<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Psychol.</journal-id>
<journal-title>Frontiers in Psychology</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Psychol.</abbrev-journal-title>
<issn pub-type="epub">1664-1078</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpsyg.2018.00801</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Psychology</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Are Adolescents Engaged in the Problematic Use of Social Networking Sites More Involved in Peer Aggression and Victimization?</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>Mart&#x000ED;nez-Ferrer</surname> <given-names>Bel&#x000E9;n</given-names></name>
<xref ref-type="corresp" rid="c001"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/356862/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Moreno</surname> <given-names>David</given-names></name>
<uri xlink:href="http://loop.frontiersin.org/people/563549/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Musitu</surname> <given-names>Gonzalo</given-names></name>
<uri xlink:href="http://loop.frontiersin.org/people/404719/overview"/>
</contrib>
</contrib-group>
<aff><institution>Department of Education and Social Psychology, Pablo de Olavide University</institution>, <addr-line>Sevilla</addr-line>, <country>Spain</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: Claudio Longobardi, Universit&#x000E0; degli Studi di Torino, Italy</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: Jes&#x000FA;s Nicasio Garc&#x000ED;a S&#x000E1;nchez, Universidad de Le&#x000F3;n, Spain; Mariano Ch&#x000F3;liz, Universitat de Val&#x000E8;ncia, Spain</p></fn>
<corresp id="c001">&#x0002A;Correspondence: Bel&#x000E9;n Mart&#x000ED;nez-Ferrer <email>bmarfer2&#x00040;upo.es</email></corresp>
<fn fn-type="other" id="fn001"><p>This article was submitted to Educational Psychology, a section of the journal Frontiers in Psychology</p></fn></author-notes>
<pub-date pub-type="epub">
<day>29</day>
<month>05</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="collection">
<year>2018</year>
</pub-date>
<volume>9</volume>
<elocation-id>801</elocation-id>
<history>
<date date-type="received">
<day>12</day>
<month>01</month>
<year>2018</year>
</date>
<date date-type="accepted">
<day>04</day>
<month>05</month>
<year>2018</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x000A9; 2018 Mart&#x000ED;nez-Ferrer, Moreno and Musitu.</copyright-statement>
<copyright-year>2018</copyright-year>
<copyright-holder>Mart&#x000ED;nez-Ferrer, Moreno and Musitu</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<abstract>
<p>The problematic use of social networking sites is becoming a major public health concern. Previous research has found that adolescents who engage in a problematic use of social networking sites are likely to show maladjustment problems. However, little is known about its links with peer aggression and victimization. The main goal of this study was to analyze the relationship between problematic use of online social networking sites, peer aggression &#x02013;overt vs. relational and reactive vs. instrumental&#x02013;, and peer victimization &#x02013;overt physical and verbal, and relational&#x02013;, taking into account gender and age (in early and mid-adolescence). Participants were selected using randomized cluster sampling considering school and class as clusters. A battery of instruments was applied to 1,952 adolescents&#x00027; secondary students from Spain (Andalusia) (50.4% boys), aged 11 to 16 (<italic>M</italic> &#x0003D; 14.07, <italic>SD</italic> &#x0003D; 1.39). Results showed that girls and 14&#x02013;16 adolescents were more involved in a problematic use of online social networking sites. Furthermore, adolescents with high problematic use of online social networking sites were more involved in overt&#x02014;reactive and instrumental&#x02014;and relational&#x02014;reactive and instrumental&#x02014;aggressive behaviors, and self-reported higher levels of overt&#x02014;physical and verbal&#x02014;and relational victimization. Even though boys indicated higher levels of all types of victimization, girls with high problematic use of online social networking sites scored the highest on relational victimization. Relating to age, early adolescents (aged 11&#x02013;14) with higher problematic use of online social networking sites reported the highest levels of overt verbal and relational victimization. Overall, results suggested the co-occurrence of problematic use of online social networking sites, peer aggression and victimization. In addition, results showed the influence that gender and age had on peer victimization. This study highlights the continuity between offline and online domains with regard to maladjustment problems in adolescence.</p>
</abstract>
<kwd-group>
<kwd>online social networking sites</kwd>
<kwd>problematic use of Internet</kwd>
<kwd>peer aggression</kwd>
<kwd>peer victimization</kwd>
<kwd>adolescence</kwd>
</kwd-group>
<contract-num rid="cn001">PSI2015-65683- P</contract-num>
<contract-sponsor id="cn001">Ministerio de Econom&#x000ED;a y Competitividad<named-content content-type="fundref-id">10.13039/501100003329</named-content></contract-sponsor>
<counts>
<fig-count count="6"/>
<table-count count="4"/>
<equation-count count="0"/>
<ref-count count="100"/>
<page-count count="13"/>
<word-count count="9999"/>
</counts>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="s1">
<title>Introduction</title>
<p>The use of Internet and Online Social Networking Sites (SNS) is an increasingly popular leisure activity in many countries around the world (Kuss and Griffiths, <xref ref-type="bibr" rid="B53">2011</xref>). It is part of today&#x00027;s lifestyle, especially in adolescence and youth (Johansson and G&#x000F6;testam, <xref ref-type="bibr" rid="B45">2004</xref>; Devine and Lloyd, <xref ref-type="bibr" rid="B22">2012</xref>). SNS constitute one of the most frequent communication tools among adolescents to establish and maintain new interpersonal relationships, allowing them to participate in social groups (Hearn and Foth, <xref ref-type="bibr" rid="B44">2007</xref>). In fact, SNS have replaced other virtual communication tools, such as e-mail and text messages, as well as non-virtual ones (Garc&#x000ED;a et al., <xref ref-type="bibr" rid="B32">2012</xref>). In the online domain, characterized by immediacy, anonymity and globalization, adolescents build their identity, strengthen existing social relationships and create new social bonds (Mu&#x000F1;oz-Rivas et al., <xref ref-type="bibr" rid="B66">2003</xref>). One of the most attractive features of SNS is precisely the possibility to be an active agent in the process of social interaction beyond geographical proximity (Echebur&#x000FA;a and de Corral, <xref ref-type="bibr" rid="B24">2010</xref>).</p>
<p>However, the use of the Internet and the SNS is not without risks. Ease of access to the Internet as well as the immediacy and social interaction capabilities of these tools also seem to increase the risk of developing problematic Internet use (PIU) and, in particular, problematic use of SNS (O&#x00027;Reilly, <xref ref-type="bibr" rid="B70">1996</xref>; Wellman and Gulia, <xref ref-type="bibr" rid="B94">1999</xref>; Preece, <xref ref-type="bibr" rid="B77">2000</xref>), which in some cases can even be classified as addictive (Smahel et al., <xref ref-type="bibr" rid="B88">2008</xref>; Fioravanti et al., <xref ref-type="bibr" rid="B29">2012</xref>; G&#x000F3;mez Salgado et al., <xref ref-type="bibr" rid="B35">2014</xref>). The concept of Internet addiction, however, has not been fully developed, and research in this area remains incipient and fragmented (Yang and Tung, <xref ref-type="bibr" rid="B97">2007</xref>), and no consensus criteria have been established to differentiate between excessive and problematic use of the Internet or dependence.</p>
<p>This plurality of terms in scientific literature reveals that there are multiple conceptual approaches to this problem and a lack of a diagnostic category, such as Internet addiction (Fern&#x000E1;ndez-Villa et al., <xref ref-type="bibr" rid="B28">2015</xref>). All this hinders reaching a consensual definition of terms such as excessive use of the Internet, PIU, and dependency, that consider different conceptual nuances. Despite these limitations, we can say that both Internet addiction and the problematic or excessive use of this tool refer to an individual&#x00027;s inability to control his or her use of the Internet with negative effects deriving from this lack of regulation, such as psychological distress and functional impairment (Echebur&#x000FA;a and de Corral, <xref ref-type="bibr" rid="B24">2010</xref>; Fern&#x000E1;ndez-Villa et al., <xref ref-type="bibr" rid="B28">2015</xref>). Meanwhile, these conceptual difficulties have been reproduced in the specific field of SNS. Andreassen and Pallesen (<xref ref-type="bibr" rid="B5">2014</xref>) define addiction to SNS as an excessive concern to connect to these interaction spaces dedicating such a large amount of time that other areas such as social activities, studies/work, interpersonal relationships, psychological health, and well-being are affected. However, just as with the concept of Internet addiction, other terms have been chosen in scientific literature, such as excessive or problematic use of the SNS, to avoid the diagnostic or clinical connotation proper to the term &#x0201C;addiction.&#x0201D;</p>
<p>The problematic use of the Internet and SNS usually affects populations who are vulnerable because of their age, such as adolescents (Griffiths and Wood, <xref ref-type="bibr" rid="B39">2000</xref>; Pallanti et al., <xref ref-type="bibr" rid="B72">2006</xref>; Puerta Cort&#x000E9;s and Carbonell, <xref ref-type="bibr" rid="B78">2014</xref>). Previous studies have indicated that 2 to 15% of adolescents use the Internet and SNS in an excessive and problematic way (Park et al., <xref ref-type="bibr" rid="B73">2008</xref>; Durkee et al., <xref ref-type="bibr" rid="B23">2012</xref>; Sasmaz et al., <xref ref-type="bibr" rid="B87">2013</xref>). In Spain, 96.5% of children under 15 years usually access the Internet (Spanish Statistical Office, <xref ref-type="bibr" rid="B90">2012</xref>), 11.5% of adolescents connect between 3&#x02013;5 h a day and 5.5% use the Internet more than 5 h a week, a percentage that rises in late adolescence (Catalina et al., <xref ref-type="bibr" rid="B17">2014</xref>). In addition, &#x0007E;85% of adolescents are registered in at least one SNS (Bringu&#x000E9; and S&#x000E1;daba, <xref ref-type="bibr" rid="B9">2009</xref>; Rial et al., <xref ref-type="bibr" rid="B82">2014</xref>) and average age of initiation to Facebook has dropped to 12 years (Garc&#x000ED;a et al., <xref ref-type="bibr" rid="B32">2012</xref>). Likewise, it has been estimated that between 3.7 and 10% of adolescents make excessive or problematic use of these virtual tools (Mu&#x000F1;oz-Rivas et al., <xref ref-type="bibr" rid="B65">2010</xref>; Carbonell et al., <xref ref-type="bibr" rid="B12">2012</xref>). This high level of usage of SNS, at problematic frequency rates in adolescence, can be attributed to the fact that these virtual spaces constitute a scenario to explore and develop multiple identities away from the supervision of parents or other figures of formal authority (Mazzoni and Iannone, <xref ref-type="bibr" rid="B61">2014</xref>; Andreassen, <xref ref-type="bibr" rid="B4">2015</xref>).</p>
<p>Regarding gender, available empirical evidence offers inconclusive results. It has been observed that boys tend to have a higher PIU than women (McKenna and Bargh, <xref ref-type="bibr" rid="B62">2000</xref>; Morahan-Martin and Schumacher, <xref ref-type="bibr" rid="B63">2000</xref>; Anderson, <xref ref-type="bibr" rid="B3">2001</xref>; Schumacher and Morahan-Martin, <xref ref-type="bibr" rid="B86">2001</xref>; Durkee et al., <xref ref-type="bibr" rid="B23">2012</xref>). However, in other studies, no significant differences were found on PIU or Internet dependency according to gender (Kim and Davis, <xref ref-type="bibr" rid="B48">2009</xref>). One significant aspect allowing to examine gender differences in more detail is how these technologies are used. Thus, data obtained from different studies show that boys spend more hours per week using e-mail, online games and web page visits, while girls use chats and social networks more (Mu&#x000F1;oz-Rivas et al., <xref ref-type="bibr" rid="B66">2003</xref>; Andreassen et al., <xref ref-type="bibr" rid="B6">2012</xref>). In fact, the problematic use of SNS has been found to be greater in girls, especially in young and adolescent girls (Ryan et al., <xref ref-type="bibr" rid="B84">2014</xref>; Andreassen, <xref ref-type="bibr" rid="B4">2015</xref>), probably because girls tend to engage more in activities involving social interaction than boys (Andreassen et al., <xref ref-type="bibr" rid="B6">2012</xref>; Kuss et al., <xref ref-type="bibr" rid="B52">2014</xref>; Van Deursen et al., <xref ref-type="bibr" rid="B93">2015</xref>).</p>
<p>The consequences of the problematic use of the Internet and SNS in adolescents have aroused growing concerns in the scientific community and in society (Blaszczynski, <xref ref-type="bibr" rid="B8">2006</xref>; Echebur&#x000FA;a et al., <xref ref-type="bibr" rid="B25">2009</xref>). There is abundant empirical evidence that the PIU and the problematic use of SNS is associated with greater manifestations of adjustment problems in adolescence such as psychological distress (Andreassen and Pallesen, <xref ref-type="bibr" rid="B5">2014</xref>), anxiety (Chabrol et al., <xref ref-type="bibr" rid="B18">2017</xref>), depressive symptoms (Morrison and Gore, <xref ref-type="bibr" rid="B64">2010</xref>; Cao et al., <xref ref-type="bibr" rid="B10">2011</xref>; Pedrero et al., <xref ref-type="bibr" rid="B74">2012</xref>), loneliness, and social isolation (Young and Rogers, <xref ref-type="bibr" rid="B99">1998</xref>; Satici et al., <xref ref-type="bibr" rid="B85">2014</xref>), and emotional problems (Caplan, <xref ref-type="bibr" rid="B11">2010</xref>; Marengo et al., <xref ref-type="bibr" rid="B58">2018</xref>). Furthermore, in a meta-analysis, Marino et al. (<xref ref-type="bibr" rid="B59">2018</xref>) found that the problematic use of Facebook was related to greater psychological distress, anxiety and depression, and low life satisfaction. The problematic use of the Internet and SNS has also been related to externalizing problems in adolescence (Rodr&#x000ED;guez and Fern&#x000E1;ndez, <xref ref-type="bibr" rid="B83">2014</xref>), with higher levels of impulsivity (Young, <xref ref-type="bibr" rid="B98">1999</xref>; Echebur&#x000FA;a et al., <xref ref-type="bibr" rid="B25">2009</xref>), anger and hostility (Ko et al., <xref ref-type="bibr" rid="B50">2008</xref>; Xiuqin et al., <xref ref-type="bibr" rid="B96">2010</xref>; Adalier and Balkan, <xref ref-type="bibr" rid="B1">2012</xref>; Carli et al., <xref ref-type="bibr" rid="B15">2013</xref>), and poor impulse control (Gr&#x000FC;sser et al., <xref ref-type="bibr" rid="B40">2007</xref>). In the same way, adolescents who used Internet more frequently were found to be more likely to participate in aggressive and hostile behaviors (Ko et al., <xref ref-type="bibr" rid="B50">2008</xref>; Xiuqin et al., <xref ref-type="bibr" rid="B96">2010</xref>; Adalier and Balkan, <xref ref-type="bibr" rid="B1">2012</xref>; Carli et al., <xref ref-type="bibr" rid="B15">2013</xref>; Mak et al., <xref ref-type="bibr" rid="B57">2014</xref>). More specifically, adolescents who spent more time connected to SNS showed to be more frequently involved in peer aggression behaviors such as bullying (Ko et al., <xref ref-type="bibr" rid="B51">2012</xref>) and cyberbullying (Erdur-Baker, <xref ref-type="bibr" rid="B26">2010</xref>; Navarro et al., <xref ref-type="bibr" rid="B69">2013</xref>; Gim&#x000E9;nez et al., <xref ref-type="bibr" rid="B34">2015</xref>; Kircabum and Bastug, <xref ref-type="bibr" rid="B49">2017</xref>).</p>
<p>One limitation of these studies is that aggression is analyzed globally. However, not all aggressive behavior is due to high impulsivity. It is important to distinguish between different manifestations of peer aggression in adolescence, to be able to explain the variety of its causes and associated correlates (e.g. Crick and Dodge, <xref ref-type="bibr" rid="B21">1996</xref>). In this line, Little&#x00027;s taxonomy (Little et al., <xref ref-type="bibr" rid="B55">2003</xref>; see Card and Little, <xref ref-type="bibr" rid="B13">2006</xref>; Card et al., <xref ref-type="bibr" rid="B14">2008</xref>) is based on two axes: the forms (&#x0201C;whats&#x0201D;-overt vs. relational aggression) and functions (&#x0201C;whys&#x0201D; -reactive vs. proactive) (See Figure <xref ref-type="fig" rid="F1">1</xref>). Forms refer to the type of behavior intending to harm the victim: aggressive conduct may involve a direct confrontation with others (e.g., intimidating, pushing, hitting, threatening, or insulting-overt aggression) or, on the contrary, may imply damaging the social reputation or social status of victims and isolate them from their friends, going so far as to use their group of peers (e.g., social exclusion, social rejection, or spreading rumors; Xie et al., <xref ref-type="bibr" rid="B95">2002</xref>; Little et al., <xref ref-type="bibr" rid="B55">2003</xref>; Juvonen and Graham, <xref ref-type="bibr" rid="B46">2014</xref>) With regard to functions, i.e., the aggression&#x00027;s purpose, this type of conduct has been found to be due possibly to reacting to real or perceived damage -reactive aggression-, or a means to obtain a desired result -proactive aggression- (Coie and Dodge, <xref ref-type="bibr" rid="B20">1998</xref>). While reactive aggression is fundamentally emotional and impulsive (Card and Little, <xref ref-type="bibr" rid="B13">2006</xref>), proactive aggression implies an intentional behavior directed toward fulfilling a desired goal and, therefore, depends on an evaluation of the consequences (Fontaine and Dodge, <xref ref-type="bibr" rid="B30">2006</xref>; Frey et al., <xref ref-type="bibr" rid="B31">2017</xref>).</p>
