<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1889-1861</journal-id>
<journal-title><![CDATA[The European Journal of Psychology Applied to Legal Context]]></journal-title>
<abbrev-journal-title><![CDATA[The European Journal of Psychology Applied to Legal Context]]></abbrev-journal-title>
<issn>1889-1861</issn>
<publisher>
<publisher-name><![CDATA[Sociedad Española de Psicología Jurídica y Forense; Colegio Oficial de la Psicología de Madrid]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1889-18612018000200079</article-id>
<article-id pub-id-type="doi">10.5093/ejpalc2018a8</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Individual, Family, and Community Predictors of Cyber-aggression among Adolescents]]></article-title>
<article-title xml:lang="es"><![CDATA[Predictores individuales, familiares y comunitarios de la ciberagresión en adolescentes]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Álvarez-García]]></surname>
<given-names><![CDATA[David]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Núñez]]></surname>
<given-names><![CDATA[José Carlos]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[Trinidad]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Barreiro-Collazo]]></surname>
<given-names><![CDATA[Alejandra]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,University of Oviedo Department of Psychology ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Spain</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2018</year>
</pub-date>
<volume>10</volume>
<numero>2</numero>
<fpage>79</fpage>
<lpage>88</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://scielo.isciii.es/scielo.php?script=sci_arttext&amp;pid=S1889-18612018000200079&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.isciii.es/scielo.php?script=sci_abstract&amp;pid=S1889-18612018000200079&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://scielo.isciii.es/scielo.php?script=sci_pdf&amp;pid=S1889-18612018000200079&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT The objective of this article is to analyze the predictive capacity of some individual, family, and community variables concerning the likelihood that a teenager will engage in aggressive behavior toward others using a mobile phone or the Internet, occasionally or intensely, controlling for the effect of potential confounding variables. To that end, the Cyber-Aggression Questionnaire for Adolescents (CYBA) as well as previously validated scales for the evaluation of the potential indicators analyzed were applied to 3,059 adolescents 12 to 18 years of age (M = 14.01, SD = 1.39). The aforementioned scales include sociodemographic variables (age and sex) and variables referring to the use of the Internet (social networks, instant messaging programs, and the Internet for non-school tasks), parental control (behavioral control, rules for the use of the Internet, Internet use monitoring, and affection and communication), personality (impulsivity and empathy), antisocial behavior (frequency of aggression toward others at school, antisocial behavior outside the school, and antisocial friendships), and frequency of cyber-victimization. Multivariate regression analyses highlight the predictive capacity of impulsivity, aggression at school, and cyber-victimization as risk factors of cyber-aggression. They also suggest the existence of indirect or even spurious relationships between some of the variables analyzed and cyber-aggression. We discuss the practical implications of these results.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN The objective of this article is to analyze the predictive capacity of some individual, family, and community variables concerning the likelihood that a teenager will engage in aggressive behavior toward others using a mobile phone or the Internet, occasionally or intensely, controlling for the effect of potential confounding variables. To that end, the Cyber-Aggression Questionnaire for Adolescents (CYBA) as well as previously validated scales for the evaluation of the potential indicators analyzed were applied to 3,059 adolescents 12 to 18 years of age (M = 14.01, SD = 1.39). The aforementioned scales include sociodemographic variables (age and sex) and variables referring to the use of the Internet (social networks, instant messaging programs, and the Internet for non-school tasks), parental control (behavioral control, rules for the use of the Internet, Internet use monitoring, and affection and communication), personality (impulsivity and empathy), antisocial behavior (frequency of aggression toward others at school, antisocial behavior outside the school, and antisocial friendships), and frequency of cyber-victimization. Multivariate regression analyses highlight the predictive capacity of impulsivity, aggression at school, and cyber-victimization as risk factors of cyber-aggression. They also suggest the existence of indirect or even spurious relationships between some of the variables analyzed and cyber-aggression. We discuss the practical implications of these results.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Cyber-aggression]]></kwd>
<kwd lng="en"><![CDATA[Predictors]]></kwd>
<kwd lng="en"><![CDATA[Risk factors]]></kwd>
<kwd lng="en"><![CDATA[Protective factors]]></kwd>
<kwd lng="en"><![CDATA[Adolescence]]></kwd>
<kwd lng="es"><![CDATA[Ciberagresión]]></kwd>
<kwd lng="es"><![CDATA[Predictores]]></kwd>
<kwd lng="es"><![CDATA[Factores de riesgo]]></kwd>
<kwd lng="es"><![CDATA[Factores de protección]]></kwd>
<kwd lng="es"><![CDATA[Adolescencia]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Álvarez-García]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Barreiro-Collazo]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Núñez]]></surname>
