<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1794-4724</journal-id>
<journal-title><![CDATA[Avances en Psicología Latinoamericana]]></journal-title>
<abbrev-journal-title><![CDATA[Av. Psicol. Latinoam.]]></abbrev-journal-title>
<issn>1794-4724</issn>
<publisher>
<publisher-name><![CDATA[Universidad del Rosario]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1794-47242020000300060</article-id>
<article-id pub-id-type="doi">10.12804/revistas.urosario.edu.co/apl/a.8160</article-id>
<title-group>
<article-title xml:lang="pt"><![CDATA[Cyberstalking preualência e estratégias de coping em estudantes portugueses do ensino secundário]]></article-title>
<article-title xml:lang="en"><![CDATA[Cyberstalking: Preualence and Coping Strategies in Portuguese Secondary School Students]]></article-title>
<article-title xml:lang="es"><![CDATA[Cyberstalking: preualencia y estrategias de afrontamiento en estudiantes portugueses de secundaria]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Sani]]></surname>
<given-names><![CDATA[Ana Isabel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Valquaresma]]></surname>
<given-names><![CDATA[Juliana]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidade Fernando Pessoa  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Portugal</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2020</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2020</year>
</pub-date>
<volume>38</volume>
<numero>3</numero>
<fpage>1</fpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S1794-47242020000300060&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S1794-47242020000300060&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S1794-47242020000300060&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo O cyberstalking é uma forma de perseguição que consiste na utilização da internet ou outro instrumento computadorizado, com intuito de assediar ou perseguir alguém, através de ações metódicas, persistentes e indesejáveis geradoras de incômodo na vida das vítimas. Este estudo pretendeu avaliar a prevalência do cyberstalking e analisar as estratégias de coping utilizadas pelas vítimas. Os dados foram recolhidos junto de 259 estudantes do ensino secundário através de um inquérito online composto por um questionário sociodemográfico, a Escala de Avaliação do Cyberstalking e Escala de Coping no Stalking. As análises estatísticas revelaram uma taxa de prevalência real (experiência de pelo menos um comportamento de cyberstalking) de 68.0 % e uma taxa de vitimação au-torrelatada (autoidentificação como vítima) de 25.5 %. Os comportamentos de cyberstalking mais frequentes foram os de hiperintimidade e as estratégias de coping mais usadas pelas vítimas envolviam evitar o contato ou negar/minimizar os comportamentos do stalker. Os resultados apontam para uma desvalorização pelas vítimas dos comportamentos de perseguição online. Concluímos pela necessidade de realizar ações informativas sobre o tema direcionadas a toda a comunidade, para consciencializar sobre esse problema social, informar sobre as especificidades do fenômeno, bem como disseminar estratégias de prevenção.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Cyberstalking is a form of innovative persecution that consists of using the Internet or another computerized instrument to harass or persecute someone through methodical, persistent, and undesirable actions that generate discomfort in the lives of the victims. This research aimed to evaluate the prevalence of cyberstalking and to analyze the coping strategies used by the victims. The data was collected from 259 secondary school students through the online inquiry, composed of a sociodemographic questionnaire, the Cyberstalking Rating Scale, and Stalking Coping Measure. Statistical analyzes revealed a real prevalence rate (experience at least one cyberstalking behavior) of 68.0 % and a self-reported victimization rate (self-identification as a victim) of 25.5 %. The most frequent cyberstalking behaviors are those of hyper-intimacy; coping strategies most used by victims are strategies that involve avoiding contact or denying/ minimizing stalker behaviors. The results point to a devaluation by victims of cyberstalking behaviors. We conclude the need to carry out information actions on the theme directed to the whole community, to raise awareness of this social problem, to inform about the specificities of the phenomenon, as well as to disseminate prevention strategies.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen El cyberstalking es una forma de persecución que consiste en el uso del internet u otro instrumento computarizado con la intención de asediar o perseguir a alguien, a través de acciones metódicas, persistentes e indeseables generadoras de incomodidad en la vida de las víctimas. Este estudio pretendió evaluar la prevalencia del cyberstalking y analizar las estrategias de afrontamiento utilizadas por las víctimas. Los datos fueron recogidos de 259 estudiantes de secundaria, a través de una encuesta en línea compuesta por un cuestionario sociodemográfico, la Escala de Evaluación del Cyberstalking y la Escala de Afrontamiento en el Acoso. Los análisis estadísticos revelaron una tasa de prevalencia real (experiencia de por lo menos un comportamiento de cyberstalking) de 68.0 % y una tasa de victimización autorrelatada (autoidentificación como víctima) de 25.5 %. Los comportamientos de cyberstalking más frecuentes fueron los de hiperintimidad, y las estrategias de afrontamiento más usadas por las víctimas involucraban evitar el contacto o negar/minimizar los comportamientos del stalker. Los resultados apuntan hacia una desvalorización de las víctimas de los comportamientos de persecución en línea. Concluimos que hay una necesidad de realizar acciones informativas sobre el tema, direccionadas a toda la comunidad para concientizar sobre ese problema social, informar sobre las especificidades del fenómeno y diseminar estrategias de prevención.]]></p></abstract>
<kwd-group>
<kwd lng="pt"><![CDATA[cyberstalking]]></kwd>
<kwd lng="pt"><![CDATA[coping]]></kwd>
<kwd lng="pt"><![CDATA[prevalência]]></kwd>
<kwd lng="pt"><![CDATA[vitimação]]></kwd>
<kwd lng="en"><![CDATA[cyberstalking]]></kwd>
<kwd lng="en"><![CDATA[coping]]></kwd>
<kwd lng="en"><![CDATA[prevalence]]></kwd>
<kwd lng="en"><![CDATA[victimization]]></kwd>
