<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0212-9728</journal-id>
<journal-title><![CDATA[Anales de Psicología]]></journal-title>
<abbrev-journal-title><![CDATA[Anal. Psicol.]]></abbrev-journal-title>
<issn>0212-9728</issn>
<publisher>
<publisher-name><![CDATA[Universidad de Murcia]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0212-97282020000200002</article-id>
<article-id pub-id-type="doi">10.6018/analesps.36.2.370451</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Cyber dating violence: A Review of Its Research Methodology]]></article-title>
<article-title xml:lang="es"><![CDATA[Ciberviolencia en las relaciones de pareja: una revisión sobre su metodología de investigación]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rodríguez-Domínguez]]></surname>
<given-names><![CDATA[Carmen]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Pérez-Moreno]]></surname>
<given-names><![CDATA[Pedro J]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Durán]]></surname>
<given-names><![CDATA[Mercedes]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Loyola Department of Psychology ]]></institution>
<addr-line><![CDATA[ Andalucía]]></addr-line>
<country>Spain</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad de Huelva Department of Clinical and Experimental Psychology ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Spain</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad de Sevilla Department of Social Psychology ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Spain</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>09</month>
<year>2020</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>09</month>
<year>2020</year>
</pub-date>
<volume>36</volume>
<numero>2</numero>
<fpage>200</fpage>
<lpage>209</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.isciii.es/scielo.php?script=sci_arttext&amp;pid=S0212-97282020000200002&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.isciii.es/scielo.php?script=sci_abstract&amp;pid=S0212-97282020000200002&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.isciii.es/scielo.php?script=sci_pdf&amp;pid=S0212-97282020000200002&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: In recent years there has been increased interest in the study of cyber dating violence, however it is necessary to examine the research methodology that supports the evidence obtained so far. This article presents a systematic review of the scientific literature that analyzes 30 instruments for the measurement of cyber dating violence in adolescents and young adults used throughout these years. The main results show a high methodological, conceptual and terminological plurality, and a reduced number of instruments with sufficient psychometric guarantees is observed. The majority of the work is originated in the United States and, among the instruments applied in Spanish samples, there is an under-representation of indicators of sexually based cyber dating violence, which limits the understanding of this problem. This research provides information on the current state in the study of cyber dating violence and highlights methodological deficiencies in the construction of knowledge in this field of study. This work enables a better understanding of the disparity of results pointed out by previous research, especially referring to prevalence, frequency and gender differences in this type of violent behavior, as well as laying the foundations to tackle the phenomenon with scientific rigor.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: En los últimos años ha aumentado el interés por el estudio de la ciberviolencia en la pareja, sin embargo es necesario examinar la metodología de investigación que sustenta las evidencias obtenidas hasta el momento. Este artículo presenta una revisión sistemática de la literatura científica que analiza 30 instrumentos de medida de ciberviolencia en la pareja de adolescentes y jóvenes adultos utilizados a lo largo de estos años. Los principales resultados muestran una elevada pluralidad metodológica, conceptual y terminológica, observándose un reducido número de instrumentos con suficientes garantías psicométricas. Predominan los trabajos de procedencia estadounidense y, entre los instrumentos aplicados en muestras españolas, destaca una infrarrepresentación de indicadores de ciberviolencia de tipo sexual, lo que limita la comprensión de esta problemática. Esta investigación aporta información sobre el estado actual en el estudio de la ciberviolencia en la pareja y pone de relieve deficiencias metodológicas en la construcción del conocimiento en este campo de estudio. Este trabajo permite una mejor comprensión de la disparidad de resultados señalada por investigaciones previas, especialmente referidas a prevalencia, frecuencia y diferencias de género en este tipo de comportamientos violentos, además de sentar las bases para abordar el fenómeno desde el rigor científico.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Cyber dating violence]]></kwd>
<kwd lng="en"><![CDATA[systematic review]]></kwd>
<kwd lng="en"><![CDATA[methodology]]></kwd>
<kwd lng="en"><![CDATA[research]]></kwd>
<kwd lng="en"><![CDATA[adolescents]]></kwd>
<kwd lng="en"><![CDATA[youngs]]></kwd>
<kwd lng="es"><![CDATA[Ciberviolencia de pareja]]></kwd>
<kwd lng="es"><![CDATA[revisión sistemática]]></kwd>
<kwd lng="es"><![CDATA[metodología]]></kwd>
<kwd lng="es"><![CDATA[investigación]]></kwd>
<kwd lng="es"><![CDATA[adolescentes]]></kwd>
<kwd lng="es"><![CDATA[jóvenes]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aboujaoude]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Savage]]></surname>
<given-names><![CDATA[MW]]></given-names>
</name>
<name>
<surname><![CDATA[Starcevic]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Salame]]></surname>
