<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1132-0559</journal-id>
<journal-title><![CDATA[Psychosocial Intervention]]></journal-title>
<abbrev-journal-title><![CDATA[Psychosocial Intervention]]></abbrev-journal-title>
<issn>1132-0559</issn>
<publisher>
<publisher-name><![CDATA[Colegio Oficial de la Psicología de Madrid]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1132-05592022000100005</article-id>
<article-id pub-id-type="doi">10.5093/pi2022a3</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Smartphone addiction, social support, and cybercrime victimization: a discrete survival and growth mixture model]]></article-title>
<article-title xml:lang="es"><![CDATA[La adicción a los teléfonos inteligentes, el apoyo social y la victimización en la ciberdelincuencia: un modelo de curvas de supervivencia para tiempo discreto y mixtura de crecimiento]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Herrero]]></surname>
<given-names><![CDATA[Juan]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[Andrea]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Vivas]]></surname>
<given-names><![CDATA[Pep]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Urueña]]></surname>
<given-names><![CDATA[Alberto]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,University of Oviedo  ]]></institution>
<addr-line><![CDATA[Oviedo ]]></addr-line>
<country>Spain</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Universitat Oberta de Cataluña  ]]></institution>
<addr-line><![CDATA[Barcelona ]]></addr-line>
<country>Spain</country>
</aff>
<aff id="A03">
<institution><![CDATA[,Universidad Politécnica de Madrid  ]]></institution>
<addr-line><![CDATA[Madrid ]]></addr-line>
<country>Spain</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2022</year>
</pub-date>
<volume>31</volume>
<numero>1</numero>
<fpage>59</fpage>
<lpage>66</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.isciii.es/scielo.php?script=sci_arttext&amp;pid=S1132-05592022000100005&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.isciii.es/scielo.php?script=sci_abstract&amp;pid=S1132-05592022000100005&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.isciii.es/scielo.php?script=sci_pdf&amp;pid=S1132-05592022000100005&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT In recent decades, criminological theories have identified a set of vulnerabilities in potential victims that seek to explain their victimization. When it comes to explaining cybercrime victimization, however, the important role that addiction to the vulnerabilities associated with technological devices can play has tended to be overlooked. In this paper we empirically link smartphone addiction, social support, and cyberfraud victimization in a nationally representative sample of 716 smartphone users followed for three years. The results of discrete survival and growth mixture models suggest that the probability of cyberfraud victimization is lower among users with a decrease in smartphone addiction and an increase in social support over the three years. These results allow us to suggest new avenues in the study of cybercrime victimization, with special emphasis on the psychosocial consequences that the deregulated use of these technological devices may entail.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN En las últimas décadas, las teorías criminológicas han identificado una serie de vulnerabilidades en las víctimas potenciales que tratan de explicar su victimización. Sin embargo, cuando se trata de explicar la victimización por ciberdelincuencia, se ha tendido a pasar por alto el importante papel que puede desempeñar la adicción a los dispositivos tecnológicos y sus consecuencias psicosociales. En este trabajo relacionamos empíricamente la adicción a los smartphones, el apoyo social y la victimización por ciberdelincuencia en una muestra representativa a nivel nacional de 716 usuarios a los que se siguió durante tres años. Los resultados de los modelos de curvas de supervivencia para tiempo discreto y mixtura de crecimiento latente sugieren que la probabilidad de victimización por ciberfraude es menor entre los usuarios con una disminución de la adicción a los teléfonos inteligentes y un aumento del apoyo social a lo largo de los tres años. Estos resultados nos permiten sugerir nuevas vías en el estudio de la victimización por ciberdelincuencia, con especial énfasis en las consecuencias psicosociales que puede conllevar el uso desregulado de estos dispositivos tecnológicos.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Cybercrime victimization]]></kwd>
<kwd lng="en"><![CDATA[Latent growth mixture modeling]]></kwd>
<kwd lng="en"><![CDATA[Smartphone addiction]]></kwd>
<kwd lng="en"><![CDATA[Social support]]></kwd>
<kwd lng="en"><![CDATA[Survival curves]]></kwd>
<kwd lng="es"><![CDATA[Victimización por ciberdelincuencia]]></kwd>
<kwd lng="es"><![CDATA[Modelos de mixtura de crecimiento latente]]></kwd>
<kwd lng="es"><![CDATA[Adicción a los teléfonos inteligentes]]></kwd>
<kwd lng="es"><![CDATA[Apoyo social]]></kwd>
<kwd lng="es"><![CDATA[Curvas de supervivencia]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Akdemir]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Lawless]]></surname>
<given-names><![CDATA[C. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Exploring the human factor in cyber-enabled and cyber-dependent crime victimisation: A lifestyle routine activities approach]]></article-title>
<source><![CDATA[Internet Research]]></source>
<year>2020</year>