<fig id="F1" position="float">
<label>Figure 1</label>
<caption><p>Subtypes of aggressive behavior according to Little&#x00027;s classification.</p></caption>
<graphic xlink:href="fpsyg-09-00801-g0001.tif"/>
</fig>
<p>By combining these two axes (forms and functions) four dimensions or subtypes of aggressive behavior are obtained: overt -reactive and proactive-, and relational &#x02013;reactive, and proactive. This classification has been validated ecologically and these dimensions, although interrelated, have shown important differences (see Murray-Close et al., <xref ref-type="bibr" rid="B67">2016</xref>). In addition, the conceptualization of forms and functions as subcategories contributes to a better understanding of the motives and socio-cognitive mechanisms underlying this behavior (Juvonen and Graham, <xref ref-type="bibr" rid="B46">2014</xref>). Regarding victimization, defined as the experience of being subjected to physical, verbal and psychological aggression perpetrated by peers (Graham, <xref ref-type="bibr" rid="B37">2006</xref>), adolescents with greater use of SNS have shown a greater probability of experiencing cyber-victimization experiences (Navarro et al., <xref ref-type="bibr" rid="B69">2013</xref>; Gim&#x000E9;nez et al., <xref ref-type="bibr" rid="B34">2015</xref>). However, it seems that no studies have yet analyzed victimization experiences in non-virtual contexts and the problematic use of the Internet and SNS.</p>
<sec>
<title>The current study</title>
<p>The problematic use of the Internet and SNS and their associated correlates is still at a very early stage. Most studies have generally analyzed the relationship between Internet dysfunctional use, PIU, psychological distress, internalizing, and externalizing problems. Findings show that adolescents with greater problematic use of the Internet and SNS are more likely to engage in behaviors that involve aggression, hostility and impulsivity. In fact, it has been suggested that adolescents displaying problematic use of Internet and SNS have more impulse control difficulties, which would explain not only their dysfunctional usage of Internet and SNS, but also their greater involvement in aggressive behavior among peers. However, important questions remain, since not all manifestations of aggression imply high impulsivity and poor control of impulses.</p>
<p>Therefore, the present study has two main goals. First, the present study aimed to analyze the relationships between the problematic use of SNS and offline peer aggression, considering the forms (overt vs. relational) and the functions (reactive vs. proactive) of aggressive behavior, and as a function of gender and age. Second, despite the empirical evidence on the excessive use of Facebook and other SNS and cyber-victimization, no studies have been found that explore the link between the problematic use of the Internet or SNS and peer victimization. Since the virtual and the non-virtual settings are interrelated (Castells, <xref ref-type="bibr" rid="B16">2001</xref>; Ch&#x000F3;liz and Marco, <xref ref-type="bibr" rid="B19">2012</xref>), the present study also aimed to analyze the relationship between offline peer victimization (overt and relational) and the problematic use of SNS, considering gender and age. This study may contribute to specifically advancing the knowledge about the link between several subtypes of offline peer aggression and victimization and the problematic use of social online sites that aim to strengthen social relationship and create new ones. On this basis, we posed the following hypothesis:
<list list-type="simple">
<list-item><p>H1: It was expected that adolescents who show a problematic use of SNS were more involved in all the forms -overt and relational- and functions -proactive and reactive- of offline peer aggression.</p></list-item>
<list-item><p>H2: It was expected that the relationship between problematic use of SNS and offline peer aggression was different as a function of gender and age.</p></list-item>
<list-item><p>H3: It was expected to find that adolescents with a problematic use of SNS reported higher levels of both overt and relational offline victimization.</p></list-item>
<list-item><p>H4: It was expected that the relationship between problematic use of SNS and offline peer victimization was different as a function of gender and age.</p></list-item>
</list></p>
</sec>
</sec>
<sec sec-type="materials and methods" id="s2">
<title>Materials and methods</title>
<sec>
<title>Participants</title>
<p>The study was ex post facto transversal and descriptive. In this study, the initial sample consisted of 2,083 adolescents of both sexes aged 12&#x02013;16 years. A total of 81 adolescents were excluded for the following reasons: not having attended one of the three phases of the study, normally due to illness (56%), mistakes in the answers (e.g., more than one answer was given for the same item on at least one scale) (28%), difficulties in understanding Spanish (foreign students) (12%), and students who voluntarily abandoned the study or who responded systematically in the same way to all scales (4%). Finally, 1,952 adolescents (50.4% boys) participated, aged 11&#x02013;16 years (<italic>M</italic> &#x0003D; 14.07, <italic>SD</italic> &#x0003D; 1.39), enrolled in nine compulsory secondary education centers (ESO) in Andalusia (Spain). The participants attended public (56.4%) and semi-private (43.5%) schools. Two age groups corresponding to different stages in adolescence were established: early adolescence (11&#x02013;13 years old, 37.3%) and middle adolescence (14&#x02013;16 years old, 62.7%).</p>
<p>For the sample, the average of missing data was 2.1%, and never above 5% for an individual measure. The low level of missingness meant that it was not likely to bias the results, thus the estimations were accurate to the expected values on the population (Graham, <xref ref-type="bibr" rid="B36">2009</xref>). Missing values by scales or subscales were processed using the regression imputation method. In this method, rows in the data matrix are presumed to constitute a random sample of a normal multivariate population. Univariate outliers were detected via the exploration of standardized scores. Following the criteria provided by Hair et al. (<xref ref-type="bibr" rid="B42">2016</xref>), atypical values were those whose standardized scores had an absolute value above 4. For multivariate detection, Mahalanobis distance was computed. A multivariate outlier is identified if the associated probability at a Mahalanobis distance is 0.001 or less (Tabachnick and Fidell, <xref ref-type="bibr" rid="B92">2007</xref>).</p>
</sec>
<sec>
<title>Instruments</title>
<sec>
<title>Peer aggression</title>
<p>The Aggressive Behavior Scale was used (Little et al., <xref ref-type="bibr" rid="B55">2003</xref>). This scale consists of 35 items with four response options (1 &#x0003D; never and 4 &#x0003D; always), which measure participation in aggressive behavior toward peer groups. For the present study, the subscales of overt reactive aggression (four items, Cronbach&#x00027;s alpha [&#x003B1;] &#x0003D; 0.76, composite reliability [&#x003C1;<sub>c</sub>] &#x0003D; 0.75, &#x003A9; &#x0003D; 0.82, average variance extracted [AVE] &#x0003D; 53%) (e.g., &#x0201C;When someone harms or hurts me, I hit him&#x0201D;), overt proactive aggression (four items, &#x003B1; &#x0003D; 0.78, &#x003C1;<sub>c</sub> &#x0003D; 0.78, &#x003A9; &#x0003D; 0.84, AVE &#x0003D; 53%) (e.g., &#x0201C;I threaten others to get what I want&#x0201D;), relational reactive aggression (four items, &#x003B1; &#x0003D; 0.77, &#x003C1;<sub>c</sub> &#x0003D; 0.77, &#x003A9; &#x0003D; 0.80, AVE &#x0003D; 51%) (e.g., &#x0201C;When someone makes me angry, I treat him/her with indifference or I stop talking to him/her&#x0201D;) and relational proactive aggression (four items, &#x003B1; &#x0003D; 0.72, &#x003C1;<sub>c</sub> &#x0003D; 0.75, &#x003A9; &#x0003D; 0.80, AVE &#x0003D; 51%) (e.g., &#x0201C;to get what I want, I disparage others&#x0201D;). The confirmatory factor analysis [CFA] performed showed the measurement model had a good fit with the data [SB&#x003C7;2 &#x0003D; 527.5385, <italic>df</italic> &#x0003D; 241, <italic>p</italic> &#x0003C; 0.001, CFI &#x0003D; 0.915, RMSEA &#x0003D; 0.026, I.C. 90 (0.023, 0.030)]. Taking into consideration the following values, the overall reliability of the scale was acceptable (&#x003B1; &#x0003D; 0.95, &#x003C1;<sub>c</sub> &#x0003D; 0.95, &#x003A9; &#x0003D; 0.96, AVE &#x0003D; 52%) (See Figure <xref ref-type="fig" rid="F2">2</xref>).</p>
<fig id="F2" position="float">
<label>Figure 2</label>
<caption><p>Peer aggression scale. <sup>&#x0002A;&#x0002A;&#x0002A;</sup><italic>p</italic> &#x0003C; 0.001. Correlation F1-F2, <italic>r</italic> &#x0003D; 0.855<sup>&#x0002A;&#x0002A;&#x0002A;</sup>;Correlation F1-F3, <italic>r</italic> &#x0003D; 0.822<sup>&#x0002A;&#x0002A;&#x0002A;</sup>; Correlation F1-F4, <italic>r</italic> &#x0003D; 0.853<sup>&#x0002A;&#x0002A;&#x0002A;</sup>;Correlation F1-F5, <italic>r</italic> &#x0003D; 0.720<sup>&#x0002A;&#x0002A;&#x0002A;</sup>; Correlation F1-F5, <italic>r</italic> &#x0003D; 0.720<sup>&#x0002A;&#x0002A;&#x0002A;</sup>; Correlation F1-F6, <italic>r</italic> &#x0003D; 0.704<sup>&#x0002A;&#x0002A;&#x0002A;</sup>; Correlation F2-F3, <italic>r</italic> &#x0003D; 0.769<sup>&#x0002A;&#x0002A;&#x0002A;</sup>; Correlation F2-F4, <italic>r</italic> &#x0003D; 0.587<sup>&#x0002A;&#x0002A;&#x0002A;</sup>; Correlation F2-F5, <italic>r</italic> &#x0003D; 0.685<sup>&#x0002A;&#x0002A;&#x0002A;</sup>; Correlation F2-F6, <italic>r</italic> &#x0003D; 0.678<sup>&#x0002A;&#x0002A;&#x0002A;</sup>; Correlation F3-F4, <italic>r</italic> &#x0003D; 0.783<sup>&#x0002A;&#x0002A;&#x0002A;</sup>; Correlation F3-F5, <italic>r</italic> &#x0003D; 0.692<sup>&#x0002A;&#x0002A;&#x0002A;</sup>; Correlation F3-F6, <italic>r</italic> &#x0003D; 0.941<sup>&#x0002A;&#x0002A;&#x0002A;</sup>; Correlation F4-F5, <italic>r</italic> &#x0003D; 0.810<sup>&#x0002A;&#x0002A;&#x0002A;</sup>; Correlation F4-F6, <italic>r</italic> &#x0003D; 0.887<sup>&#x0002A;&#x0002A;&#x0002A;</sup>; Correlation F5-F6, <italic>r</italic> &#x0003D; 0.743<sup>&#x0002A;&#x0002A;&#x0002A;</sup>. CFA fit index: [S-B&#x003C7;<sup>2</sup> &#x0003D; 527.5385, <italic>df</italic> &#x0003D; 241, <italic>p</italic> &#x0003C; 0.001, CFI &#x0003D; 0.910, RMSEA &#x0003D; 0.026(0.023, 0.030)].</p></caption>
<graphic xlink:href="fpsyg-09-00801-g0002.tif"/>
</fig>
</sec>
<sec>
<title>Peer victimization</title>
<p>The School Victimization Scale (Mynard and Joseph, <xref ref-type="bibr" rid="B68">2000</xref>) is composed of 20 items that refer to peer victimization situations, with four response options (1 &#x0003D; never and 4 &#x0003D; always). The scale has three factors: relational victimization (ten items, &#x003B1; &#x0003D; 0.89 &#x003C1;<sub>c</sub> &#x0003D; 0.88, &#x003A9; &#x0003D; 0.91, AVE &#x0003D; 55%) (e.g., &#x0201C;a peer spread rumors about me and criticized me behind my back&#x0201D;), verbal overt victimization (six items, &#x003B1; &#x0003D; 0.83 &#x003C1;<sub>c</sub> &#x0003D; 0.83, &#x003A9; &#x0003D; 0.88, AVE &#x0003D; 55%) (e.g., &#x0201C;A peer insulted me&#x0201D;), and physical overt victimization (four items, &#x003B1; &#x0003D; 0.71 &#x003C1;<sub>c</sub> &#x0003D; 0.74, &#x003A9; &#x0003D; 0.80, AVE &#x0003D; 15%) (e.g., &#x0201C;a peer struck or hit me to really harm me&#x0201D;). The CFA performed showed a good fit of the measurement model to the data [SB &#x003C7;2 &#x0003D; 421.1204, df &#x0003D; 158, <italic>p</italic> &#x0003C; 0.001, CFI &#x0003D; 0.930, RMSEA &#x0003D; 0.038 (0.034, 0.039)]. The overall reliability of the scale was acceptable (&#x003B1; &#x0003D; 0.92, &#x003C1;<sub>c</sub> &#x0003D; 0.94, &#x003A9; &#x0003D; 0.96, AVE &#x0003D; 51%) (See Figure <xref ref-type="fig" rid="F3">3</xref>).</p>
<fig id="F3" position="float">
<label>Figure 3</label>
<caption><p>Peer victimization scale. <sup>&#x0002A;&#x0002A;&#x0002A;</sup><italic>p</italic> &#x0003C; 0.001. Correlation F1-F2, <italic>r</italic> &#x0003D; 0.968<sup>&#x0002A;&#x0002A;&#x0002A;</sup>;Correlation F1-F3, <italic>r</italic> &#x0003D; 0.756<sup>&#x0002A;&#x0002A;&#x0002A;</sup>;Correlation F2-F3, <italic>r</italic> &#x0003D; 0.885<sup>&#x0002A;&#x0002A;&#x0002A;</sup>; CFA fit index: [S-B&#x003C7;<sup>2</sup> &#x0003D; 421.1204, <italic>df</italic> &#x0003D; 158, <italic>p</italic> &#x0003C; 0.001, CFI &#x0003D; 0.930, RMSEA &#x0003D; 0.038(0.034, 0.043)].</p></caption>
<graphic xlink:href="fpsyg-09-00801-g0003.tif"/>
</fig>
</sec>
<sec>
<title>Problematic use of SNS</title>
<p>A scale was administered to assess problematic use of SNS in adolescence. This scale is composed of 13 items with a response range of 1 (never) to 4 (always) it measures the problematic use of SNS (e.g., &#x0201C;I need to be connected to my social networks continuously&#x0201D;). The CFA showed a good fit of the proposed measurement model [SB &#x003C7;2 &#x0003D; 141.4920, <italic>p</italic> &#x0003C; 0.001, df &#x0003D; 57; CFI &#x0003D; 0.96, RMSEA &#x0003D; 0.036, I.C. 90 (0.029, 0.043)]. The scale showed an acceptable reliability (&#x003B1; &#x0003D; 0.87, &#x003C1;<sub>c</sub> &#x0003D; 0.90, &#x003A9; &#x0003D; 0.93, AVE &#x0003D; 51%) (See Figure <xref ref-type="fig" rid="F4">4</xref>).</p>
<fig id="F4" position="float">
<label>Figure 4</label>
<caption><p>Problematic use of SNS. CFA fit index: [S-B&#x003C7;<sup>2</sup> &#x0003D; 141.4920, gl &#x0003D; 57, <italic>p</italic> &#x0003C; 0.001, CFI &#x0003D; 0.964, RMSEA &#x0003D; 0.036(0.029, 0.043)].</p></caption>
<graphic xlink:href="fpsyg-09-00801-g0004.tif"/>
</fig>
</sec>
</sec>
<sec>
<title>Procedure</title>
<p>Schools were selected randomly in Andalusia (Spain). First, we contacted the principals of the selected educational centers, explained the research project to them and asked for their agreement. After this initial contact, we asked for an informative seminar to be held addressed to teachers as well as members of administration to explain the research objectives and to request parents&#x00027; authorizations. Next, a letter describing the study was sent to parents, requesting them to indicate in writing whether they accepted their child&#x00027;s participation in the study (only 1.5 % of the parents refused). Participants anonymously and voluntarily filled out the scales during regular classroom hours (45 min). Trained researchers administered the instruments to the adolescents during the school day, informing them always that their participation in the study was voluntary and anonymous. The study met the ethical requirements proper to research with human beings, respecting the fundamental principles included in the Declaration of Helsinki.</p>
</sec>
<sec>
<title>Data analysis</title>
<p>Confirmatory Factorial Analysis (CFA) using EQS (6.1) (Bentler, <xref ref-type="bibr" rid="B7">2006</xref>) was performed to examine the construct validity of the scales. We used the Maximum Likelihood estimation method and the Satorra-Bentler scaled chi-square test for non-normal data (Yuan et al., <xref ref-type="bibr" rid="B100">2000</xref>). We also calculated the Comparative Fit Index (CFI) and the Tucker-Lewis Index (TLI), where acceptable or good fit is indicated when values above 0.90 or 0.95, respectively, are obtained. Root Mean Square Error of Approximation (RMSEA) values of 0.05 or less indicate good model fit (Hu and Bentler, <xref ref-type="bibr" rid="B43">1998</xref>). Cronbach&#x00027;s alpha was also calculated. Factor loadings were assessed for statistical significance at the <italic>p</italic> &#x0003C; 0.01 level. As for validity, Composite Reliability, AVM, and McDonald Omega were calculated. Composite reliability values above 0.60, AVM values above 0.50, and McDonald Omega values above 0.70 indicate an acceptable convergent validity (Hair et al., <xref ref-type="bibr" rid="B41">1998</xref>; Gefen et al., <xref ref-type="bibr" rid="B33">2000</xref>; Lance et al., <xref ref-type="bibr" rid="B54">2006</xref>).</p>
<p>Statistical analyses were performed using the statistical package SPSS, version 23, and missing values were handled using the regression imputation method (Allison, <xref ref-type="bibr" rid="B2">2001</xref>). First, groups of problematic SNS use were formed. For this, three groups of adolescents were identified: low problematic use, with scores less than or equal to the first quartile, <italic>N</italic> &#x0003D; 467 (23.9%), average problematic use, with scores in the interquartile range, <italic>N</italic> &#x0003D; 961 (49.2 %) and high problematic use, with scores equal to or greater than the third quartile, <italic>N</italic> &#x0003D; 524 (26.8%). A correlational analysis was also performed to analyze relationships between variables; descriptive analyses were calculated to examine how sociodemographic gender and age group variables were distributed in the variables under study. A multifactorial MANOVA was carried out to achieve the goals of the study.</p>