<kwd lng="es"><![CDATA[cyberstalking]]></kwd>
<kwd lng="es"><![CDATA[afrontamiento]]></kwd>
<kwd lng="es"><![CDATA[prevalencia]]></kwd>
<kwd lng="es"><![CDATA[victimización]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alexy]]></surname>
<given-names><![CDATA[E. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Burgess]]></surname>
<given-names><![CDATA[A. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Baker]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Smoyak]]></surname>
<given-names><![CDATA[S. A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Perceptions of cyberstalking among college students]]></article-title>
<source><![CDATA[Brief treatment and crisis intervention]]></source>
<year>2005</year>
<numero>5</numero>
<issue>5</issue>
<page-range>279-89</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Amar]]></surname>
<given-names><![CDATA[A. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Alexy]]></surname>
<given-names><![CDATA[E. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Coping with stalking]]></article-title>
<source><![CDATA[Issues in Mental Health Nursing]]></source>
<year>2009</year>
<volume>31</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>8-14</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baum]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Catalano]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rand]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rose]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<source><![CDATA[Stalking victimization in the United States]]></source>
<year>2009</year>
<publisher-loc><![CDATA[Washington, DC ]]></publisher-loc>
<publisher-name><![CDATA[U.S. Department of Justice]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bjõrklund]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Hãkkãnen-Nyholm]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Sheridan]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Roberts]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The prevalence of stalking among Finnish university students]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2010</year>
<volume>25</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>684-98</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bocij]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Corporate cyberstalking: An invitation to build theory]]></article-title>
<source><![CDATA[Peer-reviewed Journal on the Internet]]></source>
<year>2002</year>
<volume>7</volume>
<numero>11</numero>
<issue>11</issue>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Begotti]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Acquadro Maran]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Characteristics of cyberstalking behavior, consequences, and coping strategies: A cross-sectional study in a sample of Italian university students]]></article-title>
<source><![CDATA[Future Internet]]></source>
<year>2019</year>
<volume>11</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>120</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brownhalls]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Duffy]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Eriksson]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Barlow]]></surname>
<given-names><![CDATA[F. K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reintroducing rationalization: A study of relational goal pursuit theory of intimate partner obsessive relational intrusion]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carrasquinho]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberstalking: prevalência e estratégias de coping em estudantes do ensino universitário]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Porto, Portugal ]]></publisher-loc>
<publisher-name><![CDATA[Universidade Fernando Pessoa]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Carvalho]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Ciberstalking: prevalência na população universitária da Universidade do Minho]]></source>
<year>2011</year>
<publisher-loc><![CDATA[Braga, Portugal ]]></publisher-loc>
<publisher-name><![CDATA[Universidade do Minho]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cupach]]></surname>
<given-names><![CDATA[W. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Spitzberg]]></surname>
<given-names><![CDATA[B. H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Obsessive relational intrusion and stalking]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Spitzberg]]></surname>
<given-names><![CDATA[B. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Cupach]]></surname>
<given-names><![CDATA[W. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[The dark side of close relationships]]></source>
<year>1998</year>
<page-range>233-63</page-range><publisher-loc><![CDATA[Hillsdale, NJ ]]></publisher-loc>
<publisher-name><![CDATA[Lawrence Erlbaum]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cupach]]></surname>
<given-names><![CDATA[W. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Spitzberg]]></surname>
<given-names><![CDATA[B. H]]></given-names>
</name>
</person-group>
<source><![CDATA[The dark side of relationship pursuit: From attraction to obsession to stalking]]></source>
<year>2004</year>
<publisher-loc><![CDATA[Mahwah, NJ ]]></publisher-loc>
<publisher-name><![CDATA[Lawrence Erlbaum Associates]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cupach]]></surname>
<given-names><![CDATA[W. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Spitzberg]]></surname>
<given-names><![CDATA[B. H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["Thanks but no thanks...": The occurrence and management of unwanted relationship pursuit]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Sprecher]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wenzel]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Harvey]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of relationship initiation]]></source>
<year>2008</year>
<page-range>409-24</page-range><publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Taylor &amp; Francis]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Fazio]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The legal situation on stalking among the European member states]]></article-title>
<source><![CDATA[European Journal on Criminal Policy and Research]]></source>