<given-names><![CDATA[WO]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying: Review of an old problem gone viral]]></article-title>
<source><![CDATA[Journal of Adolescent Health]]></source>
<year>2015</year>
<volume>57</volume>
<page-range>10-8</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<collab>American Educational Research Association (AERA)</collab>
<collab>American Psychological Association (APA)</collab>
<collab>National Council on Measurement in Education (NCME)</collab>
<source><![CDATA[Standards for educational and psychological testing]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Washington ]]></publisher-loc>
<publisher-name><![CDATA[American Psychological Association]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bennet]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Guran]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Ramos]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Margolin]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[College students&#8217; electronic victimization in friendships and dating relationships: Anticipated distress and associations with risky behaviors]]></article-title>
<source><![CDATA[Violence and Victims]]></source>
<year>2011</year>
<volume>26</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>410-29</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borrajo]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Calvete]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber dating abuse: Prevalence, context, and relationship with offline dating aggression]]></article-title>
<source><![CDATA[Psychological Reports: Relationships &amp; Communications]]></source>
<year>2015</year>
<volume>116</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>565-85</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borrajo]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Pereda]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Calvete]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The development and validation of the cyber dating abuse questionnaire among young couples]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2015</year>
<volume>48</volume>
<page-range>358-65</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Burke]]></surname>
<given-names><![CDATA[SC]]></given-names>
</name>
<name>
<surname><![CDATA[Wallen]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Vail-Smith]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Knox]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Using technology to control intimate partners: An exploratory study of college undergraduates]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2011</year>
<volume>27</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1162-7</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Castells]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Cardoso]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[The network society: From knowledge to policy]]></source>
<year>2005</year>
<publisher-loc><![CDATA[Washington, DC ]]></publisher-loc>
<publisher-name><![CDATA[Johns Hopkins Center for Transatlantic Relations]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cutbush]]></surname>
<given-names><![CDATA[SL]]></given-names>
</name>
</person-group>
<source><![CDATA[Teen dating violence perpetration among middle school youth: The role of bullying, sexual harassment, and gender]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Estados Unidos ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de Carolina del Norte]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cutbush]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Williams]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Miller]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Gibbs]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Clinton-Sherrod]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Longitudinal patterns of electronic teen dating violence among middle school students]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2018</year>
<page-range>1-21</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dank]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Lachman]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Zweig]]></surname>
<given-names><![CDATA[JM]]></given-names>
</name>
<name>
<surname><![CDATA[Yahner]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Dating violence experiences of lesbian, gay, bisexual, and transgender youth]]></article-title>
<source><![CDATA[Journal Youth Adolescence]]></source>
<year>2013</year>
<volume>43</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>846-57</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[David-Ferdon]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Feldman]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Electronic Media, Violence, and Adolescents: An Emerging Public Health Problem]]></article-title>
<source><![CDATA[Journal of Adolescent Health]]></source>
<year>2007</year>
<volume>41</volume>
<page-range>S1-5</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dick]]></surname>
<given-names><![CDATA[RN]]></given-names>
</name>
<name>
<surname><![CDATA[McCauley]]></surname>
<given-names><![CDATA[HL]]></given-names>
</name>
<name>
<surname><![CDATA[Jones]]></surname>
<given-names><![CDATA[KA]]></given-names>
</name>
<name>
<surname><![CDATA[Tancredi]]></surname>
<given-names><![CDATA[DJ]]></given-names>
</name>
<name>
<surname><![CDATA[Goldstein]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Blackburn]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Miller]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber Dating Abuse among Teens Using School-Based Health Centers]]></article-title>