<p>Next, a MANOVA was carried out to analyze differences in overt -proactive and reactive- and relational -proactive and reactive- aggression and overt - physical and verbal- and relational victimization, depending on the problematic use of SNS, gender and age. The factorial design was 3 (problematic use of low, medium and high SNS) by 2 (gender, boy or girl) by 2 (age group: from 11 to 13 years and from 14 to 16 years), to examine possible interaction effects. Next, univariate tests (ANOVAS) were performed to examine differences in variables that were statistically significant and the Bonferroni <italic>post-hoc</italic> test was applied. (&#x003B1; &#x0003D; 0.05).</p>
</sec>
</sec>
<sec sec-type="results" id="s3">
<title>Results</title>
<sec>
<title>Descriptive analyses</title>
<p>Before performing the multivariate analysis, a zero&#x02013;order correlation analysis was computed for all the variables. As Table <xref ref-type="table" rid="T1">1</xref> shows, problematic use of SNS was significantly and positively related to both relational and overt victimization&#x02014;physical and verbal, and to both overt and relational aggression&#x02014;reactive and instrumental. Boys scored higher on all dimensions of peer aggression and overt victimization&#x02014;physical and verbal. However, girls scored higher on relational victimization and problematic use of SNS. Moreover, adolescents aged 14&#x02013;16 years scored higher on overt reactive aggression, relational reactive aggression, and problematic use of SNS, whereas adolescents from 11 to 13 years scored higher on overt physical and verbal victimization.</p>
<table-wrap position="float" id="T1">
<label>Table 1</label>
<caption><p>Pearson correlations among the variables in the study, mean, and standard deviations.</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th/>
<th valign="top" align="center"><bold>1</bold></th>
<th valign="top" align="center"><bold>2</bold></th>
<th valign="top" align="center"><bold>3</bold></th>
<th valign="top" align="center"><bold>4</bold></th>
<th valign="top" align="center"><bold>5</bold></th>
<th valign="top" align="center"><bold>6</bold></th>
<th valign="top" align="center"><bold>7</bold></th>
<th valign="top" align="center"><bold>8</bold></th>
<th valign="top" align="center"><bold>9</bold></th>
<th valign="top" align="center"><bold>10</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">1. Gender<xref ref-type="table-fn" rid="TN1"><sup>a</sup></xref></td>
<td valign="top" align="center">1</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">2. Age<xref ref-type="table-fn" rid="TN2"><sup>b</sup></xref></td>
<td valign="top" align="center">0.01</td>
<td valign="top" align="center">1</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">3. ORA</td>
<td valign="top" align="center">&#x02212;0.36<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.05<xref ref-type="table-fn" rid="TN4"><sup>&#x0002A;</sup></xref></td>
<td valign="top" align="center">1</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">4. OIA</td>
<td valign="top" align="center">&#x02212;0.11<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.03</td>
<td valign="top" align="center">0.40<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">1</td>
<td/>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">5. RRA</td>
<td valign="top" align="center">&#x02212;0.00</td>
<td valign="top" align="center">0.09<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.31<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.31<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">1</td>
<td/>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">6. RIA</td>
<td valign="top" align="center">&#x02212;0.07<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">&#x02212;0.03</td>
<td valign="top" align="center">0.26<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.61<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.40<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">1</td>
<td/>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">7. OPV</td>
<td valign="top" align="center">&#x02212;0.16<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">&#x02212;0.06<xref ref-type="table-fn" rid="TN4"><sup>&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.16<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.15<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.03<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.11<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">1</td>
<td/>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">8. OVV</td>
<td valign="top" align="center">&#x02212;0.05<xref ref-type="table-fn" rid="TN4"><sup>&#x0002A;</sup></xref></td>
<td valign="top" align="center">&#x02212;0.07<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.13<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.18<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.13<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.16<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.60<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">1</td>
<td/>
<td/>
</tr>
<tr>
<td valign="top" align="left">9. RV</td>
<td valign="top" align="center">0.08<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.03</td>
<td valign="top" align="center">0.05<xref ref-type="table-fn" rid="TN4"><sup>&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.17<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.18<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.20<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.51<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.75<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">1</td>
<td/>
</tr>
<tr>
<td valign="top" align="left">10. PSNSU</td>
<td valign="top" align="center">0.08<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.16<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.22<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.23<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.23<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.22<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.12<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.17<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.21<xref ref-type="table-fn" rid="TN3"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">1</td>
</tr>
<tr style="border-top: thin solid #000000;">
<td valign="top" align="left">M (<italic>SD</italic>)</td>
<td valign="top" align="center">1.50 (0.50)</td>
<td valign="top" align="center">1.41 (0.49)</td>
<td valign="top" align="center">1.59 (0.55)</td>
<td valign="top" align="center">1.13 (0.24)</td>
<td valign="top" align="center">1.77 (0.48)</td>
<td valign="top" align="center">1.19 (0.30)</td>
<td valign="top" align="center">1.19 (0.29)</td>
<td valign="top" align="center">1.60 (0.46)</td>
<td valign="top" align="center">1.46 (0.43)</td>
<td valign="top" align="center">1.83 (0.46)</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p><italic>M, Mean; SD, Standard Deviation; ORA, Overt Reactive Aggression; OIA, Overt Instrumental Agression; RRA, Relational Reactive Aggression; RIA, Relational Instrumental Aggression; OPV, Overt Physical Victimization; OVV, Overt Verbal Victimization; RV, Relational Victimization; PSNSU, Problematic Social Networking Sites Use</italic>.</p>
<fn id="TN1">
<label>a</label>
<p><italic>Gender: 1 &#x0003D; boys, 2 &#x0003D; girls</italic>.</p></fn>
<fn id="TN2">
<label>b</label>
<p><italic>Group Age: 1 &#x0003D; 11&#x02013;13, 2 &#x0003D; 14&#x02013;16</italic>.</p></fn>
<fn id="TN4">
<label>&#x0002A;</label>
<p><italic>p &#x0003C; 0.05</italic>;</p></fn>
<fn id="TN3">
<label>&#x0002A;&#x0002A;</label>
<p><italic>p &#x0003C; 0.01</italic>.</p></fn>
</table-wrap-foot>
</table-wrap>
<p>Next, we examined whether the groups were similar in terms of demographic variables. As shown in Table <xref ref-type="table" rid="T2">2</xref>, significant differences relating to gender and group age were found between groups. Regarding gender, results showed significant differences between groups [&#x003C7;<sup>2</sup> (2) &#x0003D; 16.45, <italic>p</italic> &#x0003C; 0.001]. Girls were overrepresented in the group with high problematic use of SNS (<italic>N</italic> &#x0003D; 294, 30.3%); whereas boys were overrepresented in the low problematic use group (<italic>N</italic> &#x0003D; 265, 27%), and the percentages of boys and girls were similar in average problematic use group (N boys &#x0003D; 488, 49.6%, N girls &#x0003D; 473, 48.8%). As for age, results also showed significant differences among groups [&#x003C7;<sup>2</sup> (2) &#x0003D; 45.80, <italic>p</italic> &#x0003C; 0.01]. Adolescents aged 14 to 16 were overrepresented on average (N [14-16] &#x0003D; 608, 63.3%), as well as in high problematic use of SNS (N [14-16] &#x0003D; 377, 71.9%), while adolescents from both groups were similar in low use of SNS (N [11-13] &#x0003D; 228, 48.8%, N [14-16] &#x0003D; 239, 51.2%). This data coincides with results obtained from previous studies in the Spanish context (Mu&#x000F1;oz-Rivas et al., <xref ref-type="bibr" rid="B65">2010</xref>; see Carbonell et al., <xref ref-type="bibr" rid="B12">2012</xref>).</p>
<table-wrap position="float" id="T2">
<label>Table 2</label>
<caption><p>Sociodemographic variables.</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th valign="top" align="left"><bold>Variables</bold></th>
<th/>
<th valign="top" align="center" colspan="3" style="border-bottom: thin solid #000000;"><bold>Problematic use SNS</bold></th>
<th/>
</tr>
<tr>
<th/>
<th valign="top" align="center"><bold>Total sample</bold></th>
<th valign="top" align="center"><bold>Low (<italic>N</italic> &#x0003D; 467)</bold></th>
<th valign="top" align="center"><bold>Medium (<italic>N</italic> &#x0003D; 961)</bold></th>
<th valign="top" align="center"><bold>High (<italic>N</italic> &#x0003D; 524)</bold></th>
<th valign="top" align="center"><bold>&#x003C7;<sup>2</sup></bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Gender</td>
<td/>
<td/>
<td/>
<td/>
<td valign="top" align="center">&#x003C7;<sup>2</sup>(2) &#x0003D; 16.45<xref ref-type="table-fn" rid="TN5"><sup>&#x0002A;&#x0002A;&#x0002A;</sup></xref></td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;Boys</td>
<td valign="top" align="center">983(50.4%)</td>
<td valign="top" align="center">265(56.7%)</td>
<td valign="top" align="center">488(50.8%)</td>
<td valign="top" align="center">230(43.9%)</td>
<td/>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;Girls</td>
<td valign="top" align="center">969(49.6%)</td>
<td valign="top" align="center">202(43.3%)</td>
<td valign="top" align="center">473(49.2%)</td>
<td valign="top" align="center">294(56.1%)</td>
<td/>
</tr>
<tr>
<td valign="top" align="left">Group age</td>
<td/>
<td/>
<td/>
<td/>
<td valign="top" align="center">&#x003C7;<sup>2</sup>(2) &#x0003D; 45.80<xref ref-type="table-fn" rid="TN5"><sup>&#x0002A;&#x0002A;&#x0002A;</sup></xref></td>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;[11&#x02013;13]</td>
<td valign="top" align="center">728(37.3%)</td>
<td valign="top" align="center">228(48.8%)</td>
<td valign="top" align="center">353(36.7%)</td>
<td valign="top" align="center">147(28.1%)</td>
<td/>
</tr>
<tr>
<td valign="top" align="left">&#x000A0;&#x000A0;&#x000A0;[14&#x02013;16]</td>
<td valign="top" align="center">1, 224(62.7%)</td>
<td valign="top" align="center">239(51.2%)</td>
<td valign="top" align="center">608(63.3%)</td>
<td valign="top" align="center">377(71.9%)</td>
<td/>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p><italic>&#x003C7;<sup>2</sup>, Chi-square</italic>.</p>
<fn id="TN5">
<label>&#x0002A;&#x0002A;&#x0002A;</label>
<p><italic>p &#x0003C; 0.001</italic>.</p></fn>
</table-wrap-foot>
</table-wrap>
</sec>
<sec>
<title>Multivariate analysis</title>
<p>In the calculated MANOVA, statistically significant differences were found in main effects of gender variables [&#x0039B; &#x0003D; 0.822, <italic>F</italic><sub>(7, 1934)</sub> &#x0003D; 64.41, <italic>p</italic> &#x0003C; 0.001, &#x003B7;2p &#x0003D; 0.178], age [&#x0039B; &#x0003D; 0.982, <italic>F</italic><sub>(7, 1934)</sub> &#x0003D; 5.07, <italic>p</italic> &#x0003C; 0.001, &#x003B7;2p &#x0003D; 0.018] and problematic use of the SNS [&#x0039B; &#x0003D; 0.881, <italic>F</italic><sub>(14, 3868)</sub> &#x0003D; 18.11, <italic>p</italic> &#x0003C; 0.001, &#x003B7;2p &#x0003D; 0.062]. A statistically significant interaction effect was also obtained between problematic use of SNS and gender [&#x0039B; &#x0003D; 0.983, <italic>F</italic><sub>(14, 3868)</sub> &#x0003D; 2.37, <italic>p</italic> &#x0003C; 0.01, &#x003B7;2p &#x0003D; 0.009] and problematic use of SNS and age [&#x0039B; &#x0003D; 0.986, <italic>F</italic><sub>(14, 3868)</sub> &#x0003D; 1.93, <italic>p</italic> &#x0003C; 0.05, &#x003B7;2p &#x0003D; 0.007].</p>
<p>Regarding sociodemographic variables, in the ANOVA, statistically significant differences were obtained with respect to gender in the variables overt reactive, overt proactive, and overt instrumental aggression. As shown in Table <xref ref-type="table" rid="T3">3</xref>, boys showed higher scores than girls in overt aggression (reactive and proactive), proactive relational aggression, and overt victimization (physical and verbal), while girls scored higher in relational victimization. In relation to age, results of the ANOVA indicated that adolescents aged 14&#x02013;16 years had higher scores in relational reactive aggression and lower scores in overt victimization (physical and verbal), compared to adolescents between 11 and 13 years old.</p>
<table-wrap position="float" id="T3">
<label>Table 3</label>
<caption><p>Means, standard deviations, and differences on peer aggression and peer victimization by gender, age, and problematic use of SNS.</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th/>
<th valign="top" align="center" colspan="4" style="border-bottom: thin solid #000000;"><bold>Gender</bold></th>
<th valign="top" align="center" colspan="4" style="border-bottom: thin solid #000000;"><bold>Age</bold></th>
<th valign="top" align="center" colspan="5" style="border-bottom: thin solid #000000;"><bold>Problematic use SNS</bold></th>
</tr>
<tr>
<th/>
<th valign="top" align="center"><bold>Boys</bold></th>
<th valign="top" align="center"><bold>Girls</bold></th>
<th valign="top" align="center"><bold><italic>F</italic><sub>(1, 1952)</sub></bold></th>
<th valign="top" align="center"><bold><inline-formula><mml:math id="M1"><mml:msubsup><mml:mrow><mml:mi>&#x003B7;</mml:mi></mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math></inline-formula></bold></th>
<th valign="top" align="center"><bold>11&#x02013;13</bold></th>
<th valign="top" align="center"><bold>14&#x02013;16</bold></th>
<th valign="top" align="center"><bold><italic>F</italic><sub>(1, 1952)</sub></bold></th>
<th valign="top" align="center"><bold><inline-formula><mml:math id="M2"><mml:msubsup><mml:mrow><mml:mi>&#x003B7;</mml:mi></mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math></inline-formula></bold></th>
<th valign="top" align="center"><bold>Low</bold></th>
<th valign="top" align="center"><bold>Medium</bold></th>
<th valign="top" align="center"><bold>High</bold></th>
<th valign="top" align="center"><bold><italic>F</italic><sub>(2, 1952)</sub></bold></th>
<th valign="top" align="center"><bold><inline-formula><mml:math id="M3"><mml:msubsup><mml:mrow><mml:mi>&#x003B7;</mml:mi></mml:mrow><mml:mrow><mml:mtext>p</mml:mtext></mml:mrow><mml:mrow><mml:mn>2</mml:mn></mml:mrow></mml:msubsup></mml:math></inline-formula></bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">ORA</td>
<td valign="top" align="center">1.79(0.59)</td>
<td valign="top" align="center">1.39(0.42)</td>
<td valign="top" align="center">284.80<xref ref-type="table-fn" rid="TN7"><sup>&#x0002A;&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.128</td>
<td valign="top" align="center">1.55(0.55)</td>
<td valign="top" align="center">1.61(0.55)</td>
<td valign="top" align="center">0.726</td>
<td valign="top" align="center">0.000</td>
<td valign="top" align="center">1.41<sup>c</sup>(0.49)</td>
<td valign="top" align="center">1.60<sup>b</sup>(0.52)</td>
<td valign="top" align="center">1.74<sup>a</sup>(0.61)</td>
<td valign="top" align="center">69.82<xref ref-type="table-fn" rid="TN7"><sup>&#x0002A;&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.067</td>
</tr>
<tr>
<td valign="top" align="left">OIA</td>
<td valign="top" align="center">1.16(0.27)</td>
<td valign="top" align="center">1.10(0.21)</td>
<td valign="top" align="center">26.27<xref ref-type="table-fn" rid="TN7"><sup>&#x0002A;&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.013</td>
<td valign="top" align="center">1.12(0.25)</td>
<td valign="top" align="center">1.14(0.25)</td>
<td valign="top" align="center">0.077</td>
<td valign="top" align="center">0.000</td>
<td valign="top" align="center">1.07<sup>c</sup>(0.21)</td>
<td valign="top" align="center">1.12<sup>b</sup>(0.21)</td>
<td valign="top" align="center">1.21<sup>a</sup>(0.31)</td>
<td valign="top" align="center">37.54<xref ref-type="table-fn" rid="TN7"><sup>&#x0002A;&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.037</td>
</tr>
<tr>
<td valign="top" align="left">RRA</td>
<td valign="top" align="center">1.77(0.48)</td>
<td valign="top" align="center">1.77(0.48)</td>
<td valign="top" align="center">0.018</td>
<td valign="top" align="center">0.000</td>
<td valign="top" align="center">1.71(0.48)</td>
<td valign="top" align="center">1.80(0.47)</td>
<td valign="top" align="center">8.32<xref ref-type="table-fn" rid="TN6"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.004</td>
<td valign="top" align="center">1.59<sup>c</sup>(0.45)</td>