<year>2009</year>
<numero>15</numero>
<issue>15</issue>
<page-range>229-42</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dhillon]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[K. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Defining objectives for preventing cyberstalking]]></article-title>
<source><![CDATA[Journal of Business Ethics]]></source>
<year>2017</year>
<numero>157</numero>
<issue>157</issue>
<page-range>137-58</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Escamilla]]></surname>
<given-names><![CDATA[A. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Answering the new realities of stalking]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Cunha]]></surname>
<given-names><![CDATA[M. M. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Portela]]></surname>
<given-names><![CDATA[I. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of research on digital crime, cyberspace security, and information assurance]]></source>
<year>2014</year>
<page-range>67-76</page-range><publisher-loc><![CDATA[Pennsylvania ]]></publisher-loc>
<publisher-name><![CDATA[IGI Global]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ferreira]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Stalking]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Maia]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Nunes]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Caridade]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sani]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Estrada]]></surname>
<given-names><![CDATA[A. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Nogueira]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Fernandes]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Dicionário Crime, Justiça e Sociedade]]></source>
<year>2016</year>
<page-range>457-8</page-range><publisher-loc><![CDATA[Lisboa, Portugal ]]></publisher-loc>
<publisher-name><![CDATA[Edições Sílabo]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ferreira]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Matos]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Violência doméstica e stalking pós-rutura: dinâmicas, coping e impacto psicossocial na vítima]]></article-title>
<source><![CDATA[Psicologia]]></source>
<year>2013</year>
<volume>XXVII</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>81-106</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ferreira]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Matos]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Antunes]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Pathways towards new criminalization: The case of stalking in Portugal]]></article-title>
<source><![CDATA[European Journal on Criminal Policy and Research]]></source>
<year>2018</year>
<volume>24</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>335-44</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fissel]]></surname>
<given-names><![CDATA[E. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The reporting and help-seeking behaviors of cyberstalking victims]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2018</year>
<publisher-name><![CDATA[Advance online publication]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grangeia]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Matos]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Stalking: Consensos e controvérsias]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Machado]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Novas formas de vitimação criminal]]></source>
<year>2010</year>
<page-range>121-66</page-range><publisher-loc><![CDATA[Braga, Portugal ]]></publisher-loc>
<publisher-name><![CDATA[Psiquilibrios]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grangeia]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Matos]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Da invisibilidade ao reconhecimento do stalking]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Sani]]></surname>
<given-names><![CDATA[A. I.]]></given-names>
</name>
</person-group>
<source><![CDATA[Temas de Vitimologia: Realidades emergentes na vitimação e respostas sociais]]></source>
<year>2011</year>
<page-range>61-84</page-range><publisher-loc><![CDATA[Coimbra, Portugal ]]></publisher-loc>
<publisher-name><![CDATA[Almedina]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Grangeia]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Matos]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Persistent harassment: Targets and perpetrators among young adults]]></article-title>
<source><![CDATA[Victims &amp; Offenders]]></source>
<year>2017</year>
<volume>13</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>102-21</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hensler-McGinnis]]></surname>
<given-names><![CDATA[N. F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberstalking victimization: Impact and coping responses in a national university sample]]></source>
<year>2008</year>
<publisher-loc><![CDATA[USA ]]></publisher-loc>
<publisher-name><![CDATA[University of Maryland]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lindsay]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Krysik]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Online harassment among college students]]></article-title>
<source><![CDATA[Information, Communication &amp; Society]]></source>
<year>2012</year>
<volume>15</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>703-19</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maran]]></surname>
<given-names><![CDATA[D. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Varetto]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Zedda]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Munari]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Stalking victimization among Italian university students]]></article-title>
<source><![CDATA[Gender &amp; Behaviour]]></source>
<year>2014</year>
<volume>12</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>6070-9</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marques]]></surname>
<given-names><![CDATA[T. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Pinto]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Alvarez]]></surname>
