<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="editorial">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Commun.</journal-id>
<journal-title>Frontiers in Communication</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Commun.</abbrev-journal-title>
<issn pub-type="epub">2297-900X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fcomm.2022.961993</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Communication</subject>
<subj-group>
<subject>Editorial</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Editorial: Examining bias-based cyberaggression and cybervictimization from a cross-cultural perspective</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>Ramos Salazar</surname> <given-names>Leslie</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/1197407/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Cabrera</surname> <given-names>Joaqu&#x000ED;n Manuel Gonz&#x000E1;lez</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/1022953/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Navarro</surname> <given-names>Ra&#x000FA;l</given-names></name>
<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/417338/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Schultze-Krumbholz</surname> <given-names>Anja</given-names></name>
<xref ref-type="aff" rid="aff4"><sup>4</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/457248/overview"/>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>Department of Computer Information and Decision Management, West Texas A&#x00026;M University</institution>, <addr-line>Canyon, TX</addr-line>, <country>United States</country></aff>
<aff id="aff2"><sup>2</sup><institution>Department of Educational Psychology and Psychobiology, Universidad Internacional De La Rioja</institution>, <addr-line>Logro&#x000F1;o</addr-line>, <country>Spain</country></aff>
<aff id="aff3"><sup>3</sup><institution>Department of Psychology, University of Castilla La Mancha</institution>, <addr-line>Cuenca</addr-line>, <country>Spain</country></aff>
<aff id="aff4"><sup>4</sup><institution>Department of Educational Psychology, Technische Universit&#x000E4;t Berlin</institution>, <addr-line>Berlin</addr-line>, <country>Germany</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: Diyako Rahmani, Massey University, New Zealand</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: Eva M. Romera, University of Cordoba, Spain</p></fn>
<corresp id="c001">&#x0002A;Correspondence: Leslie Ramos Salazar <email>lsalazar&#x00040;wtamu.edu</email></corresp>
<fn fn-type="other" id="fn001"><p>This article was submitted to Culture and Communication, a section of the journal Frontiers in Communication</p></fn></author-notes>
<pub-date pub-type="epub">
<day>03</day>
<month>08</month>
<year>2022</year>
</pub-date>
<pub-date pub-type="collection">
<year>2022</year>
</pub-date>
<volume>7</volume>
<elocation-id>961993</elocation-id>
<history>
<date date-type="received">
<day>05</day>
<month>06</month>
<year>2022</year>
</date>
<date date-type="accepted">
<day>18</day>
<month>07</month>
<year>2022</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x000A9; 2022 Ramos Salazar, Cabrera, Navarro and Schultze-Krumbholz.</copyright-statement>
<copyright-year>2022</copyright-year>
<copyright-holder>Ramos Salazar, Cabrera, Navarro and Schultze-Krumbholz</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license> </permissions>
<related-article id="RA1" related-article-type="commentary-article" xlink:href="https://www.frontiersin.org/research-topics/19438/examining-bias-based-cyberaggression-and-cybervictimization-from-a-cross-cultural-perspective" ext-link-type="uri">Editorial on the Research Topic <article-title>Examining bias-based cyberaggression and cybervictimization from a cross-cultural perspective</article-title>
</related-article>
<kwd-group>
<kwd>cyberaggression</kwd>
<kwd>cybervictimization</kwd>
<kwd>cross-cultural communication</kwd>
<kwd>cross-cultural psychology</kwd>
<kwd>cyberbullying</kwd>
</kwd-group>
<counts>
<fig-count count="0"/>
<table-count count="0"/>
<equation-count count="0"/>
<ref-count count="20"/>
<page-count count="0"/>
<word-count count="2346"/>
</counts>
</article-meta>
</front>
<body>