<td valign="top" align="center">1.78<sup>b</sup>(0.44)</td>
<td valign="top" align="center">1.90<sup>a</sup>(0.51)</td>
<td valign="top" align="center">44.44<xref ref-type="table-fn" rid="TN7"><sup>&#x0002A;&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.044</td>
</tr>
<tr>
<td valign="top" align="left">RIA</td>
<td valign="top" align="center">1.21(0.32)</td>
<td valign="top" align="center">1.17(0.29)</td>
<td valign="top" align="center">11.84<xref ref-type="table-fn" rid="TN6"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.006</td>
<td valign="top" align="center">1.18(0.31)</td>
<td valign="top" align="center">1.20(0.30)</td>
<td valign="top" align="center">0.313</td>
<td valign="top" align="center">0.000</td>
<td valign="top" align="center">1.13<sup>c</sup>(0.27)</td>
<td valign="top" align="center">1.77<sup>b</sup>(0.27)</td>
<td valign="top" align="center">1.28<sup>a</sup>(0.37)</td>
<td valign="top" align="center">31.90<xref ref-type="table-fn" rid="TN7"><sup>&#x0002A;&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.032</td>
</tr>
<tr>
<td valign="top" align="left">OPV</td>
<td valign="top" align="center">1.23(0.32)</td>
<td valign="top" align="center">1.14(0.25)</td>
<td valign="top" align="center">59.10<xref ref-type="table-fn" rid="TN7"><sup>&#x0002A;&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.030</td>
<td valign="top" align="center">1.21(0.31)</td>
<td valign="top" align="center">1.17(0.27)</td>
<td valign="top" align="center">11.89<xref ref-type="table-fn" rid="TN6"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.006</td>
<td valign="top" align="center">1.16<sup>b</sup>(0.29)</td>
<td valign="top" align="center">1.18<sup>b</sup>(0.25)</td>
<td valign="top" align="center">1.23<sup>a</sup>(0.34)</td>
<td valign="top" align="center">15.25<xref ref-type="table-fn" rid="TN7"><sup>&#x0002A;&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.015</td>
</tr>
<tr>
<td valign="top" align="left">OVV</td>
<td valign="top" align="center">1.62(0.47)</td>
<td valign="top" align="center">1.57(0.46)</td>
<td valign="top" align="center">7.26<xref ref-type="table-fn" rid="TN6"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.004</td>
<td valign="top" align="center">1.64(0.49)</td>
<td valign="top" align="center">1.57(0.45)</td>
<td valign="top" align="center">23.16<xref ref-type="table-fn" rid="TN7"><sup>&#x0002A;&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.012</td>
<td valign="top" align="center">1.52<sup>b</sup>(0.49)</td>
<td valign="top" align="center">1.57<sup>b</sup>(0.41)</td>
<td valign="top" align="center">1.71<sup>a</sup>(0.52)</td>
<td valign="top" align="center">31.45<xref ref-type="table-fn" rid="TN7"><sup>&#x0002A;&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.031</td>
</tr>
<tr>
<td valign="top" align="left">RV</td>
<td valign="top" align="center">1.42(0.41)</td>
<td valign="top" align="center">1.49(0.44)</td>
<td valign="top" align="center">9.89<xref ref-type="table-fn" rid="TN6"><sup>&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.005</td>
<td valign="top" align="center">1.48(0.45)</td>
<td valign="top" align="center">1.44(0.41)</td>
<td valign="top" align="center">13.07<xref ref-type="table-fn" rid="TN7"><sup>&#x0002A;&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.007</td>
<td valign="top" align="center">1.36<sup>c</sup>(0.43)</td>
<td valign="top" align="center">1.43<sup>b</sup>(0.36)</td>
<td valign="top" align="center">1.59<sup>a</sup>(0.50)</td>
<td valign="top" align="center">41.97<xref ref-type="table-fn" rid="TN7"><sup>&#x0002A;&#x0002A;&#x0002A;</sup></xref></td>
<td valign="top" align="center">0.041</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p><italic>ORA, Overt Reactive Aggression; OIA, Overt Instrumental Agression; RRA, Relational Reactive Aggression; RIA, Relational Instrumental Aggression; OPV, Overt Physical Victimization; OVV, Overt Verbal Victimization; RV, Relational Victimization</italic>.</p>
<fn id="TN6">
<label>&#x0002A;&#x0002A;</label>
<p><italic>p &#x0003C; 0.01</italic>,</p></fn>
<fn id="TN7">
<label>&#x0002A;&#x0002A;&#x0002A;</label>
<p><italic>p &#x0003C; 0.001, a &#x0003E; b &#x0003E; c</italic>.</p></fn>
</table-wrap-foot>
</table-wrap>
<p>Concerning the problematic use of SNS, results of the ANOVA showed significant differences in all dimensions analyzed (see Table <xref ref-type="table" rid="T3">3</xref>). The Bonferroni tests (&#x003B1; &#x0003D; 0.05) indicated that adolescents with the highest problematic use of the SNS obtained the highest scores in overt and relational aggression (both proactive and reactive, overt victimization -physical and verbal) and relational victimization, compared to adolescents with medium and low use. In addition, adolescents with an average use of SNS, compared to the low-use group, reported higher scores for overt and relational aggression (both proactive and reactive, and relational victimization), and similar scores to the low use group for overt victimization (physical and verbal).</p>
<sec>
<title>Analysis of interactions</title>
<p>A statistically significant interaction effect was obtained between problematic use of SNS, and gender and relational victimization, <italic>F</italic><sub>(5, 1946)</sub> &#x0003D; 17.75, <italic>p</italic> &#x0003C; 0.001, &#x003B7;<sup>2</sup>p &#x0003D; 0.044. As seen in Table <xref ref-type="table" rid="T4">4</xref>, the results of the <italic>post-hoc</italic> contrasts performed with the Bonferroni test (&#x003B1; &#x0003D; 0.05) indicated that girls, particularly those with greater problematic use of SNS, obtained the highest scores in relational victimization, compared to the remaining groups (see Figure <xref ref-type="fig" rid="F5">5</xref>).</p>
<table-wrap position="float" id="T4">
<label>Table 4</label>
<caption><p>Mean, Standard Deviation (SD,) and <italic>post-hoc</italic> comparisons between problematic use of SNS, gender, age, overt verbal victimization, and relational victimization.</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th/>
<th/>
<th valign="top" align="center" colspan="3" style="border-bottom: thin solid #000000;"><bold>Problematic use SNS</bold></th>
<th/>
</tr>
<tr>
<th/>
<th valign="top" align="left"><bold>Gender</bold></th>
<th valign="top" align="center"><bold>Low</bold></th>
<th valign="top" align="center"><bold>Average</bold></th>
<th valign="top" align="center"><bold>High</bold></th>
<th valign="top" align="left"><bold><italic>Post hoc</italic> comparisons</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">RV<xref ref-type="table-fn" rid="TN8"><sup>1</sup></xref></td>
<td valign="top" align="left">Boys</td>
<td valign="top" align="center">1.36 (0.43)<sup>a</sup></td>
<td valign="top" align="center">1.41 (0.35)<sup>b</sup></td>
<td valign="top" align="center">1.52 (0.48)<sup>c</sup></td>
<td valign="top" align="left">c &#x0003E; a, b, d</td>
</tr>
<tr>
<td/>
<td valign="top" align="left">Girls</td>
<td valign="top" align="center">1.38 (0.42)<sup>d</sup></td>
<td valign="top" align="center">1.45 (0.38)<sup>e</sup></td>
<td valign="top" align="center">1.64 (0.52)<sup>f</sup></td>
<td valign="top" align="left">f &#x0003E; a, b, c, d, e</td>
</tr>
<tr style="border-top: thin solid #000000;">
<td/>
<td valign="top" align="left"><bold>Age</bold></td>
<td valign="top" align="center"><bold>Low</bold></td>
<td valign="top" align="center"><bold>Average</bold></td>
<td valign="top" align="center"><bold>High</bold></td>
<td valign="top" align="left"><italic><bold>Post hoc</bold></italic> <bold>comparisons</bold></td>
</tr>
<tr style="border-top: thin solid #000000;">
<td valign="top" align="left">OVV<xref ref-type="table-fn" rid="TN9"><sup>2</sup></xref></td>
<td valign="top" align="left">11-13</td>
<td valign="top" align="center">1.55(0.50)<sup>a</sup></td>
<td valign="top" align="center">1.59 (0.40)<sup>b</sup></td>
<td valign="top" align="center">1.79 (0.57)<sup>c</sup></td>
<td valign="top" align="left">c &#x0003E; a, b, d, e, f</td>
</tr>
<tr>
<td/>
<td valign="top" align="left">14-16</td>
<td valign="top" align="center">1.55 (0.51)<sup>d</sup></td>
<td valign="top" align="center">1.56 (0.42)<sup>e</sup></td>
<td valign="top" align="center">1.55 (0.44)<sup>f</sup></td>
<td/>
</tr>
<tr>
<td valign="top" align="left">RV<xref ref-type="table-fn" rid="TN10"><sup>3</sup></xref></td>
<td valign="top" align="left">11-13</td>
<td valign="top" align="center">1.39(0.45)<sup>a</sup></td>
<td valign="top" align="center">1.43(0.35)<sup>b</sup></td>
<td valign="top" align="center">1.64(0.55)<sup>c</sup></td>
<td valign="top" align="left">c &#x0003E; a, b, d, e, f</td>
</tr>
<tr>
<td/>
<td valign="top" align="left">14-16</td>
<td valign="top" align="center">1.41 (0.45)<sup>d</sup></td>
<td valign="top" align="center">1.44 (0.37)<sup>e</sup></td>
<td valign="top" align="center">1.45 (0.41)<sup>f</sup></td>
<td/>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p><italic>RV, Relational Victimization; OVV, Overt Verbal Victimization. &#x003B1; &#x0003D; 0.05</italic>.</p>
<fn id="TN8">
<label>1</label>
<p><italic>F <sub>(5, 1946)</sub> &#x0003D; 17.75, p &#x0003C; 0.001, &#x003B7;<sup>2</sup>p &#x0003D; 0.044</italic>;</p></fn>
<fn id="TN9">
<label>2</label>
<p><italic>F <sub>(5, 1946)</sub> &#x0003D; 12.07, p &#x0003C; 0.001, &#x003B7;<sup>2</sup>p &#x0003D; 0.030</italic>;</p></fn>
<fn id="TN10">
<label>3</label>
<p><italic>F<sub>(5, 1946)</sub> &#x0003D; 2.42, p &#x0003C; 0.001, &#x003B7;<sup>2</sup>p &#x0003D; 0.034</italic>.</p></fn>
</table-wrap-foot>
</table-wrap>
<fig id="F5" position="float">
<label>Figure 5</label>
<caption><p>Interaction effect problematic use SNS-low, average, and high-,gender, and relational victimization.</p></caption>
<graphic xlink:href="fpsyg-09-00801-g0005.tif"/>
</fig>
<p>A statistically significant interaction effect was also obtained between problematic use of SNS, age and overt verbal victimization, <italic>F</italic><sub>(5, 1946)</sub> &#x0003D; 12.07, <italic>p</italic> &#x0003C; 0.001, &#x003B7;<sup>2</sup>p &#x0003D; 0.030. Results of the <italic>post-hoc</italic> contrasts performed with the Bonferroni test showed that adolescents aged 11&#x02013;13 with a higher problematic use of SNS reported higher overt verbal victimization, compared to the remaining groups (see Table <xref ref-type="table" rid="T4">4</xref> and Figure <xref ref-type="fig" rid="F6">6</xref>). This trend was also observed in the interaction between problematic use of SNS, age and relational victimization, <italic>F</italic><sub>(5, 1946)</sub> &#x0003D; 2.42, <italic>p</italic> &#x0003C; 0.001, &#x003B7;<sup>2</sup>p &#x0003D; 0.034. As shown in Table <xref ref-type="table" rid="T4">4</xref> and Figure <xref ref-type="fig" rid="F6">6</xref>, 11&#x02013;13-year-old adolescents with the most problematic use of SNS obtained the highest scores in relational victimization compared to the rest of the groups.</p>
<fig id="F6" position="float">
<label>Figure 6</label>
<caption><p>Interaction effect problematic use SNS-low, average, and high-,age,overt verbal victimization, and relational victimization.</p></caption>
<graphic xlink:href="fpsyg-09-00801-g0006.tif"/>
</fig>
</sec>
</sec>
</sec>
<sec sec-type="discussion" id="s4">
<title>Discussion</title>
<p>The general goal of the present study was to analyze existing relationships between the problematic use of SNS, peer aggression and victimization in adolescents, taking into account gender and age. In addition, the forms (overt vs. relational) and the functions (proactive vs. reactive) of aggressive behavior were considered to evaluate peer aggression. Forms of victimization were considered as well. Overall, results confirmed that the problematic use of SNS was associated with greater involvement in all dimensions of analyzed peer aggression and with higher levels of overt (physical and verbal) victimization and relational victimization. Likewise, gender and age were shown to have an important role in the relationship between problematic use of SNS and relational victimization and verbal expression.</p>
<p>The first specific objective of this study was to examine the relationship between peer aggression and the problematic use of SNS, by gender and age. We hypothesized that adolescents with a problematic use of SNS would be more involved in all the subtypes of aggressive behavior measured. As expected, results showed that adolescents with greater problematic use showed a greater involvement in overt and relational aggression, with both a reactive and a proactive purpose. These results are compatible with those obtained in previous studies in which the PIU has been linked to Internet addiction with greater hostility and greater expression of aggressive behaviors in adolescents (Ko et al., <xref ref-type="bibr" rid="B50">2008</xref>, <xref ref-type="bibr" rid="B51">2012</xref>; Xiuqin et al., <xref ref-type="bibr" rid="B96">2010</xref>; Adalier and Balkan, <xref ref-type="bibr" rid="B1">2012</xref>; Carli et al., <xref ref-type="bibr" rid="B15">2013</xref>).</p>
<p>However, results of the present study show a deeper analysis of these relationships: the greater the problematic use of SNS, the greater the manifestation of peer aggression, in its different forms -manifest and relational- and functions -reactive and instrumental. Our findings could be explained because high engagement in aggressive conducts, both proactive and reactive, can be attributed to the fact that both types of aggression are interrelated (Poulin and Boivin, <xref ref-type="bibr" rid="B75">2000</xref>; see Kempes et al., <xref ref-type="bibr" rid="B47">2005</xref>).</p>
<p>Previous research has linked PIU and Internet dependence to difficulties in controlling impulses (Gr&#x000FC;sser et al., <xref ref-type="bibr" rid="B40">2007</xref>; Echebur&#x000FA;a et al., <xref ref-type="bibr" rid="B25">2009</xref>; Kim and Davis, <xref ref-type="bibr" rid="B48">2009</xref>), which may explain the relationship between the problematic use of SNS and reactive aggression. However, proactive aggression, unlike reactive aggression, is a more elaborate, planned and, therefore, less impulsive behavior: it is thus linked less to these difficulties in impulse control. In fact, impulsivity and anger have shown to be key factors in distinguishing between both types of aggression (Raine et al., <xref ref-type="bibr" rid="B79">2006</xref>). Conversely, proactive (or instrumental) aggression has been associated with a reduced ability to delay gratifications, so that the possible benefits are valued by the aggressors, regardless of the damage they may cause to the victims (Kempes et al., <xref ref-type="bibr" rid="B47">2005</xref>; Ram&#x000ED;rez and Andreu, <xref ref-type="bibr" rid="B80">2006</xref>; Crespo-Ramos et al., <xref ref-type="bibr" rid="B81">2017</xref>). Both traits, impulsivity and difficulties on delaying rewards are also linked to problematic use of Internet and SNS. Additional research, though, is needed to test whether these characteristics might mediate the association between Problematic use of SNS and peer aggression. In relation to the role of gender and age, results indicate that boys participate more frequently than girls in all analyzed dimensions of aggression, except in the relational reactive dimension, where equivalent scores were found. Regarding age, the only differences were in reactive relational aggression, where adolescents aged 11&#x02013;13 were found to be more frequently involved in these behaviors.</p>
<p>Regarding the second specific objective, results from previous studies indicate that adolescents with greater use of SNS report greater cyber-victimization (Navarro et al., <xref ref-type="bibr" rid="B69">2013</xref>; Gim&#x000E9;nez et al., <xref ref-type="bibr" rid="B34">2015</xref>). The findings of this study indicated that, as hypothesized, the problematic use of SNS was associated with the experience of overt -physical and verbal- and relational victimization. In addition, gender and age seemed to play an important role in understanding these relationships. This conclusion was drawn from analyzing the interaction between problematic use of SNS, gender, and age with respect to victimization. Thus, in relation to gender, results indicated that boys and girls showed a similar degree of relational peer victimization in the problem use groups of the lower and middle SNS. However, in the high problematic use group, adolescents reported higher levels of relational victimization. We believe that this result is highly revealing, insofar that it is evident that adolescents with problematic use of SNS also present other adjustment problems that differ according to gender.</p>
<p>As results obtained in the univariate analyses show, boys were subject to relational victimization more frequently than girls, while reporting a higher problematic use of SNS. This result is compatible with that obtained by other authors (Bringu&#x000E9; and S&#x000E1;daba, <xref ref-type="bibr" rid="B9">2009</xref>; Griffiths et al., <xref ref-type="bibr" rid="B38">2014</xref>; Ryan et al., <xref ref-type="bibr" rid="B84">2014</xref>; Andreassen, <xref ref-type="bibr" rid="B4">2015</xref>). Girls seemed to use Internet tools more often than boys, primarily for communication, strengthening friendships and social interaction (Mu&#x000F1;oz-Rivas et al., <xref ref-type="bibr" rid="B66">2003</xref>; Espinar Ruiz and Gonz&#x000E1;lez R&#x000ED;o, <xref ref-type="bibr" rid="B27">2009</xref>; Andreassen et al., <xref ref-type="bibr" rid="B6">2012</xref>). Nevertheless, when these variables were taken into account, girls with the most problematic use of SNS clearly reported greater relational victimization, mainly aimed at excluding adolescents from the peer group and eroding their social life.</p>
