<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1794-9998</journal-id>
<journal-title><![CDATA[Diversitas: Perspectivas en Psicología]]></journal-title>
<abbrev-journal-title><![CDATA[Divers.: Perspect. Psicol.]]></abbrev-journal-title>
<issn>1794-9998</issn>
<publisher>
<publisher-name><![CDATA[Universidad Santo Tomás]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1794-99982018000200205</article-id>
<article-id pub-id-type="doi">10.15332/s1794-9998</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Uso problemático de internet, cyberbullying y ciber-violencia de pareja en jóvenes universitarios]]></article-title>
<article-title xml:lang=""><![CDATA[Problematic internet use, cyberbullying and cyber dating violence among university students]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Peña Cárdenas]]></surname>
<given-names><![CDATA[Fabiola]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rojas-Solís]]></surname>
<given-names><![CDATA[José Luis]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[García-Sánchez]]></surname>
<given-names><![CDATA[Paola Valeria]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Autónoma de Tamaulipas, México  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>México</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Autónoma de Nayarit  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>México</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad Autónoma de Puebla  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>México</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2018</year>
</pub-date>
<volume>14</volume>
<numero>2</numero>
<fpage>205</fpage>
<lpage>219</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1794-99982018000200205&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1794-99982018000200205&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1794-99982018000200205&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen  Las Tecnologías de la Información y Comunicación se han desarrollado con rapidez integrándose en la vida cotidiana de los adolescentes y los jóvenes. Por ello, esta investigación con diseño no-experimental y transversal analizó las diferencias por sexo en el uso problemático del internet, el cyberbullying y la ciber-violencia de pareja; así como la posible relación entre las variables mencionadas. La muestra fue conformada por 456 estudiantes, procedentes de dos universidades mexicanas, con edades entre 17 y 30 años (M = 19,86; DT = 2,12). Los resultados mostraron pocas diferencias entre hombres y mujeres; asimismo se presentaron correlaciones bajas positivas entre la mayoría de los indicadores de uso problemático de internet con ciberbullying; el uso problemático de internet y ciber-violencia de pareja; y entre ciberbullying y ciber-violencia de pareja. Se concluyó que las conductas violentas de jóvenes mediante nuevas tecnologías parecen generalizarse a las relaciones entre pares y de pareja. Se discuten los resultados destacando la necesidad de más estudios sobre estos fenómenos cada vez más presentes en jóvenes.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract  The Information and Communication Technologies have developed at a fast pace, integrating themselves in the daily life of adolescents and young people. For this reason, this non-experimental cross-sectional study analyzed the gender differences in problematic Internet use, cyberbullying and cyber-violence, as well as the possible relationship between these variables. The sample consisted of 456 students, from two Mexican universities, aged between 17 and 30 years (M = 19,86; DT = 2,12). The results showed few significant differences between men and women; likewise, significant positive correlations were found between most of indicators of problematic Internet use with cyberbullying; between problematic Internet use and cyber dating violence; and between cyberbullying and cyber dating violence. It was concluded that violent behavior of young people through new technologies seems to be generalized to relationships with peers and couples. It was discussed the results highlighting the need for more studies on these phenomena increasingly present in young people.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Uso problemático del internet]]></kwd>
<kwd lng="es"><![CDATA[cyberbullying]]></kwd>
<kwd lng="es"><![CDATA[ciber-violencia de pareja]]></kwd>
<kwd lng="es"><![CDATA[universitarios]]></kwd>
<kwd lng="en"><![CDATA[Problematic internet use]]></kwd>
<kwd lng="en"><![CDATA[cyberbullying]]></kwd>
<kwd lng="en"><![CDATA[cyber dating]]></kwd>
<kwd lng="en"><![CDATA[college students]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arnaiz]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Cerezo]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Giménez]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Maquilón]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Conductas de ciberadicción y experiencias de cyberbullying entre adolescentes]]></article-title>
<source><![CDATA[Anales de Psicología]]></source>
<year>2016</year>
<volume>32</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>761-9</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borrajo]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comportamientos, motivos y reacciones asociadas a la victimización del abuso online en el noviazgo: un análisis cualitativo]]></article-title>
<source><![CDATA[Revista de Victimología]]></source>
<year>2015</year>
<volume>2</volume>
<page-range>73-95</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borrajo]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Calvete]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Borrajo, E., Gámez-Guadix, M. &amp; Calvete, E. (2015a). Cyber dating Abuse: Prevalence, Context, and Relationship with offline Dating Aggression]]></article-title>
