<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2007-7467</journal-id>
<journal-title><![CDATA[RIDE. Revista Iberoamericana para la Investigación y el Desarrollo Educativo]]></journal-title>
<abbrev-journal-title><![CDATA[RIDE. Rev. Iberoam. Investig. Desarro. Educ]]></abbrev-journal-title>
<issn>2007-7467</issn>
<publisher>
<publisher-name><![CDATA[Centro de Estudios e Investigaciones para el Desarrollo Docente A.C.]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2007-74672024000200736</article-id>
<article-id pub-id-type="doi">10.23913/ride.v15i29.2098</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Ciberviolencia perpetrada por estudiantes de secundaria a docentes de Sinaloa, México: percepción, incidencia y estrategias de afrontamiento]]></article-title>
<article-title xml:lang="en"><![CDATA[Cyberviolence perpetrated by secondary school students Against Teachers in Sinaloa, Mexico: Perception, Incidence, and Coping Strategies]]></article-title>
<article-title xml:lang="pt"><![CDATA[Violência cibernética perpetrada por estudantes do ensino médio contra professores em Sinaloa, México: percepção, incidência e estratégias de enfrentamento]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Pereira Hernández]]></surname>
<given-names><![CDATA[María Luisa]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Pedagógica del Estado de Sinaloa  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>México</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2024</year>
</pub-date>
<volume>15</volume>
<numero>29</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2007-74672024000200736&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2007-74672024000200736&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2007-74672024000200736&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen  El estudio se enfoca en analizar la incidencia y las características de la ciberviolencia hacia los docentes en el estado de Sinaloa, México. Se empleó una metodología cuantitativa de alcance exploratorio descriptivo para obtener una comprensión integral del fenómeno. Se aplicó una encuesta validada por jueces de 33 preguntas a 852 docentes de secundarias estatales, del Estado de Sinaloa. Los resultados revelaron ciberataques y ciberbullying hacia los docentes, el 77% informó conocer a compañeros y el 16.9% compañeras víctimas, se identificaron diversas estrategias de afrontamiento utilizadas por los afectados, incluyendo el diálogo con el estudiantado (45) y la comunicación con las autoridades escolares (22). Los hallazgos destacan la necesidad de una mayor conciencia y capacitación sobre ciberseguridad en el ámbito educativo, así como de políticas efectivas para abordar el ciberbullying. Las conclusiones principales subrayan la importancia de promover una cultura de seguridad cibernética en las escuelas y de implementar intervenciones específicas para prevenir y mitigar la ciberviolencia del estudiantado al docente.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract  The study focuses on analyzing the incidence and characteristics of cyberviolence towards teachers in the state of Sinaloa, Mexico. A quantitative methodology with an exploratory descriptive scope was used to obtain a comprehensive understanding of the phenomenon. A 33-question survey, validated by experts, was applied to 852 secondary school teachers in Sinaloa. The results revealed cyberattacks and cyberbullying towards teachers, with 77% reporting knowing colleagues who were victims and 16.9% reporting knowing female colleagues who were victims. Various coping strategies used by the affected teachers were identified, including dialogue with students (45) and communication with school authorities (22). The findings highlight the need for greater awareness and training on cybersecurity in the educational field, as well as effective policies to address cyberbullying. The main conclusions emphasize the importance of promoting a culture of cybersecurity in schools and implementing specific interventions to prevent and mitigate student-to-teacher cyberviolence.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo  O estudo se concentra em analisar a incidência e as características da ciberviolência contra professores no estado de Sinaloa, México. Utilizou-se uma metodologia quantitativa de escopo exploratório descritivo para obter uma compreensão abrangente do fenômeno. Uma pesquisa validada por juízes com 33 perguntas foi aplicada a 852 professores do ensino médio estadual do Estado de Sinaloa. Os resultados revelaram ataques cibernéticos e cyberbullying contra professores, 77% relataram conhecer colegas de classe e 16,9% outras vítimas, foram identificadas várias estratégias de enfrentamento utilizadas pelas pessoas afetadas, incluindo o diálogo com os alunos (45) e a comunicação com as autoridades (22). As conclusões destacam a necessidade de uma maior sensibilização e formação em segurança cibernética na educação, bem como de políticas eficazes para combater o cyberbullying. As principais conclusões destacam a importância de promover uma cultura de cibersegurança nas escolas e de implementar intervenções específicas para prevenir e mitigar a ciberviolência dos alunos aos professores.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[ciberbullying]]></kwd>
<kwd lng="es"><![CDATA[ciberacoso]]></kwd>
<kwd lng="es"><![CDATA[formación de docentes]]></kwd>
<kwd lng="es"><![CDATA[ciberseguridad]]></kwd>
<kwd lng="es"><![CDATA[tecnología educativa]]></kwd>