<p>In adolescence, SNS represent a platform to establish new relationships and to strengthen existing ones, whether friendly or romantic. Girls, more than boys, seem to find the online domain a safer and more protected space to initiate friendship and affective relationships (Subrahmanyam and Greenfield, <xref ref-type="bibr" rid="B91">2008</xref>). However, a greater predisposition to online communication seems to entail a greater risk of suffering negative consequences derived from the problematic use of the Internet and SNS (Oberst et al., <xref ref-type="bibr" rid="B71">2017</xref>). Results of the present study suggest that these risks are especially high in girls showing problems of relational victimization. Thus, it is possible that in a situation of victimization, girls participate more frequently in SNS and in online communication activities to strengthen existing friendship relationships and to create new links that minimize the adverse effects of the experience of victimization: this, in turn, may make these adolescents more vulnerable to developing a problematic use of SNS. This finding can be considered highly significant and these relationships should be analyzed more in-depth in future research.</p>
<p>Regarding the interaction between problematic use of SNS and age, results showed that adolescents aged 11&#x02013;13 years old -early adolescence- who used the SNS in a problematic way, reported greater verbal and relational verbal victimization, compared to the rest of the groups. Previous research has shown that approximately between 3.7% and 10% of adolescents used the Internet in a problematic way. However, no data has been found regarding the problematic use of SNS at different stages of adolescence. These results are compatible with studies carried out in Spain, that found that 85% of adolescents were registered in at least one SNS (Bringu&#x000E9; and S&#x000E1;daba, <xref ref-type="bibr" rid="B9">2009</xref>; Garc&#x000ED;a et al., <xref ref-type="bibr" rid="B32">2012</xref>; Rial et al., <xref ref-type="bibr" rid="B82">2014</xref>). The findings of the present study indicated that adolescents aged 14&#x02013;16 years showed greater problems with the use of SNS. However, it was adolescents aged 11&#x02013;13 years with high problematic use who reported greater overt verbal and relational victimization. These results could be explained by the fact that the highest prevalence of peer victimization occurs in early adolescence (Mart&#x000ED;nez-Ferrer et al., <xref ref-type="bibr" rid="B60">2011</xref>; Povedano et al., <xref ref-type="bibr" rid="B76">2012</xref>). In addition, at this developmental stage, they already have access to the SNS and, therefore, they can make a greater exploratory use of these tools, which could lead to a high and problematic use of the SNS. For adolescents, one of the most inviting aspects of these networks is that they enable building support networks, searching information and social support beyond geographical proximity, though often reduced to the virtual domain (Mu&#x000F1;oz-Rivas et al., <xref ref-type="bibr" rid="B66">2003</xref>; Echebur&#x000FA;a and de Corral, <xref ref-type="bibr" rid="B24">2010</xref>). It is possible that the SNS constitute, in turn, a support-seeking tool for adolescents victimized by their peer group,</p>
</sec>
<sec id="s5">
<title>Limitations</title>
<p>Despite its positive aspects, this study also presents some limitations. Positive aspects include the novelty of the field, which lacks almost completely in empirical evidence, in particular on the link between problematic use of SNS and peer victimization. In this sense, results of the present study contribute to scientific knowledge in this field. Another main contribution is related to the interaction between gender and problematic use of SNS. This result sheds light on the need to incorporate a gender perspective in future research focused on the continuity of the processes of aggression and victimization in the online and offline domains. Among its limitations, the cross-sectional nature of the study did not allow establishing causal relationships between studied variables, so longitudinal studies should test these relationships more in depth. In this sense, future longitudinal studies could examine these relationships in more detail. In addition, all sources were self-reports, leading to possible biases, especially in sensitive topics such as aggression and the problematic use of SNS. In this sense, the use of online surveys could minimize the aforementioned biases because adolescents might feel their identity more protected. Moreover, outliers and missing values could be easily identified. Furthermore, findings suggest that as pointed out by (Livingstone and Smith, <xref ref-type="bibr" rid="B56">2014</xref>; Smith and Livingstone, <xref ref-type="bibr" rid="B89">2017</xref>), offline and online continuity exists, so vulnerable adolescents in one area may also be vulnerable in the other, while those who take risks in one domain may also take them in others. Future research may find it revealing to incorporate measures of cyber-aggression and of cyber-victimization.</p>
</sec>
<sec sec-type="conclusions" id="s6">
<title>Conclusions</title>
<p>Despite its limitations, the results of this study allow addressing the extent of the problematic use of SNS in depth and connecting the offline and online settings. Many studies have found that the problematic use of Internet and SNS is associated with other existing adjustment problems such us internalizing symptoms and lower levels of life satisfaction (Caplan, <xref ref-type="bibr" rid="B11">2010</xref>; Marengo et al., <xref ref-type="bibr" rid="B58">2018</xref>). This study contributes to a better understanding of adolescents with a problematic use of SNS and its links to peer aggression and peer victimization. Findings of the present study are particularly important given that research on SNS and adjustment problems in offline settings is scarce. The constellation of adjustment problems is interrelated, so adolescents with more problems deriving from the use of these social networks are more frequently involved in -overt and relational- aggression and victimization. In addition, in girls and adolescents aged 11&#x02013;13 years, the problematic use of SNS is linked to greater victimization suggesting social influences. These findings reveal the need for educational programs on Internet and SNS good practices so that adolescents develop a healthy use of these communication tools. Such programs could also help detect violence and peer victimization problems and, therefore, lead to initiatives to improve harmonious coexistence in the community. Moreover, at the public health level, identifying the problematic use of SNS among adolescents in the early stages could potentially lead to identifying improvements in preventing peer aggression and fostering positive social climates.</p>
</sec>
<sec id="s7">
<title>Ethics statement</title>
<p>The present study was conducted in accordance with the 1964 Helsinki declaration and its later amendments or comparable ethical standards, with the approval of the management board of schools, the educational inspection services, and the Childhood Observatory of the Regional Government of Andalusia (Spain). All participants gave written informed consent. The required authorizations from the education authorities, the schools, and the children&#x00027;s families were obtained.</p>
</sec>
<sec id="s8">
<title>Author contributions</title>
<p>BM-F, DM, and GM had participated in the intellectual content, the analysis of data, and the writing of the work. BM-F, DM, and GM had reviewed the final version of the work and they approve it for publication.</p>
<sec>
<title>Conflict of interest statement</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
</sec>
</body>
<back>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Adalier</surname> <given-names>A.</given-names></name> <name><surname>Balkan</surname> <given-names>E.</given-names></name></person-group> (<year>2012</year>). <article-title>The relationship between internet addiction and psychological symptoms</article-title>. <source>Int. J. Global Educat.</source> <volume>1</volume>, <fpage>42</fpage>&#x02013;<lpage>49</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.ijtase.net/ojs/index.php/ijge/article/view/72">http://www.ijtase.net/ojs/index.php/ijge/article/view/72</ext-link></citation></ref>
<ref id="B2">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Allison</surname> <given-names>P. D.</given-names></name></person-group> (<year>2001</year>). <source>Missing data, Vol. 136</source>. <publisher-loc>Thousand Oaks, CA</publisher-loc>: <publisher-name>Sage Publications</publisher-name></citation></ref>
<ref id="B3">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Anderson</surname> <given-names>K. J.</given-names></name></person-group> (<year>2001</year>). <article-title>Internet use among college students: an exploratory study</article-title>. <source>J. Am. Coll. Heal.</source> <volume>50</volume>, <fpage>21</fpage>&#x02013;<lpage>26</lpage>. <pub-id pub-id-type="doi">10.1080/07448480109595707</pub-id><pub-id pub-id-type="pmid">11534747</pub-id></citation></ref>
<ref id="B4">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Andreassen</surname> <given-names>C. S.</given-names></name></person-group> (<year>2015</year>). <article-title>Online social network site addiction: a comprehensive review</article-title>. <source>Curr. Addict. Rep.</source> <volume>2</volume>, <fpage>175</fpage>&#x02013;<lpage>184</lpage>. <pub-id pub-id-type="doi">10.1007/s40429-015-0056-9</pub-id></citation></ref>
<ref id="B5">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Andreassen</surname> <given-names>C. S.</given-names></name> <name><surname>Pallesen</surname> <given-names>S.</given-names></name></person-group> (<year>2014</year>). <article-title>Social network site addiction-an overview</article-title>. <source>Curr. Pharm. Des.</source> <volume>20</volume>, <fpage>4053</fpage>&#x02013;<lpage>4061</lpage>. <pub-id pub-id-type="doi">10.2174/13816128113199990616</pub-id></citation></ref>
<ref id="B6">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Andreassen</surname> <given-names>C. S.</given-names></name> <name><surname>Torsheim</surname> <given-names>T.</given-names></name> <name><surname>Brunborg</surname> <given-names>G. S.</given-names></name> <name><surname>Pallesen</surname> <given-names>S.</given-names></name></person-group> (<year>2012</year>). <article-title>Development of a facebook addiction scale</article-title>. <source>Psychol. Rep.</source> <volume>110</volume>, <fpage>501</fpage>&#x02013;<lpage>517</lpage>. <pub-id pub-id-type="doi">10.2466/02.09.18.PR0.110.2.501-517</pub-id><pub-id pub-id-type="pmid">22662404</pub-id></citation></ref>
<ref id="B7">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Bentler</surname> <given-names>P. M.</given-names></name></person-group> (<year>2006</year>). <source>EQS 6 Structural Equations Program Manual</source>. <publisher-loc>Encino, CA</publisher-loc>: <publisher-name>Multivariate Software, Inc</publisher-name>.</citation></ref>
<ref id="B8">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Blaszczynski</surname> <given-names>A.</given-names></name></person-group> (<year>2006</year>). <article-title>Internet use: in search of an addiction</article-title>. <source>Int. J. Ment. Health Addict.</source> <volume>4</volume>, <fpage>7</fpage>&#x02013;<lpage>9</lpage>. <pub-id pub-id-type="doi">10.1007/s11469-006-9002-3</pub-id></citation></ref>
<ref id="B9">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Bringu&#x000E9;</surname> <given-names>X.</given-names></name> <name><surname>S&#x000E1;daba</surname> <given-names>C.</given-names></name></person-group> (<year>2009</year>). <source>The Interactive Generation in Spain: Children and Teenagers in the Face of the Screens.</source> <publisher-loc>Barcelona; Madrid</publisher-loc>: <publisher-name>Ariel y Fundaci&#x000F3;n Telef&#x000F3;nica</publisher-name>.</citation></ref>
<ref id="B10">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Cao</surname> <given-names>H.</given-names></name> <name><surname>Sun</surname> <given-names>Y.</given-names></name> <name><surname>Wan</surname> <given-names>Y.</given-names></name> <name><surname>Hao</surname> <given-names>J.</given-names></name> <name><surname>Tao</surname> <given-names>F.</given-names></name></person-group> (<year>2011</year>). <article-title>Problematic Internet use in Chinese adolescents and its relation to psychosomatic symptoms and life satisfaction</article-title>. <source>BMC Public Health</source> <volume>11</volume>, <fpage>1</fpage>&#x02013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1186/1471-2458-11-802</pub-id><pub-id pub-id-type="pmid">21995654</pub-id></citation></ref>
<ref id="B11">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Caplan</surname> <given-names>S. E.</given-names></name></person-group> (<year>2010</year>). <article-title>Theory and measurement of generalized problematic internet use: a two-step approach</article-title>. <source>Comput. Hum. Behav.</source> <volume>26</volume>, <fpage>1089</fpage>&#x02013;<lpage>1097</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2010.03.012</pub-id></citation></ref>
<ref id="B12">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Carbonell</surname> <given-names>X.</given-names></name> <name><surname>Chamarro</surname> <given-names>A.</given-names></name> <name><surname>Beranuy</surname> <given-names>M.</given-names></name> <name><surname>Griffiths</surname> <given-names>M.</given-names></name> <name><surname>Oberst</surname> <given-names>U.</given-names></name> <name><surname>Cladellas</surname> <given-names>R.</given-names></name> <etal/></person-group>. (<year>2012</year>). <article-title>Problematic internet and cell phone use in Spanish teenagers and young students</article-title>. <source>An. Psicol.</source> <volume>28</volume>, <fpage>789</fpage>&#x02013;<lpage>796</lpage>. <pub-id pub-id-type="doi">10.6018/analesps.28.3.156061</pub-id></citation></ref>
<ref id="B13">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Card</surname> <given-names>N. A.</given-names></name> <name><surname>Little</surname> <given-names>T. D.</given-names></name></person-group> (<year>2006</year>). <article-title>Proactive and reactive aggression in childhood and adolescence: a meta-analysis of differential relations with psychosocial adjustment</article-title>. <source>?Int. J. Behav. Dev.</source> <volume>30</volume>, <fpage>466</fpage>&#x02013;<lpage>480</lpage>. <pub-id pub-id-type="doi">10.1177/0165025406071904</pub-id></citation></ref>
<ref id="B14">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Card</surname> <given-names>N. A.</given-names></name> <name><surname>Stucky</surname> <given-names>B. D.</given-names></name> <name><surname>Sawalani</surname> <given-names>G. M.</given-names></name> <name><surname>Little</surname> <given-names>T. D.</given-names></name></person-group> (<year>2008</year>). <article-title>Direct and indirect aggression during childhood and adolescence: a meta-analytic review of gender differences, intercorrelations, and relations to maladjustment</article-title>. <source>Child Dev.</source> <volume>79</volume>, <fpage>1185</fpage>&#x02013;<lpage>1229</lpage>. <pub-id pub-id-type="doi">10.1111/j.1467-8624.2008.01184.x</pub-id><pub-id pub-id-type="pmid">18826521</pub-id></citation></ref>
<ref id="B15">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Carli</surname> <given-names>V.</given-names></name> <name><surname>Durkee</surname> <given-names>T.</given-names></name> <name><surname>Wasserman</surname> <given-names>D.</given-names></name> <name><surname>Hadlaczky</surname> <given-names>G.</given-names></name> <name><surname>Despalins</surname> <given-names>R.</given-names></name> <name><surname>Kramarz</surname> <given-names>E.</given-names></name> <etal/></person-group>. (<year>2013</year>). <article-title>The association between pathological internet use and comorbid psychopathology: a systematic review</article-title>. <source>Psychopathology</source> <volume>46</volume>, <fpage>1</fpage>&#x02013;<lpage>13</lpage>. <pub-id pub-id-type="doi">10.1159/000337971</pub-id><pub-id pub-id-type="pmid">22854219</pub-id></citation></ref>
<ref id="B16">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Castells</surname> <given-names>M.</given-names></name></person-group> (<year>2001</year>). <source>The Internet and the Real Society</source>. <publisher-loc>Barcelona</publisher-loc>: <publisher-name>Alianza</publisher-name>.</citation></ref>
<ref id="B17">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Catalina</surname> <given-names>B.</given-names></name> <name><surname>L&#x000F3;pez de Ayala L&#x000F3;pez</surname> <given-names>M. C.</given-names></name> <name><surname>Garc&#x000ED;a Jim&#x000E9;nez</surname> <given-names>A.</given-names></name></person-group> (<year>2014</year>). <article-title>The risks faced by adolescents on the Internet: minors as actors and victims of the dangers of the Internet</article-title>. <source>Rev. Lat. Comun. Soc.</source> <volume>69</volume>, <fpage>462</fpage>&#x02013;<lpage>485</lpage>. <pub-id pub-id-type="doi">10.4185/RLCS-2014-1020</pub-id></citation></ref>