<source><![CDATA[Psychological Reports: Relationships &amp; Communications]]></source>
<year>2015</year>
<month>a</month>
<volume>2</volume>
<numero>116</numero>
<issue>116</issue>
<page-range>565-85</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borrajo]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Calvete]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Justification beliefs of violence, myths about love and cyber dating abuse]]></article-title>
<source><![CDATA[Psicothema]]></source>
<year>2015</year>
<month>b</month>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>327-33</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borrajo]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Pereda]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Calvete]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The development and validation of the cyber dating abuse questionnaire among young couples]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2015</year>
<volume>48</volume>
<page-range>358-65</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Burke]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Martsolf]]></surname>
<given-names><![CDATA[D. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The role of electronic communication technology in adolescent dating violence]]></article-title>
<source><![CDATA[Journal of Child and Adolescent Psychiatric Nursing]]></source>
<year>2010</year>
<volume>3</volume>
<numero>23</numero>
<issue>23</issue>
<page-range>133-42</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carruth]]></surname>
<given-names><![CDATA[K. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ginsburg]]></surname>
<given-names><![CDATA[H. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social networking and privacy attitudes among college students]]></article-title>
<source><![CDATA[Psychology, Society, &amp; Education]]></source>
<year>2014</year>
<volume>2</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>82-93</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Castaño-Muñoz]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Senges]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Youth-culture or student-culture? The internet use intensity divides among university students and the consequences for academic performance]]></article-title>
<source><![CDATA[Estudios sobre Educación]]></source>
<year>2011</year>
<volume>20</volume>
<page-range>203-31</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Crosslin]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Crosslin]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying at a Texas University &#8211; A Mixed Methods Approach to Examining Online Aggression]]></article-title>
<source><![CDATA[Texas Public Health Journal]]></source>
<year>2014</year>
<volume>3</volume>
<numero>66</numero>
<issue>66</issue>
<page-range>26-31</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cunningham]]></surname>
<given-names><![CDATA[C. E]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Vaillancourt]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Rimas]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
<name>
<surname><![CDATA[Deal]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Cunningham]]></surname>
<given-names><![CDATA[L. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ratcliffe]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modeling the anti-cyberbullying preferences of university students: adaptive choice-based conjoint analysis]]></article-title>
<source><![CDATA[Aggressive Behavior]]></source>
<year>2015</year>
<volume>41</volume>
<page-range>369-85</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Durán]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Martínez-Pecino]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ciberacoso mediante teléfono móvil e Internet en las relaciones de noviazgo entre jóvenes]]></article-title>
<source><![CDATA[Comunicar]]></source>
<year>2015</year>
<volume>44</volume>
<numero>22</numero>
<issue>22</issue>
<page-range>159-67</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Echeburúa]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[De Corral]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adicción a las nuevas tecnologías y las redes sociales: un nuevo reto]]></article-title>
<source><![CDATA[Adicciones]]></source>
<year>2010</year>
<volume>2</volume>
<numero>22</numero>
<issue>22</issue>
<page-range>91-6</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Espinar]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Jóvenes y adolescentes ante las nuevas tecnologías: percepción de riesgos]]></article-title>
<source><![CDATA[Athenea Digital]]></source>
<year>2009</year>
<volume>16</volume>
<page-range>1-20</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fernández-Villa]]></surname>
<given-names><![CDATA[T]]></given-names>
</name>
<name>
<surname><![CDATA[Alguacil]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Almaraz]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Cancela]]></surname>
<given-names><![CDATA[J. M]]></given-names>
</name>
<name>
<surname><![CDATA[Delgado-Rodríguez]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[García-Martín]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Jiménez-Mejías]]></surname>
<given-names><![CDATA[E]]></given-names>
</name>
<name>
<surname><![CDATA[Llorca]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Molina]]></surname>
<given-names><![CDATA[A. J]]></given-names>
</name>
<name>
<surname><![CDATA[Ortíz]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Valero-Juan]]></surname>
<given-names><![CDATA[L. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Martín]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Problematic Internet Use in University Students: associated factors and differences of gender.]]></article-title>
<source><![CDATA[Adicciones]]></source>