<volume>30</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1665-2020</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alhaboby]]></surname>
<given-names><![CDATA[Z. A]]></given-names>
</name>
<name>
<surname><![CDATA[Barnes]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Evans]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Short]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber-victimization of people with chronic conditions and disabilities: A systematic review of scope and impact]]></article-title>
<source><![CDATA[Trauma, Violence, &amp; Abuse]]></source>
<year>2019</year>
<volume>20</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>398-415</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Al-Kandari]]></surname>
<given-names><![CDATA[Y. Y]]></given-names>
</name>
<name>
<surname><![CDATA[Al-Sejari]]></surname>
<given-names><![CDATA[M. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social isolation, social support and their relationship with smartphone addiction]]></article-title>
<source><![CDATA[Information, Communication &amp; Society]]></source>
<year>2020</year>
<volume>24</volume>
<numero>13</numero>
<issue>13</issue>
<page-range>1925-43</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alves]]></surname>
<given-names><![CDATA[L. M]]></given-names>
</name>
<name>
<surname><![CDATA[Wilson]]></surname>
<given-names><![CDATA[S. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The effects of loneliness on telemarketing fraud vulnerability among older adults]]></article-title>
<source><![CDATA[Journal of Elder Abuse &amp; Neglect]]></source>
<year>2008</year>
<volume>20</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>63-85</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bauer]]></surname>
<given-names><![CDATA[D. J]]></given-names>
</name>
<name>
<surname><![CDATA[Curran]]></surname>
<given-names><![CDATA[P. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Distributional assumptions of growth mixture models: Implications for overextraction of latent trajectory classes]]></article-title>
<source><![CDATA[Psychological Methods]]></source>
<year>2003</year>
<volume>8</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>338-63</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bian]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Leung]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Linking loneliness, shyness, smartphone addiction symptoms, and patterns of Smartphone use to social capital]]></article-title>
<source><![CDATA[Social Science Computer Review]]></source>
<year>2015</year>
<volume>33</volume>
<page-range>61-79</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Buchanan]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Whitty]]></surname>
<given-names><![CDATA[M. T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The online dating romance scam: Causes and consequences of victimhood]]></article-title>
<source><![CDATA[Psychology, Crime &amp; Law]]></source>
<year>2014</year>
<volume>20</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>261-83</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Busch]]></surname>
<given-names><![CDATA[P. A]]></given-names>
</name>
<name>
<surname><![CDATA[McCarthy]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Antecedents and consequences of problematic smartphone use: A systematic literature review of an emerging research area]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2020</year>
<volume>114</volume>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Celeux]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Frühwirth-Schnatter]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Robert]]></surname>
<given-names><![CDATA[C. P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Model selection for mixture models&#8212;perspectives and strategies]]></article-title>
<source><![CDATA[Handbook of mixture analysis]]></source>
<year>2018</year>
<page-range>121-60</page-range><publisher-name><![CDATA[Taylor &amp; Francis]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Elhai]]></surname>
<given-names><![CDATA[J. D]]></given-names>
</name>
<name>
<surname><![CDATA[Dvorak]]></surname>
<given-names><![CDATA[R. D]]></given-names>
</name>
<name>
<surname><![CDATA[Levine]]></surname>
<given-names><![CDATA[J. C]]></given-names>
</name>
<name>
<surname><![CDATA[Hall]]></surname>
<given-names><![CDATA[B. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Problematic smartphone use: A conceptual overview and systematic review of relations with anxiety and depression psychopathology]]></article-title>
<source><![CDATA[Journal of Affective Disorders]]></source>
<year>2017</year>
<volume>207</volume>
<page-range>251-9</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ghazi-Tehrani]]></surname>
<given-names><![CDATA[A. K]]></given-names>
</name>
<name>
<surname><![CDATA[Pontell]]></surname>
<given-names><![CDATA[H. N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Phishing evolves: Analyzing the enduring cybercrime]]></article-title>
<source><![CDATA[Victims &amp; Offenders]]></source>
<year>2021</year>
<volume>16</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>316-42</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Herrero]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Fuente]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Gracia]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Covariates of subjective well-being among Latin American immigrants in Spain: The role of social integration in the community]]></article-title>
<source><![CDATA[Journal of Community Psychology]]></source>
