<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2007-4832</journal-id>
<journal-title><![CDATA[Acta de investigación psicológica]]></journal-title>
<abbrev-journal-title><![CDATA[Acta de investigación psicol]]></abbrev-journal-title>
<issn>2007-4832</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Facultad de Psicología]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2007-48322017000102593</article-id>
<article-id pub-id-type="doi">10.1016/j.aipprr.2017.01.001</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Violencia de pareja a través de medios electrónicos en adolescentes mexicanos]]></article-title>
<article-title xml:lang="en"><![CDATA[Violence in teenage mexican couples through electronic/social media]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Jaen-Cortés]]></surname>
<given-names><![CDATA[Claudia Ivethe]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rivera-Aragón]]></surname>
<given-names><![CDATA[Sofía]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Reidl-Martínez]]></surname>
<given-names><![CDATA[Lucy María]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[García-Méndez]]></surname>
<given-names><![CDATA[Mirna]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Nacional Autónoma de México Facultad de Psicología ]]></institution>
<addr-line><![CDATA[Ciudad de México ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Nacional Autónoma de México Facultad de Estudios Superiores Zaragoza ]]></institution>
<addr-line><![CDATA[Ciudad de México ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2017</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2017</year>
</pub-date>
<volume>7</volume>
<numero>1</numero>
<fpage>2593</fpage>
<lpage>2605</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2007-48322017000102593&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2007-48322017000102593&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2007-48322017000102593&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: El propósito de este estudio instrumental fue obtener las propiedades psicométricas de la Escala de Violencia de Pareja que se expresa a través de Medios Electrónicos (EVIME) en adolescentes mexicanos. Colaboraron 878 participantes, hombres y mujeres con edades de entre 12 y 19 años (M = 16.58; DE = 1.36 años). Dicha escala está compuesta por 32 reactivos agrupados en 5 factores y con formato de respuesta tipo Likert de 4 opciones. Se obtuvo la validez de constructo mediante análisis factorial de componentes principales con rotación ortogonal (varimax) que explican el 57.7% de la varianza (prueba KMO = 0.93, p = 0.00). La consistencia interna total tiene un valor alfa de Cronbach &#945; = 0.94. Las prevalencias de violencia en una muestra probabilística de 1,278 adolescentes para cada una de las dimensiones son: control, monitoreo intrusivo y vigilancia cibernética = 44.3%; agresión verbal = 15.5%; agresión sexual = 11.9%; coerción sexual = 7.7% y humillación = 6.1%. La violencia de pareja que se manifiesta a través de medios electrónicos es un problema social y de salud pública emergente que posee cualidades específicas debido a la naturaleza de las herramientas tecnológicas que utilizan los adolescentes para interactuar con la pareja romántica.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: The aim of this study was to get the psychometric characteristics for the Social/Electronic Media Violence in Couples Scale (EVIME for its initials in Spanish) in Mexican teenagers. There were 878 participants, men and women with ages ranging between 12 and 19 years old (M = 16.58; SD = 1.36). This scale is composed by 32 items grouped into 5 factors with 4 Likert-type answer options. The construct validity was obtained through a factorial analysis of principal components with an orthogonal rotation (varimax) which account for the 57.7% of the variance (KMO test = .93, P = .00). The total internal consistency has a Cronbach&#8217;s alpha of &#945; = .94. Violence prevalence in a probabilistic simple of 1,278 teenagers for each dimension are: control, intrusive monitoring and cybernetic vigilance = 44.3%; verbal aggression = 15.5%; sexual aggression = 11.9%; sexual coercion = 7.7% and humiliation = 6.1%. Violence in couples through social/electronic media is a social and public health growing problem with specific characteristics due to all the variety of technological tools teenagers use to interact with their couple.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Tecnologías de la información y la comunicación]]></kwd>
<kwd lng="es"><![CDATA[Pubertad]]></kwd>
<kwd lng="es"><![CDATA[Relaciones románticas]]></kwd>
<kwd lng="es"><![CDATA[Medición]]></kwd>
<kwd lng="es"><![CDATA[Agresión]]></kwd>
<kwd lng="en"><![CDATA[Information and communications technology]]></kwd>
<kwd lng="en"><![CDATA[Puberty]]></kwd>
<kwd lng="en"><![CDATA[Romantic relationships]]></kwd>
<kwd lng="en"><![CDATA[Measurement]]></kwd>
<kwd lng="en"><![CDATA[Aggression]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alvarez]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Confronting cyberbullying and exploring the use of cybertools in teen dating relationships]]></article-title>
<source><![CDATA[Journal of Clinical Psychology]]></source>
<year>2012</year>
<volume>68</volume>
<numero>11</numero>
<issue>11</issue>
<page-range>1205-15</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="">
<collab>Asociación Mexicana de Internet</collab>
<source><![CDATA[11.o estudio sobre los hábitos de los usuarios de internet en México 2015]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="">
<collab>Asociación Mexicana de Internet</collab>
<source><![CDATA[12.o estudio sobre los hábitos de los usuarios de internet en México 2016]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baker]]></surname>
<given-names><![CDATA[C. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Dating violence and substance use: Exploring the context of adolescent relationships]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2016</year>
<volume>31</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>900-19</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bennet]]></surname>
<given-names><![CDATA[D. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Guran]]></surname>
<given-names><![CDATA[E. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Ramos]]></surname>
<given-names><![CDATA[M. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Margolin]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[College students´&#305; electronic victimization in friendship and dating relationships: Anticipated distress and associations with risky behaviors]]></article-title>
<source><![CDATA[Violence and Victims]]></source>
<year>2011</year>
