<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0121-4381</journal-id>
<journal-title><![CDATA[Suma Psicológica]]></journal-title>
<abbrev-journal-title><![CDATA[Suma Psicol.]]></abbrev-journal-title>
<issn>0121-4381</issn>
<publisher>
<publisher-name><![CDATA[Fundación Universitaria Konrad Lorenz]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0121-43812017000200129</article-id>
<article-id pub-id-type="doi">10.1016/j.sumpsi.2017.08.002</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Millennials sex differences on Snapchat perceived privacy]]></article-title>
<article-title xml:lang="es"><![CDATA[Diferencias por sexo de los «Millenials» sobre la privacidad percibida en Snapchat]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rauzzino]]></surname>
<given-names><![CDATA[Antonietta]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Correa]]></surname>
<given-names><![CDATA[Juan C.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Fundación Universitaria Konrad Lorenz  ]]></institution>
<addr-line><![CDATA[Bogotá ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>12</month>
<year>2017</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>12</month>
<year>2017</year>
</pub-date>
<volume>24</volume>
<numero>2</numero>
<fpage>129</fpage>
<lpage>134</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S0121-43812017000200129&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S0121-43812017000200129&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S0121-43812017000200129&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract Snapchat offers a distinctive feature from other social networks in that its users control the visibility of the contents they share with others by defining how long these contents may be available. Snapchat is changing the way men and women perceive online information privacy and content management. This paper aims to illustrate the relevance of social representation theory to evaluate perceived privacy in Snapchat users, with a sample of 268 young adults residing in Bogotá. A survey method was employed for data collection purposes. The results reveal that Snapchat users are concerned about their networks' privacy, with no significant sex differences, although men's perception of Snapchat privacy is safer than that of women. Finally, a discussion is presented as to the limitations and implications of these results for further studies.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen De las redes sociales existentes, Snapchat ofrece a sus usuarios el rasgo distintivo de permitirles controlar el tiempo que será visible el contenido que comparten con otros. Snapchat plantea un cambio en la manera cómo se concibe la privacidad de la información y el manejo de contenidos online por parte de hombres y mujeres. El objetivo de este trabajo es ilustrar la relevancia de la teoría de representaciones sociales para evaluar la privacidad percibida Redes sociales en usuarios de Snapchat a través de una muestra de 268 adultos jóvenes residentes en Bogotá. Con el diseño y aplicación de una encuesta especialmente adaptada se pudo observar que a los usuarios de Snapchat les preocupa la privacidad de sus redes sin que existan diferencias significativas por sexo; aunque, en comparación con sus pares femeninos, los hombres perciben que Snapchat es más segura. El artículo finaliza con una discusión sobre las limitaciones e implicaciones de estos resultados para futuros estudios.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Snapchat]]></kwd>
<kwd lng="en"><![CDATA[Privacy]]></kwd>
<kwd lng="en"><![CDATA[Security Privacy concerns]]></kwd>
<kwd lng="en"><![CDATA[Social networks]]></kwd>
<kwd lng="es"><![CDATA[Snapchat]]></kwd>
<kwd lng="es"><![CDATA[Privacidad]]></kwd>
<kwd lng="es"><![CDATA[Seguridad]]></kwd>
<kwd lng="es"><![CDATA[Preocupación por la privacidad]]></kwd>
<kwd lng="es"><![CDATA[Sexo y seguridad]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arab]]></surname>
<given-names><![CDATA[L. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Díaz]]></surname>
<given-names><![CDATA[G. A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Impacto de las redes sociales e internet en la adolescencia: Aspectos positivos y negativos]]></article-title>
<source><![CDATA[Revista Médica Clínica Las Condes]]></source>
<year>2015</year>
<volume>26</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>7-13</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bayer]]></surname>
<given-names><![CDATA[J. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Ellison]]></surname>
<given-names><![CDATA[N. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Schoenebeck]]></surname>
<given-names><![CDATA[S. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Falk]]></surname>
<given-names><![CDATA[E. B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sharing the small moments: Ephemeral social interaction on Snapchat]]></article-title>
<source><![CDATA[Information, Communication &amp; Society]]></source>
<year>2015</year>
<volume>4462</volume>
<page-range>1-22</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Boy]]></surname>
<given-names><![CDATA[J. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Uitermark]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How to study the city on Instagram]]></article-title>
<source><![CDATA[PLOS ONE]]></source>
<year>2016</year>
<volume>11</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1-16</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Correa]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Camargo]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Ideological consumerism in Colombian elections, 2015: Links between political ideology, Twitter activity and electoral results]]></article-title>