<p>During the COVID-19 pandemic, individuals relied heavily on computer mediated communication technologies to perform personal and professional activities (Meier et al., <xref ref-type="bibr" rid="B9">2021</xref>). Because individuals relied heavily on their electronic devices and the Internet, this made them more vulnerable to cyberaggression and cybervictimization (Wang et al., <xref ref-type="bibr" rid="B17">2022</xref>), which lead to negative effects such as depression, suicide ideation, and low wellbeing (Kowalski et al., <xref ref-type="bibr" rid="B6">2014</xref>; Keipi et al., <xref ref-type="bibr" rid="B5">2018</xref>; Musharraf and Anis-ul-Haque, <xref ref-type="bibr" rid="B11">2018</xref>). Cyberaggression includes cyberbullying perpetration (Zych et al., <xref ref-type="bibr" rid="B20">2015</xref>), cyberhate (Bedrosova et al., <xref ref-type="bibr" rid="B3">2022</xref>), cybergossip (Romera et al., <xref ref-type="bibr" rid="B13">2018</xref>), and cybercrime, such as cyberstalking (Mikkola et al., <xref ref-type="bibr" rid="B10">2020</xref>) along with other aggressive behaviors that occur in computer-mediated contexts.</p>
<p>Cyberaggression and cybervictimization studies have emphasized the prevalence rates across countries, especially when examining gender (Kowalski et al., <xref ref-type="bibr" rid="B6">2014</xref>; Sorrentino et al., <xref ref-type="bibr" rid="B16">2019</xref>). European studies report higher prevalence among Bulgarian youth in comparison to other countries such as Greek, Italian, Polish, and Spanish youth (Livingstone et al., <xref ref-type="bibr" rid="B7">2011</xref>; Athanasiades et al., <xref ref-type="bibr" rid="B1">2015</xref>; Sorrentino et al., <xref ref-type="bibr" rid="B16">2019</xref>). Research examining the prevalence of cybervictimization and cyberbullying in Austria, Cyprus, and Romania, found that multi-item scales are more effective when engaging in cross-national comparisons (Yanagida et al., <xref ref-type="bibr" rid="B18">2016</xref>). Another study found that cellphone ownership moderated the relationship between factors such as gender and cybervictimization among adolescents from Canada (Shapka et al., <xref ref-type="bibr" rid="B15">2018</xref>). When examining cyberbullying and cybervictimization across 8 European countries, Sorrentino et al. (<xref ref-type="bibr" rid="B16">2019</xref>) found that boys were more likely to become perpetrators across all countries, and cybervictimization was more likely to occur in Bulgaria and Hungary. In a cross-cultural comparison of college students between USA and Japan, US males were more likely to report higher levels of cyberbullying than Japanese males (Barlett et al., <xref ref-type="bibr" rid="B2">2014</xref>). It&#x00027;s also been found that compulsive Internet use partially mediates the positive relationship between cyberaggression and impulsivity across Finland, Spain, and the United States (Zych et al., <xref ref-type="bibr" rid="B19">2021</xref>). Further, a study comparing adolescents and young adults from Estonia, Italy, Germany and Turkey showed that the severity of cyberbullying is perceived differently across countries (Palladino et al., <xref ref-type="bibr" rid="B12">2017</xref>). While studies have initiated the work in examining cross-national comparisons of cyberaggression and cybervictimization using survey and experimental methods and validating measures (e.g., Del Rey et al., <xref ref-type="bibr" rid="B4">2015</xref>) and classification approaches (e.g., Schultze-Krumbholz et al., <xref ref-type="bibr" rid="B14">2014</xref>) across countries, a gap in the literature has been examining these issues from a cross-cultural perspective using various methodological perspectives. To address this gap, this collection will highlight the findings of cyberaggression and cybervictimization studies that will extend previous research.</p>
<sec id="s1">
<title>This Research Topic</title>
<p>The objective of this special issue was to highlight cyberaggression and cybervictimization research from a cross-cultural perspective. This Research Topic compiled the following four research articles that address cyberbullying victimization across cultures.</p>