<source><![CDATA[Pediatrics]]></source>
<year>2014</year>
<volume>134</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>e1560-7</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Donoso]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Rubio]]></surname>
<given-names><![CDATA[MJ]]></given-names>
</name>
<name>
<surname><![CDATA[Vilà]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Las ciberagresiones en función del género]]></article-title>
<source><![CDATA[Revista de Investigación Educativa]]></source>
<year>2017</year>
<volume>35</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>197-214</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Donoso]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Rubio]]></surname>
<given-names><![CDATA[MJ]]></given-names>
</name>
<name>
<surname><![CDATA[Vilà]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La adolescencia ante la violencia de género 2.0: Concepciones, conductas y experiencias]]></article-title>
<source><![CDATA[Educación XX1]]></source>
<year>2018</year>
<volume>21</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>109-34</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Donoso-Vázquez]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Las ciberviolencias de género, nuevas manifestaciones de la violencia machista]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Donoso-Vázquez]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Rebollo-Catalán]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Violencias de género en entornos virtuales]]></source>
<year>2018</year>
<page-range>15-28</page-range><publisher-loc><![CDATA[Barcelona, España ]]></publisher-loc>
<publisher-name><![CDATA[Ediciones OCTAEDRO, SL]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Drouin]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Ross]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Tobin]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sexting: A new, digital vehicle for intimate partner aggression?]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2015</year>
<volume>50</volume>
<page-range>197-204</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fernández]]></surname>
<given-names><![CDATA[AM]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Propiedades psicométricas de las escalas y cuestionarios objetivos en Psicología: Aspectos a considerar en la construcción, adaptación y utilización de instrumentos psicológicos]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Loubat]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<source><![CDATA[Diagnóstico Psicológico: más que una Intuición]]></source>
<year>2008</year>
<page-range>97-126</page-range><publisher-loc><![CDATA[Santiago ]]></publisher-loc>
<publisher-name><![CDATA[Ediciones PubliFAHU- Editorial LOM]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Foshee]]></surname>
<given-names><![CDATA[VA]]></given-names>
</name>
<name>
<surname><![CDATA[Bauman]]></surname>
<given-names><![CDATA[KE]]></given-names>
</name>
<name>
<surname><![CDATA[Linder]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Rice]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Wilcher]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Typologies of adolescent dating violence]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2007</year>
<volume>22</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>498-519</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Borrajo]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Calvete]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Partner abuse, control and violence through internet and smartphones]]></article-title>
<source><![CDATA[Papeles del Psicólogo]]></source>
<year>2018</year>
<volume>39</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>218-27</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Górriz]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[On-line childgrooming en Derecho penal español]]></article-title>
<source><![CDATA[InDret, Revista para el Análisis del Derecho]]></source>
<year>2016</year>
<volume>3</volume>
<page-range>1-47</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Harned]]></surname>
<given-names><![CDATA[MS]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Abused women or abused men? An examination of the context and outcomes of dating violence]]></article-title>
<source><![CDATA[Violence and Victims]]></source>
<year>2001</year>
<volume>16</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>269-85</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ibarra]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Protección de niños en la red: sexting, ciberbullying y pornografía infantil]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Luna]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<source><![CDATA[Estudios aplicados sobre la libertad de expresión y el derecho a la información]]></source>
<year>2014</year>
<page-range>83-115</page-range><publisher-loc><![CDATA[México ]]></publisher-loc>
<publisher-name><![CDATA[UNAM, Instituto de Investigaciones Jurídicas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="">
<collab>Instituto Europeo de la Igualdad de Género, IEIG</collab>
<source><![CDATA[La ciberviolencia contra mujeres y niñas]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jabaloyas]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Las TICs como factor de riesgo de la violencia en parejas adolescentes]]></article-title>
<source><![CDATA[Criminología y Sociedad]]></source>
<year>2015</year>
<volume>4</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>211-64</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leisring]]></surname>
<given-names><![CDATA[PA]]></given-names>
</name>
<name>
<surname><![CDATA[Giumetti]]></surname>
