>2018</year>
<volume>13</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>204-13</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marín-Cortes]]></surname>
<given-names><![CDATA[Andrés]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Las fuentes digitales de la vergüenza: experiencias de ciberacoso entre adolescentes]]></article-title>
<source><![CDATA[The Qualitative Report]]></source>
<year>2020</year>
<volume>25</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>166-80</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marín-Cortés]]></surname>
<given-names><![CDATA[Andrés]]></given-names>
</name>
<name>
<surname><![CDATA[Hoyos]]></surname>
<given-names><![CDATA[Olga]]></given-names>
</name>
<name>
<surname><![CDATA[Sierra]]></surname>
<given-names><![CDATA[Andrea]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Factores de riesgo y factores protectores relacionados con el ciberbullying entre adolescentes: una revisión sistemática]]></article-title>
<source><![CDATA[Papeles del Psicólogo]]></source>
<year>2019</year>
<volume>40</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>109-24</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Menesini]]></surname>
<given-names><![CDATA[Ersilia]]></given-names>
</name>
<name>
<surname><![CDATA[Nocentini]]></surname>
<given-names><![CDATA[Annalaura]]></given-names>
</name>
<name>
<surname><![CDATA[Calussi]]></surname>
<given-names><![CDATA[Pamela]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The measurement of cyberbullying: dimensional structure and relative item severity and discrimination]]></article-title>
<source><![CDATA[Cyberpsychology, Behavior, and Social Networking]]></source>
<year>2011</year>
<volume>14</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>267-74</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<collab>Ministerio de las Tecnologías de la Información y la Comunicación</collab>
<source><![CDATA[Desconectar el matoneo en redes, un reto de MinTIC en el Día contra el Ciberacoso: ministra Karen Abudinen]]></source>
<year>2020</year>
<publisher-loc><![CDATA[Bogotá ]]></publisher-loc>
<publisher-name><![CDATA[MinTIC]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[Kenneth]]></given-names>
</name>
<name>
<surname><![CDATA[Rosoff]]></surname>
<given-names><![CDATA[Heather]]></given-names>
</name>
<name>
<surname><![CDATA[John]]></surname>
<given-names><![CDATA[Richard]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Valuing information security from a phishing attack]]></article-title>
<source><![CDATA[Journal of Cybersecurity]]></source>
<year>2017</year>
<volume>3</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>159-71</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[O&#8217;Malley]]></surname>
<given-names><![CDATA[Roberta]]></given-names>
</name>
<name>
<surname><![CDATA[Holt]]></surname>
<given-names><![CDATA[Karen]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber sextortion: An exploratory analysis of different perpetrators engaging in a similar crime]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Orosco]]></surname>
<given-names><![CDATA[John]]></given-names>
</name>
<name>
<surname><![CDATA[Pomasunco]]></surname>
<given-names><![CDATA[Rocío]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adolescentes frente a los riesgos en el uso de las TIC]]></article-title>
<source><![CDATA[Revista Electrónica de Investigación Educativa]]></source>
<year>2020</year>
<volume>22</volume>
<numero>17</numero>
<issue>17</issue>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ortega]]></surname>
<given-names><![CDATA[Jessica]]></given-names>
</name>
<name>
<surname><![CDATA[González]]></surname>
<given-names><![CDATA[Dora]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El ciberacoso y su relación con el rendimiento académico]]></article-title>
<source><![CDATA[Innovación Educativa]]></source>
<year>2016</year>
<volume>16</volume>
<numero>71</numero>
<issue>71</issue>
<page-range>17-38</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ortega]]></surname>
<given-names><![CDATA[Rosario]]></given-names>
</name>
<name>
<surname><![CDATA[del Rey]]></surname>
<given-names><![CDATA[Rosario]]></given-names>
</name>
<name>
<surname><![CDATA[Casas]]></surname>
<given-names><![CDATA[José]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Redes sociales y cyber-bullying. El proyecto ConRed]]></article-title>
<source><![CDATA[Convives]]></source>
<year>2013</year>
<volume>3</volume>
<page-range>34-44</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pabian]]></surname>
<given-names><![CDATA[Sara]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An investigation of the effectiveness and determinants of seeking support among adolescent victims of cyberbullying]]></article-title>
<source><![CDATA[The Social Science Journal]]></source>
<year>2018</year>
<volume>55</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>480-91</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Palomares Ruiz]]></surname>
<given-names><![CDATA[Ascención]]></given-names>
</name>
<name>
<surname><![CDATA[Oteiza-Nascimento]]></surname>