<p><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fcomm.2022.768494">Peker and &#x000DC;mit Yal&#x000E7;in</ext-link> conducted a descriptive bibliographical approach to map cross-cultural research and cyberbullying victimization. Findings highlight the cross-cultural studies of cybervictimization across 74 countries and found that the countries that contributed the most literature of cross-cultural cyberbullying victimization were USA, Spain, England, China, and Canada. A total of 8 cooperation clusters were identified around the world. Cross-collaborations across institutions and authors were also illustrated to highlight the cross-cultural nature of cyberbullying as a global issue.</p>
<p>In their study, <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fcomm.2022.796146">Nagar et al.</ext-link> compared youth from Canadian and Iranian cultural contexts in regards to their bystander behavior against cyberbullying perpetration. Because most cyberbullying research on bystanders behavior is conducted in Western cultures, comparing the evaluation of bystander behavior using an individualistic Western country (e.g., Canada) and a collectivistic Middle Eastern country (e.g., Iran) is beneficial (Machackova and Pfetsch, <xref ref-type="bibr" rid="B8">2016</xref>). Findings illustrate that both Canadians and Iranians evaluated the assisting of the cyberbully negatively regardless of relationship type. When evaluating outsider behavior, Canadians evaluated the behavior more negatively when it was a friend; whereas Iranians were indifferent toward outsiders. Defending behavior perceptions differed by country. In terms of moral responsibility, the relationship with the bystander mattered to both Canadians and Iranians. In this study, youth similarities and differences are detailed in regards to the evaluation of bystander behavior, which can inform cross-cultural bystander intervention programs.</p>
<p><ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fcomm.2022.841424">Ca&#x000F1;as et al.</ext-link> used the sociometry method to identify peer acceptance and rejection values based on six statuses: popular, preferred, rejected, controversial, ignored, and average. Findings of 29 studies revealed that the bully role was related to both positive status (e.g., popularity, acceptance, and social preference) and a negative status (e.g., rejection). With these findings, the status perceptions of the role of the bully can be better understood in traditional and cyber victimization problems that occur in cross-cultural social hierarchies among adolescents.</p>
<p>Finally, <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.3389/fcomm.2022.846794">Schultze-Krumbholz et al.</ext-link> examined the ethnic-based motives of ethnic/racist cybervictimization of 349 adolescents. Those with a migration background were more likely to have victimization motives. The factor of ethnicity-based motives was a predictor of ethnic/racist victimization. However, dispute-related motives was a significant predictor of different forms of cybervictimization. Socio-cultural factors such as generation/migration status and ethnicity were shown to explain coping strategies when encountering cybervictimization. The most vulnerable to cyberbullying victimization were shown to be first generation migrant adolescents.</p>
<p>In sum, the papers in this issue offer several contributions. The cultural factors of bullies and victims such as social status and ethnicity can explain the interpersonal perceptions that perpetuate the bully-victim cycle. Next, cross-cultural differences based on cultural upbringing can explain bystander behavior based on the relationship they have with the perpetrator. It was found that moral emotions may differ on whether a country is collectivistic, or individualist, such that collectivistic countries might be more likely to engaging in bystander behavior to maintain the harmony of a group. Also, the ethnic/race and migration status of adolescents can explain the coping behaviors adopted against cybervictimization. Lastly, the visual network analysis demonstrated the strength of collaboration links of cyberbullying across the world using an illustration of 8 clusters, demonstrating that cyberbullying is a cross-cultural issue that requires increased cross-cultural collaboration.</p>
</sec>
<sec id="s2">
<title>Practical implications</title>
