<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1607-4041</journal-id>
<journal-title><![CDATA[Revista electrónica de investigación educativa]]></journal-title>
<abbrev-journal-title><![CDATA[REDIE]]></abbrev-journal-title>
<issn>1607-4041</issn>
<publisher>
<publisher-name><![CDATA[Universidad Autónoma de Baja California, Instituto de Investigación y Desarrollo Educativo]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1607-40412024000100106</article-id>
<article-id pub-id-type="doi">10.24320/redie.2024.26.e06.5992</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Multidimensional Scale to Assess Digital Security in Adolescents]]></article-title>
<article-title xml:lang="es"><![CDATA[Escala multidimensional para evaluar la seguridad digital en adolescentes]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Peraza-Balderrama]]></surname>
<given-names><![CDATA[José Néstor]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Valdés-Cuervo]]></surname>
<given-names><![CDATA[Ángel Alberto]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Parra-Pérez]]></surname>
<given-names><![CDATA[Lizeth Guadalupe]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Urías-Murrieta]]></surname>
<given-names><![CDATA[Maricela]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Instituto Tecnológico de Sonora  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2024</year>
</pub-date>
<volume>26</volume>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1607-40412024000100106&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1607-40412024000100106&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1607-40412024000100106&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract The study examined the psychometric properties of a Digital Security Scale (DSS-A) in a sample of 868 adolescents (460 female, 408 male), made up of 424 early adolescents (Mage = 11.84 years,SD= 0.36) and 444 middle adolescents (Mage = 13.44,SD= 0.49). The sample was randomly split into two for validation (n= 434) and cross-validation (n= 434) purposes. The results confirmed the fit of a one second-order factor model with four first-order factors (personal data protection, safe relationships, healthy internet use, and self-disclosure). As expected, digital security dimensions were positively associated with parental mediation. Measurement invariance was found in this model by gender and stage of adolescence. Latent mean comparisons showed differences by gender and stage of adolescence. Overall, findings indicate that the measurement model is helpful for measuring adolescents&#8217; digital security behaviors.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Este estudio analiza las propiedades psicométricas de una escala de seguridad digital (DSS-A) en una muestra de 868 adolescentes (460 chicas, 408 chicos), compuesta por 424 en etapa de adolescencia temprana (Medad = 11.84 años,DE= 0.36) y 444 en etapa de adolescencia media (Medad = 13.44,DE= 0.49). La muestra se dividió aleatoriamente en dos con fines de validación (n = 434) y validación cruzada (n = 434). Se confirmó el ajuste de un modelo de un factor de segundo orden, con cuatro factores de primer orden (protección de datos personales, relaciones seguras, uso saludable de Internet y autorrevelación). Tal como se esperaba, las dimensiones de seguridad digital se asociaron positivamente con la mediación parental. En este modelo, se confirmó la invarianza de medición por género y etapa de la adolescencia. La comparación de medias latentes mostró diferencias por género y etapa de la adolescencia. En general, los hallazgos indican que este modelo de medida es útil para medir los comportamientos de los adolescentes en materia de seguridad digital.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[citizenship]]></kwd>
<kwd lng="en"><![CDATA[digital citizenship]]></kwd>
<kwd lng="en"><![CDATA[adolescents]]></kwd>
<kwd lng="es"><![CDATA[ciudadanía]]></kwd>
<kwd lng="es"><![CDATA[ciudadanía digital]]></kwd>
<kwd lng="es"><![CDATA[adolescentes]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Almanasreh]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Moles]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evaluation of methods used for estimating content validity]]></article-title>
<source><![CDATA[Research in Social and Administrative Pharmacy]]></source>
<year>2019</year>
<volume>15</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>214-21</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ayd&#305;n]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Güçlü]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ünal-Ayd&#305;n]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Spada]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Metacognitions and emotion recognition in Internet Gaming Disorder among adolescents]]></article-title>
<source><![CDATA[Addictive Behavior Reports]]></source>
<year>2020</year>
<volume>12</volume>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Babaoglu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Akman]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Participation with social media: The case of Turkish metropolitan municipalities in Facebook]]></article-title>
<collab>Information Resources Management Association</collab>
<source><![CDATA[Research anthology on citizen engagement and activism for social change]]></source>
<year>2022</year>
<page-range>104-25</page-range><publisher-name><![CDATA[IGI Global]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bandalos]]></surname>
<given-names><![CDATA[D. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Finney]]></surname>
<given-names><![CDATA[S. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Factor analysis: Exploratory and confirmatory]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Hancock]]></surname>
<given-names><![CDATA[G. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Stapleton]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Mueller]]></surname>
<given-names><![CDATA[R. O.]]></given-names>
</name>
</person-group>
<source><![CDATA[The reviewer&#8217;s guide to quantitative methods in the social sciences]]></source>
<year>2019</year>
<page-range>98-122</page-range><publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brown]]></surname>
<given-names><![CDATA[T. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Confirmatory factorial analysis]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Hoyle]]></surname>
<given-names><![CDATA[R. H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of structural equation modeling]]></source>
<year>2023</year>
