<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0212-9728</journal-id>
<journal-title><![CDATA[Anales de Psicología]]></journal-title>
<abbrev-journal-title><![CDATA[Anal. Psicol.]]></abbrev-journal-title>
<issn>0212-9728</issn>
<publisher>
<publisher-name><![CDATA[Universidad de Murcia]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0212-97282018000200014</article-id>
<article-id pub-id-type="doi">10.6018/analesps.34.2.295411</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Factors in cyber bullying: the attitude-social influence-efficacy model]]></article-title>
<article-title xml:lang="es"><![CDATA[Factores en el acoso cibernético: el modelo de actitud-influencia social-eficacia]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[Yi-Chih]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[Wei-Li]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Chien Hsin University of Science and Technology Department of International Business ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Taiwan</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2018</year>
</pub-date>
<volume>34</volume>
<numero>2</numero>
<fpage>323</fpage>
<lpage>330</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.isciii.es/scielo.php?script=sci_arttext&amp;pid=S0212-97282018000200014&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.isciii.es/scielo.php?script=sci_abstract&amp;pid=S0212-97282018000200014&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.isciii.es/scielo.php?script=sci_pdf&amp;pid=S0212-97282018000200014&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract This study examines the correlation between risk perception, knowledge, social influence, self-efficacy, and cyber bullying behavior from the perspective of the attitude-social influence-efficacy model. The samples in this survey are adolescents who have had cyber bullying behavior or have witnessed their peers&#8217; cyber bullying behavior. The results showed that attitude towards cyber bullying affected cyber bullying intention, and that intention also influenced cyber bullying behavior. Social influence also had an impact on cyber bullying intention and cyber bullying behavior. In fact, intention was a mediator between attitude and behavior, as well as between social influence and behavior.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen Este estudio examina la correlación entre la percepción de riesgo, el conocimiento, la influencia social, la autoeficacia y el comportamiento del acoso cibernético desde la perspectiva del modelo de influencia social. Las muestras en esta encuesta son adolescentes que han tenido un comportamiento de acoso cibernético o han presenciado el comportamiento de acoso cibernético de sus compañeros. Los resultados mostraron que la actitud hacia el acoso cibernético afectó la intención de acoso cibernético, y esa intención también influyó en el comportamiento del acoso cibernético. La influencia social también tuvo un impacto en la intención de acoso cibernético y el comportamiento de acoso cibernético. De hecho, la intención era un mediador entre la actitud y el comportamiento, así como entre la influencia social y el comportamiento.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Ciberacoso]]></kwd>
<kwd lng="es"><![CDATA[Modelo de actitud-influencia social-eficacia]]></kwd>
<kwd lng="es"><![CDATA[Percepción de riesgo]]></kwd>
<kwd lng="en"><![CDATA[Cyber bullying]]></kwd>
<kwd lng="en"><![CDATA[Attitude-social influence-efficacy model]]></kwd>
<kwd lng="en"><![CDATA[Risk perception]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Perceived self-efficacy in cognitive development and functioning]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bandura]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Educational Psychologist]]></source>
<year>1993</year>
<volume>28</volume>
<page-range>117-48</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bandura]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Social Foundations of Thought and Action: A Social Cognitive Theory]]></source>
<year>1986</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Prentice Hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bandura]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social cognitive theory of moral thought and action]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Kurtines]]></surname>
<given-names><![CDATA[W. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of moral behavior and development]]></source>
<year>1991</year>
<volume>1</volume>
<page-range>45-103</page-range><publisher-loc><![CDATA[Hillsdale, NJ ]]></publisher-loc>
<publisher-name><![CDATA[Erlbaum]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Self-efficacy: Toward a unifying theory of behavioral change]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bandura]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Psychological Review]]></source>
<year>1977</year>
<volume>84</volume>
<page-range>191-215</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[A Meta&#8208;Analysis of Sex Differences in Cyber&#8208;Bullying Behavior: The Moderating Role of Age]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barlett]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Coyne]]></surname>
<given-names><![CDATA[S.M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Aggressive Behavior]]></source>
<year>2014</year>
<volume>40</volume>
<page-range>474-88</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cyberbullying: a real and growing threat]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Belsey]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[ATA Magazine]]></source>
<year>2007</year>
<volume>88</volume>
<page-range>14-21</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Psychosocial determinants of fruit and vegetable consumption]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brug]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lechner]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[De Vries]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Appetite]]></source>
<year>1995</year>
<volume>25</volume>