<year>2011</year>
<volume>39</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>761-75</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gui]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Büchi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[From use to overuse: Digital inequality in the age of communication abundance]]></article-title>
<source><![CDATA[Social Science Computer Review]]></source>
<year>2021</year>
<volume>39</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>3-19</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Herrero]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Vivas]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Arenas]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Urueña]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Examining the empirical links between digital social pressure, personality, psychological distress, social support, users' residential living conditions, and smartphone addiction]]></article-title>
<source><![CDATA[Social Science Computer Review]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Herrero]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Vivas]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Hidalgo]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez]]></surname>
<given-names><![CDATA[F. J]]></given-names>
</name>
<name>
<surname><![CDATA[Urueña]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Smartphone addiction and cybercrime victimization in the context of lifestyles routine activities and self-control theories: The user's dual vulnerability model of cybercrime victimization]]></article-title>
<source><![CDATA[International Journal of Environmental Research and Public Health]]></source>
<year>2021</year>
<volume>18</volume>
<numero>7</numero>
<issue>7</issue>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Herrero]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Vivas]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Urueña]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Smartphone addiction and social support: A three-year longitudinal study]]></article-title>
<source><![CDATA[Psychosocial Intervention]]></source>
<year>2019</year>
<month>a</month>
<volume>28</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>111-8</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Herrero]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Vivas]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Urueña]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Technological addiction in context: The influence of perceived neighborhood social disorder on the extensive use and addiction to the smartphone]]></article-title>
<source><![CDATA[Social Science Computer Review]]></source>
<year>2019</year>
<month>b</month>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Herrero]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Urueña]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Hidalgo]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Smartphone addiction: Psychosocial correlates, risky attitudes, and smartphone harm]]></article-title>
<source><![CDATA[Journal of Risk Research]]></source>
<year>2019</year>
<month>a</month>
<volume>22</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>81-92</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Herrero]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Urueña]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Torres]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Hidalgo]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Socially connected but still isolated: Smartphone addiction decreases social support over time]]></article-title>
<source><![CDATA[Social Science Computer Review]]></source>
<year>2019</year>
<month>b</month>
<volume>37</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>73-88</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Holtfreter]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Reisig]]></surname>
<given-names><![CDATA[M. D]]></given-names>
</name>
<name>
<surname><![CDATA[Pratt]]></surname>
<given-names><![CDATA[T. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Low self-control, routine activities, and fraud victimization]]></article-title>
<source><![CDATA[Criminology]]></source>
<year>2008</year>
<volume>46</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>189-220</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ihm]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social implications of children's smartphone addiction: The role of support networks and social engagement]]></article-title>
<source><![CDATA[Journal of Behavioral Addictions]]></source>
<year>2018</year>
<volume>7</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>473-81</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Judges]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The impact of loneliness on financial fraud victimization in Chinese older adults]]></article-title>
<source><![CDATA[Innovation in Aging]]></source>
<year>2018</year>
<volume>2</volume>
<numero>Suppl 1</numero>
<issue>Suppl 1</issue>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Koh]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Avoidant attachment and smartphone addiction in college students: The mediating effects of anxiety and self-esteem]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2018</year>
<volume>84</volume>
<page-range>264-71</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kubrin]]></surname>
<given-names><![CDATA[C. E]]></given-names>
