<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1665-2673</journal-id>
<journal-title><![CDATA[Innovación educativa (México, DF)]]></journal-title>
<abbrev-journal-title><![CDATA[Innov. educ. (Méx. DF)]]></abbrev-journal-title>
<issn>1665-2673</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Coordinación Editorial]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1665-26732016000200017</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[El ciberacoso y su relación con el rendimiento académico]]></article-title>
<article-title xml:lang="en"><![CDATA[Cyberbullying and its relationship to academic performance]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ortega Reyes]]></surname>
<given-names><![CDATA[Jesika Ivete]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[González Bañales]]></surname>
<given-names><![CDATA[Dora Luz]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Colegio de Estudios Científicos y Tecnológicos del Estado de Durango  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Instituto Tecnológico de Durango Departamento de Sistemas y Computación ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>08</month>
<year>2016</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>08</month>
<year>2016</year>
</pub-date>
<volume>16</volume>
<numero>71</numero>
<fpage>17</fpage>
<lpage>38</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1665-26732016000200017&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1665-26732016000200017&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1665-26732016000200017&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: El objetivo del presente estudio es analizar la relación entre el ciberacoso y el rendimiento académico de estudiantes de nivel medio superior, por medio del European Cyberbullying Intervention Project Questionnaire (ECIPQ). El estudio se aplicó a un grupo de 397 estudiantes. El análisis se realizó mediante la correlación bivariada. La evidencia obtenida sugiere que existe una relación entre el ciberacoso y el rendimiento académico.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: The objective of the present paper is to analyze the relationship between cyberbullying and the academic performance of students at the secondary level using the European Cyberbullying Intervention Project Questionnaire (ECIPQ). The study was applied to a group of 397 students. The analysis was carried out using bivariate correlation. The results suggest that there is a relationship between cyberbullying and academic performance.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Ciberacoso]]></kwd>
<kwd lng="es"><![CDATA[educación media superior]]></kwd>
<kwd lng="es"><![CDATA[rendimiento académico]]></kwd>
<kwd lng="es"><![CDATA[tecnologías de la información y la comunicación]]></kwd>
<kwd lng="en"><![CDATA[Academic performance]]></kwd>
<kwd lng="en"><![CDATA[cyberbullying]]></kwd>
<kwd lng="en"><![CDATA[information and communication technology]]></kwd>
<kwd lng="en"><![CDATA[secondary education]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Violencia a través de las tecnologías de la información y la comunicación en estudiantes de secundaria Introducción]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Álvarez-García]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Núñez Pérez]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Álvarez Pérez]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Dobarro González]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez Pérez]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[González-Castro]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Anales de Psicología]]></source>
<year>2011</year>
<volume>27</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>221-31</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Parents as a resource: communication quality affects the relationship between adolescents&#8217; internet use and loneliness]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Appel]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Holtz]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Stiglbauer]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Batinic]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of adolescence]]></source>
<year>2012</year>
<volume>35</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1641-8</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[La presentación del sí-mismo en blogs y redes sociales]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arcila]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Anuario Electronico de Estudios en Comunicación Social]]></source>
<year>2010</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>139-89</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ashktorab]]></surname>
<given-names><![CDATA[Z.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[De]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Golbeck]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[iAnon : Leveraging social network big data to mitigate behavioral symptoms of cyberbullying. iConference 2014]]></source>
<year>2014</year>
<page-range>1-4</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Representaciones mediáticas de las redes sociales: un estudio de casos]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bacallao]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Revista Latina de comunicación social]]></source>
<year>2010</year>
<volume>65</volume>
<page-range>114-25</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Validación del inventario de expectativas de autoeficacia académica en tres muestras secuenciales e independientes]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barraza]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Revista de Investigación Educativa]]></source>
<year>2010</year>
<volume>10</volume>
<page-range>2-30</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<article-title xml:lang=""><![CDATA[Niños y adolescentes españoles ante las pantallas: rasgos configuradores de una generación interactiva]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bringué]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Sábada]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[CEE Participación Educativa, Noviembre]]></source>
<year>2010</year>
<page-range>86-104</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cyberbullying and subjective health]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brolin]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Modin]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Östberg]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Children and Youth Services Review]]></source>
<year>2013</year>
<volume>35</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>112-9</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cyberbullying : victimización entre adolescentes a través del teléfono móvil y de Internet]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Buelga]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Cava]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Musitu]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Psicolhema]]></source>
<year>2010</year>
<volume>22</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>784-9</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Bullying and cyberbullying: Convergent and divergent predictor variables]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Casas]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Del Rey]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Ortega]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2013</year>
<volume>29</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>580-7</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Sticks and Stones Can Break My Bones, But How Can Pixels Hurt Me?: Students&#8217; Experiences with Cyber-Bullying]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cassidy]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Jackson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Brown]]></surname>
<given-names><![CDATA[K. N.]]></given-names>
</name>
</person-group>
<source><![CDATA[School Psychology International]]></source>
<year>2009</year>