<year>2015</year>
<volume>4</volume>
<numero>27</numero>
<issue>27</issue>
<page-range>265-75</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gahagan]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Vaterlaus]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Frost]]></surname>
<given-names><![CDATA[L. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[College student cyberbullying on social networking sites: Conceptualization, prevalence, and perceived bystander responsibility]]></article-title>
<source><![CDATA[Computers Human Behavior]]></source>
<year>2016</year>
<volume>55</volume>
<page-range>1097-105</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Garaigordobil]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberbullying. Screening del acoso entre iguales. Screening del acoso escolar presencial (bullying) y tecnológico (cyberbullying)]]></source>
<year>2013</year>
<publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[TEA]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Garaigordobil]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying. Screening de acoso entre iguales: descripción y datos psicométricos]]></article-title>
<source><![CDATA[International Journal of Developmental and Educational Psychology]]></source>
<year>2014</year>
<volume>1</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>311-8</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[García]]></surname>
<given-names><![CDATA[J. A]]></given-names>
</name>
<name>
<surname><![CDATA[Terol]]></surname>
<given-names><![CDATA[M. C]]></given-names>
</name>
<name>
<surname><![CDATA[Nieto]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Lledó]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Martín-Aragón]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sitges]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Uso y abuso de Internet en jóvenes universitarios]]></article-title>
<source><![CDATA[Adicciones]]></source>
<year>2008</year>
<volume>2</volume>
<numero>20</numero>
<issue>20</issue>
<page-range>131-42</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Henao-Rodríguez]]></surname>
<given-names><![CDATA[D. P]]></given-names>
</name>
<name>
<surname><![CDATA[Martínez]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Velasco-Benítez]]></surname>
<given-names><![CDATA[C. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Bullying Universitario]]></article-title>
<source><![CDATA[Revista Gastrohnup]]></source>
<year>2015</year>
<volume>1</volume>
<numero>17</numero>
<issue>17</issue>
<page-range>58-62</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Herrera-Batista]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Disponibilidad, uso y apropiación de las tecnologías por estudiantes universitarios en México: Perspectivas para una incorporación innovadora]]></article-title>
<source><![CDATA[Revista Iberoamericana de Educación]]></source>
<year>2009</year>
<volume>48</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1-9</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jaen-Cortés]]></surname>
<given-names><![CDATA[C. I]]></given-names>
</name>
<name>
<surname><![CDATA[Rivera-Aragón]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Reidl-Martínez]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
<name>
<surname><![CDATA[García-Méndez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Violencia de pareja a través de medios electrónicos en adolescentes mexicanos]]></article-title>
<source><![CDATA[Acta de Investigación Psicológica]]></source>
<year>2017</year>
<volume>7</volume>
<page-range>2593-605</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kokkinos]]></surname>
<given-names><![CDATA[C. M]]></given-names>
</name>
<name>
<surname><![CDATA[Antoniadou]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Markos]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber-bullying: An investigation of the psychological profile of university student participants]]></article-title>
<source><![CDATA[Journal of Applied Developmental Psychology]]></source>
<year>2014</year>
<volume>35</volume>
<page-range>204-14</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lawler]]></surname>
<given-names><![CDATA[J. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Molluzzo]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A comprehensive survey on student perceptions of cyberbullying at a Mayor Metropolitan University]]></article-title>
<source><![CDATA[Contemporary Issues in Education Research]]></source>
<year>2015</year>
<volume>3</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>159-70</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[M. G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Acoso escolar y cibernético en estudiantes universitarios]]></article-title>
<source><![CDATA[Revista de Investigación en Educación]]></source>
<year>2017</year>
<volume>15</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>11-26</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martín]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Pazos]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Montilla]]></surname>
<given-names><![CDATA[M. V. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Romero]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Una modalidad actual de violencia de género en parejas de jóvenes: las redes sociale]]></article-title>
<source><![CDATA[Educación XXI]]></source>
<year>2016</year>
<volume>2</volume>
<numero>19</numero>
<issue>19</issue>
<page-range>405-29</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mateus]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Veiga]]></surname>
<given-names><![CDATA[A. M]]></given-names>
</name>
<name>
<surname><![CDATA[Costa]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Dores]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying: The hidden side of college students.]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2015</year>