<p>Several practical implications can be derived from this collection. First, cybervictimization intervention programs need to consider cultural factors when tailoring their programs to bullies, victims, and bystanders. For instance, interventions need to adhere to cultural values, norms, and perspectives to improve their cross-cultural content to maximize their prevention effectiveness. Second, education curriculums and programs need to take into consideration the cultural factors that explain why some individuals become targets of victimization. Ethnic-related cybervictimization can be addressed by promoting diversity and multicultural trainings and workshops. Third, prevention and intervention programs should pay special attention to more vulnerable and less popular students, and should also be directed to reduce popularity-motivated cyberbullying. Fourth, there is a need to improve cybervictimization policies and laws to protect individuals from targeted cybervictimization based on cultural factors.</p>
</sec>
<sec id="s3">
<title>Summary and future directions</title>
<p>Overall, this collection examined cybervictimization and cyberaggression from different cross-cultural approaches. Findings from this special issue demonstrate that researchers can conduct cross-cultural research using a variety of methods including descriptive bibliographical, cross-cultural comparison, sociometry, and descriptive prevalence-based. Future researchers may use these findings to develop or evaluate cross-cultural cyberaggression or cybervictimization interventions among adolescents and young adult samples. Future studies may also consider using qualitative methods of research such as focus groups, interviews, and diary studies to better understand the in-depth experiences of cyberbullies, cybervictims, and cyberbystanders from a cross-cultural perspective.</p>
</sec>
<sec id="s4">
<title>Author contributions</title>
<p>LR was responsible for writing the initial draft of the editorial. All authors listed helped with revising and editing this editorial. All authors contributed to the article and approved the submitted version.</p>
</sec>
<sec sec-type="COI-statement" id="conf1">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="disclaimer" id="s5">
<title>Publisher&#x00027;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
</body>
<back>
<ack><p>We would like to express our gratitude to all authors, reviewers, and editors who worked to help bring this collection into fruition.</p>
</ack>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Athanasiades</surname> <given-names>C.</given-names></name> <name><surname>Kamariotis</surname> <given-names>H.</given-names></name> <name><surname>Psalti</surname> <given-names>A.</given-names></name> <name><surname>Baldry</surname> <given-names>A. C.</given-names></name> <name><surname>Sorrentino</surname> <given-names>A.</given-names></name></person-group> (<year>2015</year>). <article-title>Internet use and cyberbullying among adolescent students in Greece: the &#x0201C;Tabby&#x0201D; project</article-title>. <source>Hellenic J. Psychol.</source> <volume>12</volume>, <fpage>14</fpage>&#x02013;<lpage>39</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="http://ikee.lib.auth.gr/record/272535?ln=en">http://ikee.lib.auth.gr/record/272535?ln=en</ext-link></citation>
</ref>
<ref id="B2">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Barlett</surname> <given-names>C. P.</given-names></name> <name><surname>Gentile</surname> <given-names>D. A.</given-names></name> <name><surname>Anderson</surname> <given-names>C. A.</given-names></name> <name><surname>Suzuki</surname> <given-names>K.</given-names></name> <name><surname>Sakamoto</surname> <given-names>A.</given-names></name> <name><surname>Yamaoka</surname> <given-names>A.</given-names></name> <etal/></person-group>. (<year>2014</year>). <article-title>Cross-cultural differences in cyberbullying behavior: a short-term longitudinal study</article-title>. <source>J. Cross-Cult. Psychol.</source> <volume>45</volume>, <fpage>300</fpage>&#x02013;<lpage>313</lpage>. <pub-id pub-id-type="doi">10.1177/0022022113504622</pub-id></citation>
</ref>