<given-names><![CDATA[GW]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sticks and stones may break my bones, but abusive text messages also hurt: Development and validation of the CyberPsychological Abuse scale]]></article-title>
<source><![CDATA[Partner Abuse]]></source>
<year>2014</year>
<volume>5</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>323-41</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lyndon]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Bonds-Raacke]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Cratty]]></surname>
<given-names><![CDATA[AD]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[College students&#8217; Facebook stalking of ex-partners]]></article-title>
<source><![CDATA[Cyberpsychology, Behavior, and Social Networking]]></source>
<year>2011</year>
<volume>14</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>711-6</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Madlock]]></surname>
<given-names><![CDATA[PE]]></given-names>
</name>
<name>
<surname><![CDATA[Westerman]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Hurtful cyber-teasing and violence: who' slaughing out loud?]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2011</year>
<volume>26</volume>
<numero>17</numero>
<issue>17</issue>
<page-range>3542-60</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marganski]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Melander]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Intimate partner violence victimization in the cyber and real world: examining the extent of cyber aggression experiences and its association with in-person dating violence]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2018</year>
<volume>33</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1071-95</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martinez-Pecino]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Durán]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[I Love You but I Cyberbully You. The Role of Hostile Sexism]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2016</year>
<volume>25</volume>
<page-range>1-14</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mclaughlin]]></surname>
<given-names><![CDATA[JH]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Crime and Punishment: Teen Sexting in Context]]></article-title>
<source><![CDATA[Penn State Law Review]]></source>
<year>2010</year>
<volume>115</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>135-81</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Melander]]></surname>
<given-names><![CDATA[LA]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[College students&#8217; perceptions of intimate partner cyberharassment]]></article-title>
<source><![CDATA[Cyberpsychology, Behavior, and Social Networking]]></source>
<year>2010</year>
<volume>13</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>263-8</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muñiz]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Violencia de pareja online en la adolescencia, clima familiar y escolar desde la perspectiva de género]]></article-title>
<source><![CDATA[Infancia y Aprendizaje]]></source>
<year>2017</year>
<page-range>12-22</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muñoz-Rivas]]></surname>
<given-names><![CDATA[MJ]]></given-names>
</name>
<name>
<surname><![CDATA[Graña]]></surname>
<given-names><![CDATA[JL]]></given-names>
</name>
<name>
<surname><![CDATA[O´Leary]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[González]]></surname>
<given-names><![CDATA[MP]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Aggression in adolescent dating relationships: Prevalence, justification and health consequences]]></article-title>
<source><![CDATA[Journal of Adolescent Health]]></source>
<year>2007</year>
<volume>40</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>298-304</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Flores]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Fuente]]></surname>
<given-names><![CDATA[S De la]]></given-names>
</name>
<name>
<surname><![CDATA[Álvarez]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Gutiérrez]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[Guía sobre adolescencia y sexting: Qué es y cómo prevenirlo]]></source>
<year>2011</year>
<publisher-name><![CDATA[Instituto Nacional de Tecnologías de la Información y Pantallas Amigas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Picard]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[Tech abuse in teen relationships]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Chicago, IL ]]></publisher-loc>
<publisher-name><![CDATA[Teen Research Unlimited]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Prieto]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Delgado]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fiabilidad y validez]]></article-title>
<source><![CDATA[Papeles del Psicólogo]]></source>
<year>2010</year>
<volume>31</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>67-74</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quesada]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Fernández-González]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Calvete]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El sexteo (sexting) en la adolescencia: Frecuencia y asociación con la victimización de ciberacoso y violencia en el noviazgo]]></article-title>
<source><![CDATA[Psicología Conductual: Revista Internacional de Psicología Clínica y de la Salud]]></source>
<year>2018</year>
<volume>26</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>225-42</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ramos]]></surname>
<given-names><![CDATA[MC]]></given-names>