<kwd lng="en"><![CDATA[cyberbullying]]></kwd>
<kwd lng="en"><![CDATA[cyberharassment]]></kwd>
<kwd lng="en"><![CDATA[teacher training]]></kwd>
<kwd lng="en"><![CDATA[cybersecurity]]></kwd>
<kwd lng="en"><![CDATA[technology education]]></kwd>
<kwd lng="pt"><![CDATA[cyberbullying]]></kwd>
<kwd lng="pt"><![CDATA[formação de professores]]></kwd>
<kwd lng="pt"><![CDATA[cibersegurança]]></kwd>
<kwd lng="pt"><![CDATA[tecnologia educacional]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Challenor]]></surname>
<given-names><![CDATA[L. P.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Cyberbullying of Post-Primary Teachers in Ireland]]></source>
<year>2019</year>
<publisher-name><![CDATA[Institute of Education, Dublin City University]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Corral]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Validez y confiabilidad de los instrumentos de investigación para la recolección de datos]]></article-title>
<source><![CDATA[Revista Ciencias de la Educación]]></source>
<year>2009</year>
<volume>19</volume>
<numero>33</numero>
<issue>33</issue>
<page-range>228-47</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dehue]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Koeter]]></surname>
<given-names><![CDATA[M. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Schaufeli]]></surname>
<given-names><![CDATA[W. B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Pesten op het werk: de relatie met gezondheid en verzuim en de rol van coping]]></article-title>
<source><![CDATA[Gedrag y Organisatie]]></source>
<year>2009</year>
<volume>22</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>97-117</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Wet]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Victims of educator-targeted bullying: A qualitative study]]></article-title>
<source><![CDATA[South African Journal of Education]]></source>
<year>2010</year>
<volume>30</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<collab>Dirección de Estudios de Política Educativa, Dirección General de Planeación, Programación y Estadística Educativa- Secretaría de Educación Pública</collab>
<source><![CDATA[Atlas de los servicios educativos: Representación cartográfica del acceso y prestación de los servicios educativos en México]]></source>
<year>2023</year>
<edition>Primera</edition>
<publisher-name><![CDATA[SEP]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dudovskiy]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Ultimate Guide to Writing a Dissertation in Business Studies: A Step-by-Step Assistance]]></source>
<year>2022</year>
<edition>6</edition>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Eden]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Heiman]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Olenik-Shemesh]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Teachers&#8217; perceptions, beliefs and concerns about cyberbullying]]></article-title>
<source><![CDATA[British Journal of Educational Technology]]></source>
<year>2013</year>
<volume>44</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1036-52</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Garrett]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The student bullying of teachers: an exploration of the nature of the phenomenon and the ways in which it is experienced by teachers]]></article-title>
<source><![CDATA[Aigne]]></source>
<year>2014</year>
<volume>5</volume>
<page-range>19-40</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Glasow]]></surname>
<given-names><![CDATA[P. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Fundamentals of Survey Research Methodology]]></source>
<year>2005</year>
<publisher-name><![CDATA[MITRE Department. Division]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[González]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sufren 60% de los maestros violencia por parte de sus alumnos: especialista]]></article-title>
<source><![CDATA[El Heraldo de Chihuahua]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[González Torres]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Pereira Hernández]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Encuesta: ciberviolencia dirigida al docente a través de una examinación de autenticidad por dictamen de árbitros]]></article-title>
<source><![CDATA[Revista Internacional de Investigación en Didáctica de las Ciencias y la Matemática]]></source>
<year>2023</year>
<volume>13</volume>
<numero>26</numero>
<issue>26</issue>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hernández Oropa]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Informe violencia digital. Las sociedades patriarcales creamos víctimas y agresores. Un informe para entender cómo, dónde y quiénes perpetúan de forma sistémica la violencia virtual contra las mujeres y niñas en México]]></source>
<year>2022</year>
<publisher-name><![CDATA[Frente Nacional para la Sororidad y Defensoras Digitales]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hinduja]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Patchin]]></surname>
<given-names><![CDATA[J. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying: An exploratory analysis of factors related to offending and victimization]]></article-title>
<source><![CDATA[Deviant Behavior]]></source>
<year>2008</year>
<volume>29</volume>
<page-range>129-56</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hua]]></surname>
<given-names><![CDATA[T. K.]]></given-names>