<given-names><![CDATA[M. J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Estudo psicométrico da escala de avaliação dos riscos e oportunidades dos jovens utilizadores do Facebook]]></article-title>
<source><![CDATA[Revista Iberoamericana de Diagnóstico y Evaluación - e Avaliação Psicológica]]></source>
<year>2015</year>
<volume>41</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>145-58</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Matos]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Grangeia]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Ferreira]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Azevedo]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[Inquérito de Vitimação por stalking - Relatório de investigação]]></source>
<year>2011</year>
<publisher-loc><![CDATA[Braga, Portugal ]]></publisher-loc>
<publisher-name><![CDATA[Universidade do Minho, Escola de Psicologia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Matos]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Grangeia]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Ferreira]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Azevedo]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<source><![CDATA[Stalking: boas práticas no apoio à vítima - manual para profissionais]]></source>
<year>2011</year>
<publisher-loc><![CDATA[Porto, Portugal ]]></publisher-loc>
<publisher-name><![CDATA[Comissão para a Cidadania e Igualdade de Gênero]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Matos]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Grangeia]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Ferreira]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[&amp;Azevedo]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Vitimação por stalking: preditores do medo]]></article-title>
<source><![CDATA[Análise Psicológica]]></source>
<year>2012</year>
<volume>30</volume>
<numero>1-2</numero>
<issue>1-2</issue>
<page-range>161-76</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Matos]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Grangeia]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Ferreira]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Azevedo]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Gonçalves]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sheridan]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Stalking victimization in Portugal: Prevalence, characteristics, and impact]]></article-title>
<source><![CDATA[International Journal of Law, Crime and Justice]]></source>
<year>2019</year>
<numero>57</numero>
<issue>57</issue>
<page-range>103-15</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McFarlane]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Bocij]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An exploration of predatory behavior in cyberspace: Towards a typology of cyberstalkers]]></article-title>
<source><![CDATA[First Monday]]></source>
<year>2003</year>
<volume>8</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>1-14</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McKeon]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[McEwan]]></surname>
<given-names><![CDATA[T. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Luebbers]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["It's not really stalking if you know the person": Measuring community attitudes that normalize, justify and minimise stalking]]></article-title>
<source><![CDATA[Psychiatry, Psychology and Law]]></source>
<year>2015</year>
<volume>22</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>291-306</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nguyen]]></surname>
<given-names><![CDATA[L. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Spitzberg]]></surname>
<given-names><![CDATA[B. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[C. M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Coping with obsessive relational intrusion and stalking: The role of social support and coping strategies]]></article-title>
<source><![CDATA[Violence and Victims]]></source>
<year>2012</year>
<volume>27</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>414-33</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pathé]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Mullen]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Purcell]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Management of victims of stalking]]></article-title>
<source><![CDATA[Advances in Psychiatric Treatment]]></source>
<year>2001</year>
<volume>7</volume>
<page-range>399-406</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Paullet]]></surname>
<given-names><![CDATA[K. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Rota]]></surname>
<given-names><![CDATA[D. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Swan]]></surname>
<given-names><![CDATA[T. T]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberstalking: An exploratory study of students at a Mid-Atlantic university]]></article-title>
<source><![CDATA[Issues in Information Systems]]></source>
<year>2009</year>
<volume>10</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>640-9</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pereira]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Matos]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberstalking entre adolescentes: Uma nova forma de assédio e perseguição?]]></article-title>
<source><![CDATA[Psicologia, Saúde e Doenças]]></source>
<year>2015</year>
<volume>16</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>57-69</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pereira]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Matos]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sampaio]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber-crimes against adolescents: Bridges between psychological and a design approach]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Cunha]]></surname>
<given-names><![CDATA[M. M. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Portela]]></surname>
<given-names><![CDATA[. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of research on digital crime, cyberspace security, and information assurance]]></source>
<year>2014</year>
<page-range>211-30</page-range><publisher-loc><![CDATA[Pennsylvania ]]></publisher-loc>