<volume>43</volume>
<page-range>167-82</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Molero]]></surname>
<given-names><![CDATA[M. M]]></given-names>
</name>
<name>
<surname><![CDATA[Martos]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Cardila]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Barragán]]></surname>
<given-names><![CDATA[A. B]]></given-names>
</name>
<name>
<surname><![CDATA[Pérez-Fuentes]]></surname>
<given-names><![CDATA[M. C]]></given-names>
</name>
<name>
<surname><![CDATA[Gázquez]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rosales-Nieto]]></surname>
<given-names><![CDATA[J. G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Uso de internet y redes sociales en estudiantes universitarios]]></article-title>
<source><![CDATA[European Journal of Child Development, Education and Psychopathology]]></source>
<year>2014</year>
<volume>3</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>81-96</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Odaci]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Kalkan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Problematic Internet use, loneliness and dating anxiety among young adult university students]]></article-title>
<source><![CDATA[Computers &amp; Education]]></source>
<year>2010</year>
<volume>55</volume>
<page-range>1091-7</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Orel]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Campbell]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Wozencroft]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Leong]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Kimpton]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Exploring University Students&#8217; Coping Strategy Intentions for Cyberbullying]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2015</year>
<volume>3</volume>
<numero>32</numero>
<issue>32</issue>
<page-range>1-17</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ozgur]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Exploring the distance education students&#8217; cyberbullying, cybervictimization and cyberbullying sensibility levels]]></article-title>
<source><![CDATA[Turkish Online Journal of Distance Education (TOJDE)]]></source>
<year>2015</year>
<volume>4</volume>
<numero>16</numero>
<issue>16</issue>
<page-range>3-17</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Parra]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Vargas]]></surname>
<given-names><![CDATA[J. I]]></given-names>
</name>
<name>
<surname><![CDATA[Zamorano]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
<name>
<surname><![CDATA[Peña]]></surname>
<given-names><![CDATA[F]]></given-names>
</name>
<name>
<surname><![CDATA[Velázquez]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Ruiz]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Monreal]]></surname>
<given-names><![CDATA[O.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adicción y factores determinantes en el uso Problemático del internet, en una muestra de Jóvenes universitarios EDUTEC]]></article-title>
<source><![CDATA[Revista Electrónica de Tecnología Educativa]]></source>
<year>2016</year>
<volume>56</volume>
<page-range>60-73</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Prieto]]></surname>
<given-names><![CDATA[M. T]]></given-names>
</name>
<name>
<surname><![CDATA[Carrillo]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Lucio]]></surname>
<given-names><![CDATA[L. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Violencia virtual y acoso escolar entre estudiantes universitarios: el lado oscuro de las redes sociales]]></article-title>
<source><![CDATA[Innovación Educativa]]></source>
<year>2015</year>
<volume>68</volume>
<numero>15</numero>
<issue>15</issue>
<page-range>33-47</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Puerta-Cortés]]></surname>
<given-names><![CDATA[D. X.]]></given-names>
</name>
<name>
<surname><![CDATA[Carbonell]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Uso problemático de Internet en una muestra de estudiantes universitarios colombianos]]></article-title>
<source><![CDATA[Avances en Psicología Latinoamericana]]></source>
<year>2013</year>
<volume>3</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>620-31</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Puerta-Cortés]]></surname>
<given-names><![CDATA[D. X.]]></given-names>
</name>
<name>
<surname><![CDATA[Carbonell]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[El modelo de los cinco grandes factores de personalidad y el uso problemático de Internet en jóvenes colombianos]]></article-title>
<source><![CDATA[Adicciones]]></source>
<year>2014</year>
<volume>1</volume>
<numero>26</numero>
<issue>26</issue>
<page-range>54-61</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pulido-Rull]]></surname>
<given-names><![CDATA[M. A]]></given-names>
</name>
<name>
<surname><![CDATA[Escoto-de la Rosa]]></surname>
<given-names><![CDATA[R. &amp;Gutiérrez-Valdovinos]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Validez y Confiabilidad del Cuestionario de Uso Problemático de Internet (CUPI)]]></article-title>
<source><![CDATA[Journal of Behavior, Health &amp; Social Issues]]></source>
<year>2011</year>
<volume>1</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>25-34</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rial]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Gómez]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Braña]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Varela]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Actitudes, percepciones y uso de Internet y las redes sociales entre los adolescentes de la comunidad gallega]]></article-title>
<source><![CDATA[Anales de Psicología]]></source>
<year>2014</year>