<page-range>285-96</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Designing research for application]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Calder]]></surname>
<given-names><![CDATA[B. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Phillips]]></surname>
<given-names><![CDATA[L. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Tybout]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Consumer Research]]></source>
<year>1981</year>
<volume>8</volume>
<page-range>197-207</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Social cognitive determinants of betel quid chewing among college students in southern Taiwan: a revised Attitudes-Social Influence-Efficacy Model]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[C.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Ko]]></surname>
<given-names><![CDATA[H.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[J.Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Cheng]]></surname>
<given-names><![CDATA[C.P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Addictive Behaviors]]></source>
<year>2007</year>
<volume>32</volume>
<page-range>2345-50</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The Effects of Therapeutic Relationship on an Adolescent Victim of Bullying: A Case Study]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[H.P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Chinese Journal of Guidance and Counseling]]></source>
<year>2013</year>
<volume>28</volume>
<page-range>29-56</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The Effects of Therapeutic Relationship on an Adolescent Victim of Bullying: A Case Study]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[H.P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Chinese Journal of Guidance and Counseling]]></source>
<year>2013</year>
<volume>38</volume>
<page-range>29-55</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Depression, Cognitive Determinants, and Social Influence in Explaining Betel Nut Chewing among College Students in Southern Taiwan]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[H.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Ko]]></surname>
<given-names><![CDATA[H.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[K.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[M.P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Formosa Journal of Mental Health]]></source>
<year>2010</year>
<volume>23</volume>
<page-range>587-612</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[A Structural Model of Drug Use Behaviors among Aboriginal Adolescents in Taiwan: Factors of Ethnic Identity, Personality, Social Learning, and Beliefs about Drug Use]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[H.Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Bulletin of Educational Psychology]]></source>
<year>2008</year>
<volume>39</volume>
<page-range>335-54</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="">
<collab>Child Welfare League Foundation</collab>
<source><![CDATA[Survey report of school bullying phenomenon in Taiwan in 2014]]></source>
<year>2014</year>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Does Customer Knowledge Affect How Loyalty Is Formed]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chiou]]></surname>
<given-names><![CDATA[J. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Droge]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hanvanich]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Service Research]]></source>
<year>2002</year>
<volume>5</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>113-24</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[A paradigm for developing better measures of marketing constructs]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Churchill]]></surname>
<given-names><![CDATA[G.A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Marketing Research]]></source>
<year>1979</year>
<volume>16</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>64-73</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The European Smoking Prevention Framework Approach (EFSA): an example of integral prevention]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[de Vries]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Mudde]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Leijs]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Charlton]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Vartiainen]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Buijs]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Clemente]]></surname>
<given-names><![CDATA[M.P.]]></given-names>
</name>
<name>
<surname><![CDATA[Storm]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[González Navarro]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Nebot]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Prins]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[&Kremers]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Health education research]]></source>
<year>2003</year>
<volume>18</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>611-26</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cyberbullying: Youngsters' experiences and parental perception]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dehue]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Bolman]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Vollink]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberpsychology &amp; Behaviour]]></source>
<year>2008</year>
<volume>11</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>217-25</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Pupil and parent attitudes towards bullying in primary schools]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Eslea]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[P.K.]]></given-names>
</name>
</person-group>
<source><![CDATA[European Journal of Psychology of Education]]></source>
<year>2012</year>
<volume>15</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>207-19</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fishbein]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ajzen]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research]]></source>
<year>1975</year>