<ref id="B3">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Bedrosova</surname> <given-names>M.</given-names></name> <name><surname>Machakova</surname> <given-names>H.</given-names></name> <name><surname>Serek</surname> <given-names>J.</given-names></name> <name><surname>Smahel</surname> <given-names>D.</given-names></name> <name><surname>Blaya</surname> <given-names>C.</given-names></name></person-group> (<year>2022</year>). <article-title>The relation between the cyberhate and cyberbullying experiences of adolescents in the Czech Republic, Poland, and Slovakia</article-title>. <source>Comput. Hum. Behav.</source> <volume>126</volume>, <fpage>1</fpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2021.107013</pub-id></citation>
</ref>
<ref id="B4">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Del Rey</surname> <given-names>R.</given-names></name> <name><surname>Casas</surname> <given-names>J. A.</given-names></name> <name><surname>Ortega-Ruiz</surname> <given-names>R.</given-names></name> <name><surname>Schultze-Krumbholz</surname> <given-names>A.</given-names></name> <name><surname>Scheithauer</surname> <given-names>H.</given-names></name> <name><surname>Smith</surname> <given-names>P.</given-names></name> <etal/></person-group>. (<year>2015</year>). <article-title>Structural validation and cross-cultural robustness of the european cyberbullying intervention project questionnaire</article-title>. <source>Comput. Hum. Behav.</source> <volume>50</volume>, <fpage>141</fpage>&#x02013;<lpage>147</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2015.03.065</pub-id></citation>
</ref>
<ref id="B5">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Keipi</surname> <given-names>T.</given-names></name> <name><surname>R&#x000E4;s&#x000E4;nen</surname> <given-names>P.</given-names></name> <name><surname>Oksanen</surname> <given-names>A.</given-names></name> <name><surname>Hawdon</surname> <given-names>J.</given-names></name> <name><surname>N&#x000E4;si</surname> <given-names>M.</given-names></name></person-group> (<year>2018</year>). <article-title>Exposure to online hate material and subjective wellbeing: a comparative study of American and Finnish youth</article-title>. <source>Online Inform. Rev.</source> <volume>42</volume>, <fpage>2</fpage>&#x02013;<lpage>15</lpage>. <pub-id pub-id-type="doi">10.1108/OIR-05-2016-0133</pub-id></citation>
</ref>
<ref id="B6">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Kowalski</surname> <given-names>R. M.</given-names></name> <name><surname>Giumetti</surname> <given-names>G. W.</given-names></name> <name><surname>Schroeder</surname> <given-names>A. N.</given-names></name> <name><surname>Lattanner</surname> <given-names>M. R.</given-names></name></person-group> (<year>2014</year>). <article-title>Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth</article-title>. <source>Psychol. Bull.</source> <volume>140</volume>, <fpage>1073</fpage>&#x02013;<lpage>1137</lpage>. <pub-id pub-id-type="doi">10.1037/a0035618</pub-id><pub-id pub-id-type="pmid">24512111</pub-id></citation></ref>
<ref id="B7">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Livingstone</surname> <given-names>S.</given-names></name> <name><surname>Haddon</surname> <given-names>L.</given-names></name> <name><surname>Gorzig</surname> <given-names>A.</given-names></name> <name><surname>Olafssson</surname> <given-names>K.</given-names></name></person-group> (<year>2011</year>). <source>EU Kids Online: Final report. EU Kids Online</source>.</citation>
</ref>
<ref id="B8">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Machackova</surname> <given-names>H.</given-names></name> <name><surname>Pfetsch</surname> <given-names>J.</given-names></name></person-group> (<year>2016</year>). <article-title>Bystanders&#x00027; responses to offline bullying and cyberbullying: the role of empathy and normative beliefs about aggression</article-title>. <source>Scand. J. Psychol.</source> <volume>57</volume>, <fpage>169</fpage>&#x02013;<lpage>176</lpage>. <pub-id pub-id-type="doi">10.1111/sjop.12277</pub-id><pub-id pub-id-type="pmid">26946454</pub-id></citation></ref>
<ref id="B9">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Meier</surname> <given-names>J. V.</given-names></name> <name><surname>Noel</surname> <given-names>J. A.</given-names></name> <name><surname>Kaspar</surname> <given-names>K.</given-names></name></person-group> (<year>2021</year>). <article-title>Alone together: Computer-mediated communication in leisure time during and after the COVID-19 pandemic</article-title>. <source>Front. Psychol.</source> <volume>21</volume>, <fpage>665</fpage>. <pub-id pub-id-type="doi">10.3389/fpsyg.2021.666655</pub-id><pub-id pub-id-type="pmid">34234714</pub-id></citation></ref>