<volume>30</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>383-402</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Prevalencia de intimidación en dos instituciones educativas del departamento del Valle del Cauca]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cuevas]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hoyos]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Ortiz]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Redalyc]]></source>
<year>2009</year>
<numero>6</numero>
<issue>6</issue>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[La agresión entre iguales en la era digital : estrategias de afrontamiento de los estudiantes del último ciclo de Primaria y del primero de Secundaria]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[De la Caba]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Revista de Educación]]></source>
<year>2011</year>
<volume>362</volume>
<page-range>6-9</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Structural validation and cross-cultural robustness of the European Cyberbullying Intervention Project Questionnaire]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Del Rey]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Casas]]></surname>
<given-names><![CDATA[J. a.]]></given-names>
</name>
<name>
<surname><![CDATA[Ortega-Ruiz]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Schultze-Krumbholz]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Scheithauer]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Plichta]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2015</year>
<volume>50</volume>
<page-range>141-7</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Del Río]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Bringue]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Sádaba]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[González]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberbullying : un análisis comparativo en estudiantes de Argentina , Brasil , Chile, Colombia, México, Perú y Venezuela]]></source>
<year>2008</year>
<conf-name><![CDATA[ VCongrés Internacional Comunicació i Realitat]]></conf-name>
<conf-loc>Barcelona, Es </conf-loc>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Traditional and cyberbullying victimization as correlates of psychosocial distress and barriers to a healthy lifestyle among severely obese adolescents--a matched case-control study on prevalence and results from a cross-sectional study]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Desmet]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Deforche]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Hublet]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Tanghe]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Stremersch]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[De Bourdeaudhuij]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[BMC public health]]></source>
<year>2014</year>
<volume>14</volume>
<numero>1</numero>
<issue>1</issue>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cyberbullying and its correlation to traditional bullying, gender and frequent and risky usage of internet-mediated communication tools]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Erdur-Baker]]></surname>
<given-names><![CDATA[Ö.]]></given-names>
</name>
</person-group>
<source><![CDATA[New Media Society]]></source>
<year>2009</year>
<volume>12</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>109-25</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Un estudio descriptivo sobre el acoso y violencia escolar en la educación obligatoria]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Félix]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Ferrer]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mesas]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Escritos de Psicologia-Psychological Writings]]></source>
<year>2009</year>
<volume>2</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>43-51</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Finkelhor]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[K. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wolak]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Online Victimization: A Report on the Nation&#8217;s Young People]]></source>
<year>2000</year>
<publisher-name><![CDATA[ERIC (Educational Resources Information Center)]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Prevalencia y consecuencias del cyberbullying: una revisión]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Garaigordobil]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[International Journal of Psychology and Psychological Therapy]]></source>
<year>2011</year>
<volume>11</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>233-54</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Estudio exploratorio y descriptivo del cyberbullying en escolares de secundaria]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Jiménez]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Revista Qurriculum]]></source>
<year>2010</year>
<volume>23</volume>
<page-range>155-64</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Ciberbullying: forma virtual de intimidación escolar]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Joffre]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Martínez]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Llanes]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Revista Colombiana de Psiquiatria]]></source>
<year>2011</year>
<volume>40</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>115-30</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cyberbullying en escolares de educación secundaria de Lima metropolitana]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Orellana]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Pomalaya]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Yanac]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Sotelo]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Herrera]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Fernandini]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Revista IIPSI]]></source>
<year>2010</year>
<volume>13</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>83-99</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Acceso a las tecnologías, rendimiento académico y cyberbullying en escolares de secundaria]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Giménez-Gualdo]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Maquilón-Sanchez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Armaniz Sanchez]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Revista Iberoamericana de Psicología y Salud]]></source>
<year>2014</year>
<volume>5</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>119-33</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cyberbullying: Causes, effects, and remedies]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hoff]]></surname>
<given-names><![CDATA[D. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[S. N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Educational Administration]]></source>
<year>2009</year>
<volume>47</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>652-65</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Systematic literature reviews in software engineering - A systematic literature review]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kitchenham]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Pearl Brereton]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Budgen]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Turner]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bailey]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Linkman]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Information and Software Technology]]></source>
<year>2009</year>
<volume>51</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>7-15</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Systematic literature reviews in software engineering - A tertiary study]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kitchenham]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Pretorius]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Budgen]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Pearl Brereton]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