<given-names><![CDATA[J. C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberaggression among adolescents: Prevalence and gender differences]]></article-title>
<source><![CDATA[Comunicar]]></source>
<year>2017</year>
<volume>50</volume>
<page-range>89-97</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Álvarez-García]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Barreiro-Collazo]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Núñez]]></surname>
<given-names><![CDATA[J. C]]></given-names>
</name>
<name>
<surname><![CDATA[Dobarro]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Validity and reliability of the Cyber-aggression Questionnaire for Adolescents (CYBA)]]></article-title>
<source><![CDATA[The European Journal of Psychology Applied to Legal Context]]></source>
<year>2016</year>
<volume>8</volume>
<page-range>69-77</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Álvarez-García]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Barreiro-Collazo]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Dobarro]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Antúnez]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Parenting style dimensions as predictors of adolescent antisocial behavior]]></article-title>
<source><![CDATA[Frontiers in Psychology]]></source>
<year>2016</year>
<volume>7</volume>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Álvarez-García]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Cueli]]></surname>
<given-names><![CDATA[M.,]]></given-names>
</name>
<name>
<surname><![CDATA[Núñez]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Parental control of Internet use during adolescence: Evolution and gender differences]]></article-title>
<source><![CDATA[Control parental del uso de Internet durante la adolescencia: evolución y diferencias de género]]></source>
<year>2017</year>
<publisher-name><![CDATA[Manuscript submitted for publication]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Álvarez-García]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Núñez]]></surname>
<given-names><![CDATA[J. C]]></given-names>
</name>
<name>
<surname><![CDATA[Barreiro-Collazo]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Validation of the Cybervictimization Questionnaire (CYVIC) for adolescents]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2017</year>
<volume>70</volume>
<page-range>270-81</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aoyama]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Utsumi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Hasegawa]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying in Japan: Cases, government reports, adolescent relational aggression, and parental monitoring roles]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Q.]]></given-names>
</name>
<name>
<surname><![CDATA[Cross]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberbullying in the global playground. Research from international perspectives]]></source>
<year>2012</year>
<page-range>183-201</page-range><publisher-loc><![CDATA[Malden, MA ]]></publisher-loc>
<publisher-name><![CDATA[Wiley-Blackwell]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bastiaensens]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Pabian]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Vandebosch]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Poels]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Van Cleemput]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[DeSmet]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[De Bourdeaudhuij]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[From normative influence to social pressure: How relevant others affect whether bystanders join in cyberbullying]]></article-title>
<source><![CDATA[Social Development]]></source>
<year>2016</year>
<volume>25</volume>
<page-range>193-211</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Beran]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Mishna]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[McInroy]]></surname>
<given-names><![CDATA[L. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Shariff]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Children&#8217;s experiences of cyberbullying: A Canadian national study]]></article-title>
<source><![CDATA[Children &amp; Schools]]></source>
<year>2015</year>
<volume>37</volume>
<page-range>207-14</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brewer]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Kerslake]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying, self-esteem, empathy and loneliness]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2015</year>
<volume>48</volume>
<page-range>255-60</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Buelga]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Iranzo]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Cava]]></surname>
<given-names><![CDATA[M. J]]></given-names>
</name>
<name>
<surname><![CDATA[Torralba]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Psychological profile of adolescent cyberbullying aggressors]]></article-title>
<source><![CDATA[Revista de Psicología Social]]></source>
<year>2015</year>
<volume>30</volume>
<page-range>382-406</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Calmaestra]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Escorial]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Del Moral]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Perazzo]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Ubrich]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[I don&#8217;t play that. Bullying and cyberbullying in childhood]]></article-title>