<ref id="B10">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Mikkola</surname> <given-names>M.</given-names></name> <name><surname>Oksanen</surname> <given-names>A.</given-names></name> <name><surname>Kaakinen</surname> <given-names>M.</given-names></name> <name><surname>Miller</surname> <given-names>B. L.</given-names></name> <name><surname>Savolainen</surname> <given-names>L.</given-names></name> <name><surname>Sirola</surname> <given-names>A.</given-names></name> <etal/></person-group>. (<year>2020</year>). <article-title>Situational and individual risk factors for cybercrime victimization in a cross-national context</article-title>. <source>Int. J. Offender Therap. Comparat. Criminol.</source> <volume>20</volume>, <fpage>1041</fpage>. <pub-id pub-id-type="doi">10.1177/0306624X20981041</pub-id><pub-id pub-id-type="pmid">33300379</pub-id></citation></ref>
<ref id="B11">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Musharraf</surname> <given-names>S.</given-names></name> <name><surname>Anis-ul-Haque</surname> <given-names>M.</given-names></name></person-group> (<year>2018</year>). <article-title>Impact of cyber aggression and cyber victimization on mental health and wellbeing of Pakistani young adults: the moderating role of gender</article-title>. <source>J. Aggress. Maltreat. Trauma</source> <volume>21</volume>, <fpage>942</fpage>&#x02013;<lpage>958</lpage>. <pub-id pub-id-type="doi">10.1080/10926771.2017.1422838</pub-id></citation>
</ref>
<ref id="B12">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Palladino</surname> <given-names>B. E.</given-names></name> <name><surname>Menesini</surname> <given-names>E.</given-names></name> <name><surname>Nocentini</surname> <given-names>A.</given-names></name> <name><surname>Luik</surname> <given-names>P.</given-names></name> <name><surname>Naruskov</surname> <given-names>K.</given-names></name> <name><surname>Ucanok</surname> <given-names>Z.</given-names></name> <etal/></person-group>. (<year>2017</year>). <article-title>Perceived severity of cyberbullying: differences and similarities across four countries</article-title>. <source>Front. Psychol.</source> <volume>8</volume>, <fpage>1524</fpage>. <pub-id pub-id-type="doi">10.3389/fpsyg.2017.01524</pub-id><pub-id pub-id-type="pmid">28979217</pub-id></citation></ref>
<ref id="B13">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Romera</surname> <given-names>E. M.</given-names></name> <name><surname>Herrera-L&#x000F3;pez</surname> <given-names>M.</given-names></name> <name><surname>Casas</surname> <given-names>J. A.</given-names></name> <name><surname>Ruiz</surname> <given-names>R, O.</given-names></name> <name><surname>Rey</surname> <given-names>R. D.</given-names></name></person-group> (<year>2018</year>). <article-title>How much do adolescents cybergossip? scale development and validation in Spain and Colombia</article-title>. <source>Front. Psychol.</source> <volume>9</volume>, <fpage>126</fpage>. <pub-id pub-id-type="doi">10.3389/fpsyg.2018.00126</pub-id><pub-id pub-id-type="pmid">29483887</pub-id></citation></ref>
<ref id="B14">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Schultze-Krumbholz</surname> <given-names>A.</given-names></name> <name><surname>G&#x000F6;bel</surname> <given-names>K.</given-names></name> <name><surname>Scheithauer</surname> <given-names>H.</given-names></name> <name><surname>Brighi</surname> <given-names>A.</given-names></name> <name><surname>Guarini</surname> <given-names>A.</given-names></name> <name><surname>Tsorbatzoudis</surname> <given-names>H.</given-names></name> <etal/></person-group>. (<year>2014</year>). <article-title>A comparison of classification approaches for cyberbullying and traditional bullying using data from six European countries</article-title>. <source>J. School Viol.</source> <volume>14</volume>, <fpage>47</fpage>&#x02013;<lpage>65</lpage>. <pub-id pub-id-type="doi">10.1080/15388220.2014.961067</pub-id></citation>
</ref>