<ref id="B18">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Chabrol</surname> <given-names>H.</given-names></name> <name><surname>Laconi</surname> <given-names>S.</given-names></name> <name><surname>Delfour</surname> <given-names>M.</given-names></name> <name><surname>Moreau</surname> <given-names>A.</given-names></name></person-group> (<year>2017</year>). <article-title>Contributions of psychopathological and interpersonal variables to problematic Facebook use in adolescents and young adults</article-title>. <source>Int. J. High Risk Behav. Addic.</source> <volume>6</volume>:<fpage>e32773</fpage>. <pub-id pub-id-type="doi">10.5812/ijhrba.32773</pub-id></citation></ref>
<ref id="B19">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Ch&#x000F3;liz</surname> <given-names>M.</given-names></name> <name><surname>Marco</surname> <given-names>C.</given-names></name></person-group> (<year>2012</year>). <source>Adicction to the Internet and Social Networks. Psychological Treatment</source>. <fpage>Madrid</fpage>: <publisher-name>Alianza Editorial</publisher-name>.</citation></ref>
<ref id="B20">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Coie</surname> <given-names>J. D.</given-names></name> <name><surname>Dodge</surname> <given-names>K. A.</given-names></name></person-group> (<year>1998</year>). <article-title>Aggression and antisocial behavior</article-title>, in <source>Handbook of Child Psychology</source>, Vol. 3. <italic>Social, Emotional, and Personality Development</italic>, eds <person-group person-group-type="editor"><name><surname>Damon</surname> <given-names>W.</given-names></name> <name><surname>Eisenberg</surname> <given-names>N.</given-names></name></person-group> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Wiley</publisher-name>), <fpage>779</fpage>&#x02013;<lpage>862</lpage>.</citation></ref>
<ref id="B21">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Crick</surname> <given-names>N. R.</given-names></name> <name><surname>Dodge</surname> <given-names>K. A.</given-names></name></person-group> (<year>1996</year>). <article-title>Social information-processing mechanisms in reactive and proactive aggression</article-title>. <source>Child Dev.</source> <volume>67</volume>, <fpage>993</fpage>&#x02013;<lpage>1002</lpage>. <pub-id pub-id-type="doi">10.1111/j.1467-8624.1996.tb01778.x</pub-id><pub-id pub-id-type="pmid">8706540</pub-id></citation></ref>
<ref id="B22">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Devine</surname> <given-names>P.</given-names></name> <name><surname>Lloyd</surname> <given-names>K.</given-names></name></person-group> (<year>2012</year>). <article-title>Internet use and psychological well-being among 10-year-old and 11-year-old children</article-title>. <source>Child Care Pract</source>. <volume>18</volume>, <fpage>5</fpage>&#x02013;<lpage>22</lpage>. <pub-id pub-id-type="doi">10.1080/13575279.2011.621888</pub-id></citation></ref>
<ref id="B23">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Durkee</surname> <given-names>T.</given-names></name> <name><surname>Kaess</surname> <given-names>M.</given-names></name> <name><surname>Carli</surname> <given-names>V.</given-names></name> <name><surname>Parzer</surname> <given-names>P.</given-names></name> <name><surname>Wasserman</surname> <given-names>C.</given-names></name> <name><surname>Floderus</surname> <given-names>B.</given-names></name> <etal/></person-group>. (<year>2012</year>). <article-title>Prevalence of pathological internet use among adolescents in Europe: demographic and social factors</article-title>. <source>Addiction</source> <volume>107</volume>, <fpage>2210</fpage>&#x02013;<lpage>2222</lpage>. <pub-id pub-id-type="doi">10.1111/j.1360-0443.2012.03946.x</pub-id><pub-id pub-id-type="pmid">22621402</pub-id></citation></ref>
<ref id="B24">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Echebur&#x000FA;a</surname> <given-names>E.</given-names></name> <name><surname>de Corral</surname> <given-names>P.</given-names></name></person-group> (<year>2010</year>). <article-title>Addiction to new technologies and to online social networking in young people: a new challenge</article-title>. <source>Adicciones</source> <volume>22</volume>, <fpage>91</fpage>&#x02013;<lpage>96</lpage>. <pub-id pub-id-type="doi">10.20882/adicciones.196</pub-id><pub-id pub-id-type="pmid">20549142</pub-id></citation></ref>
<ref id="B25">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Echebur&#x000FA;a</surname> <given-names>E.</given-names></name> <name><surname>Labrador</surname> <given-names>F. J.</given-names></name> <name><surname>Beco&#x000F1;a</surname> <given-names>E.</given-names></name></person-group> (<year>2009</year>). <source>Adicction to New Technologies</source>. <publisher-loc>Madrid</publisher-loc>: <fpage>Pir&#x000E1;mide</fpage>.</citation></ref>
<ref id="B26">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Erdur-Baker</surname> <given-names>&#x000D6;.</given-names></name></person-group> (<year>2010</year>). <article-title>Cyberbullying and its correlation to traditional bullying, gender and frequent and risky use of internet-mediated communication tools</article-title>. <source>?New Media Soc</source>. <volume>12</volume>, <fpage>109</fpage>&#x02013;<lpage>125</lpage>. <pub-id pub-id-type="doi">10.1177/1461444809341260</pub-id></citation></ref>
<ref id="B27">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Espinar Ruiz</surname> <given-names>E.</given-names></name> <name><surname>Gonz&#x000E1;lez R&#x000ED;o</surname> <given-names>M.</given-names></name></person-group> (<year>2009</year>). <article-title>Young people in virtual social networks: an exploratory analysis of gender differences</article-title>. <source>Feminismos</source> <volume>14</volume>, <fpage>87</fpage>&#x02013;<lpage>105</lpage>. <pub-id pub-id-type="doi">10.14198/fem.2009.14.06</pub-id></citation></ref>
<ref id="B28">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Fern&#x000E1;ndez-Villa</surname> <given-names>T.</given-names></name> <name><surname>Alguacil Ojeda</surname> <given-names>J.</given-names></name> <name><surname>Almaraz G&#x000F3;mez</surname> <given-names>A.</given-names></name> <name><surname>Cancela Carral</surname> <given-names>J. M.</given-names></name> <name><surname>Delgado-Rodr&#x000ED;guez</surname> <given-names>M.</given-names></name> <name><surname>Garc&#x000ED;a-Mart&#x000ED;n</surname> <given-names>M.</given-names></name> <etal/></person-group>. (<year>2015</year>). <article-title>Problematic internet use in university students: associated factors and differences of gender</article-title>. <source>Adicciones</source> <volume>27</volume>, <fpage>265</fpage>&#x02013;<lpage>275</lpage>. <pub-id pub-id-type="doi">10.20882/adicciones.751</pub-id><pub-id pub-id-type="pmid">26706809</pub-id></citation></ref>
<ref id="B29">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Fioravanti</surname> <given-names>G.</given-names></name> <name><surname>D&#x000E8;ttore</surname> <given-names>D.</given-names></name> <name><surname>Casale</surname> <given-names>S.</given-names></name></person-group> (<year>2012</year>). <article-title>Adolescent Internet addiction: testing the association between self-esteem, the perception of Internet attributes, and preference for online social interactions</article-title>. <source>Cyberpsychol. Behav. Soc. Netw.</source> <volume>15</volume>, <fpage>318</fpage>&#x02013;<lpage>323</lpage>. <pub-id pub-id-type="doi">10.1089/cyber.2011.0358</pub-id><pub-id pub-id-type="pmid">22703038</pub-id></citation></ref>
<ref id="B30">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Fontaine</surname> <given-names>R. G.</given-names></name> <name><surname>Dodge</surname> <given-names>K. A.</given-names></name></person-group> (<year>2006</year>). <article-title>Real-time decision making and aggressive behavior in youth: a heuristic model of response evaluation and decision (RED)</article-title>. <source>Aggress. Behav.</source> <volume>32</volume>, <fpage>604</fpage>&#x02013;<lpage>624</lpage>. <pub-id pub-id-type="doi">10.1002/ab.20150</pub-id><pub-id pub-id-type="pmid">20802851</pub-id></citation></ref>
<ref id="B31">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Frey</surname> <given-names>K. S.</given-names></name> <name><surname>Strong</surname> <given-names>Z. H.</given-names></name> <name><surname>Onyewuenyi</surname> <given-names>A. C.</given-names></name></person-group> (<year>2017</year>). <article-title>Individual and class norms differentially predict proactive and reactive aggression: a functional analysis</article-title>. <source>J. Educ. Psychol.</source> <volume>109</volume>:<fpage>178</fpage>. <pub-id pub-id-type="doi">10.1037/edu0000118</pub-id></citation></ref>
<ref id="B32">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Garc&#x000ED;a</surname> <given-names>A.</given-names></name> <name><surname>L&#x000F3;pez de Ayala</surname> <given-names>M.</given-names></name> <name><surname>Gaona</surname> <given-names>C.</given-names></name></person-group> (<year>2012</year>). <article-title>Research on uses and risks of children and adolescents in cyberspace. methodological analysis</article-title>. <source>Doxa Comun. Rev. Interdiscip. Estud. Comun. y ciencias Soc.</source> <volume>13</volume>, <fpage>13</fpage>&#x02013;<lpage>41</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://recyt.fecyt.es/index.php/doxacom/article/view/35898">https://recyt.fecyt.es/index.php/doxacom/article/view/35898</ext-link></citation></ref>
<ref id="B33">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gefen</surname> <given-names>D.</given-names></name> <name><surname>Straub</surname> <given-names>D.</given-names></name> <name><surname>Boudreau</surname> <given-names>M. C.</given-names></name></person-group> (<year>2000</year>). <article-title>Structural equation modeling and regression: guidelines for research practice</article-title>. <source>CAIS 4</source>, <fpage>1</fpage>&#x02013;<lpage>70</lpage>. Retrieved from: <ext-link ext-link-type="uri" xlink:href="http://aisel.aisnet.org/cais/vol4/iss1/7">http://aisel.aisnet.org/cais/vol4/iss1/7</ext-link></citation></ref>
<ref id="B34">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gim&#x000E9;nez</surname> <given-names>A. M.</given-names></name> <name><surname>Maquil&#x000F3;n</surname> <given-names>J. J.</given-names></name> <name><surname>Arnaiz</surname> <given-names>P.</given-names></name></person-group> (<year>2015</year>). <article-title>Problematic and aggressive use of ICT in adolescents involved in cyberbullying</article-title>. <source>Rev. Investig. Educ.</source> <volume>33</volume>, <fpage>335</fpage>&#x02013;<lpage>351</lpage>. <pub-id pub-id-type="doi">10.6018/rie.33.2.199841</pub-id></citation></ref>
<ref id="B35">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>G&#x000F3;mez Salgado</surname> <given-names>P.</given-names></name> <name><surname>Rial Boubeta</surname> <given-names>A.</given-names></name> <name><surname>Bra&#x000F1;a Tob&#x000ED;o</surname> <given-names>T.</given-names></name> <name><surname>Varela Mallou</surname> <given-names>J.</given-names></name> <name><surname>Barreiro Couto</surname> <given-names>C.</given-names></name></person-group> (<year>2014</year>). <article-title>Evaluation and early detection of problematic Internet use in adolescents</article-title>. <source>Psicothema</source> <volume>26</volume>, <fpage>21</fpage>&#x02013;<lpage>26</lpage>. <pub-id pub-id-type="doi">10.7334/psicothema2013.109</pub-id><pub-id pub-id-type="pmid">24444725</pub-id></citation></ref>
<ref id="B36">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Graham</surname> <given-names>J. W.</given-names></name></person-group> (<year>2009</year>). <article-title>Missing data analysis: making it work in the real world</article-title>. <source>Annu. Rev. Psychol.</source> <volume>60</volume>, <fpage>549</fpage>&#x02013;<lpage>576</lpage>. <pub-id pub-id-type="doi">10.1146/annurev.psych.58.110405.085530</pub-id><pub-id pub-id-type="pmid">18652544</pub-id></citation></ref>
<ref id="B37">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Graham</surname> <given-names>S.</given-names></name></person-group> (<year>2006</year>). <article-title>Peer victimization in school: exploring the ethnic context</article-title>. <source>Curr. Dir. Psychol. Sci.</source> <volume>15</volume>, <fpage>317</fpage>&#x02013;<lpage>321</lpage>. <pub-id pub-id-type="doi">10.1111/j.1467-8721.2006.00460.x</pub-id></citation></ref>
<ref id="B38">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Griffiths</surname> <given-names>M. D.</given-names></name> <name><surname>Kuss</surname> <given-names>D. J.</given-names></name> <name><surname>Demetrovics</surname> <given-names>Z.</given-names></name></person-group> (<year>2014</year>). <article-title>Social networking addiction: an overview of preliminary findings</article-title>, in <source>Behavioral Addictions: Criteria, Evidence and Treatment</source>, eds <person-group person-group-type="editor"><name><surname>Rosenberg</surname> <given-names>K.</given-names></name> <name><surname>Feder</surname> <given-names>L.</given-names></name></person-group> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Elsevier</publisher-name>), <fpage>119</fpage>&#x02013;<lpage>141</lpage>.</citation></ref>
<ref id="B39">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Griffiths</surname> <given-names>M. D.</given-names></name> <name><surname>Wood</surname> <given-names>R. T.</given-names></name></person-group> (<year>2000</year>). <article-title>Risk factors in adolescence: the case of gambling, videogame playing, and the internet</article-title>. <source>J. Gambl. Stud.</source> <volume>16</volume>, <fpage>199</fpage>&#x02013;<lpage>225</lpage>. <pub-id pub-id-type="doi">10.1023/A:1009433014881</pub-id><pub-id pub-id-type="pmid">14634313</pub-id></citation></ref>
<ref id="B40">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gr&#x000FC;sser</surname> <given-names>S. M.</given-names></name> <name><surname>Thaleman</surname> <given-names>R.</given-names></name> <name><surname>Griffiths</surname> <given-names>M. D.</given-names></name></person-group> (<year>2007</year>). <article-title>Excessive computer game playing: evidence for addiction and aggression?</article-title> <source>CyberPsychol. Behav.</source> <volume>10</volume>, <fpage>290</fpage>&#x02013;<lpage>292</lpage>. <pub-id pub-id-type="doi">10.1089/cpb.2006.9956</pub-id><pub-id pub-id-type="pmid">17474848</pub-id></citation></ref>
<ref id="B41">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Hair</surname> <given-names>J. F.</given-names></name> <name><surname>Anderson</surname> <given-names>R. E.</given-names></name> <name><surname>Tatham</surname> <given-names>R. L.</given-names></name> <name><surname>Black</surname> <given-names>W. C.</given-names></name></person-group> (<year>1998</year>). <source>Multivariate Data Analysis</source>. <publisher-loc>Upper Saddle River, NJ</publisher-loc>: <publisher-name>Prentice-Hall</publisher-name>.</citation></ref>
<ref id="B42">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Hair</surname> <given-names>J. F.</given-names></name> <name><surname>Hult</surname> <given-names>G. T. M.</given-names></name> <name><surname>Ringle</surname> <given-names>C.</given-names></name> <name><surname>Sarstedt</surname> <given-names>M.</given-names></name></person-group> (<year>2016</year>). <source>A Primer on Partial Least Squares Structural Equation Modelling (PLS-SEM)</source>. <publisher-loc>Thousand Oaks, CA</publisher-loc>: <publisher-name>Sage Publications</publisher-name>.</citation></ref>
<ref id="B43">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hu</surname> <given-names>L. T.</given-names></name> <name><surname>Bentler</surname> <given-names>P. M.</given-names></name></person-group> (<year>1998</year>). <article-title>Fit indices in covariance structure modeling: sensitivity to underparameterized model misspecification</article-title>. <source>Psychol. Methods</source> <volume>3</volume>, <fpage>424</fpage>&#x02013;<lpage>453</lpage>. <pub-id pub-id-type="doi">10.1037/1082-989X.3.4.424</pub-id></citation></ref>
<ref id="B44">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Hearn</surname> <given-names>G.</given-names></name> <name><surname>Foth</surname> <given-names>M.</given-names></name></person-group> (<year>2007</year>). <article-title>Communicative Ecologies</article-title>. <source>Electron. J. Comm.</source> <volume>17</volume>, <fpage>1</fpage>&#x02013;<lpage>2</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.cios.org/www/ejc/v17n12.htm#Pr&#x000E9;faceEditoriale">http://www.cios.org/www/ejc/v17n12.htm#Pr&#x000E9;faceEditoriale</ext-link></citation></ref>
<ref id="B45">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Johansson</surname> <given-names>A.</given-names></name> <name><surname>G&#x000F6;testam</surname> <given-names>K. G.</given-names></name></person-group> (<year>2004</year>). <article-title>Internet addiction: characteristics of a questionnaire and prevalence in Norwegian youth (12-18 years)</article-title>. <source>Scand. J. Psychol.</source> <volume>45</volume>, <fpage>223</fpage>&#x02013;<lpage>229</lpage>. <pub-id pub-id-type="doi">10.1111/j.1467-9450.2004.00398.x</pub-id><pub-id pub-id-type="pmid">15182240</pub-id></citation></ref>
<ref id="B46">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Juvonen</surname> <given-names>J.</given-names></name> <name><surname>Graham</surname> <given-names>S.</given-names></name></person-group> (<year>2014</year>). <article-title>Bullying in schools: the power of bullies and the plight of victims</article-title>. <source>Annu. Rev. Psychol.</source> <volume>65</volume>, <fpage>159</fpage>&#x02013;<lpage>185</lpage>. <pub-id pub-id-type="doi">10.1146/annurev-psych-010213-115030</pub-id><pub-id pub-id-type="pmid">23937767</pub-id></citation></ref>