</name>
<name>
<surname><![CDATA[Ousey]]></surname>
<given-names><![CDATA[G. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding victimization: The role of cultural theories]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Pratt]]></surname>
<given-names><![CDATA[T. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Turanovic]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Revitalizing victimization theory: Revisions, applications, and new directions]]></source>
<year>2021</year>
<publisher-name><![CDATA[Routlege]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kushlev]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Dwyer]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Dunn]]></surname>
<given-names><![CDATA[E. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The social price of constant connectivity: Smartphones impose subtle costs on well-being]]></article-title>
<source><![CDATA[Current Directions in Psychological Science]]></source>
<year>2019</year>
<volume>28</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>347-52</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lapierre]]></surname>
<given-names><![CDATA[M. A]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Smartphones and social support: Longitudinal associations between smartphone use and types of support]]></article-title>
<source><![CDATA[Social Science Computer Review]]></source>
<year>2021</year>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Leukfeldt]]></surname>
<given-names><![CDATA[E. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comparing victims of phishing and malware attacks: Unraveling risk factors and possibilities for situational crime prevention]]></article-title>
<source><![CDATA[arXiv preprint]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Dean]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Ensel]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Social support, life events and depression]]></source>
<year>1986</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Academic Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Ma]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social support through online social networking sites and addiction among college students: The mediating roles of fear of missing out and problematic smartphone use]]></article-title>
<source><![CDATA[Current Psychology]]></source>
<year>2018</year>
<volume>39</volume>
<page-range>1892-9</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lougheed]]></surname>
<given-names><![CDATA[J. P]]></given-names>
</name>
<name>
<surname><![CDATA[Benson]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Cole]]></surname>
<given-names><![CDATA[P. M]]></given-names>
</name>
<name>
<surname><![CDATA[Ram]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Multilevel survival analysis: Studying the timing of children's recurring behaviors]]></article-title>
<source><![CDATA[Developmental Psychology]]></source>
<year>2019</year>
<volume>55</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>53-65</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Masyn]]></surname>
<given-names><![CDATA[K. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Discrete-time survival factor mixture analysis for low-frequency recurrent event histories]]></article-title>
<source><![CDATA[Research in Human Development]]></source>
<year>2009</year>
<volume>6</volume>
<numero>2-3</numero>
<issue>2-3</issue>
<page-range>165-94</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martínez-Ferrer]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[León-Moreno]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Suárez-Relinque]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Del Moral-Arroyo]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Musitu-Ochoa]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cybervictimization, offline victimization, and cyberbullying: The mediating role of the problematic use of social networking sites in boys and girls]]></article-title>
<source><![CDATA[Psychosocial Intervention]]></source>
<year>2021</year>
<volume>30</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>155-62</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Matthews]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Caspi]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Danese]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Fisher]]></surname>
<given-names><![CDATA[H. L]]></given-names>
</name>
<name>
<surname><![CDATA[Moffitt]]></surname>
<given-names><![CDATA[T. E]]></given-names>
</name>
<name>
<surname><![CDATA[Arseneault]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A longitudinal twin study of victimization and loneliness from childhood to young adulthood]]></article-title>
<source><![CDATA[Development and Psychopathology]]></source>
<year>2020</year>
<page-range>1-11</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mollenhorst]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Edling]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Rydgren]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Personal networks and crime victimization among Swedish youth]]></article-title>
<source><![CDATA[Journal of Scandinavian Studies in Criminology and Crime Prevention]]></source>
<year>2018</year>
<volume>19</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>116-35</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muthén]]></surname>
<given-names><![CDATA[L. K]]></given-names>
</name>
<name>
<surname><![CDATA[Muthén]]></surname>