<edition>(2nd ed</edition>
<page-range>261-76</page-range><publisher-name><![CDATA[The Guildford Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Casaló]]></surname>
<given-names><![CDATA[L. V.]]></given-names>
</name>
<name>
<surname><![CDATA[Escario]]></surname>
<given-names><![CDATA[J.-J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Predictors of excessive internet use among adolescents in Spain: The relevance of the relationship between parents and their children]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2019</year>
<volume>92</volume>
<page-range>344-51</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosli]]></surname>
<given-names><![CDATA[S. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Basri]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Hoe]]></surname>
<given-names><![CDATA[C. Y. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Investigation of screen time inclination and the accompanying visual and musculoskeletal discomfort in young smartphone users]]></article-title>
<source><![CDATA[Trends in Sciences]]></source>
<year>2022</year>
<volume>19</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reducing harm from media: A meta-analysis of parental mediation]]></article-title>
<source><![CDATA[Journalism &amp; Mass Communication Quarterly]]></source>
<year>2019</year>
<volume>96</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>173-93</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Shih]]></surname>
<given-names><![CDATA[W. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[C. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[P. L,]]></given-names>
</name>
<name>
<surname><![CDATA[Tsai]]></surname>
<given-names><![CDATA[C. Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Relationships among undergraduates&#8217; problematic information security behavior, compulsive internet use, and mindful awareness in Taiwan]]></article-title>
<source><![CDATA[Computers &amp; Education]]></source>
<year>2021</year>
<volume>164</volume>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chugh]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Guggisberg]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Stalking and other forms of dating violence: Lessons learned from You in relation to cyber safety]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2022</year>
<volume>37</volume>
<numero>9-10</numero>
<issue>9-10</issue>
<page-range>6760-84</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Curran]]></surname>
<given-names><![CDATA[M. B. F. X.]]></given-names>
</name>
<name>
<surname><![CDATA[Ribble]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[P-20 model of digital citizenship]]></article-title>
<source><![CDATA[New Directions for Student Leadership]]></source>
<year>2017</year>
<volume>2017</volume>
<numero>153</numero>
<issue>153</issue>
<page-range>35-46</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dedkova]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Mýlek]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Parental mediation of online interactions and its relation to adolescents&#8217; contacts with new people online: The role of risk perception]]></article-title>
<source><![CDATA[Information, Communication &amp; Society]]></source>
<year>2022</year>
<volume>26</volume>
<numero>16</numero>
<issue>16</issue>
<page-range>3179-96</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Emejulu]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[McGregor]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Towards a radical digital citizenship in digital education]]></article-title>
<source><![CDATA[Critical Studies in Education]]></source>
<year>2019</year>
<volume>60</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>131-47</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[R.-D.]]></given-names>
</name>
<name>
<surname><![CDATA[Ding]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Hong]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Jiang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The impact of parental active mediation on adolescent mobile phone dependency: A moderated mediation model]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2020</year>
<volume>107</volume>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Funder]]></surname>
<given-names><![CDATA[D. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Ozer]]></surname>
<given-names><![CDATA[D. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evaluating effect size in psychological research: Sense and nonsense]]></article-title>
<source><![CDATA[Advances in Methods and Practices in Psychological Science]]></source>
<year>2019</year>
<volume>2</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>156-68</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Furr]]></surname>
<given-names><![CDATA[R. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Psychometrics. An introduction]]></source>
<year>2018</year>
<edition>3rd ed.</edition>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gallego-Arrufat]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Torres-Hernández]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Pessoa]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Competence of future teachers in the digital security area]]></article-title>
<source><![CDATA[Comunicar]]></source>
<year>2019</year>
<volume>61</volume>
<numero>27</numero>
<issue>27</issue>
<page-range>53-62</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gottfried]]></surname>
<given-names><![CDATA[E. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Shier]]></surname>
<given-names><![CDATA[E. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Mulay]]></surname>
<given-names><![CDATA[A. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Child pornography and online sexual solicitation]]></article-title>
<source><![CDATA[Current Psychiatry Reports]]></source>
<year>2020</year>
<volume>22</volume>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Green]]></surname>
<given-names><![CDATA[S. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evaluation of dimensionality in the assessment of internal consistency reliability: Coefficient alpha and omega coefficients]]></article-title>
<source><![CDATA[Educational Measurement: Issues and Practice]]></source>
<year>2015</year>
<volume>34</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>14-20</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hair]]></surname>
<given-names><![CDATA[J. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Black]]></surname>
<given-names><![CDATA[W. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Babin]]></surname>