<source><![CDATA[Cyberpsychology, Behaviour and Social Networking]]></source>
<year>2017</year>
<volume>20</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>37-43</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dinev]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[J. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Hart]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Information privacy and correlates: An empirical attempt to bridge and distinguish privacy-related concepts]]></article-title>
<source><![CDATA[European Journal of Information Systems]]></source>
<year>2012</year>
<volume>22</volume>
<numero>1561</numero>
<issue>1561</issue>
<page-range>297-3181</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Frye]]></surname>
<given-names><![CDATA[N. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Dornisch]]></surname>
<given-names><![CDATA[M. M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[When is trust not enough? The role of perceived privacy of communication tools in comfort with self-disclosure]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2010</year>
<volume>26</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>1120-7</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gamer]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Lemon]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Fellows]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Sing]]></surname>
<given-names><![CDATA[P]]></given-names>
</name>
</person-group>
<source><![CDATA[irr: Various coefficients of interrater reliability and agreement]]></source>
<year>2012</year>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Giglietto]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Rossi]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Bennato]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The open laboratory: Limits and possibilities of using Facebook, Twitter, and YouTube as a research data source]]></article-title>
<source><![CDATA[Journal of Technology in Human Services]]></source>
<year>2012</year>
<volume>30</volume>
<numero>3-1</numero>
<issue>3-1</issue>
<page-range>145-59</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Häkkilä]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Chatfield]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<source><![CDATA[It's like if you opened someone else's letter]]></source>
<year>2005</year>
<conf-name><![CDATA[ 7thrnational conference on human computer interaction with mobile devices &amp; services -MobileHCl '05 (p. 219)]]></conf-name>
<conf-loc>Salzburg, Austria </conf-loc>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Howarth]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A social representation is not a quiet thing: Exploring the critical potential of social representations theory]]></article-title>
<source><![CDATA[The British Journal of Social Psychology/the British Psychological Society]]></source>
<year>2006</year>
<volume>45</volume>
<page-range>65-86</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hoy]]></surname>
<given-names><![CDATA[M. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Milne]]></surname>
<given-names><![CDATA[G. R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Gender differences in privacy-related measures for young adult Facebook users]]></article-title>
<source><![CDATA[ournal of Interactive Advertising]]></source>
<year>2010</year>
<volume>10</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>28-45</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Joffe]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risk: From perception to social representation]]></article-title>
<source><![CDATA[British Journal of Social Psychology]]></source>
<year>2003</year>
<volume>42</volume>
<page-range>55-73</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kite]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Foley]]></surname>
<given-names><![CDATA[B. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Grunseit]]></surname>
<given-names><![CDATA[A. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Freeman]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Please like me: Facebook and public health communication]]></article-title>
<source><![CDATA[PLoS ONE]]></source>
<year>2016</year>
<volume>11</volume>
<numero>9</numero>
<issue>9</issue>
<page-range>1-16</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kozlowski]]></surname>
<given-names><![CDATA[S. W. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hattrup]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A disagreement about within-group agreement: Disentangling issues of consistency versus consensus]]></article-title>
<source><![CDATA[Journal of Applied Psychology]]></source>
<year>1992</year>
<volume>77</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>161-7</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Theories in online information privacy research: A critical review and an integrated framework]]></article-title>
<source><![CDATA[Decision Support Systems]]></source>
<year>2012</year>
<volume>54</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>471-81</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marmolejo-Ramos]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Correa]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Sakarkar]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Ngo]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Ruiz-Fernandez]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Butcher]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Yamada]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Placing joy, surprise and sadness in space: A cross-cultural study]]></article-title>