<given-names><![CDATA[B. O.]]></given-names>
</name>
</person-group>
<source><![CDATA[Mplus user's guide]]></source>
<year>2017</year>
<edition>eigh</edition>
<publisher-name><![CDATA[Muthén &amp; Muthén]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nylund]]></surname>
<given-names><![CDATA[K. L]]></given-names>
</name>
<name>
<surname><![CDATA[Asparouhov]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Muthén]]></surname>
<given-names><![CDATA[B. O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Deciding on the number of classes in latent class analysis and growth mixture modeling: A Monte Carlo simulation study]]></article-title>
<source><![CDATA[Structural Equation modeling: A Multidisciplinary Journal]]></source>
<year>2007</year>
<volume>14</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>535-69</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Oksanen]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Keipi]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Young people as victims of crime on the internet: A population-based study in Finland]]></article-title>
<source><![CDATA[Vulnerable Children and Youth Studies]]></source>
<year>2013</year>
<volume>8</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>298-309</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pratt]]></surname>
<given-names><![CDATA[T. C]]></given-names>
</name>
<name>
<surname><![CDATA[Turanovic]]></surname>
<given-names><![CDATA[J. J]]></given-names>
</name>
<name>
<surname><![CDATA[Fox]]></surname>
<given-names><![CDATA[K. A]]></given-names>
</name>
<name>
<surname><![CDATA[Wright]]></surname>
<given-names><![CDATA[K. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Self-control and victimization: A meta-analysis]]></article-title>
<source><![CDATA[Criminology]]></source>
<year>2014</year>
<volume>52</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>87-116</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ranney]]></surname>
<given-names><![CDATA[J. D]]></given-names>
</name>
<name>
<surname><![CDATA[Troop-Gordon]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The role of popularity and digital self-monitoring in adolescents' cyberbehaviors and cybervictimization]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2020</year>
<volume>102</volume>
<page-range>293-302</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Spano]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Nagy]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social guardianship and social isolation: An application and extension of lifestyle/routine activities theory to rural adolescents]]></article-title>
<source><![CDATA[Rural Sociology]]></source>
<year>2005</year>
<volume>70</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>414-37</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Turanovic]]></surname>
<given-names><![CDATA[J. J]]></given-names>
</name>
<name>
<surname><![CDATA[Pratt]]></surname>
<given-names><![CDATA[T. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["Can't stop, won't stop": Self-control, risky lifestyles, and repeat victimization]]></article-title>
<source><![CDATA[Journal of Quantitative Criminology]]></source>
<year>2014</year>
<volume>30</volume>
<page-range>29-56</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Whitty]]></surname>
<given-names><![CDATA[M. T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Predicting susceptibility to cyber-fraud victimhood]]></article-title>
<source><![CDATA[Journal of Financial Crime]]></source>
<year>2019</year>
<volume>26</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>277-92</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wilcox]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Cullen]]></surname>
<given-names><![CDATA[F. T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Situational opportunity theories of crime]]></article-title>
<source><![CDATA[Annual Review of Criminology]]></source>
<year>2018</year>
<volume>1</volume>
<page-range>123-48</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xing]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Zhao]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Wu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Vulnerability to fraud among Chinese older adults: Do personality traits and loneliness matter?]]></article-title>
<source><![CDATA[Journal of Elder Abuse &amp; Neglect]]></source>
<year>2020</year>
<volume>32</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>46-59</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yap]]></surname>
<given-names><![CDATA[M. B]]></given-names>
</name>
<name>
<surname><![CDATA[Devilly]]></surname>
<given-names><![CDATA[G. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The role of perceived social support in crime victimization]]></article-title>
<source><![CDATA[Clinical Psychology Review]]></source>
<year>2004</year>
<volume>24</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-14</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yayan]]></surname>
<given-names><![CDATA[E. H]]></given-names>
</name>
<name>
<surname><![CDATA[Suna Da]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Düken]]></surname>
<given-names><![CDATA[M. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The effects of technology use on working young loneliness and social relationships]]></article-title>
<source><![CDATA[Perspectives in Psychiatric Care]]></source>
<year>2019</year>
<volume>55</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>194-200</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