<ref id="B47">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kempes</surname> <given-names>M.</given-names></name> <name><surname>Matthys</surname> <given-names>W.</given-names></name> <name><surname>de Vries</surname> <given-names>H.</given-names></name> <name><surname>Van Engeland</surname> <given-names>H.</given-names></name></person-group> (<year>2005</year>). <article-title>Reactive and proactive aggression in children A review of theory, findings and the relevance for child and adolescent psychiatry</article-title>. <source>Eur. Child Adolesc. Psychiatry</source> <volume>14</volume>, <fpage>11</fpage>&#x02013;<lpage>19</lpage>. <pub-id pub-id-type="doi">10.1007/s00787-005-0432-4</pub-id><pub-id pub-id-type="pmid">15756511</pub-id></citation></ref>
<ref id="B48">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kim</surname> <given-names>H. K.</given-names></name> <name><surname>Davis</surname> <given-names>K. E.</given-names></name></person-group> (<year>2009</year>). <article-title>Toward a comprehensive theory of problematic Internet use: evaluating the role of self-esteem, anxiety, flow, and the self-rated importance of internet activities</article-title>. <source>Comput. Human Behav.</source> <volume>25</volume>, <fpage>490</fpage>&#x02013;<lpage>500</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2008.11.001</pub-id></citation></ref>
<ref id="B49">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kircabum</surname> <given-names>K.</given-names></name> <name><surname>Bastug</surname> <given-names>I.</given-names></name></person-group> (<year>2017</year>). <article-title>Predicting cyberbullying tendencies of adolescents with problematic internet use</article-title>. <source>Int. J. Soc. Sci. Stud</source>. <volume>48</volume>, <fpage>385</fpage>&#x02013;<lpage>396</lpage>. <pub-id pub-id-type="doi">10.9761/JASSS3597</pub-id></citation></ref>
<ref id="B50">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ko</surname> <given-names>C. H.</given-names></name> <name><surname>Yen</surname> <given-names>J. Y.</given-names></name> <name><surname>Chen</surname> <given-names>C. S.</given-names></name> <name><surname>Chen</surname> <given-names>C. C.</given-names></name> <name><surname>Yen</surname> <given-names>C. F.</given-names></name></person-group> (<year>2008</year>). <article-title>Psychiatric comorbidity of internet addiction in college students: an interview study</article-title>. <source>CNS Spectr</source>. <volume>13</volume>, <fpage>147</fpage>&#x02013;<lpage>153</lpage>. <pub-id pub-id-type="doi">10.1017/S1092852900016308</pub-id><pub-id pub-id-type="pmid">18227746</pub-id></citation></ref>
<ref id="B51">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ko</surname> <given-names>C. H.</given-names></name> <name><surname>Yen</surname> <given-names>J. Y.</given-names></name> <name><surname>Yen</surname> <given-names>C. F.</given-names></name> <name><surname>Chen</surname> <given-names>C. S.</given-names></name> <name><surname>Chen</surname> <given-names>C. C.</given-names></name></person-group> (<year>2012</year>). <article-title>The association between Internet addiction and psychiatric disorder: a review of the literature</article-title>. <source>Eur. Psychiatry</source> <volume>27</volume>, <fpage>1</fpage>&#x02013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1016/j.eurpsy.2010.04.011</pub-id><pub-id pub-id-type="pmid">22153731</pub-id></citation></ref>
<ref id="B52">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kuss</surname> <given-names>D. D.</given-names></name> <name><surname>Griffiths</surname> <given-names>M.</given-names></name> <name><surname>Karila</surname> <given-names>L.</given-names></name> <name><surname>Billieux</surname> <given-names>J.</given-names></name></person-group> (<year>2014</year>). <article-title>Internet addiction: a systematic review of epidemiological research for the last decade</article-title>. <source>Curr. Pharm. Des.</source> <volume>20</volume>, <fpage>4026</fpage>&#x02013;<lpage>4052</lpage>. <pub-id pub-id-type="doi">10.2174/13816128113199990617</pub-id><pub-id pub-id-type="pmid">24001297</pub-id></citation></ref>
<ref id="B53">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kuss</surname> <given-names>D. J.</given-names></name> <name><surname>Griffiths</surname> <given-names>M. D.</given-names></name></person-group> (<year>2011</year>). <article-title>Online social networking and addiction&#x02014;a review of the psychological literature</article-title>. <source>Int. J. Environ. Res. Public Health</source> <volume>8</volume>, <fpage>3528</fpage>&#x02013;<lpage>3552</lpage>. <pub-id pub-id-type="doi">10.3390/ijerph8093528</pub-id><pub-id pub-id-type="pmid">22016701</pub-id></citation></ref>
<ref id="B54">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Lance</surname> <given-names>C. E.</given-names></name> <name><surname>Butts</surname> <given-names>M. M.</given-names></name> <name><surname>Michels</surname> <given-names>L. C.</given-names></name></person-group> (<year>2006</year>). <article-title>The sources of four commonly reported cutoff criteria: what did they really say?</article-title> <source>Organ. Res. Methods</source> <volume>9</volume>, <fpage>202</fpage>&#x02013;<lpage>220</lpage>. <pub-id pub-id-type="doi">10.1177/1094428105284919</pub-id></citation></ref>
<ref id="B55">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Little</surname> <given-names>T.</given-names></name> <name><surname>Henrich</surname> <given-names>C.</given-names></name> <name><surname>Jones</surname> <given-names>S.</given-names></name> <name><surname>Hawley</surname> <given-names>P.</given-names></name></person-group> (<year>2003</year>). <article-title>Disentangling the&#x0201C; whys&#x0201D; from the&#x0201C; whats&#x0201D; of aggressive behaviour</article-title>. <source>?Int. J. Behav. Dev.</source> <volume>27</volume>, <fpage>122</fpage>&#x02013;<lpage>133</lpage>. <pub-id pub-id-type="doi">10.1080/01650250244000128</pub-id></citation></ref>
<ref id="B56">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Livingstone</surname> <given-names>S.</given-names></name> <name><surname>Smith</surname> <given-names>P. K.</given-names></name></person-group> (<year>2014</year>). <article-title>Research Review: harms experienced by child users of online and mobile technologies: the nature, prevalence and management of sexual and aggressive risks in the digital age</article-title>. <source>J. Child Psychol. Psychiatry</source> <volume>55</volume>, <fpage>635</fpage>&#x02013;<lpage>654</lpage>. <pub-id pub-id-type="doi">10.1111/jcpp.12197</pub-id><pub-id pub-id-type="pmid">24438579</pub-id></citation></ref>
<ref id="B57">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mak</surname> <given-names>K. K.</given-names></name> <name><surname>Lai</surname> <given-names>C. M.</given-names></name> <name><surname>Watanabe</surname> <given-names>H.</given-names></name> <name><surname>Kim</surname> <given-names>D. I.</given-names></name> <name><surname>Bahar</surname> <given-names>N.</given-names></name> <name><surname>Ramos</surname> <given-names>M.</given-names></name> <etal/></person-group>. (<year>2014</year>). <article-title>Epidemiology of internet behaviors and addiction among adolescents in six Asian countries. <italic>Cyberpsychol</italic></article-title>. <source>Behav. Soc</source>. <volume>17</volume>, <fpage>720</fpage>&#x02013;<lpage>728</lpage>. <pub-id pub-id-type="doi">10.1089/cyber.2014.0139</pub-id></citation></ref>
<ref id="B58">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Marengo</surname> <given-names>D.</given-names></name> <name><surname>Longobardi</surname> <given-names>C.</given-names></name> <name><surname>Fabris</surname> <given-names>M. A.</given-names></name> <name><surname>Settanni</surname> <given-names>M.</given-names></name></person-group> (<year>2018</year>). <article-title>Highly-visual social media and internalizing symptoms in adolescence: the mediating role of body image concerns</article-title>. <source>Comput. Human Behav.</source> <volume>82</volume>, <fpage>63</fpage>&#x02013;<lpage>69</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2018.01.003</pub-id></citation></ref>
<ref id="B59">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Marino</surname> <given-names>C.</given-names></name> <name><surname>Gini</surname> <given-names>G.</given-names></name> <name><surname>Vieno</surname> <given-names>A.</given-names></name> <name><surname>Spada</surname> <given-names>M. M.</given-names></name></person-group> (<year>2018</year>). <article-title>The associations between problematic Facebook use, psychological distress and well-being among adolescents and young adults: a systematic review and meta-analysis</article-title>. <source>J. Affect. Disord.</source> <volume>226</volume>, <fpage>274</fpage>&#x02013;<lpage>281</lpage>. <pub-id pub-id-type="doi">10.1016/j.jad.2017.10.007</pub-id><pub-id pub-id-type="pmid">29024900</pub-id></citation></ref>
<ref id="B60">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mart&#x000ED;nez Ferrer</surname> <given-names>B.</given-names></name> <name><surname>Moreno</surname> <given-names>D.</given-names></name> <name><surname>Amador</surname> <given-names>L. V.</given-names></name> <name><surname>Orford</surname> <given-names>J.</given-names></name></person-group> (<year>2011</year>). <article-title>School victimization among adolescents. An analysis from an ecological perspective</article-title>. <source>Psychosoc. Interv.</source> <volume>20</volume>, <fpage>149</fpage>&#x02013;<lpage>160</lpage>. <pub-id pub-id-type="doi">10.5093/in2011v20n2a3</pub-id></citation></ref>
<ref id="B61">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mazzoni</surname> <given-names>E.</given-names></name> <name><surname>Iannone</surname> <given-names>M.</given-names></name></person-group> (<year>2014</year>). <article-title>From high school to university: impact of social networking sites on social capital in the transitions of emerging adults</article-title>. <source>Br. J. Educ. Technol.</source> <volume>45</volume>, <fpage>303</fpage>&#x02013;<lpage>315</lpage>. <pub-id pub-id-type="doi">10.1111/bjet.12026</pub-id></citation></ref>
<ref id="B62">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>McKenna</surname> <given-names>K. Y.</given-names></name> <name><surname>Bargh</surname> <given-names>J. A.</given-names></name></person-group> (<year>2000</year>). <article-title>Plan 9 from cyberspace: the implications of the Internet for personality and social psychology</article-title>. <source>Personal. Soc. Psychol. Rev.</source> <volume>4</volume>, <fpage>57</fpage>&#x02013;<lpage>75</lpage>. <pub-id pub-id-type="doi">10.1207/S15327957PSPR0401_6</pub-id></citation></ref>
<ref id="B63">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Morahan-Martin</surname> <given-names>J.</given-names></name> <name><surname>Schumacher</surname> <given-names>P.</given-names></name></person-group> (<year>2000</year>). <article-title>Incidence and correlates of pathological internet use among college students</article-title>. <source>Comput. Human Behav.</source> <volume>16</volume>, <fpage>13</fpage>&#x02013;<lpage>29</lpage>. <pub-id pub-id-type="doi">10.1016/S0747-5632(99)00049-7</pub-id></citation></ref>
<ref id="B64">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Morrison</surname> <given-names>C. M.</given-names></name> <name><surname>Gore</surname> <given-names>H.</given-names></name></person-group> (<year>2010</year>). <article-title>The relationship between excessive Internet use and depression: a questionnaire-based study of 1,319 young people and adults</article-title>. <source>Psychopathology</source> <volume>43</volume>, <fpage>121</fpage>&#x02013;<lpage>126</lpage>. <pub-id pub-id-type="doi">10.1159/000277001</pub-id><pub-id pub-id-type="pmid">20110764</pub-id></citation></ref>
<ref id="B65">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mu&#x000F1;oz-Rivas</surname> <given-names>M. J.</given-names></name> <name><surname>Fern&#x000E1;ndez</surname> <given-names>L.</given-names></name> <name><surname>G&#x000E1;mez-Guadix</surname> <given-names>M.</given-names></name></person-group> (<year>2010</year>). <article-title>Analysis of the indicators of pathological internet use in Spanish university students</article-title>. <source>Span. J. Psychol.</source> <volume>13</volume>, <fpage>697</fpage>&#x02013;<lpage>707</lpage>. <pub-id pub-id-type="doi">10.1017/S1138741600002365</pub-id><pub-id pub-id-type="pmid">20977019</pub-id></citation></ref>
<ref id="B66">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mu&#x000F1;oz-Rivas</surname> <given-names>M. J.</given-names></name> <name><surname>Navarro</surname> <given-names>M. E.</given-names></name> <name><surname>Ortega</surname> <given-names>N.</given-names></name></person-group> (<year>2003</year>). <article-title>Internet usage patterns in Spanish university student population</article-title>. <source>Adicciones</source> <volume>15</volume>, <fpage>137</fpage>&#x02013;<lpage>144</lpage>. <pub-id pub-id-type="doi">10.20882/adicciones.437</pub-id></citation></ref>
<ref id="B67">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Murray-Close</surname> <given-names>D.</given-names></name> <name><surname>Nelson</surname> <given-names>D. A.</given-names></name> <name><surname>Ostrov</surname> <given-names>J. M.</given-names></name> <name><surname>Casas</surname> <given-names>J. F.</given-names></name> <name><surname>Crick</surname> <given-names>N. R.</given-names></name></person-group> (<year>2016</year>). <article-title>Relational aggression: a developmental psychopathology perspective</article-title>. <source>Dev. Psychopathol.</source> <volume>13</volume>, <fpage>1</fpage>&#x02013;<lpage>63</lpage>. <pub-id pub-id-type="doi">10.1002/9781119125556.devpsy413</pub-id></citation></ref>
<ref id="B68">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mynard</surname> <given-names>H.</given-names></name> <name><surname>Joseph</surname> <given-names>S.</given-names></name></person-group> (<year>2000</year>). <article-title>Development of the multidimensional peer-victimization scale</article-title>. <source>Aggress. Behav.</source> <volume>26</volume>, <fpage>169</fpage>&#x02013;<lpage>178</lpage>. <pub-id pub-id-type="doi">10.1002/(SICI)1098-2337(2000)26:2&#x0003C;169::AID-AB3&#x0003E;3.0.CO;2-A</pub-id></citation></ref>
<ref id="B69">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Navarro</surname> <given-names>R.</given-names></name> <name><surname>Serna</surname> <given-names>C.</given-names></name> <name><surname>Mart&#x000ED;nez</surname> <given-names>V.</given-names></name> <name><surname>Ruiz-Oliva</surname> <given-names>R.</given-names></name></person-group> (<year>2013</year>). <article-title>The role of Internet use and parental mediation on cyberbullying victimization among Spanish children from rural public schools</article-title>. <source>Eur. J. Psychol. Educ</source>. <volume>28</volume>, <fpage>725</fpage>&#x02013;<lpage>745</lpage>. <pub-id pub-id-type="doi">10.1007/s10212-012-0137-2</pub-id></citation></ref>
<ref id="B70">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>O&#x00027;Reilly</surname> <given-names>M.</given-names></name></person-group> (<year>1996</year>). <article-title>Internet addiction: a new disorder enters the medical lexicon</article-title>. <source>CMAJ</source> <volume>154</volume>, <fpage>188</fpage>&#x02013;<lpage>189</lpage>.</citation></ref>
<ref id="B71">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Oberst</surname> <given-names>U.</given-names></name> <name><surname>Wegmann</surname> <given-names>E.</given-names></name> <name><surname>Stodt</surname> <given-names>B.</given-names></name> <name><surname>Brand</surname> <given-names>M.</given-names></name> <name><surname>Chamarro</surname> <given-names>A.</given-names></name></person-group> (<year>2017</year>). <article-title>Negative consequences from heavy social networking in adolescents: the mediating role of fear of missing out</article-title>. <source>J. Adolesc.</source> <volume>55</volume>, <fpage>51</fpage>&#x02013;<lpage>60</lpage>. <pub-id pub-id-type="doi">10.1016/j.adolescence.2016.12.008</pub-id><pub-id pub-id-type="pmid">28033503</pub-id></citation></ref>
<ref id="B72">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pallanti</surname> <given-names>S.</given-names></name> <name><surname>Bernardi</surname> <given-names>S.</given-names></name> <name><surname>Quercioli</surname> <given-names>L.</given-names></name></person-group> (<year>2006</year>). <article-title>The Shorter PROMIS questionnaire and the internet addiction scale in the assessment of multiple addictions in a high-school population: prevalence and related disability</article-title>. <source>CNS Spectr</source>. <volume>11</volume>, <fpage>966</fpage>&#x02013;<lpage>974</lpage>. <pub-id pub-id-type="doi">10.1017/S1092852900015157</pub-id><pub-id pub-id-type="pmid">17146410</pub-id></citation></ref>
<ref id="B73">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Park</surname> <given-names>S. K.</given-names></name> <name><surname>Kim</surname> <given-names>J. Y.</given-names></name> <name><surname>Cho</surname> <given-names>C. B.</given-names></name></person-group> (<year>2008</year>). <article-title>Prevalence of Internet addiction and correlations with family factors among South Korean adolescents</article-title>. <source>Adolescence</source> <volume>43</volume>:<fpage>895</fpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://search.proquest.com/docview/195950665?accountid=14695">https://search.proquest.com/docview/195950665?accountid=14695</ext-link> <pub-id pub-id-type="pmid">19149152</pub-id></citation></ref>