<given-names><![CDATA[Arantxa]]></given-names>
</name>
<name>
<surname><![CDATA[Toldos]]></surname>
<given-names><![CDATA[María]]></given-names>
</name>
<name>
<surname><![CDATA[Serrano-Marugán]]></surname>
<given-names><![CDATA[Isabel]]></given-names>
</name>
<name>
<surname><![CDATA[Martín-Babarro]]></surname>
<given-names><![CDATA[Javier]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bullying and depression: The moderating effect of social support, rejection and victimization profile]]></article-title>
<source><![CDATA[Anales de Psicología]]></source>
<year>2018</year>
<volume>35</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Patchin]]></surname>
<given-names><![CDATA[Justin]]></given-names>
</name>
<name>
<surname><![CDATA[Hinduja]]></surname>
<given-names><![CDATA[Sameer]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sextortion among adolescents: Results from a national survey of U.S. youth]]></article-title>
<source><![CDATA[Annals of Sex Research]]></source>
<year>2018</year>
<volume>32</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1-25</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peled]]></surname>
<given-names><![CDATA[Yehuda]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying and its influence on academic, social, and emotional development of undergraduate students]]></article-title>
<source><![CDATA[Heliyon]]></source>
<year>2019</year>
<volume>5</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Peña]]></surname>
<given-names><![CDATA[Fabiola]]></given-names>
</name>
<name>
<surname><![CDATA[Rojas-Solís]]></surname>
<given-names><![CDATA[José]]></given-names>
</name>
<name>
<surname><![CDATA[García-Sánchez]]></surname>
<given-names><![CDATA[Paola]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Uso problemático de Internet, cyberbullying y ciber-violencia de pareja en jóvenes universitarios]]></article-title>
<source><![CDATA[Diversitas: Perspectivas en Psicología]]></source>
<year>2018</year>
<volume>14</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>205-19</page-range></nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rincón]]></surname>
<given-names><![CDATA[Alberto]]></given-names>
</name>
<name>
<surname><![CDATA[Ávila]]></surname>
<given-names><![CDATA[William]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Simbiosis vital para describir el ciber-bullying en Colombia]]></article-title>
<source><![CDATA[Revista Científica General José María Córdova]]></source>
<year>2014</year>
<volume>12</volume>
<numero>14</numero>
<issue>14</issue>
<page-range>149-64</page-range></nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[Marisol]]></given-names>
</name>
<name>
<surname><![CDATA[Rivadulla-López]]></surname>
<given-names><![CDATA[Juan]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Percepción y experiencias sobre el ciberbullying en estudiantes universitarios]]></article-title>
<source><![CDATA[@tic. Revista d&#8217;innovació Educativa]]></source>
<year>2018</year>
<volume>21</volume>
<page-range>10-22</page-range></nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schettini]]></surname>
<given-names><![CDATA[Patricia]]></given-names>
</name>
<name>
<surname><![CDATA[Cortazzo]]></surname>
<given-names><![CDATA[Inés]]></given-names>
</name>
</person-group>
<source><![CDATA[Técnicas y estrategias en la investigación cualitativa]]></source>
<year>2016</year>
<publisher-loc><![CDATA[La Plata ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de la Plata]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Strauss]]></surname>
<given-names><![CDATA[Anselm]]></given-names>
</name>
<name>
<surname><![CDATA[Corbin]]></surname>
<given-names><![CDATA[Juliet]]></given-names>
</name>
</person-group>
<source><![CDATA[Bases de la investigación cualitativa. Técnicas y procedimientos para desarrollar la teoría fundamentada]]></source>
<year>2002</year>
<publisher-loc><![CDATA[Medellín ]]></publisher-loc>
<publisher-name><![CDATA[Contus]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tajahuerce]]></surname>
<given-names><![CDATA[Isabel]]></given-names>
</name>
<name>
<surname><![CDATA[Yanna]]></surname>
<given-names><![CDATA[Franco]]></given-names>
</name>
<name>
<surname><![CDATA[Juárez]]></surname>
<given-names><![CDATA[Javier]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ciberbullying y género: nuevos referentes en la ocupación de los espacios virtuales]]></article-title>
<source><![CDATA[Estudios sobre el Mensaje Periodístico]]></source>
<year>2018</year>
<volume>24</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1845-59</page-range></nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="">
<collab>Te Protejo</collab>
<source><![CDATA[Logros y resultados. Línea virtual de reporte para la protección de la niñez y adolescencia colombiana]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Thorvaldsen]]></surname>
<given-names><![CDATA[Steinar]]></given-names>
</name>
<name>
<surname><![CDATA[Stenseth]]></surname>
<given-names><![CDATA[Anna-María]]></given-names>
</name>
<name>
<surname><![CDATA[Egeberg]]></surname>
<given-names><![CDATA[Gunstein]]></given-names>
</name>
<name>