<publisher-loc><![CDATA[Reading, MA ]]></publisher-loc>
<publisher-name><![CDATA[Addison-Wesley]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Childhood maltreatment in adult female psychiatric outpatients with eating disorders]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fosse]]></surname>
<given-names><![CDATA[G. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Holen]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Eating Behaviours]]></source>
<year>2006</year>
<volume>7</volume>
<page-range>404-9</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Health risk perception and cigarette smoking behavior: the case of Taiwan]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[T.T.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[J.T.]]></given-names>
</name>
<name>
<surname><![CDATA[Kan]]></surname>
<given-names><![CDATA[K.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Lai]]></surname>
<given-names><![CDATA[W.L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Academia Economic Papers]]></source>
<year>2001</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>91-118</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Metacognition in action: the importance of implementation intentions]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gollwitzer]]></surname>
<given-names><![CDATA[P.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Schaal]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Personality and Social Psychology Review]]></source>
<year>1998</year>
<volume>2</volume>
<page-range>124-36</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Peer victimization, aggression, and their co-occurrence in middle school: Pathways to adjustment problems]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Graham]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Bellmore]]></surname>
<given-names><![CDATA[A. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Mize]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Abnormal Child Psychology]]></source>
<year>2006</year>
<volume>34</volume>
<page-range>363-78</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Knowledge, attitudes and behavior in children with asthma]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hazzard]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Angert]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Asthma]]></source>
<year>1986</year>
<volume>23</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>61-7</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hinduja]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Patchin]]></surname>
<given-names><![CDATA[J. W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Bullying beyond the schoolyard: Preventing and responding to cyber bullying]]></source>
<year>2009</year>
<publisher-loc><![CDATA[Thousand Oaks, CA ]]></publisher-loc>
<publisher-name><![CDATA[Corwin Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Perceptions and attributions of bystanders to cyber bullying]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Holfeld]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2014</year>
<volume>38</volume>
<page-range>1-7</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Positive affect predicting worker psychological response to cyber-bullying in the high-tech industry in Northern Taiwan]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hong]]></surname>
<given-names><![CDATA[J.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[C.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Hwang]]></surname>
<given-names><![CDATA[M.Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[R.P.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y.L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2014</year>
<volume>30</volume>
<page-range>307-14</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[An Empirical Study of Social Influence and Community Characteristics Impact Bloggers&#8217; Perceived Task Value and Blog Continuous Usage Intention in Blog Context]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hsu]]></surname>
<given-names><![CDATA[L.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Hsu]]></surname>
<given-names><![CDATA[T.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Tang]]></surname>
<given-names><![CDATA[J.W.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[C.C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of E-Business]]></source>
<year>2011</year>
<volume>13</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>781-816</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Ethical Computer Self-efficacy: Development and Test of a Measure of Ethical Self-efficacy for Software Piracy]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hsu]]></surname>
<given-names><![CDATA[M.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Kuo]]></surname>
<given-names><![CDATA[F.Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[S.Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Information Management]]></source>
<year>2000</year>
<volume>7</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>85-102</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The New Issue in the Coming of Aged Society: A Study of Elementary and Secondary Students&#8217; Knowledge, Attitudes, and Behavior Intention toward Aging]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[C.S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Curriculum &amp; Instruction Quarterly]]></source>
<year>2011</year>
<volume>14</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>193-216</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[An analysis of multiple factors of cyberbullying among junior high school students in Taiwan]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[Y. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Chou]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2010</year>
<volume>26</volume>
<page-range>1581-90</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[School bullying and suicidal risk in Korean, middle school students]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[Y. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Koh]]></surname>