</name>
<name>
<surname><![CDATA[So&#8217;od]]></surname>
<given-names><![CDATA[S. M. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Hamid]]></surname>
<given-names><![CDATA[B. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Communicating insults in cyberbullying]]></article-title>
<source><![CDATA[Journal of Media and Communication Research]]></source>
<year>2019</year>
<volume>11</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>91-109</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[V. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Atrey]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyber Bullying Detection Using Social and Textual Analysis]]></source>
<year>2014</year>
<conf-name><![CDATA[ Proceedings of the 3rd International Workshop on Socially-Aware Multimedia]]></conf-name>
<conf-loc>Orlando, Florida </conf-loc>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<collab>Instituto del Derecho de las Telecomunicaciones</collab>
<source><![CDATA[México está en riesgo por ciberataques, dice Monreal]]></source>
<year>2022</year>
<publisher-name><![CDATA[IDET]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<collab>Instituto del Derecho de las Telecomunicaciones</collab>
<source><![CDATA[Mexicanos, los más preocupados]]></source>
<year>2021</year>
<publisher-name><![CDATA[IDET]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<collab>Instituto del Derecho de las Telecomunicaciones</collab>
<source><![CDATA[México: 10 mil ciberataques al mes]]></source>
<year>2020</year>
<publisher-name><![CDATA[IDET]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<collab>Instituto del Derecho de las Telecomunicaciones</collab>
<source><![CDATA[Los 6 ciberataques que serán más habituales en 2023]]></source>
<year>2022</year>
<publisher-name><![CDATA[IDET]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="">
<collab>Instituto del Derecho de las Telecomunicaciones</collab>
<source><![CDATA[Maestros y escuelas por entidad federativa según nivel educativo, ciclos escolares seleccionados de 2000/2001 a 2022/2023]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[James]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lawlor]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Courtney]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Flynn]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Henry]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Murphy]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bullying behaviour in secondary schools: What roles do teachers play?]]></article-title>
<source><![CDATA[Child Abuse Review]]></source>
<year>2008</year>
<volume>17</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>160-73</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Juvonen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Gross]]></surname>
<given-names><![CDATA[E. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Extending the school grounds? Bullying experiences in cyberspace]]></article-title>
<source><![CDATA[Journal of School Health]]></source>
<year>2008</year>
<volume>78</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>496-505</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kauppi]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Pörhölä]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[School teachers bullied by their students: Teachers&#8217; attributions and how they share their experiences]]></article-title>
<source><![CDATA[Teaching and Teacher Education]]></source>
<year>2012</year>
<volume>28</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1059-68</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kauppi]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Pörhölä]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Teachers bullied by students: Forms of bullying and perpetrator characteristics]]></article-title>
<source><![CDATA[Violence and Victims]]></source>
<year>2012</year>
<volume>27</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>396-413</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kopecký]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Szotkowski]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying, cyber aggression and their impact on the victim - The teacher]]></article-title>
<source><![CDATA[Telematics and Informatics]]></source>
<year>2017</year>
<volume>34</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>506-17</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kowalski]]></surname>
<given-names><![CDATA[R. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Limber]]></surname>
<given-names><![CDATA[S. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Agatston]]></surname>
<given-names><![CDATA[P. W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberbullying: Bullying in the digital age]]></source>
<year>2012</year>
<edition>2</edition>
<publisher-name><![CDATA[Wiley Blackwell]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[New bottle but old wine: A research of cyberbullying in schools]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2007</year>
<volume>23</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1777-91</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mohajan]]></surname>
<given-names><![CDATA[H. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Quantitative Research: A Successful Investigation in Natural and Social Sciences]]></article-title>
<source><![CDATA[Journal of Economic Development, Environment and People]]></source>