<volume>26</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>410-29</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borrajo]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Pereda]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Calvete]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The development and validation of the cyber dating abuse questionnaire among young couples]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2015</year>
<volume>48</volume>
<page-range>358-65</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borrajo]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Calvete]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber dating abuse: Prevalence, context, and relationship with offline dating aggression]]></article-title>
<source><![CDATA[Psychological Reports]]></source>
<year>2015</year>
<volume>16</volume>
<page-range>565-85</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borrajo]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Calvete]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Justification beliefs of violence, myths about love and cyber dating abuse]]></article-title>
<source><![CDATA[Psicothema]]></source>
<year>2015</year>
<volume>27</volume>
<page-range>327-33</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Burke]]></surname>
<given-names><![CDATA[S. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Wallen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Vail-Smith]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Knox]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Using technology to control intimate partners: An exploratory study of college undergraduates]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2011</year>
<volume>27</volume>
<page-range>1162-7</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dick]]></surname>
<given-names><![CDATA[R. N.]]></given-names>
</name>
<name>
<surname><![CDATA[McCauley]]></surname>
<given-names><![CDATA[H. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Jones]]></surname>
<given-names><![CDATA[K. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Tancredi]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Goldstein]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Blackbum]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber dating abuse among teens using school-based health centers]]></article-title>
<source><![CDATA[Pediatrics]]></source>
<year>2014</year>
<volume>134</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>e1560-7</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Draucker]]></surname>
<given-names><![CDATA[C. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Martsolf]]></surname>
<given-names><![CDATA[D. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The role of electronic communication technology in adolescent dating violence]]></article-title>
<source><![CDATA[Journal of Child and Adolescent Psychiatric Nursing]]></source>
<year>2010</year>
<volume>23</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>133-42</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Einarsdóttir]]></surname>
<given-names><![CDATA[G.A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Social Network Site usage among adolescents: Effects on mental and physical well-being]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Islandia ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de Reykjavik]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Escobar-Pérez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Cuervo-Martínez]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Validez de contenido y juicio de expertos: una aproximación a su utilización]]></article-title>
<source><![CDATA[Avances en Medición]]></source>
<year>2008</year>
<volume>6</volume>
<page-range>27-37</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fox]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Osborn]]></surname>
<given-names><![CDATA[J. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Warber]]></surname>
<given-names><![CDATA[K. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Relational dialectics and social networking sites: The role of Facebook in romantic relationship escalation, maintenance, conflict, and dissolution]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2014</year>
<volume>35</volume>
<page-range>527-34</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Furr]]></surname>
<given-names><![CDATA[R. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bacharach]]></surname>
<given-names><![CDATA[V. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Psychometrics. An introduction]]></source>
<year>2008</year>
<publisher-loc><![CDATA[Estados Unidos de América ]]></publisher-loc>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[George]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Odgers]]></surname>
<given-names><![CDATA[C. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Seven fears and the science of how mobile technologies may be influencing adolescents in the digital age]]></article-title>
<source><![CDATA[Perspectives on Psychological Science]]></source>
<year>2015</year>
<volume>10</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>832-51</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gutiérrez]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Vega]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Rendón]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Uso de la internet y teléfono celular asociados a situaciones de riesgo de explotación sexual de adolescentes]]></article-title>
<source><![CDATA[Salud Mental]]></source>
<year>2013</year>
<volume>36</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>41-8</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hinduja]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Patchin]]></surname>
<given-names><![CDATA[J.W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Electronic dating violence: A brief guide for educators and parents]]></source>
<year>2011</year>
<publisher-name><![CDATA[Cyberbullying Research Center]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="">
<collab>Instituto Nacional de Estadística y Geografía</collab>
<source><![CDATA[Encuesta Nacional sobre Disponibilidad y Uso de Tecnologías de la Información en los Hogares, ENDUTIH]]></source>
<year>2015</year>
<publisher-loc><![CDATA[México ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kaukinen]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Dating violence among college students: The risk and protective factors]]></article-title>
<source><![CDATA[Trauma, Violence &amp; Abuse]]></source>
<year>2014</year>
<volume>15</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>283-96</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Korchmaros]]></surname>