<name>
<surname><![CDATA[Turner]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Niazi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Linkman]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Information and Software Technology]]></source>
<year>2010</year>
<volume>52</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>792-805</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Bullying in the Digital Age: A Critical Review and Meta-Analysis of Cyberbullying Research Among Youth]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kowalski]]></surname>
<given-names><![CDATA[R. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Giumetti]]></surname>
<given-names><![CDATA[G. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Schroeder]]></surname>
<given-names><![CDATA[A. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Lattanner]]></surname>
<given-names><![CDATA[M. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Psychological bulletinulletin]]></source>
<year>2014</year>
<volume>140</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1073-137</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Traditional bullying as a potential warning sign of cyberbullying]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kowalski]]></surname>
<given-names><![CDATA[R. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Morgan]]></surname>
<given-names><![CDATA[C. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Limber]]></surname>
<given-names><![CDATA[S. P.]]></given-names>
</name>
</person-group>
<source><![CDATA[School Psychology International]]></source>
<year>2012</year>
<volume>33</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>505-19</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cyberbullying en una muestra de estudiantes de Educación Secundaria : Variables moduladoras y redes sociales]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[León]]></surname>
<given-names><![CDATA[Benito]]></given-names>
</name>
<name>
<surname><![CDATA[Felipe]]></surname>
<given-names><![CDATA[Elena]]></given-names>
</name>
<name>
<surname><![CDATA[Fajardo]]></surname>
<given-names><![CDATA[Fernando]]></given-names>
</name>
<name>
<surname><![CDATA[Gómez]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Education y Psychology I+D+i]]></source>
<year>2012</year>
<volume>10</volume>
<numero>27</numero>
<issue>27</issue>
<page-range>771-88</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lucio López]]></surname>
<given-names><![CDATA[L. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[El Cyberbullying en estudiantes del nivel medio superior en México]]></source>
<year>2009</year>
<conf-name><![CDATA[ Memorias del X Congreso Nacional de Investigación Educativa]]></conf-name>
<conf-loc>Veracruz, MX </conf-loc>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lucio López]]></surname>
<given-names><![CDATA[L. A.]]></given-names>
</name>
<name>
<surname><![CDATA[González]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[El teléfono móvil como instrumento de violencia entre estudiantes de bachillerato en México]]></source>
<year>2012</year>
<conf-name><![CDATA[ Memorias del IV Congreso Internacional Latina de Comunicación Social]]></conf-name>
<conf-loc>Tenerife, ES </conf-loc>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Acoso utilizando medios electrónicos]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Luna]]></surname>
<given-names><![CDATA[R. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Revista Digital Universitaria]]></source>
<year>2014</year>
<volume>15</volume>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Ciberbullying: diferencias entre el alumnado de secundaria]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martinez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Boletín de Psicología]]></source>
<year>2009</year>
<volume>96</volume>
<page-range>79-96</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Nuevas formas de violencia entre pares : del bullying al cyberbullying]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Matilde]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Rev Med Urug]]></source>
<year>2012</year>
<volume>28</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>48-53</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muñoz]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[El impacto de las redes sociales en la sociedad: análisis del cyberbullying en los estudiantes de educación superior del municipio de Durango]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Durango, México ]]></publisher-loc>
<publisher-name><![CDATA[Instituto Tecnológico de Durango]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Navarro Rodríguez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Barraza Macías]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Redes sociales y uso patalógico del internet (PIU): síntomas y efectos en jóvenes. Un análisis de contenido]]></source>
<year>2011</year>
<conf-name><![CDATA[ Memorias del XI Congreso Nacional de Investigación Educativa]]></conf-name>
<conf-loc>Monterrey, MX </conf-loc>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[La cultura de violencia social y narcotráfico de los jóvenes, una mirada a los blogs y sitios públicos de gran impacto, sus implicaciones educativas]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Navarro]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Morfín]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Preciado]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Telles]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[REDIE]]></source>
<year>2010</year>
<volume>3</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>74-84</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[El rendimiento académico: concepto, investigación y desarrollo]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Navarro]]></surname>
<given-names><![CDATA[R. E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Revista Electrónica Iberoamericana sobre Calidad, Eficacia y Cambio en Educación]]></source>
<year>2003</year>
<volume>1</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1-15</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Game On? Online Friendship, Cyberbullying, and Psychosocial Adjustment in Hong Kong Chinese Children]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nga-man]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mcbride-Chang]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Social and Clinical Psychology]]></source>
<year>2013</year>
<volume>32</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>159-85</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ortega]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Agresividad injustificada,bullying y violencia escolar]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Madrid, ES ]]></publisher-loc>
<publisher-name><![CDATA[Alianza Editorial]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cyberbullying]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ortega]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Calmaestra]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Merchán]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[International Journal of Psychology and Psychological Therapy]]></source>
<year>2008</year>
<volume>8</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>183-92</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cyberbullying]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ortega]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Calmastra]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Mora]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[International Journal of Psychology and Psychological Therapy]]></source>
<year>2008</year>
<volume>8</volume>
<page-range>183-92</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[La convivencia escolar: clave en la predicción del Bullying]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ortega-Ruíz]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Del Rey]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Casas]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Revista Iberoamericana de Evaluación Educativa]]></source>