<ref id="B15">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Shapka</surname> <given-names>J. D.</given-names></name> <name><surname>Onditi</surname> <given-names>H. Z.</given-names></name> <name><surname>Collie</surname> <given-names>R. J.</given-names></name> <name><surname>Lapidot-Lefler</surname> <given-names>N.</given-names></name></person-group> (<year>2018</year>). <article-title>Cyberbullying and cybervictimization within a cross-cultural context: a study of Canadian and Tanzanian adolescents</article-title>. <source>Child Develop.</source> <volume>89</volume>, <fpage>89</fpage>&#x02013;<lpage>99</lpage>. <pub-id pub-id-type="doi">10.1111/cdev.12829</pub-id><pub-id pub-id-type="pmid">28523643</pub-id></citation></ref>
<ref id="B16">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Sorrentino</surname> <given-names>A.</given-names></name> <name><surname>Farrington</surname> <given-names>D. P.</given-names></name> <name><surname>Baldry</surname> <given-names>A. C.</given-names></name> <name><surname>Blaya</surname> <given-names>C.</given-names></name></person-group> (<year>2019</year>). <article-title>Epidemiology of cyberbullying across Europe: Differences between countries and genders</article-title>. <source>Educat. Sci. Theory Pract.</source> <volume>19</volume>, <fpage>79</fpage>&#x02013;<lpage>91</lpage>. <pub-id pub-id-type="doi">10.12738/estp.2019.2.005</pub-id></citation>
</ref>
<ref id="B17">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>Q.</given-names></name> <name><surname>Luo</surname> <given-names>X.</given-names></name> <name><surname>Tu</surname> <given-names>R.</given-names></name> <name><surname>Xiao</surname> <given-names>T.</given-names></name> <name><surname>Hu</surname> <given-names>W.</given-names></name></person-group> (<year>2022</year>). <article-title>COVID-19 information overload and cyber aggression during the pandemic lockdown: the mediating role of depression/anxiety and the moderating role of Confucian responsibility thinking</article-title>. <source>Int. J. Environ. Res. Public Health</source> <volume>19</volume>, <fpage>1540</fpage>. <pub-id pub-id-type="doi">10.3390/ijerph19031540</pub-id><pub-id pub-id-type="pmid">35162578</pub-id></citation></ref>
<ref id="B18">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Yanagida</surname> <given-names>T.</given-names></name> <name><surname>Gradinger</surname> <given-names>P.</given-names></name> <name><surname>Strohmeier</surname> <given-names>D.</given-names></name> <name><surname>Solomontos-Kountouri</surname> <given-names>O.</given-names></name> <name><surname>Trip</surname> <given-names>S.</given-names></name> <name><surname>Bora</surname> <given-names>C.</given-names></name></person-group> (<year>2016</year>). <article-title>Cross-national prevalence of traditional bullying, traditional victimization, cyberbullying and cyber-victimization: Comparing single-item and multi-item approaches of measurement</article-title>. <source>Int. J. Develop. Sci.</source> <volume>10</volume>, <fpage>21</fpage>&#x02013;<lpage>32</lpage>. <pub-id pub-id-type="doi">10.3233/DEV-150173</pub-id></citation>
</ref>
<ref id="B19">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zych</surname> <given-names>I.</given-names></name> <name><surname>Kaakinen</surname> <given-names>M.</given-names></name> <name><surname>Savolainen</surname> <given-names>I.</given-names></name> <name><surname>Sirola</surname> <given-names>A.</given-names></name> <name><surname>Paek</surname> <given-names>H.-J.</given-names></name> <name><surname>Oksanen</surname> <given-names>A.</given-names></name></person-group> (<year>2021</year>). <article-title>The role of impulsivity, social relations online and offline, and compulsive Internet use in cyberaggression: a four-country study</article-title>. <source>New Media and Society</source> <volume>1</volume>, <fpage>1</fpage>&#x02013;<lpage>18</lpage>. <pub-id pub-id-type="doi">10.1177/14614448211009459</pub-id></citation>
</ref>
<ref id="B20">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Zych</surname> <given-names>I.</given-names></name> <name><surname>Ortega-Ruiz</surname> <given-names>R.</given-names></name> <name><surname>Del Rey</surname> <given-names>R.</given-names></name></person-group> (<year>2015</year>). <article-title>Systematic review of theoretical studies on bullying and cyberbullying: Facts, knowledge, prevention, and intervention</article-title>. <source>Aggress. Viol. Behav.</source> <volume>23</volume>, <fpage>1</fpage>&#x02013;<lpage>21</lpage>. <pub-id pub-id-type="doi">10.1016/j.avb.2015.10.001</pub-id></citation>
</ref>
</ref-list> 
</back>
</article>