<given-names><![CDATA[J. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Ybarra]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Langhinrichsen-Rohling]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Boyd]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Lenhart]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Perpetration of teen dating violence in a networked society]]></article-title>
<source><![CDATA[Cyberpsychology. Behavior, and Social Networking]]></source>
<year>2013</year>
<volume>16</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>561-7</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Krug]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Dahlberg]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Mercy]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Informe mundial sobre la violencia y la salud]]></source>
<year>2003</year>
<publisher-loc><![CDATA[Washington, DC ]]></publisher-loc>
<publisher-name><![CDATA[Organización Mundial de la Salud]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lenhart]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Teens, social media &amp; technology overview 2015. Smartphones facilitate shifts in communication landscape for teens]]></source>
<year>2015</year>
<publisher-name><![CDATA[Pew Research Center]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lucio-López]]></surname>
<given-names><![CDATA[L. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Prieto-Quezada]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Violencia en el ciberespacio en las relaciones de noviazgo adolescente. Un estudio exploratorio en estudiantes mexicanos de escuelas preparatorias]]></article-title>
<source><![CDATA[Revista de Educación y Desarrollo]]></source>
<year>2014</year>
<volume>31</volume>
<page-range>61-72</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marganski]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Melander]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Intimate partner violence victimization in the cyber and real world: Examining the extent of cyber aggression experiences and its association with in-person dating violence]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2015</year>
<page-range>1-25</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martinez-Pecino]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Durán]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[I love you but I cyberbully you: The role of hostile sexism]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2016</year>
<page-range>1-14</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nunnally]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Teoría psicométrica]]></source>
<year>2013</year>
<publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[Trillas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Offenhauer]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Buchalter]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Teen dating violence: A literature review and annotated bibliography]]></source>
<year>2011</year>
<publisher-loc><![CDATA[USA ]]></publisher-loc>
<publisher-name><![CDATA[US Department of Justice]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pereira]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Spitzberg]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Matos]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber-harassment victimization in Portugal: Prevalence, fear and help-seeking among adolescents]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2016</year>
<volume>62</volume>
<page-range>136-46</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Picard]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Tech abuse in teen relationships]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Chicago, IL ]]></publisher-loc>
<publisher-name><![CDATA[Teen Research Unlimited]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Priebe]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Finkelhor]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[To tell or not tell? Youths responses to unwanted internet experiences]]></article-title>
<source><![CDATA[Cyber psychology: Journal of Psychosocial Research on Cyberspace]]></source>
<year>2013</year>
<volume>7</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>18-31</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pujazon-Zazik]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Park]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[To tweet, or not to tweet: Gender differences and potential positive and negative health outcomes of adolescents&#8217; social internet use]]></article-title>
<source><![CDATA[American Journal of Men&#8217;s Health]]></source>
<year>2010</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>77-85</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Retana]]></surname>
<given-names><![CDATA[F. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[A. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Acoso Cibernético: validación en México del ORI-82]]></article-title>
<source><![CDATA[Acta de Investigación Psicológica]]></source>
<year>2015</year>
<volume>5</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>2011-97</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rey-Anacona]]></surname>
<given-names><![CDATA[C. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Variables asociadas a los malos tratos en el noviazgo en adolescentes y adultos jóvenes]]></article-title>
<source><![CDATA[Acta Colombiana de Psicología]]></source>
<year>2015</year>
<volume>18</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>159-71</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reyes]]></surname>
<given-names><![CDATA[L. I.]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[B. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Procedimiento de validación psicométrica culturalmente relevante: un ejemplo]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Rivera]]></surname>
<given-names><![CDATA[A. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Díaz]]></surname>
<given-names><![CDATA[L. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[A. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Reyes]]></surname>
<given-names><![CDATA[L. I.]]></given-names>
</name>
</person-group>
<source><![CDATA[La psicología social en México (XII)]]></source>
<year>2008</year>
<page-range>625-30</page-range><publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[Asociación Mexicana de Psicología Social]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rideout]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Fochr]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Roberts]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Generation M: Media in the lives of 8 to 18 years old]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Menlo Park, CA ]]></publisher-loc>