<year>2020</year>
<volume>9</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>52-79</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mooij]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Secondary school teachers&#8217; personal and school characteristics, experience of violence and perceived violence motives]]></article-title>
<source><![CDATA[Teachers and Teaching: Theory and Practice]]></source>
<year>2011</year>
<volume>17</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>227-53</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Olweus]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Bullying at school: What we know and what we can do]]></source>
<year>1993</year>
<publisher-name><![CDATA[Blackwell Publishers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Patchin]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hinduja]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bullies move beyond the schoolyard: A preliminary look at cyberbullying]]></article-title>
<source><![CDATA[Youth Violence and Juvenile Justice]]></source>
<year>2006</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>123-47</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pereira Hernández]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
</person-group>
<source><![CDATA[El docente de secundaria: Una víctima más de los ciberataques]]></source>
<year>2021</year>
<conf-name><![CDATA[ Memoria electrónica del XVI Congreso Nacional de Investigación Educativa]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pereira Hernández]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Violencia al docente: Una revisión sistémica de la circulación del conocimiento]]></article-title>
<source><![CDATA[Dilemas Contemporáneos: Educación, Política y Valores]]></source>
<year>2023</year>
<volume>10</volume>
<numero>3</numero>
<issue>3</issue>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pereira Hernández]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Voces silenciadas: Desvelando la violencia y ciberviolencia hacia docentes en estudios de acceso abierto]]></source>
<year>2024</year>
<publisher-name><![CDATA[Universidad Tecnológica de Puebla]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ramos-Galarza]]></surname>
<given-names><![CDATA[C. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Los alcances de una investigación]]></article-title>
<source><![CDATA[CienciAmérica]]></source>
<year>2020</year>
<volume>9</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rajbhandari]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rana]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying on Social Media: An Analysis of Teachers&#8217; Unheard Voices and Coping Strategies in Nepal]]></article-title>
<source><![CDATA[International Journal of Bullying Prevention]]></source>
<year>2022</year>
<volume>5</volume>
<page-range>95-107</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rigby]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Attitudes and beliefs about bullying among Australian children]]></article-title>
<source><![CDATA[Irish Journal of Psychology]]></source>
<year>1997</year>
<volume>18</volume>
<page-range>202-9</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Slonje]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying: Another Main Type of Bullying?]]></article-title>
<source><![CDATA[Scandinavian Journal of Psychology]]></source>
<year>2008</year>
<volume>49</volume>
<page-range>147-54</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Sharp]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[School Bullying: Insights and Perspectives]]></source>
<year>1994</year>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Mahdavi]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Carvalho]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Fisher]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Russell]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Tippett]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying: Its nature and impact in secondary school pupils]]></article-title>
<source><![CDATA[Journal of Child Psychology and Psychiatry]]></source>
<year>2008</year>
<volume>49</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>376-85</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tolentino]]></surname>
<given-names><![CDATA[A. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bullying of a teacher in the workplace: A phenomenological study]]></article-title>
<source><![CDATA[International Journal of Learning and Teaching]]></source>
<year>2016</year>
<volume>2</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>20-7</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Whitney]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey of the nature and extent of bullying in junior/middle and secondary schools]]></article-title>
<source><![CDATA[Educational Research]]></source>
<year>1993</year>
<volume>35</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>3-25</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhou]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mao]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Automatic detection of cyberbullying on social networks based on bullying features]]></source>
<year>2016</year>
<conf-name><![CDATA[ Proceedings of the 17th international conference on distributed computing and networking]]></conf-name>
<conf-loc>Singapore </conf-loc>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