<given-names><![CDATA[B. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Anderson]]></surname>
<given-names><![CDATA[R. E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Multivariate data analysis]]></source>
<year>2010</year>
<edition>7th ed.</edition>
<publisher-name><![CDATA[Pearson]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hair]]></surname>
<given-names><![CDATA[J. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Hult]]></surname>
<given-names><![CDATA[T. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ringle]]></surname>
<given-names><![CDATA[C. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sarstedt]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[A primer on partial least squares structural equation modeling]]></source>
<year>2017</year>
<edition>2th ed.</edition>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hamza]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Anand]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Marimuthu]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Thamilselvan]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Chakraborty]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Suma]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Baglari]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Singh]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Urban and rural pattern of Internet use among youth and its association with mood state]]></article-title>
<source><![CDATA[Journal of Family Medicine and Primary Care]]></source>
<year>2019</year>
<volume>8</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>2602-6</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ho]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of univariate and multivariate data analysis and interpretation with SPSS]]></source>
<year>2014</year>
<edition>2nd ed.</edition>
<publisher-name><![CDATA[CRC Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hurwitz]]></surname>
<given-names><![CDATA[L. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Schmitt]]></surname>
<given-names><![CDATA[K. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Can children benefit from early internet exposure? Short- and long-term links between internet use, digital skill, and academic performance]]></article-title>
<source><![CDATA[Computers &amp; Education]]></source>
<year>2020</year>
<volume>146</volume>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="">
<collab>INEE</collab>
<source><![CDATA[Panorama educativo de México 2018. Indicadores del sistema educativo nacional. Educación básica y media superior [Overview of education in Mexico 2018. National education system indicators. Basic and upper secondary education]]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="">
<collab>INEGI</collab>
<source><![CDATA[Encuesta Nacional sobre Disponibilidad y Uso de Tecnologías de la Información en los Hogares 2021. [2021 National Survey on Availability and Use of Information Technologies in Households]]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jiang]]></surname>
<given-names><![CDATA[L. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[I. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Self-disclosure to parents in emerging adulthood: Examining the roles of perceived parental responsiveness and separation-individuation]]></article-title>
<source><![CDATA[Journal of Social and Personal Relationships]]></source>
<year>2017</year>
<volume>34</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>425-45</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jones]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[K. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Defining and measuring youth digital citizenship]]></article-title>
<source><![CDATA[New Media and Society]]></source>
<year>2016</year>
<volume>18</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>2063-79</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kapetanovic]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Bohlin]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Skoog]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Gerdner]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Structural relations between sources of parental knowledge, feelings of being overly controlled and risk behaviors in early adolescence]]></article-title>
<source><![CDATA[Journal of Family Studies]]></source>
<year>2017</year>
<volume>26</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>226-42</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Koutamanis]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Vossen]]></surname>
<given-names><![CDATA[H. G. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Valkenburg]]></surname>
<given-names><![CDATA[P. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adolescents&#8217; comments in social media: Why do adolescents receive negative feedback and who is most at risk?]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2015</year>
<volume>53</volume>
<page-range>486-94</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lauricella]]></surname>
<given-names><![CDATA[A. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Herdzina]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Robb]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Early childhood educators&#8217; teaching of digital citizenship competencies]]></article-title>
<source><![CDATA[Computers &amp; Education]]></source>
<year>2020</year>
<volume>158</volume>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[S. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Parental restrictive mediation of children&#8217;s internet use: Effective for what and for whom?]]></article-title>
<source><![CDATA[New Media &amp; Society]]></source>
<year>2013</year>
<volume>15</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>466-81</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lionetti]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Keijsers]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Dellagiulia]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Pastore]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evidence of factorial validity of parental knowledge, control and solicitation, and adolescent disclosure scales: When the ordered nature of Likert scales matters]]></article-title>
<source><![CDATA[Frontiers in Psychology]]></source>
<year>2016</year>
<volume>7</volume>
</nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Ang]]></surname>
<given-names><![CDATA[R. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Lwin]]></surname>