<publisher-name><![CDATA[IGI Global]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pereira]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Matos]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sheridan]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Scott]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Perceptions and personal experiences of unwanted attention among Portuguese male students]]></article-title>
<source><![CDATA[Psychology, Crime &amp; Law]]></source>
<year>2015</year>
<volume>21</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>398-411</page-range></nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pereira]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Spitzberg]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Matos]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber-harassment victimization in Portugal: Prevalence, fear and help-seeking among adolescents]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2016</year>
<numero>62</numero>
<issue>62</issue>
<page-range>136-46</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Phillips]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Spitzberg]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Speculating about spying on Myspace and beyond: Social network surveillance and obsessive relational intrusion]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Wright]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Webb]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Computer-mediated communication in personal relationships]]></source>
<year>2010</year>
<page-range>344-67</page-range><publisher-loc><![CDATA[NewYork ]]></publisher-loc>
<publisher-name><![CDATA[Peter Lang]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pires]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sani]]></surname>
<given-names><![CDATA[A. I.]]></given-names>
</name>
<name>
<surname><![CDATA[Soeiro]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Stalking e cyberstalking em estudantes universitários: uma revisão sistemática]]></article-title>
<source><![CDATA[Revista Portuguesa de Investigação Comportamental e Social]]></source>
<year>2018</year>
<month>a</month>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>6075</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pires]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sani]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Soeiro]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Stalking e cyberstalking: coocorrência e padrões de viti-mação em estudantes universitários.]]></article-title>
<source><![CDATA[Arquivos Brasileiros de Psicologia]]></source>
<year>2018</year>
<month>b</month>
<volume>70</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>1-17</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reychav]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Sukenik]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Cunha]]></surname>
<given-names><![CDATA[M. M. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Portela]]></surname>
<given-names><![CDATA[I. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of research on digital crime, cyberspace security, and information assurance]]></source>
<year>2014</year>
<page-range>77-98</page-range><publisher-loc><![CDATA[Pennsylvania ]]></publisher-loc>
<publisher-name><![CDATA[IGI Global]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reyns]]></surname>
<given-names><![CDATA[B. W]]></given-names>
</name>
</person-group>
<source><![CDATA[Being pursued online: Extent and nature of cyberstalking victimization from a lifestyle/routine activities perspective]]></source>
<year>2010</year>
<publisher-loc><![CDATA[USA ]]></publisher-loc>
<publisher-name><![CDATA[University of Cincinnati]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sani]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Carrasquinho]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Soeiro]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Violências nas relações de intimidade em jovens e os comportamentos de stalking e cyberstalking]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Paulino]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Alchieri]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Desvio, Crime e Vitimologia]]></source>
<year>2018</year>
<page-range>71-85</page-range><publisher-loc><![CDATA[Lisboa, Portugal ]]></publisher-loc>
<publisher-name><![CDATA[Pactor]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sheridan]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Arianayagam]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Chan]]></surname>
<given-names><![CDATA[H. C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Perceptions and experiences of intrusive behavior and stalking within a culture]]></article-title>
<source><![CDATA[Psychology, Crime &amp; Law]]></source>
<year>2018</year>
<numero>25</numero>
<issue>25</issue>
<page-range>381-95</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sheridan]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Grant]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Is cyberstalking different?]]></article-title>
<source><![CDATA[Psychology, Crime &amp; Law]]></source>
<year>2007</year>
<numero>13</numero>
<issue>13</issue>
<page-range>627-40</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Southworth]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Finn]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Dawson]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Fraser]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Tucker]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Intimate partner violence, technology, and stalking]]></article-title>
<source><![CDATA[Violence against women]]></source>
<year>2007</year>
<volume>13</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>842-56</page-range></nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Spitzberg]]></surname>
<given-names><![CDATA[B. H]]></given-names>
</name>
</person-group>
<source><![CDATA[Stalking/obsessive relational intrusion]]></source>
<year>2015</year>
</nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wilson]]></surname>
<given-names><![CDATA[J.P. Dillard]]></given-names>
</name>
<name>
<surname><![CDATA[Caughlin]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Solomon]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[The International Encyclopedia of Interpersonal Communication]]></source>