</name>
<name>
<surname><![CDATA[Miller]]></surname>
<given-names><![CDATA[KF]]></given-names>
</name>
<name>
<surname><![CDATA[Moss]]></surname>
<given-names><![CDATA[IK]]></given-names>
</name>
<name>
<surname><![CDATA[Margolin]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Perspective-Taking and empathy mitigate family-of-origin risk for electronic aggression perpetrationtoward dating partners: A brief report]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2017</year>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reed]]></surname>
<given-names><![CDATA[LA]]></given-names>
</name>
<name>
<surname><![CDATA[Tolman]]></surname>
<given-names><![CDATA[RM]]></given-names>
</name>
<name>
<surname><![CDATA[Ward]]></surname>
<given-names><![CDATA[LM]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Snooping and sexting: Digital media as a context for dating aggression and abuse among college students]]></article-title>
<source><![CDATA[Violence Against Women]]></source>
<year>2016</year>
<volume>22</volume>
<numero>13</numero>
<issue>13</issue>
<page-range>1556-76</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez-Domínguez]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Moreno]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Durán]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Valoración de chicas adolescentes de la pornografía de venganza: Percepciones de gravedad y culpabilidad]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[García-Carpintero]]></surname>
<given-names><![CDATA[MA]]></given-names>
</name>
<name>
<surname><![CDATA[Casado]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Botello]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Aguilar]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<source><![CDATA[Libro de Actas I Congreso Internacional de Género y Salud]]></source>
<year>2017</year>
<page-range>308-14</page-range><publisher-loc><![CDATA[Sevilla, España ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de Sevilla]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez-Domínguez]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[Ciberacoso en las relaciones entre adolescentes y su reflejo en los medios]]></source>
<year>2015</year>
<publisher-loc><![CDATA[España ]]></publisher-loc>
<publisher-name><![CDATA[Universidad de Huelva]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez-Domínguez]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Martínez-Pecino]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Durán]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ciberacoso en la adolescencia y revelación de las agresiones]]></article-title>
<source><![CDATA[Apuntes de Psicología]]></source>
<year>2015</year>
<volume>33</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>95-102</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Muñoz-Fernández]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Ortega-Ruíz]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberdating Q_A: An instrument to assess the quality of adolescent dating relationships in socialnetworks]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2015</year>
<volume>48</volume>
<page-range>78-86</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Muñoz-Fernández]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Lucio]]></surname>
<given-names><![CDATA[LA]]></given-names>
</name>
<name>
<surname><![CDATA[Ortega-Ruíz]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ciberagresión en parejas adolescentes: Un estudio transcultural España-México]]></article-title>
<source><![CDATA[Revista Mexicana de Psicología]]></source>
<year>2017</year>
<volume>34</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>46-54</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schnurr]]></surname>
<given-names><![CDATA[MP]]></given-names>
</name>
<name>
<surname><![CDATA[Mahatmya]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Basche]]></surname>
<given-names><![CDATA[RA]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The role of dominance, cyberaggression perpetration, and gender on emerging adults&#8217; perpetration of intimate partner violence]]></article-title>
<source><![CDATA[Psychology of Violence]]></source>
<year>2013</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>70-83</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Cénat]]></surname>
<given-names><![CDATA[JM]]></given-names>
</name>
<name>
<surname><![CDATA[Lapierre]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Dion]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Hébert]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Côté]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberdating violence: Prevalence and correlates among high school students from small urban areas in Quebec]]></article-title>
<source><![CDATA[Journal of Affective Disorders]]></source>
<year>2018</year>
<volume>234</volume>
<page-range>220-3</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Smith-Darden]]></surname>
<given-names><![CDATA[JP]]></given-names>
</name>
<name>
<surname><![CDATA[Kernsmith]]></surname>
<given-names><![CDATA[PD]]></given-names>
</name>
<name>
<surname><![CDATA[Victor]]></surname>
<given-names><![CDATA[BG]]></given-names>
</name>
<name>
<surname><![CDATA[Lathrop]]></surname>
<given-names><![CDATA[RA]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Electronic displays of aggression in teen dating relationships: Does the social ecology matter?]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2017</year>
<volume>67</volume>
<page-range>33-40</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Smoker]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[March]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Predicting perpetration of intimate partner cyberstalking: Gender and the Dark Tetrad]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2017</year>