<given-names><![CDATA[M. O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cognitive, personality, and social factors associated with adolescents&#8217; online personal information disclosure]]></article-title>
<source><![CDATA[Journal of Adolescence]]></source>
<year>2013</year>
<volume>36</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>629-38</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Livingstone]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Haddon]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Görzig]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ólafsson]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Risks and safety on the internet: The perspective of European children: Full findings and policy implications from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries]]></source>
<year>2011</year>
<publisher-name><![CDATA[EU Kids Online Network]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lukavská]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Hrabec]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Lukavský]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Demetrovics]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Király]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The associations of adolescent problematic internet use with parenting: A meta-analysis]]></article-title>
<source><![CDATA[Addictive Behaviors]]></source>
<year>2022</year>
<volume>135</volume>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Madrid]]></surname>
<given-names><![CDATA[E. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Valdés]]></surname>
<given-names><![CDATA[A. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Urías]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[G. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Parra-Pérez]]></surname>
<given-names><![CDATA[L. G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Factores asociados al ciberacoso en adolescentes: Una perspectiva ecológico-social [Factors associated with cyberbullying in adolescents: An ecological social perspective]]]></article-title>
<source><![CDATA[Perfiles Educativos]]></source>
<year>2020</year>
<volume>42</volume>
<numero>167</numero>
<issue>167</issue>
<page-range>68-83</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martin]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Hunt]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Brooks]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Middle school student perception of technology use and digital citizenship practices]]></article-title>
<source><![CDATA[Computers in the Schools]]></source>
<year>2020</year>
<volume>37</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>196-215</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mesch]]></surname>
<given-names><![CDATA[G. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Parent-child connections on social networking sites and cyberbullying]]></article-title>
<source><![CDATA[Youth and Society]]></source>
<year>2018</year>
<volume>50</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1145-62</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mueller]]></surname>
<given-names><![CDATA[R. O.]]></given-names>
</name>
<name>
<surname><![CDATA[Hancock]]></surname>
<given-names><![CDATA[G. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Structural equation modeling]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Hancock]]></surname>
<given-names><![CDATA[G. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Stapleton]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Mueller]]></surname>
<given-names><![CDATA[R. O.]]></given-names>
</name>
</person-group>
<source><![CDATA[The reviewer&#8217;s guide to quantitative methods in the social sciences]]></source>
<year>2019</year>
<edition>2nd ed.</edition>
<page-range>445-56</page-range><publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muthén]]></surname>
<given-names><![CDATA[L. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Muthén]]></surname>
<given-names><![CDATA[B. O.]]></given-names>
</name>
</person-group>
<source><![CDATA[Mplus user&#8217;s guide]]></source>
<year>2017</year>
<edition>8th ed.</edition>
<publisher-name><![CDATA[Muthén &amp; Muthén]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nikken]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Jansz]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Developing scales to measure parental mediation of young children&#8217;s internet use]]></article-title>
<source><![CDATA[Learning, Media and Technology]]></source>
<year>2014</year>
<volume>39</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>250-66</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nowell]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Pfeifer]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Enticott]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Silk]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Vijayakumar]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Value of self-disclosure to parents and peers during adolescence]]></article-title>
<source><![CDATA[Journal of Research on Adolescence]]></source>
<year>2022</year>
<volume>33</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>289-301</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="">
<collab>Organization for Economic Cooperation and Development</collab>
<source><![CDATA[Internet access (indicator)]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Orosco]]></surname>
<given-names><![CDATA[J. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Pomasunco]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adolescentes frente a los riesgos en el uso de las TIC [Adolescents and risks of ICT]]]></article-title>
<source><![CDATA[Revista Electrónica de Investigación Educativa]]></source>
<year>2020</year>
<volume>22</volume>
<page-range>1-13</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Padilla-Walker]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Coyne]]></surname>
<given-names><![CDATA[S. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Fraser]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Getting a high-speed family connection: Associations between family media use and family connection]]></article-title>
<source><![CDATA[Family Relations]]></source>
<year>2012</year>
<volume>61</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>426-40</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pastor]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[García-Jiménez]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[López-de-Ayala]]></surname>