<publisher-name><![CDATA[Kaiser Family Foundation]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Saldívar]]></surname>
<given-names><![CDATA[H. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Jiménez]]></surname>
<given-names><![CDATA[T. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gutiérrez]]></surname>
<given-names><![CDATA[R. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Romero]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La coerción sexual asociada con los mitos de violación y las actitudes sexuales en estudiantes universitarios]]></article-title>
<source><![CDATA[Salud Mental]]></source>
<year>2015</year>
<volume>38</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>27-32</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[J. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Muñoz-Fernández]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Lucio]]></surname>
<given-names><![CDATA[L. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Ortega-Ruiz]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ciberagresión en parejas adolescentes: un estudio transcultural España-México]]></article-title>
<source><![CDATA[Revista Mexicana de Psicología]]></source>
<year>2017</year>
<volume>34</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>46-54</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Muñoz-Fernández]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Ortega-Ruiz]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[&#8216;Cyberdating Q A&#8217;: An instrument to assess the quality of adolescent dating relationships in social networks]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2015</year>
<volume>48</volume>
<page-range>78-86</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sargent]]></surname>
<given-names><![CDATA[K. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Krauss]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Jouriles]]></surname>
<given-names><![CDATA[E. N.]]></given-names>
</name>
<name>
<surname><![CDATA[McDonald]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber victimization, psychological intimate partner violence, and problematic mental health outcomes among first-year college students]]></article-title>
<source><![CDATA[Cyberpsychology, Behavior, and Social Networking]]></source>
<year>2016</year>
<volume>9</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>545-50</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shapiro]]></surname>
<given-names><![CDATA[L. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Margolin]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Growing ups wired: Social networking sites and adolescent psychosocial development]]></article-title>
<source><![CDATA[Clinical Child Family Psychology Review]]></source>
<year>2014</year>
<volume>17</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-18</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Subrahmanyam]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Greenfield]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Online communication and adolescent relationship]]></article-title>
<source><![CDATA[The Future of Children]]></source>
<year>2008</year>
<volume>18</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>119-46</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Temple]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Choi]]></surname>
<given-names><![CDATA[H. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Brem]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Wolford-Clevenger]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Stuart]]></surname>
<given-names><![CDATA[G. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Fleschler]]></surname>
<given-names><![CDATA[P. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The temporal association between traditional and cyber dating abuse among adolescents]]></article-title>
<source><![CDATA[Journal of Youth Adolescence]]></source>
<year>2016</year>
<volume>45</volume>
<page-range>340-9</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Watts]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A twenty-first century science]]></article-title>
<source><![CDATA[Nature]]></source>
<year>2007</year>
<numero>445</numero>
<issue>445</issue>
<page-range>489</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wigderson]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Lynch]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber-and traditional peer victimization: Unique relationships with adolescent well-being]]></article-title>
<source><![CDATA[Psychology of Violence]]></source>
<year>2013</year>
<volume>3</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>297-309</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wolford-Clevenger]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Zapor]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Brasfield]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Febres]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Elmquist]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Brem]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An examination of the Partner Cyber Abuse Questionnaire in a college student sample]]></article-title>
<source><![CDATA[Psychology of Violence]]></source>
<year>2016</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>156-62</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zavaleta]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Pobreza, vergüenza y humillación: una propuesta de medición]]></article-title>
<source><![CDATA[Revista Latinoamericana de Desarrollo Humano]]></source>
<year>2011</year>
<numero>76</numero>
<issue>76</issue>
<page-range>1-7</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zweig]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Dank]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Lachman]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Yahner]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Technology, teen dating violence and abuse, and bullying]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Estados Unidos de América ]]></publisher-loc>
<publisher-name><![CDATA[Urban Institute. Justice Policy Center]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zweig]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lachman]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Yahner]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Dank]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Correlates of cyber dating abuse among teens]]></article-title>
<source><![CDATA[Journal of Youth Adolescence]]></source>
<year>2014</year>
<volume>43</volume>
<page-range>1306-21</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