<volume>72</volume>
<page-range>390-6</page-range></nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Strawhun]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Adams]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Huss]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The assessment of cyberstalking: an expanded examination including social networking, attachment, jealousy, and anger in relation to violence and abuse]]></article-title>
<source><![CDATA[Violence and Victims]]></source>
<year>2013</year>
<volume>28</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>715-30</page-range></nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Temple]]></surname>
<given-names><![CDATA[JR]]></given-names>
</name>
<name>
<surname><![CDATA[Choi]]></surname>
<given-names><![CDATA[HJ]]></given-names>
</name>
<name>
<surname><![CDATA[Brem]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Wolford-Clevenger]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Stuart]]></surname>
<given-names><![CDATA[GL]]></given-names>
</name>
<name>
<surname><![CDATA[Peskin]]></surname>
<given-names><![CDATA[MF]]></given-names>
</name>
<name>
<surname><![CDATA[Elmquist]]></surname>
<given-names><![CDATA[JA]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The temporal association between traditional andcyber dating abuse among adolescents]]></article-title>
<source><![CDATA[Journal of Youth and Adolescence]]></source>
<year>2016</year>
<volume>45</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>340-9</page-range></nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tokunaga]]></surname>
<given-names><![CDATA[RS]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social networking site or social surveillance site? Understanding the use of interpersonal electronic surveillance in romantic relationships]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2011</year>
<volume>27</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>705-13</page-range></nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tompson]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Benz]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Agiesta]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[The digital abuse study: Experiences ofteens and young adults]]></source>
<year>2013</year>
<publisher-name><![CDATA[AP-NORC Centre for Public Affairs Research. Universidad de Chicago]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Robles]]></surname>
<given-names><![CDATA[JM]]></given-names>
</name>
<name>
<surname><![CDATA[De Marco]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<source><![CDATA[El ciberacoso como forma de ejercer la violencia de género en la juventud: Un riesgo en la sociedad de la información y del conocimiento]]></source>
<year>2013</year>
<publisher-name><![CDATA[Ministerio de Sanidad Servicios Sociales e Igualdad. Gobierno de España]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wolak]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Finkelhor]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[Sexting: A typology]]></source>
<year>2011</year>
<publisher-loc><![CDATA[Durham, NH ]]></publisher-loc>
<publisher-name><![CDATA[Crimes against Children Research Center]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wolford-Clevenger]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Zapor]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Brasfield]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Febres]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Elmquist]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Brem]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Stuart]]></surname>
<given-names><![CDATA[GL]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An examination of the partner cyber abuse questionnaire in a college student sample]]></article-title>
<source><![CDATA[Psychology of Violence]]></source>
<year>2016</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>156-62</page-range></nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wright]]></surname>
<given-names><![CDATA[MF]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber aggression within adolescents&#8217; romantic relationships: Linkages to parental and partner attachment]]></article-title>
<source><![CDATA[Journal of Youth and Adolescence]]></source>
<year>2015</year>
<volume>44</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>37-47</page-range></nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zweig]]></surname>
<given-names><![CDATA[JM]]></given-names>
</name>
<name>
<surname><![CDATA[Dank]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Yahner]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Lachman]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The rate of cyber datingabuse among teens and how it relates to other forms of teen dating violence]]></article-title>
<source><![CDATA[Journal of Youth and Adolescence]]></source>
<year>2013</year>
<volume>42</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>1063-77</page-range></nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zweig]]></surname>
<given-names><![CDATA[JM]]></given-names>
</name>
<name>
<surname><![CDATA[Lachman]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Yahner]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Dank]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Correlates of cyber dating abuse among teens]]></article-title>
<source><![CDATA[Journal of Youth and Adolescence]]></source>
<year>2014</year>
<volume>43</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1306-21</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