<surname><![CDATA[Pettersen]]></surname>
<given-names><![CDATA[Geir]]></given-names>
</name>
<name>
<surname><![CDATA[Rønning]]></surname>
<given-names><![CDATA[John]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber harassment and quality of life]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Elstad]]></surname>
<given-names><![CDATA[Eyvind]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital Expectations and Experiences in Education]]></source>
<year>2016</year>
<publisher-loc><![CDATA[Rotterdam ]]></publisher-loc>
<publisher-name><![CDATA[Sense]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tudela]]></surname>
<given-names><![CDATA[Sergio]]></given-names>
</name>
<name>
<surname><![CDATA[Barrón]]></surname>
<given-names><![CDATA[Ana]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Redes sociales: del ciberacoso a los grupos de apoyo online con víctimas de acoso escolar]]></article-title>
<source><![CDATA[Escritos de Psicología]]></source>
<year>2017</year>
<volume>10</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>167-77</page-range></nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Urresti]]></surname>
<given-names><![CDATA[Marcelo]]></given-names>
</name>
<name>
<surname><![CDATA[Linne]]></surname>
<given-names><![CDATA[Joaquín]]></given-names>
</name>
<name>
<surname><![CDATA[Basile]]></surname>
<given-names><![CDATA[Diego]]></given-names>
</name>
</person-group>
<source><![CDATA[Conexión total. Los jóvenes y la experiencia social en la era de la comunicación digital]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Consejo Latinoamericano de Ciencias Sociales]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Walker]]></surname>
<given-names><![CDATA[Kate]]></given-names>
</name>
<name>
<surname><![CDATA[Sleath]]></surname>
<given-names><![CDATA[Emma]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A systematic review of the current knowledge regarding revenge pornography and non-consensual sharing of sexually explicit media]]></article-title>
<source><![CDATA[Aggression and Violent Behavior]]></source>
<year>2017</year>
<volume>36</volume>
<page-range>9-24</page-range></nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[Chien-Chuan]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[Yu-Ping]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Yi-Hsin]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[Huei-Fan]]></given-names>
</name>
<name>
<surname><![CDATA[Yen]]></surname>
<given-names><![CDATA[Chen-Fang]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Relationships between traditional and cyber harassment and self-identity confusion among Taiwanese gay and bisexual men in emerging adulthood]]></article-title>
<source><![CDATA[Comprehensive Psychiatry]]></source>
<year>2019</year>
<volume>90</volume>
<page-range>14-20</page-range></nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Willoughby]]></surname>
<given-names><![CDATA[Mark]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A review of the risks associated with children and young people&#8217;s social media use and the implications for social work practice]]></article-title>
<source><![CDATA[Journal of Social Work Practice]]></source>
<year>2019</year>
<volume>33</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>127-40</page-range></nlm-citation>
</ref>
<ref id="B62">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yubero]]></surname>
<given-names><![CDATA[Santiago]]></given-names>
</name>
<name>
<surname><![CDATA[Larrañaga]]></surname>
<given-names><![CDATA[Elisa]]></given-names>
</name>
<name>
<surname><![CDATA[Navarro]]></surname>
<given-names><![CDATA[Raúl]]></given-names>
</name>
<name>
<surname><![CDATA[Elche]]></surname>
<given-names><![CDATA[María]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Padres, hijos e Internet. Socialización familiar en la red]]></article-title>
<source><![CDATA[Universitas Psychologica]]></source>
<year>2018</year>
<volume>17</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>88-100</page-range></nlm-citation>
</ref>
<ref id="B63">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[You]]></surname>
<given-names><![CDATA[Sukkyung]]></given-names>
</name>
<name>
<surname><![CDATA[Ah Lim]]></surname>
<given-names><![CDATA[Sun]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Longitudinal predictors of cyberbullying perpetration: Evidence from Korean middle school students]]></article-title>
<source><![CDATA[Personality and Individual Differences]]></source>
<year>2016</year>
<volume>89</volume>
<page-range>172-6</page-range></nlm-citation>
</ref>
<ref id="B64">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zezulka]]></surname>
<given-names><![CDATA[Lauren]]></given-names>
</name>
<name>
<surname><![CDATA[Seigfried-Spellar]]></surname>
<given-names><![CDATA[Kathryn]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Differentiating cyberbullies and Internet trolls by personality characteristics and self-esteem]]></article-title>
<source><![CDATA[Journal of Digital Forensics, Security &amp; Law]]></source>
<year>2016</year>
<volume>11</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