<given-names><![CDATA[M.-C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Estrategias de regulación de uso del smartphone y uso problemático de internet en la adolescencia [Regulatory strategies for smartphone use and problematic internet use in adolescence]]]></article-title>
<source><![CDATA[Anales de Psicología]]></source>
<year>2022</year>
<volume>38</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>269-77</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pereira]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Fillol]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Moura]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El aprendizaje de los jóvenes con medios digitales fuera de la escuela: De lo informal a lo formal [Young people learning from digital media outside of school: The informal meets the formal]]]></article-title>
<source><![CDATA[Comunicar]]></source>
<year>2019</year>
<volume>27</volume>
<numero>58</numero>
<issue>58</issue>
<page-range>41-50</page-range></nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reise]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mansolf]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Haviland]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bifactor measurement models]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Hoyle]]></surname>
<given-names><![CDATA[R. H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of structural equation modeling]]></source>
<year>2023</year>
<edition>2nd ed</edition>
<page-range>329-48</page-range><publisher-name><![CDATA[Guilford Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ribble]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital citizenship in schools: Nine elements all students should know]]></source>
<year>2015</year>
<edition>3rd ed.</edition>
<publisher-name><![CDATA[International Society for Technology in Education]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ribble]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bailey]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Digital citizenship in schools]]></source>
<year>2011</year>
<publisher-name><![CDATA[International Society for Technology in Education]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="">
<collab>Secretaría de Educación Pública</collab>
<source><![CDATA[Plan de estudios 2022. Educación básica. [2022 curriculum. Basic education]]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shin]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Kang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adolescents&#8217; privacy concerns and information disclosure online: The role of parents and the Internet]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2016</year>
<volume>54</volume>
<page-range>114-23</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Skryabin]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How the ICT development level and usage influence student achievement in reading, mathematics, and science]]></article-title>
<source><![CDATA[Computers &amp; Education]]></source>
<year>2015</year>
<volume>85</volume>
<page-range>49-58</page-range></nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Smetana]]></surname>
<given-names><![CDATA[J. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Villalobos]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Tasopoulus-Chan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gettman]]></surname>
<given-names><![CDATA[D. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Campione-Barr]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Early and middle adolescents' disclosure to parents about activities in different domains]]></article-title>
<source><![CDATA[Journal of Adolescence]]></source>
<year>2009</year>
<volume>32</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>693-713</page-range></nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Son]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Padilla-Walker]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Whereabouts and secrets: A person-centered approach to emerging adults&#8217; routine and self-disclosure to parents]]></article-title>
<source><![CDATA[Emerging Adulthood]]></source>
<year>2019</year>
<volume>9</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>145-57</page-range></nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Steinfeld]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Parental mediation of adolescent Internet use: Combining strategies to promote awareness, autonomy and self-regulation in preparing youth for life on the web]]></article-title>
<source><![CDATA[Education and Information Technologies]]></source>
<year>2021</year>
<volume>26</volume>
<page-range>1897-920</page-range></nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tifferet]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Gender differences in privacy tendencies on social network sites: A meta-analysis]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2019</year>
<volume>93</volume>
<page-range>1-12</page-range></nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vrieze]]></surname>
<given-names><![CDATA[S. I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Model selection and psychological theory: A discussion of the differences between the Akaike information criterion (AIC) and the Bayesian information criterion (BIC)]]></article-title>
<source><![CDATA[Psychological Methods]]></source>
<year>2012</year>
<volume>17</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>228-43</page-range></nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Xing]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Exploring the influence of parental involvement and socioeconomic status on teen digital citizenship: A path modeling approach]]></article-title>
<source><![CDATA[Educational Technology &amp; Society]]></source>
<year>2018</year>
<volume>21</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>186-99</page-range></nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Widaman]]></surname>
<given-names><![CDATA[K. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Olivera-Aguilar]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Investigating measurement invariance using confirmatory factorial analysis]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Hoyle]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Structural equation modeling]]></source>
<year>2023</year>
<edition>2nd ed.</edition>
<page-range>367-84</page-range><publisher-name><![CDATA[Guilford Press]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