<source><![CDATA[Yo a eso no juego. Bullying y cyberbullying en la infancia]]></source>
<year>2016</year>
<publisher-loc><![CDATA[Madrid, España ]]></publisher-loc>
<publisher-name><![CDATA[Save the Children]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Calvete]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Orue]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Estévez]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Villardón]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Padilla]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying in adolescents: Modalities and aggressors&#8217; profile]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2010</year>
<volume>26</volume>
<page-range>1128-35</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chan]]></surname>
<given-names><![CDATA[S. F.]]></given-names>
</name>
<name>
<surname><![CDATA[La Greca]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber victimization and aggression: Are they linked with adolescent smoking and drinking?]]></article-title>
<source><![CDATA[Child &amp; Youth Care Forum]]></source>
<year>2016</year>
<volume>45</volume>
<page-range>47-63</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chapple]]></surname>
<given-names><![CDATA[C. L]]></given-names>
</name>
<name>
<surname><![CDATA[Vaske]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hope]]></surname>
<given-names><![CDATA[T. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sex differences in the causes of self-control: An examination of mediation, moderation, and gendered etiologies]]></article-title>
<source><![CDATA[Journal of Criminal Justice]]></source>
<year>2010</year>
<volume>38</volume>
<page-range>1122-31</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ciucci]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Baroncelli]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Emotion-related personality traits and peer social standing: Unique and interactive effects in cyberbullying behaviors]]></article-title>
<source><![CDATA[Cyberpsychology, Behavior, and Social Networking]]></source>
<year>2014</year>
<volume>17</volume>
<page-range>490-584</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Corcoran]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Mc Guckin]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Prentice]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying or cyber aggression? A review of existing definitions of cyber-based peer-to-peer aggression]]></article-title>
<source><![CDATA[Societies]]></source>
<year>2015</year>
<volume>5</volume>
<page-range>245-55</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Criss]]></surname>
<given-names><![CDATA[M. M]]></given-names>
</name>
<name>
<surname><![CDATA[Houltbergb]]></surname>
<given-names><![CDATA[B., J.]]></given-names>
</name>
<name>
<surname><![CDATA[Cui]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Bosler]]></surname>
<given-names><![CDATA[C. D]]></given-names>
</name>
<name>
<surname><![CDATA[Morris]]></surname>
<given-names><![CDATA[A. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Silk]]></surname>
<given-names><![CDATA[J. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Direct and indirect links between peer factors and adolescent adjustment difficulties]]></article-title>
<source><![CDATA[Journal of Applied Developmental Psychology]]></source>
<year>2016</year>
<volume>43</volume>
<page-range>83-90</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cutrín]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
<name>
<surname><![CDATA[Gómez-Fraguela]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Luengo]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Peer-group mediation in the relationship between family and juvenile antisocial behavior]]></article-title>
<source><![CDATA[The European Journal of Psychology Applied to Legal Context]]></source>
<year>2015</year>
<volume>7</volume>
<page-range>59-65</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Del Rey]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Casas]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ortega]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Impact of the ConRed Program on different cyberbulling roles]]></article-title>
<source><![CDATA[Aggressive Behavior]]></source>
<year>2016</year>
<volume>42</volume>
<page-range>123-35</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Del Rey]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lazuras]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Casas]]></surname>
<given-names><![CDATA[J. A]]></given-names>
</name>
<name>
<surname><![CDATA[Barkoukis]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Ortega]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Tsorbatzoudis]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Does empathy predict (cyber) bullying perpetration, and how do age, gender and nationality affect this relationship?]]></article-title>
<source><![CDATA[Learning and Individual Differences]]></source>
<year>2016</year>
<volume>45</volume>
<page-range>275-81</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Díaz-Aguado]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[[National survey on relations at school in Compulsory Secondary Education]]></article-title>
<source><![CDATA[Estudio estatal sobre la convivencia escolar en la Educación Secundaria Obligatoria]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Madrid, España ]]></publisher-loc>