<volume>2</volume>
<numero>30</numero>
<issue>30</issue>
<page-range>642-55</page-range><publisher-loc><![CDATA[España ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ruíz-Olivares]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Lucena]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
<name>
<surname><![CDATA[Pino]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Herruzo]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Análisis de comportamientos relacionados con el uso/abuso de internet, teléfono móvil, compras y juego en estudiantes universitarios]]></article-title>
<source><![CDATA[Adicciones]]></source>
<year>2010</year>
<volume>4</volume>
<numero>22</numero>
<issue>22</issue>
<page-range>301-10</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sánchez-Rodríguez]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Ruíz-Palmero]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sánchez-Rivas]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Uso problemático de las redes sociales en estudiantes universitarios]]></article-title>
<source><![CDATA[Revista Complutense de Educación]]></source>
<year>2015</year>
<volume>26</volume>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Savage]]></surname>
<given-names><![CDATA[M. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Tokunaga]]></surname>
<given-names><![CDATA[R. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Moving toward a theory: Testing an integrated model of cyberbullying perpetration, aggression, communication skills, and internet self-efficacy]]></article-title>
<source><![CDATA[Computers in human Behavior]]></source>
<year>2017</year>
<volume>71</volume>
<page-range>353-61</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schnurr]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Mahatmya]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Basche]]></surname>
<given-names><![CDATA[R. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Role Of Dominance, Cyber Aggression Perpetration, And Gender On Emerging Adults&#8217; Perpetration Of Intimate Partner Violence]]></article-title>
<source><![CDATA[Psychology of Violenc]]></source>
<year>2013</year>
<volume>1</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>70-83</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Psicología]]></surname>
<given-names><![CDATA[de]]></given-names>
</name>
</person-group>
<source><![CDATA[Código ético del Psicólogo]]></source>
<year>2010</year>
<publisher-loc><![CDATA[México, D.F ]]></publisher-loc>
<publisher-name><![CDATA[Trillas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Strawhun]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Adams]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Huss]]></surname>
<given-names><![CDATA[M. T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Assessment of Cyberstalking: An Expanded Examination Including Social Networking, Attachment, Jealousy, and Anger in Relation to Violence and Abuse]]></article-title>
<source><![CDATA[Violence and Victims]]></source>
<year>2013</year>
<volume>4</volume>
<numero>28</numero>
<issue>28</issue>
<page-range>715-30</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vázquez]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Las redes sociales online en España 2012-2016: mucho más que una herramienta comunicativa]]></article-title>
<source><![CDATA[Revista de Comunicación de la SEECI]]></source>
<year>2016</year>
<volume>20</volume>
<numero>41</numero>
<issue>41</issue>
<page-range>1-16</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Van Ouytsel]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Ponnet]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Walrave]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Temple]]></surname>
<given-names><![CDATA[J. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adolescent cyber dating abuse victimization and its associations with substance use, and sexual behaviors]]></article-title>
<source><![CDATA[Public Health]]></source>
<year>2016</year>
<volume>135</volume>
<page-range>147-51</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wozencroft]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
<name>
<surname><![CDATA[Campbell]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Orel]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Kimpton]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Leong]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[University students&#8217; intentions to report cyberbullying]]></article-title>
<source><![CDATA[Australian Journal of Educational &amp; Developmental Psychology]]></source>
<year>2015</year>
<volume>15</volume>
<page-range>1-12</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zweig]]></surname>
<given-names><![CDATA[J. M]]></given-names>
</name>
<name>
<surname><![CDATA[Dank]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Yahner]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Lachman]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The rate of cyber dating abuse among teens and how it relates to other forms of teen dating violence]]></article-title>
<source><![CDATA[Journal of Youth and Adolescence]]></source>
<year>2013</year>
<volume>42</volume>
<page-range>1063-77</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zweig]]></surname>
<given-names><![CDATA[J. M]]></given-names>
</name>
<name>
<surname><![CDATA[Lachman]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
<name>
<surname><![CDATA[Yahner]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Dank]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Correlates of Cyber Dating Abuse Among Teens]]></article-title>
<source><![CDATA[Journal of Youth and Adolescence]]></source>
<year>2013</year>
<volume>8</volume>
<numero>43</numero>
<issue>43</issue>
<page-range>1306-21</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