<source><![CDATA[Psychological Research]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Padrón Mercado]]></surname>
<given-names><![CDATA[C. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Barreto]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Representaciones sociales asociadas al consumo hedónico de alimentos en restaurantes]]></article-title>
<source><![CDATA[Revista Latinoamericana de Psicologia]]></source>
<year>2011</year>
<volume>43</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>487-96</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Piwek]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Joinson]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA["What do they Snapchat about?" Patterns of use in time-limited instant messaging service]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2016</year>
<volume>54</volume>
<numero>358-367</numero>
<issue>358-367</issue>
<page-range>http://dx.doi.org/10.1016/j.chb.2015.08.026</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="">
<collab>R Core Team</collab>
<source><![CDATA[R: A language and environment for statistical computing]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rateau]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Moliner]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Christian]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Abric]]></surname>
<given-names><![CDATA[J.-C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social representation theory]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Lange]]></surname>
<given-names><![CDATA[P.A. Van]]></given-names>
</name>
<name>
<surname><![CDATA[Kruglanski]]></surname>
<given-names><![CDATA[A. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Higgins]]></surname>
<given-names><![CDATA[E. T.]]></given-names>
</name>
</person-group>
<source><![CDATA[The handbook of theories of social psychology]]></source>
<year>2012</year>
<page-range>477-97</page-range><publisher-loc><![CDATA[Ne York, NY ]]></publisher-loc>
<publisher-name><![CDATA[Sage]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sashittal]]></surname>
<given-names><![CDATA[H. C.]]></given-names>
</name>
<name>
<surname><![CDATA[DeMar]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Jassawalla]]></surname>
<given-names><![CDATA[A. R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Building acquaintance brands via Snapchat for the college student market]]></article-title>
<source><![CDATA[Business Horizons]]></source>
<year>2016</year>
<volume>59</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>193-204</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Silva]]></surname>
<given-names><![CDATA[T. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Vaz De Melo]]></surname>
<given-names><![CDATA[P. O. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Viana]]></surname>
<given-names><![CDATA[A. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Almeida]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Salles]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Loureiro]]></surname>
<given-names><![CDATA[A. A. F]]></given-names>
</name>
</person-group>
<source><![CDATA[Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics)]]></source>
<year>2013</year>
<volume>8238</volume>
<page-range>309-18</page-range><publisher-name><![CDATA[LNCS]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Utz]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Muscanell]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Khalid]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Snapchat elicits more jealousy than Facebook: A comparison of Snapchat and Facebook use]]></article-title>
<source><![CDATA[Cyberpsychology, Behavior, and Social Networking]]></source>
<year>2015</year>
<volume>18</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>141-6</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vanderhoven]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Schellens]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Valcke]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Raes]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How safe do teenagers behave on Facebook? An observational study]]></article-title>
<source><![CDATA[PLoS ONE]]></source>
<year>2014</year>
<volume>9</volume>
<numero>8</numero>
<issue>8</issue>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wagner]]></surname>
<given-names><![CDATA[W]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social cognition vs. social representations: A comment on Duveen &amp; de Rosa]]></article-title>
<source><![CDATA[Ongoing Production on Social Representations]]></source>
<year>1992</year>
<volume>1</volume>
<numero>2-3</numero>
<issue>2-3</issue>
<page-range>109-15</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[oung]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Subramanian]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Miles]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Hinnant]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Andsager]]></surname>
<given-names><![CDATA[J. L]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social representation of cyberbullying and adolescent suicide: A mixed-method analysis of news stories]]></article-title>
<source><![CDATA[Health Communication]]></source>
<year>2016</year>
<page-range>1-11</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