<publisher-name><![CDATA[Ministerio de Educación]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Festl]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Scharkow]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Quandt]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The individual or the group: A multilevel analysis of cyberbullying in school classes]]></article-title>
<source><![CDATA[Human Communication Research]]></source>
<year>2015</year>
<volume>41</volume>
<page-range>535-56</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Floros]]></surname>
<given-names><![CDATA[G. D]]></given-names>
</name>
<name>
<surname><![CDATA[Siomos]]></surname>
<given-names><![CDATA[K. E]]></given-names>
</name>
<name>
<surname><![CDATA[Fisoun]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Dafouli]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Geroukalis]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adolescent online cyberbullying in Greece: The impact of parental online security practices, bonding, and online impulsiveness]]></article-title>
<source><![CDATA[Journal of School Health]]></source>
<year>2013</year>
<volume>83</volume>
<page-range>445-53</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fletcher]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Fitzgerald-Yau]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Jones]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Allen]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Viner.]]></surname>
<given-names><![CDATA[R. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bonell]]></surname>
<given-names><![CDATA[Ch.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Brief report: Cyberbullying perpetration and its associations with socio-demographics, aggressive behaviour at school, and mental health outcomes]]></article-title>
<source><![CDATA[Journal of Adolescence]]></source>
<year>2014</year>
<volume>37</volume>
<page-range>1393-8</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Haltigan]]></surname>
<given-names><![CDATA[J. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Vaillancourt]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Joint trajectories of bullying and peer victimization across Elementary and Middle School and associations with symptoms of psychopathology]]></article-title>
<source><![CDATA[Developmental Psychology]]></source>
<year>2014</year>
<volume>50</volume>
<page-range>2426-36</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kokkinos]]></surname>
<given-names><![CDATA[C. M]]></given-names>
</name>
<name>
<surname><![CDATA[Antoniadou]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Asdre]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Voulgaridou]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Parenting and Internet behavior predictors of cyber-bullying and cyber-victimization among preadolescents]]></article-title>
<source><![CDATA[Deviant Behavior]]></source>
<year>2016</year>
<volume>37</volume>
<page-range>439-55</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kowalski]]></surname>
<given-names><![CDATA[R. M]]></given-names>
</name>
<name>
<surname><![CDATA[Giumetti]]></surname>
<given-names><![CDATA[G. W]]></given-names>
</name>
<name>
<surname><![CDATA[Schroeder]]></surname>
<given-names><![CDATA[A. N.]]></given-names>
</name>
<name>
<surname><![CDATA[Lattanner]]></surname>
<given-names><![CDATA[M. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth]]></article-title>
<source><![CDATA[Psychological Bulletin]]></source>
<year>2014</year>
<volume>140</volume>
<page-range>1073-137</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Law]]></surname>
<given-names><![CDATA[D. M]]></given-names>
</name>
<name>
<surname><![CDATA[Shapka]]></surname>
<given-names><![CDATA[J. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Olson]]></surname>
<given-names><![CDATA[B. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Computers in Human Behavior]]></article-title>
<source><![CDATA[To control or not to control? Parenting behaviours and adolescent online aggression]]></source>
<year>2010</year>
<volume>26</volume>
<page-range>1651-6</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Shin]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Prevalence of cyberbullying and predictors of cyberbullying perpetration among Korean adolescents]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2017</year>
<volume>68</volume>
<page-range>352-8</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Llorca-Mestre]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Malonda-Vidal]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Samper-García]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Prosocial reasoning and emotions in young offenders and non-offenders]]></article-title>
<source><![CDATA[The European Journal of Psychology Applied to Legal Context]]></source>
<year>2017</year>
<volume>9</volume>
<page-range>65-73</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martins]]></surname>
<given-names><![CDATA[M. J. D]]></given-names>
</name>
<name>
<surname><![CDATA[Veiga]]></surname>
<given-names><![CDATA[A. M]]></given-names>
</name>
<name>
<surname><![CDATA[Freire]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
<name>
<surname><![CDATA[Caetano]]></surname>
<given-names><![CDATA[A. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Matos]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber-victimization and cyber-aggression among Portuguese adolescents: The relation to family support and family rules]]></article-title>
<source><![CDATA[International Journal of Cyber Behavior, Psychology and Learning]]></source>