<given-names><![CDATA[Y. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Leventhal]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Pediatrics]]></source>
<year>2005</year>
<volume>115</volume>
<page-range>357-63</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cyber-bullying: An investigation of the psychological profile of university student participants]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kokkinos]]></surname>
<given-names><![CDATA[C.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Antoniadou]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Markos]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Applied Developmental Psychology]]></source>
<year>2014</year>
<volume>35</volume>
<page-range>204-14</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Consumer conformity: Review and applications for marketing theory and practice]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lascu]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Zinkhan]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Marketing Theory and Practice]]></source>
<year>1999</year>
<volume>7</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1-12</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The Empirical Study of Cyberbully in Taiwan]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liao]]></surname>
<given-names><![CDATA[G.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[T.C.K.]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[J.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[C.C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Information and Management Science]]></source>
<year>2012</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>31-55</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The Study of the Influence of Knowledge Resources, Knowledge Characteristics and Knowledge Flow Mechanisms on the Performance of Knowledge Transfer -Verifying on the Staff of International Retailing S]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[M.Q.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Management]]></source>
<year>2004</year>
<volume>21</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>801-26</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Effects of social network indicators and positions in class on bullied experiences among junior high school students in Taiwan]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[Y.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[W.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[C.Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[D.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Chiang]]></surname>
<given-names><![CDATA[Y.C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Taiwan J Public Health]]></source>
<year>2014</year>
<volume>33</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>397-409</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Censored Quantile Regression for the Decision of Alcohol Consumption under Heterogeneous Risk Perceptions]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liou]]></surname>
<given-names><![CDATA[J.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[P.I.]]></given-names>
</name>
</person-group>
<source><![CDATA[Taiwan Journal of Applied Economics]]></source>
<year>2009</year>
<volume>86</volume>
<page-range>95-137</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Health Risk Perception and Happiness for Smoking Decision: Behavior under Rationality and Perceptibility]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liou]]></surname>
<given-names><![CDATA[J.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[P.I.]]></given-names>
</name>
</person-group>
<source><![CDATA[Agriculture and Economics]]></source>
<year>2013</year>
<volume>50</volume>
<page-range>1-39</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Cyberbullying among college student: prevalence and demographic differences]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Macdonald]]></surname>
<given-names><![CDATA[C.D.]]></given-names>
</name>
<name>
<surname><![CDATA[Bridget]]></surname>
<given-names><![CDATA[R.P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Procedia social and Behavioral Sciences]]></source>
<year>2010</year>
<volume>9</volume>
<page-range>2003-9</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="">
<collab>Ministry of Education</collab>
<source><![CDATA[]]></source>
<year>2011</year>
<publisher-loc><![CDATA[Taiwan ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Risk factors for involvement in cyber bullying: Victims, bullies and bully-victims]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mishna]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Khoury-Kassabri]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Gadalla]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Daciuk]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Children and Youth Services Review]]></source>
<year>2012</year>
<volume>34</volume>
<page-range>63-70</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The Elaboration Likelihood Model of Persuasion]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Petty]]></surname>
<given-names><![CDATA[R.E.]]></given-names>
</name>
<name>
<surname><![CDATA[Cacioppo]]></surname>
<given-names><![CDATA[J.T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Advances in Experimental Social Psychology]]></source>
<year>1986</year>
<volume>19</volume>
<page-range>123-205</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Stages and processes of self change of smoking: toward an integrative model of change]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Prochaska]]></surname>
<given-names><![CDATA[J.O.]]></given-names>
</name>
<name>
<surname><![CDATA[DiClemente]]></surname>
<given-names><![CDATA[C.C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Consulting and Clinical Psychology]]></source>
<year>1983</year>
<volume>51</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>390-5</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shariff]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Gouin]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyber- dilemmas: Gendered hierarchies free expression and cyber-safety in schools. Paper presented at safety and security in a networked world: Balancing cyber-rights and responsibilities]]></source>