<year>2013</year>
<volume>6</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>91-102</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Redes Sociales y Cyberbullying. El proyecto ConRed]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ortega]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Del Rey]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Casas]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Convives Revista Digital]]></source>
<year>2013</year>
<volume>3</volume>
<page-range>34-44</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Victimización infanto-juvenil en españa: una revisión sistemática de estudios epidemiológicos]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pereda]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Guilera]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Noemí]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Grup]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Recerca]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Papeles del Psicólogo]]></source>
<year>2014</year>
<volume>35</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>66-77</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Diferencias conductuales según género en convivencia escolar]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Postigo]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[González]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Mateu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Ferrero]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Martorell]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Valencia]]></surname>
<given-names><![CDATA[U. De]]></given-names>
</name>
</person-group>
<source><![CDATA[Psicolhema]]></source>
<year>2009</year>
<volume>21</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>453-8</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Acoso psicológico , organización e identidad : análisis desde un foro virtual]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pulido]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Montalbán]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Palomo]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Luque]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Athenea Digital]]></source>
<year>2008</year>
<volume>6</volume>
<page-range>133-52</page-range></nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[La modalidad de agrupamiento educativo como variable relevante en el análisis de la violencia escolar]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pulido]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Martín]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Lucas]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Revista de Educación]]></source>
<year>2011</year>
<volume>356</volume>
<page-range>457-81</page-range></nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Estilos de crianza y empatía en adolescentes implicados en ciberbullying]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quintana]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Montgomery]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Malaver]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Ruíz]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Moras]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Revista de Investigación en Psicologia]]></source>
<year>2013</year>
<volume>16</volume>
<numero>2</numero>
<issue>2</issue>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cyberbullying in Germany - an exploration of prevalence, overlapping with real life bullying and coping strategies]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Riebel]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Jäger]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Fischer]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
</person-group>
<source><![CDATA[Psychology Science Quarterly]]></source>
<year>2009</year>
<volume>51</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>298-314</page-range></nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[La etnografía virtual en una investigación con niñas]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[C. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Actualidades Pedagógicas]]></source>
<year>2013</year>
<numero>62</numero>
<issue>62</issue>
<page-range>37-50</page-range></nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[A comparative analysis of cyberbullying perceptions of preservice educators: Canada and Turkey]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ryan]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Kariuki]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Yilmaz]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Turkish Online Journal of Educational Technology]]></source>
<year>2011</year>
<volume>10</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1-12</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="book">
<collab>SEEFPU</collab>
<source><![CDATA[Marco común europeo de competencia digital]]></source>
<year>2012</year>
<publisher-loc><![CDATA[España ]]></publisher-loc>
<publisher-name><![CDATA[Secretaría de Estado de Educación, Formación Profesional y Universidades]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cyberbullying: Another main type of bullying?]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Slonje]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Scandinavian journal of psychology]]></source>
<year>2008</year>
<volume>49</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>147-54</page-range></nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The nature of cyberbullying, and strategies for prevention]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Slonje]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Frisén]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2013</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>26-32</page-range></nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cyberbullying: Its nature and impact in secondary school pupils]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Mahdavi]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Carvalho]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Fisher]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Russell]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Tippett]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of child psychology and psychiatry, and allied disciplines]]></source>
<year>2008</year>
<volume>49</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>376-85</page-range></nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Retos y riesgos del uso de Internet por parte de los menores. ¿Cómo empoderarlos?]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tejedor]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Pulido]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Comunicar]]></source>
<year>2012</year>
<volume>XX</volume>
<numero>39</numero>
<issue>39</issue>
<page-range>65-72</page-range></nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Facebook como red de profesionales de bibliotecología, documentación y archivística en Iberoamérica]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Uribe]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Echavarría]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[El Profesional de la Informacion]]></source>
<year>2008</year>
<volume>17</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>670-6</page-range></nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Velázquez]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Seting, Sexcasting, Sextorsión, Grooming y Cyberbullyying. El lado oscuro de las TICs]]></source>
<year>2010</year>
<conf-name><![CDATA[ XICongreso Nacional de Investigación Educativa]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Viscaíno]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[La sociedad, los procesos de aprendizaje y el lenguaje]]></source>
<year>2012</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