<year>2016</year>
<volume>6</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>65-78</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mishna]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Khoury-Kassabri]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Gadalla]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Daciuk]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risk factors for involvement in cyber bullying: Victims, bullies and bully&#8211;victims]]></article-title>
<source><![CDATA[Children and Youth Services Review]]></source>
<year>2012</year>
<volume>34</volume>
<page-range>63-70</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muñiz]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Elosua]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Hambleton]]></surname>
<given-names><![CDATA[R. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[International Test Commission guidelines for test translation and adaptation: Second edition]]></article-title>
<source><![CDATA[Psicothema]]></source>
<year>2013</year>
<volume>25</volume>
<page-range>151-7</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Navarro]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Gender issues and cyberbullying in children and adolescents: From gender differences to gender identity measures]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Navarro]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Yubero]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Larrañaga]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberbullying across the globe: Gender, family, and mental health]]></source>
<year>2016</year>
<page-range>35-61</page-range><publisher-loc><![CDATA[Cham, Switzerland ]]></publisher-loc>
<publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Navarro-González]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
<name>
<surname><![CDATA[Lorenzo-Seva]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Vigil-Colet]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How response bias affects the factorial structure of personality self-reports]]></article-title>
<source><![CDATA[Psicothema]]></source>
<year>2016</year>
<volume>28</volume>
<page-range>465-70</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nocentini]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Calmaestra]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Schultze-Krumbholz]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Scheithauer]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Ortega]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Menesini]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying: Labels, behaviours and definition in three European countries]]></article-title>
<source><![CDATA[Australian Journal of Guidance &amp; Counselling]]></source>
<year>2010</year>
<volume>20</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>129-42</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Olweus]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying: An overrated phenomenon?]]></article-title>
<source><![CDATA[European Journal of Developmental Psychology]]></source>
<year>2012</year>
<volume>9</volume>
<page-range>520-38</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Palladino]]></surname>
<given-names><![CDATA[B. E]]></given-names>
</name>
<name>
<surname><![CDATA[Nocentini]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Menesini]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evidence-based intervention against bullying and cyberbullying: Evaluation of the NoTrap! program in two independent trials]]></article-title>
<source><![CDATA[Aggressive Behavior]]></source>
<year>2016</year>
<volume>42</volume>
<page-range>194-206</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rice]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Petering]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Rhoades]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Winetrobe]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Goldbach]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Plant]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kordic]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying perpetration and victimization among Middle-School students]]></article-title>
<source><![CDATA[American Journal of Public Health]]></source>
<year>2015</year>
<volume>105</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>e66-72</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sticca]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Ruggieri]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Alsaker]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Perren]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Longitudinal risk factors for cyberbullying in adoles- cence]]></article-title>
<source><![CDATA[Journal of Community and Applied Social Psychology]]></source>
<year>2013</year>
<volume>23</volume>
<page-range>52-67</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vazsonyi]]></surname>
<given-names><![CDATA[A. T]]></given-names>
</name>
<name>
<surname><![CDATA[Machackova]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Sevcikova]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Smahel]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Cerna]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying in context: Direct and indirect effects by low self-control across 25 countries]]></article-title>
<source><![CDATA[European Journal of Developmental Psychology]]></source>
<year>2012</year>
<volume>9</volume>
<page-range>210-27</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