<ref id="B74">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Pedrero</surname> <given-names>E. J.</given-names></name> <name><surname>Rodr&#x000ED;guez</surname> <given-names>M. T.</given-names></name> <name><surname>Ruiz</surname> <given-names>J. M.</given-names></name></person-group> (<year>2012</year>). <article-title>Mobile phone abuse or addiction. A review of the literature</article-title>. <source>Adicciones</source> <volume>24</volume>, <fpage>139</fpage>&#x02013;<lpage>152</lpage>. <pub-id pub-id-type="doi">10.20882/adicciones.107</pub-id></citation></ref>
<ref id="B75">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Poulin</surname> <given-names>F.</given-names></name> <name><surname>Boivin</surname> <given-names>M.</given-names></name></person-group> (<year>2000</year>). <article-title>Reactive and proactive aggression: evidence of a two-factor model</article-title>. <source>Psychol. Assess.</source> <volume>12</volume>, <fpage>115</fpage>&#x02013;<lpage>122</lpage>. <pub-id pub-id-type="doi">10.1037/1040-3590.12.2.115</pub-id><pub-id pub-id-type="pmid">10887757</pub-id></citation></ref>
<ref id="B76">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Povedano</surname> <given-names>A.</given-names></name> <name><surname>Est&#x000E9;vez</surname> <given-names>E.</given-names></name> <name><surname>Mart&#x000ED;nez</surname> <given-names>B.</given-names></name> <name><surname>Monreal</surname> <given-names>M. C.</given-names></name></person-group> (<year>2012</year>). <article-title>A psychosocial profile of adolescent aggressors and school victims: analysis of gender differences</article-title>. <source>Rev. Psicol. Soc.</source> <volume>27</volume>, <fpage>169</fpage>&#x02013;<lpage>182</lpage>. <pub-id pub-id-type="doi">10.1174/021347412800337906</pub-id></citation></ref>
<ref id="B77">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Preece</surname> <given-names>J.</given-names></name></person-group> (<year>2000</year>). <source>Online Communities: Designing Usability and Supporting Sociability</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>John Wiley &#x00026; Sons, Inc.</publisher-name></citation></ref>
<ref id="B78">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Puerta Cort&#x000E9;s</surname> <given-names>D. X.</given-names></name> <name><surname>Carbonell</surname> <given-names>X.</given-names></name></person-group> (<year>2014</year>). <article-title>The model of the big five personality factors and problematic Internet use in Colombian youth</article-title>. <source>Adicciones</source> <volume>26</volume>, <fpage>54</fpage>&#x02013;<lpage>61</lpage>. <pub-id pub-id-type="doi">10.20882/adicciones.131</pub-id><pub-id pub-id-type="pmid">24652399</pub-id></citation></ref>
<ref id="B79">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Raine</surname> <given-names>A.</given-names></name> <name><surname>Dodge</surname> <given-names>K.</given-names></name> <name><surname>Loeber</surname> <given-names>R.</given-names></name> <name><surname>Gatzke-Kopp</surname> <given-names>L.</given-names></name> <name><surname>Lynam</surname> <given-names>D.</given-names></name> <name><surname>Reynolds</surname> <given-names>C.</given-names></name> <etal/></person-group>. (<year>2006</year>). <article-title>The reactive&#x02013;proactive aggression questionnaire: differential correlates of reactive and proactive aggression in adolescent boys</article-title>. <source>Aggress. Behav.</source> <volume>32</volume>, <fpage>159</fpage>&#x02013;<lpage>171</lpage>. <pub-id pub-id-type="doi">10.1002/ab.20115</pub-id><pub-id pub-id-type="pmid">20798781</pub-id></citation></ref>
<ref id="B80">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ram&#x000ED;rez</surname> <given-names>J. M.</given-names></name> <name><surname>Andreu</surname> <given-names>J. M.</given-names></name></person-group> (<year>2006</year>). <article-title>Aggression, and some related psychological constructs (anger, hostility, and impulsivity) Some comments from a research project</article-title>. <source>Neurosci. Biobehav. Rev.</source> <volume>30</volume>, <fpage>276</fpage>&#x02013;<lpage>291</lpage>. <pub-id pub-id-type="doi">10.1016/j.neubiorev.2005.04.015</pub-id><pub-id pub-id-type="pmid">16081158</pub-id></citation></ref>
<ref id="B81">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Crespo-Ramos</surname> <given-names>S.</given-names></name> <name><surname>Romero-Abrio</surname> <given-names>A.</given-names></name> <name><surname>Mart&#x000ED;nez-Ferrer</surname> <given-names>B.</given-names></name> <name><surname>Musitu</surname> <given-names>G.</given-names></name></person-group> (<year>2017</year>). <article-title>Psychosocial variables and overt school violence among adolescents</article-title>. <source>Psychosoc. Interv.</source> <volume>26</volume>, <fpage>125</fpage>&#x02013;<lpage>130</lpage>. <pub-id pub-id-type="doi">10.1016/j.psi.2017.05.002</pub-id></citation></ref>
<ref id="B82">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rial</surname> <given-names>A.</given-names></name> <name><surname>G&#x000F3;mez</surname> <given-names>P.</given-names></name> <name><surname>Bra&#x000F1;a</surname> <given-names>T.</given-names></name> <name><surname>Varela</surname> <given-names>J.</given-names></name></person-group> (<year>2014</year>). <article-title>Attitudes, perceptions and Internet and social networks use among Galician (Spain) teens</article-title>. <source>An. Psicol.</source> <volume>30</volume>, <fpage>642</fpage>&#x02013;<lpage>655</lpage>. <pub-id pub-id-type="doi">10.6018/analesps.30.2.159111</pub-id></citation></ref>
<ref id="B83">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Rodr&#x000ED;guez</surname> <given-names>A.</given-names></name> <name><surname>Fern&#x000E1;ndez</surname> <given-names>A. P.</given-names></name></person-group> (<year>2014</year>). <article-title>Relationship between the time spent on internet social networking and mental health in Colombian adolescents</article-title>. <source>Act. Colom. Psicol.</source> <volume>17</volume>, <fpage>131</fpage>&#x02013;<lpage>140</lpage>. <pub-id pub-id-type="doi">10.14718/ACP.2014.17.1.13</pub-id></citation></ref>
<ref id="B84">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Ryan</surname> <given-names>T.</given-names></name> <name><surname>Chester</surname> <given-names>A.</given-names></name> <name><surname>Reece</surname> <given-names>J.</given-names></name> <name><surname>Xenos</surname> <given-names>S.</given-names></name></person-group> (<year>2014</year>). <article-title>The uses and abuses of facebook: a review of facebook addiction</article-title>. <source>J. Behav. Addict.</source> <volume>3</volume>, <fpage>133</fpage>&#x02013;<lpage>148</lpage>. <pub-id pub-id-type="doi">10.1556/JBA.3.2014.016</pub-id><pub-id pub-id-type="pmid">25317337</pub-id></citation></ref>
<ref id="B85">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Satici</surname> <given-names>B.</given-names></name> <name><surname>Saricali</surname> <given-names>M.</given-names></name> <name><surname>Satici</surname> <given-names>S. A.</given-names></name> <name><surname>&#x000C7;apan</surname> <given-names>B. E.</given-names></name></person-group> (<year>2014</year>). <article-title>Social competence and psychological vulnerability as predictors of Facebook addiction</article-title>. <source>Stud. Psychol.</source> <volume>56</volume>, <fpage>301</fpage>&#x02013;<lpage>308</lpage>. <pub-id pub-id-type="doi">10.21909/sp.2014.04.738</pub-id></citation></ref>
<ref id="B86">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Schumacher</surname> <given-names>P.</given-names></name> <name><surname>Morahan-Martin</surname> <given-names>J.</given-names></name></person-group> (<year>2001</year>). <article-title>Gender, Internet and computer attitudes and experiences</article-title>. <source>Comput. Human Behav.</source> <volume>17</volume>, <fpage>95</fpage>&#x02013;<lpage>110</lpage>. <pub-id pub-id-type="doi">10.1016/S0747-5632(00)00032-7</pub-id></citation></ref>
<ref id="B87">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sasmaz</surname> <given-names>T.</given-names></name> <name><surname>&#x000D6;ner</surname> <given-names>S.</given-names></name> <name><surname>Kurt</surname> <given-names>A. &#x000D6;.</given-names></name> <name><surname>Yapici</surname> <given-names>G.</given-names></name> <name><surname>Yazici</surname> <given-names>A. E.</given-names></name> <name><surname>Bugdayci</surname> <given-names>R.</given-names></name></person-group> (<year>2013</year>). <article-title>Prevalence and risk factors of Internet addiction in high school students</article-title>. <source>Eur. J. Public Health</source> <volume>24</volume>, <fpage>15</fpage>&#x02013;<lpage>20</lpage>. <pub-id pub-id-type="doi">10.1093/eurpub/ckt051</pub-id><pub-id pub-id-type="pmid">23722862</pub-id></citation></ref>
<ref id="B88">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Smahel</surname> <given-names>D.</given-names></name> <name><surname>Blinka</surname> <given-names>L.</given-names></name> <name><surname>Ledabyl</surname> <given-names>O.</given-names></name></person-group> (<year>2008</year>). <article-title>Playing MMORPGs: connections between addiction and identifying with a character</article-title>. <source>Cyberpsychol. Behav. Soc. Netw.</source> <volume>11</volume>, <fpage>715</fpage>&#x02013;<lpage>718</lpage>. <pub-id pub-id-type="doi">10.1089/cpb.2007.0210</pub-id><pub-id pub-id-type="pmid">18954271</pub-id></citation></ref>
<ref id="B89">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Smith</surname> <given-names>P. K.</given-names></name> <name><surname>Livingstone</surname> <given-names>S.</given-names></name></person-group> (<year>2017</year>). <article-title>Child users of online and mobile technologies&#x02013;risks, harms and intervention</article-title>, in <source>Child Psychology and Psychiatry: Frameworks for Clinical Training and Practice</source>, eds <person-group person-group-type="editor"><name><surname>Skuse</surname> <given-names>D.</given-names></name> <name><surname>Bruce</surname> <given-names>H.</given-names></name> <name><surname>Dowdney</surname> <given-names>L.</given-names></name></person-group> (<publisher-loc>Hoboken, NJ</publisher-loc>: <publisher-name>John Wiley &#x00026; Sons</publisher-name>), <fpage>141</fpage>&#x02013;<lpage>148</lpage>. <pub-id pub-id-type="pmid">24438579</pub-id></citation></ref>
<ref id="B90">
<citation citation-type="web"><person-group person-group-type="author"><collab>Spanish Statistical Office</collab></person-group> (<year>2012</year>). <source>Data from: Household Information Technology Survey</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://www.ine.es/ss/Satellite?L=es_ES&#x00026;c=INESeccion_C&#x00026;cid=1259925528782&#x00026;p=1254735110672&#x00026;pagename=ProductosYServicios%2FPYSLayout">http://www.ine.es/ss/Satellite?L=es_ES&#x00026;c=INESeccion_C&#x00026;cid=1259925528782&#x00026;p=1254735110672&#x00026;pagename=ProductosYServicios%2FPYSLayout</ext-link></citation></ref>
<ref id="B91">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Subrahmanyam</surname> <given-names>K.</given-names></name> <name><surname>Greenfield</surname> <given-names>P.</given-names></name></person-group> (<year>2008</year>). <article-title>Online communication and adolescent relationships</article-title>. <source>Future Child.</source> <volume>18</volume>, <fpage>119</fpage>&#x02013;<lpage>146</lpage>. <pub-id pub-id-type="doi">10.1353/foc.0.0006</pub-id><pub-id pub-id-type="pmid">21338008</pub-id></citation></ref>
<ref id="B92">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Tabachnick</surname> <given-names>B. G.</given-names></name> <name><surname>Fidell</surname> <given-names>L. S.</given-names></name></person-group> (<year>2007</year>). <source>Using Multivariate Statistics 5th Edn</source>. <publisher-loc>Boston, MA</publisher-loc>: <publisher-name>Allyn and Bacon</publisher-name>.</citation></ref>
<ref id="B93">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Van Deursen</surname> <given-names>A. J.</given-names></name> <name><surname>van Dijk</surname> <given-names>J. A.</given-names></name> <name><surname>Peter</surname> <given-names>M.</given-names></name></person-group> (<year>2015</year>). <article-title>Increasing inequalities in what we do online: a longitudinal cross-sectional analysis of Internet activities among the Dutch population (2010 to 2013) over gender, age, education, and income</article-title>. <source>Telemat. Inform.</source> <volume>32</volume>, <fpage>259</fpage>&#x02013;<lpage>272</lpage>. <pub-id pub-id-type="doi">10.1016/j.tele.2014.09.003</pub-id></citation></ref>
<ref id="B94">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Wellman</surname> <given-names>B.</given-names></name> <name><surname>Gulia</surname> <given-names>M.</given-names></name></person-group> (<year>1999</year>). <article-title>Net surfers don&#x00027;t ride alone: virtual communities as communities</article-title>, in <source>Networks in the Global Village</source>, ed <person-group person-group-type="editor"><name><surname>Wellman</surname> <given-names>B.</given-names></name></person-group> (<publisher-loc>Colorado, AZ</publisher-loc>: <publisher-name>Westview Press</publisher-name>), <fpage>331</fpage>&#x02013;<lpage>366</lpage>.</citation></ref>
<ref id="B95">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Xie</surname> <given-names>H.</given-names></name> <name><surname>Cairns</surname> <given-names>R. B.</given-names></name> <name><surname>Cairns</surname> <given-names>B. D.</given-names></name></person-group> (<year>2002</year>). <article-title>The development of social aggression and physical aggression: a narrative analysis of interpersonal conflicts</article-title>. <source>Aggress. Behav.</source> <volume>28</volume>, <fpage>341</fpage>&#x02013;<lpage>355</lpage>. <pub-id pub-id-type="doi">10.1002/ab.80008</pub-id></citation></ref>
<ref id="B96">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Xiuqin</surname> <given-names>H.</given-names></name> <name><surname>Huimin</surname> <given-names>Z.</given-names></name> <name><surname>Mengchen</surname> <given-names>L.</given-names></name> <name><surname>Jinan</surname> <given-names>W.</given-names></name> <name><surname>Ying</surname> <given-names>Z.</given-names></name> <name><surname>Ran</surname> <given-names>T.</given-names></name></person-group> (<year>2010</year>). <article-title>Mental health, personality, and parental rearing styles of adolescents with Internet addiction disorder</article-title>. <source>Cyberpsychol. Behav. Soc. Netw</source>. <volume>13</volume>, <fpage>401</fpage>&#x02013;<lpage>406</lpage>. <pub-id pub-id-type="doi">10.1089/cyber.2009.0222</pub-id><pub-id pub-id-type="pmid">20712498</pub-id></citation></ref>
<ref id="B97">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname> <given-names>S. C.</given-names></name> <name><surname>Tung</surname> <given-names>C. J.</given-names></name></person-group> (<year>2007</year>). <article-title>Comparison of Internet addicts and non-addicts in Taiwanese high school</article-title>. <source>Comput. Hum. Behav.</source> <volume>23</volume>, <fpage>79</fpage>&#x02013;<lpage>96</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2004.03.037</pub-id></citation></ref>
<ref id="B98">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Young</surname> <given-names>K. S.</given-names></name></person-group> (<year>1999</year>). &#x0201C;Internet addiction: symptoms, evaluation and treatment&#x0201D;, in <source>Innovations in Clinical Practice: A Source Book</source>, eds <person-group person-group-type="editor"><name><surname>Van de Creek</surname> <given-names>L.</given-names></name> <name><surname>Jackson</surname> <given-names>X.</given-names></name></person-group> (<publisher-loc>Sarasota, FL</publisher-loc>: <publisher-name>Professional Resource Press</publisher-name>), <fpage>19</fpage>&#x02013;<lpage>31</lpage>.</citation></ref>
<ref id="B99">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Young</surname> <given-names>K. S.</given-names></name> <name><surname>Rogers</surname> <given-names>R. C.</given-names></name></person-group> (<year>1998</year>). <article-title>The relationship between depression and Internet addiction</article-title>. <source>Cyberpsychol. Behav.</source> <volume>1</volume>, <fpage>25</fpage>&#x02013;<lpage>28</lpage>. <pub-id pub-id-type="doi">10.1089/cpb.1998.1.25</pub-id></citation></ref>
<ref id="B100">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yuan</surname> <given-names>K. H.</given-names></name> <name><surname>Chan</surname> <given-names>W.</given-names></name> <name><surname>Bentler</surname> <given-names>P. M.</given-names></name></person-group> (<year>2000</year>). <article-title>Robust transformation with applications to structural equation modelling</article-title>. <source>Br. J. Math. Stat. Psychol.</source> <volume>53</volume>, <fpage>31</fpage>&#x02013;<lpage>50</lpage>. <pub-id pub-id-type="doi">10.1348/00071100015916</pub-id><pub-id pub-id-type="pmid">10895521</pub-id></citation></ref>
</ref-list>
<fn-group>
<fn fn-type="financial-disclosure"><p><bold>Funding.</bold> The present study has been performed in the framework of the Research Project Bulling, Cyberbullying, and Child-to-Parent Violence in adolescence (PSI2015-65683- P) [MINECO/FEDER, UE], funded by the Spanish Government and FEDER founds.</p>
</fn>
</fn-group>
</back>
</article>