<year>2005</year>
<conf-name><![CDATA[ Oxford Internet Institute Conference]]></conf-name>
<conf-date>September 8, 2005</conf-date>
<conf-loc>Oxford, U.K. </conf-loc>
</nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Prevention of bullying-related morbidity and mortality: a call for public health policies]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Srabstein]]></surname>
<given-names><![CDATA[J.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Leventhal]]></surname>
<given-names><![CDATA[B.L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Bulletin of the World Health Organization]]></source>
<year>2010</year>
<volume>88</volume>
<page-range>403</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The Effect of Attitude, Social Influences and Self-Efficacy on Asthmatic Adolescents&#8217; Self-Management Intentions]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tan]]></surname>
<given-names><![CDATA[C.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Hung]]></surname>
<given-names><![CDATA[C.H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Evidence-Based Nursing]]></source>
<year>2006</year>
<volume>2</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>24-33</page-range></nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Following you home from school: A critical review and synthesis of research on cyberbullying victimization]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tokunaga]]></surname>
<given-names><![CDATA[R. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2010</year>
<volume>26</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>277-87</page-range></nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Explicit- and implicit bullying attitudes in relation to bullying behavior]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[van Goethem]]></surname>
<given-names><![CDATA[A.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Scholte]]></surname>
<given-names><![CDATA[R.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Wiers]]></surname>
<given-names><![CDATA[R.W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Abnormal Child Psychology]]></source>
<year>2010</year>
<volume>38</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>829-42</page-range></nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Age Variations in Risk Perceptions and Smoking Decisions]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Viscusi]]></surname>
<given-names><![CDATA[W. K.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Review of Economics and Statistics]]></source>
<year>1991</year>
<volume>73</volume>
<page-range>577-88</page-range></nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The precaution adoption process]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Weinstein]]></surname>
<given-names><![CDATA[N.D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Health Psychology]]></source>
<year>1988</year>
<volume>7</volume>
<page-range>355-86</page-range></nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[An Investigation to Cyber Bullying Behavior among Teenagers]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[M.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Jian]]></surname>
<given-names><![CDATA[M.R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Secondary Education]]></source>
<year>2009</year>
<volume>60</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>90-109</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Knowledge, attitudes, and behavior regarding correct analgesic use among senior/vocational high school students in Taiwan]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[J.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[F.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Chi]]></surname>
<given-names><![CDATA[H.Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Huang]]></surname>
<given-names><![CDATA[L.J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Taiwan Journal of Public Health]]></source>
<year>2015</year>
<volume>34</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>61-73</page-range></nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Why Speak Up? The Effects of Voice Self-Efficacy and Group Voice Behavior on Individual Voice Behavior]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[M.Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Ke]]></surname>
<given-names><![CDATA[Y.T.]]></given-names>
</name>
</person-group>
<source><![CDATA[NTU Management Review]]></source>
<year>2015</year>
<volume>25</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>39-66</page-range></nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Examining the overlap in Internet harassment and school bullying: Implications for school intervention]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ybarra]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Diener-West]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Leaf]]></surname>
<given-names><![CDATA[P. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Adolescent Health]]></source>
<year>2007</year>
<volume>41</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>42-50</page-range></nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Predicting the Use of Pirated Software: Integrating Perceived Risk, Software Cost, and Moral Obligation with the Theory of Planned Behavior]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[H.N.]]></given-names>
</name>
<name>
<surname><![CDATA[Liao]]></surname>
<given-names><![CDATA[C.C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of E-Business]]></source>
<year>2011</year>
<volume>13</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>55-76</page-range></nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[A Study on the Pro-Environmental Behavioral Intention of Post-Secondary School Students]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hong]]></surname>
<given-names><![CDATA[J.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Fu]]></surname>