<year></year>
<page-range>1-9</page-range></nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Spitzberg]]></surname>
<given-names><![CDATA[B. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Cupach]]></surname>
<given-names><![CDATA[W. R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Paradoxes of pursuit: Toward a relational model of stalking-related phenomena]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Davis]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Stalking crimes and victim protection: Prevention, intervention, threat assessment and case management]]></source>
<year>2001</year>
<page-range>97-136</page-range><publisher-loc><![CDATA[Boca Raton, FL ]]></publisher-loc>
<publisher-name><![CDATA[CRC Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Spitzberg]]></surname>
<given-names><![CDATA[B. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Cupach]]></surname>
<given-names><![CDATA[W. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[What mad pursuit? Obsessive relational intrusion and stalking related phenomena]]></article-title>
<source><![CDATA[Aggression and violent behavior]]></source>
<year>2003</year>
<numero>8</numero>
<issue>8</issue>
<page-range>345-75</page-range></nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Spitzberg]]></surname>
<given-names><![CDATA[B. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Cupach]]></surname>
<given-names><![CDATA[W. R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberstalking as a (mis)matchmaking]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Whitty]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Baker]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Inman]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Online matchmaking]]></source>
<year>2007</year>
<page-range>127-46</page-range><publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[Palgrave Macmillan]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Spitzberg]]></surname>
<given-names><![CDATA[B. H.]]></given-names>
</name>
<name>
<surname><![CDATA[&amp;Cupach]]></surname>
<given-names><![CDATA[W. R]]></given-names>
</name>
</person-group>
<source><![CDATA[The dark side of relationship pursuit: From attraction to obsession and stalking]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Routledge]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Spitzberg]]></surname>
<given-names><![CDATA[B. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Hoobler]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberstalking and the technologies of interpersonal terrorism]]></article-title>
<source><![CDATA[New media &amp; society]]></source>
<year>2002</year>
<numero>4</numero>
<issue>4</issue>
<page-range>67-88</page-range></nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stonard]]></surname>
<given-names><![CDATA[K. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Bowen]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Walker]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Price]]></surname>
<given-names><![CDATA[S. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[They'll always find a way to get to you: Technology use in adolescent romantic relationships and its role in dating violence and abuse]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2015</year>
<volume>32</volume>
<numero>14</numero>
<issue>14</issue>
<page-range>2083-117</page-range></nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tavani]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Grodzinsky]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberstalking, personal privacy, and moral responsibility]]></article-title>
<source><![CDATA[Ethics and Information Technology]]></source>
<year>2002</year>
<volume>4</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>123132</page-range></nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tjaden]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Thoennes]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[Stalking in America: Findings from the national violence against women survey]]></source>
<year>1998</year>
<publisher-loc><![CDATA[Washington, DC ]]></publisher-loc>
<publisher-name><![CDATA[National Institute of Justice, Centers for Disease Control and Prevention]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tokunaga]]></surname>
<given-names><![CDATA[R. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyber-intrusions: Strategies of coping with online obsessive relational intrusion]]></source>
<year>2007</year>
<publisher-loc><![CDATA[USA ]]></publisher-loc>
<publisher-name><![CDATA[University of Hawaii]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Villacampa]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Pujols]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Effects of and coping strategies for stalking victimisation in Spain: Consequences for its criminalization]]></article-title>
<source><![CDATA[Journal of International Criminal Justice]]></source>
<year>2018</year>
<numero>56</numero>
<issue>56</issue>
<page-range>27-38</page-range></nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[White]]></surname>
<given-names><![CDATA[W. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Carmody]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Preventing online victimization: College students' views on intervention and prevention]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2016</year>
<volume>33</volume>
<numero>14</numero>
<issue>14</issue>
<page-range>2291-307</page-range></nlm-citation>
</ref>
<ref id="B62">
<nlm-citation citation-type="">
<collab>Working to Halt Online Abuse -WHOA</collab>
<source><![CDATA[Cyberstalking statistics]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B63">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Worsley]]></surname>
<given-names><![CDATA[J. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Wheatcroft]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Short]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Corcoran]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Victims' voices: Understanding the emotional impact of cyberstalking and individuals' coping responses]]></source>
<year>2017</year>
<page-range>1-13</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