<given-names><![CDATA[H.Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Bulletin of Educational Psychology]]></source>
<year>2012</year>
<volume>44</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>373-87</page-range></nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Development and Validation of the Perceived Risk ofWeb Survey Questionnaire (PRWSQ)]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hsu]]></surname>
<given-names><![CDATA[H.Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Lai]]></surname>
<given-names><![CDATA[Y.H.]]></given-names>
</name>
<name>
<surname><![CDATA[Chin]]></surname>
<given-names><![CDATA[H.Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Psychological Testing]]></source>
<year>2013</year>
<volume>60</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>351-68</page-range></nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Evaluating structural equation models with unobservable variables and measurement error]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fornell]]></surname>
<given-names><![CDATA[C. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Larcker]]></surname>
<given-names><![CDATA[D. F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Marketing Research]]></source>
<year>1981</year>
<volume>18</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>39-50</page-range></nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sobel]]></surname>
<given-names><![CDATA[M. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Asymptotic intervals for indirect effects in structural equations models]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Leinhart]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Sociological methodology]]></source>
<year>1982</year>
<page-range>290-312</page-range><publisher-loc><![CDATA[San Francisco ]]></publisher-loc>
<publisher-name><![CDATA[Jossey-Bass]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B62">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[SPSS and SAS procedures for estimating indirect effects in simple mediation models]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Preacher]]></surname>
<given-names><![CDATA[K.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hayes]]></surname>
<given-names><![CDATA[A. F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Behavior Research Methods, Instruments, &amp; Computers]]></source>
<year>2004</year>
<volume>36</volume>
<page-range>717-31</page-range></nlm-citation>
</ref>
<ref id="B63">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Correlates of traditional bullying and cyberbullying perpetration among Australian students]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tanrikulu]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Campbell]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Children and Youth Services Review]]></source>
<year>2015</year>
<volume>55</volume>
<page-range>138-46</page-range></nlm-citation>
</ref>
<ref id="B64">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Examination of cyberbullying experiences among Turkish students from different school types]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Topçu]]></surname>
<given-names><![CDATA[Ç.]]></given-names>
</name>
<name>
<surname><![CDATA[Erdur-Baker]]></surname>
<given-names><![CDATA[Ö.]]></given-names>
</name>
<name>
<surname><![CDATA[Çapa-AydÕn]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyber Psychology and Behavior]]></source>
<year>2008</year>
<volume>11</volume>
<page-range>643-8</page-range></nlm-citation>
</ref>
<ref id="B65">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[The Theory of Planned Behavior]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ajzen]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<source><![CDATA[Organizational behavior and human decision processes]]></source>
<year>1991</year>
<volume>50</volume>
<page-range>179-211</page-range></nlm-citation>
</ref>
<ref id="B66">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Peer-group pressure as a moderator of the relationship between attitude toward cyberbullying and cyberbullying behaviors on mobile instant messengers]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Shim]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Shin]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Telematics and Informatics]]></source>
<year>2016</year>
<volume>33</volume>
<page-range>17-24</page-range></nlm-citation>
</ref>
<ref id="B67">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Mobile Virtual Community (MVC) Continuous Participation Decision: Antecedent Model and Consequent Model]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liao]]></surname>
<given-names><![CDATA[T.H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of e-Business]]></source>
<year>2015</year>
<volume>17</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>183-234</page-range></nlm-citation>
</ref>
<ref id="B68">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[Compliance, identification, and internalization: Three processes of attitude change]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kelman]]></surname>
<given-names><![CDATA[H. C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Journal of Conflict Resolution]]></source>
<year>1958</year>
<volume>2</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>51-60</page-range></nlm-citation>
</ref>
<ref id="B69">
<nlm-citation citation-type="journal">
<article-title xml:lang=""><![CDATA[A longitudinal study of the social and emotional predictors and consequences of cyber and traditional bullying victimisation]]></article-title>
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cross]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Lester]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Barnes]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[International Journal of Public Health]]></source>
<year>2015</year>
<volume>60</volume>
<page-range>207-17</page-range></nlm-citation>
</ref>
<ref id="B70">
<nlm-citation citation-type="">
<collab>Taipei City Government&#8217;s Department of Education</collab>
<source><![CDATA[Cyberbullying ebook]]></source>
<year>2014</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
