{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T15:59:49Z","timestamp":1726847989250},"reference-count":51,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers in Human Behavior"],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1016\/j.chb.2011.09.004","type":"journal-article","created":{"date-parts":[[2011,10,3]],"date-time":"2011-10-03T07:02:45Z","timestamp":1317625365000},"page":"226-232","source":"Crossref","is-referenced-by-count":189,"title":["The changing face of bullying: An empirical comparison between traditional and internet bullying and victimization"],"prefix":"10.1016","volume":"28","author":[{"given":"Danielle M.","family":"Law","sequence":"first","affiliation":[]},{"given":"Jennifer D.","family":"Shapka","sequence":"additional","affiliation":[]},{"given":"Shelley","family":"Hymel","sequence":"additional","affiliation":[]},{"given":"Brent F.","family":"Olson","sequence":"additional","affiliation":[]},{"given":"Terry","family":"Waterhouse","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.chb.2011.09.004_b0005","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1177\/0143034396174002","article-title":"Defining bullying: Towards a clearer general understanding and more effective intervention strategies","volume":"17","author":"Arora","year":"1996","journal-title":"School Psychology International"},{"key":"10.1016\/j.chb.2011.09.004_b0010","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1080\/00220679809597580","article-title":"Observations of bullying in the classroom","volume":"92","author":"Atlas","year":"1998","journal-title":"The Journal of Educational Research"},{"key":"10.1016\/j.chb.2011.09.004_b0015","doi-asserted-by":"crossref","first-page":"265","DOI":"10.2190\/8YQM-B04H-PG4D-BLLH","article-title":"Cyber-harassment: A study of a new method for an old behavior","volume":"32","author":"Beran","year":"2005","journal-title":"Journal of Educational Computing Research"},{"key":"10.1016\/j.chb.2011.09.004_b0245","series-title":"Testing structural equation models","first-page":"136","article-title":"Alternative ways of assessing model fit","author":"Browne","year":"1993"},{"issue":"12","key":"10.1016\/j.chb.2011.09.004_b0020","doi-asserted-by":"crossref","first-page":"1704","DOI":"10.1177\/1049732308325865","article-title":"The power of peers: Why some students bully others to conform","volume":"18","author":"Burns","year":"2008","journal-title":"Qualitative Health Research"},{"key":"10.1016\/j.chb.2011.09.004_b0025","series-title":"A first course in factor analysis","author":"Comrey","year":"1992"},{"key":"10.1016\/j.chb.2011.09.004_b0030","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1177\/0143034300211002","article-title":"Observations of bullying in the playground and in the classroom","volume":"21","author":"Craig","year":"2000","journal-title":"School Psychology International"},{"key":"10.1016\/j.chb.2011.09.004_b0035","doi-asserted-by":"crossref","first-page":"993","DOI":"10.2307\/1131875","article-title":"Social information-processing mechanisms in reactive and proactive aggression","volume":"67","author":"Crick","year":"1996","journal-title":"Child Development"},{"key":"10.1016\/j.chb.2011.09.004_b0040","doi-asserted-by":"crossref","first-page":"1146","DOI":"10.1037\/0022-3514.53.6.1146","article-title":"Social information processing factors in reactive and proactive aggression in children\u2019s peer groups","volume":"53","author":"Dodge","year":"1987","journal-title":"Journal of Personality and Social Psychology"},{"key":"10.1016\/j.chb.2011.09.004_b0045","doi-asserted-by":"crossref","first-page":"1289","DOI":"10.2307\/1130743","article-title":"Peer status and aggression in boys\u2019 groups: Developmental and contextual analyses","volume":"61","author":"Dodge","year":"1990","journal-title":"Child Development"},{"issue":"4","key":"10.1016\/j.chb.2011.09.004_b0050","first-page":"182","article-title":"Cyberbullying versus face-to-face bullying: A theoretical and conceptual review","volume":"217","author":"Dooley","year":"2009","journal-title":"Journal of Psychology"},{"issue":"4","key":"10.1016\/j.chb.2011.09.004_b0055","first-page":"205","article-title":"Traditional bullying and cyberbullying: Identification of risk groups for adjustment problems","volume":"217","author":"Gradinger","year":"2009","journal-title":"Journal of Psychology"},{"key":"10.1016\/j.chb.2011.09.004_b0060","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1111\/1540-4560.00249","article-title":"Internet use and well-being in adolescence","volume":"58","author":"Gross","year":"2002","journal-title":"Journal of Social Issues"},{"key":"10.1016\/j.chb.2011.09.004_b0065","first-page":"29","article-title":"Bullies, victims, and bully\/victims: Distinct groups of at-risk youth","volume":"21","author":"Haynie","year":"2001","journal-title":"Journal of Adolescence"},{"key":"10.1016\/j.chb.2011.09.004_b0250","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1080\/00131880110051137","article-title":"Adult recognition of school bullying situations","volume":"43","author":"Hazler","year":"2001","journal-title":"Educational Research"},{"key":"10.1016\/j.chb.2011.09.004_b0070","unstructured":"Hinduja, S., & Patchin, J. W. (2008). Cyberbullying.us. Retrieved November 2008."},{"key":"10.1016\/j.chb.2011.09.004_b0075","series-title":"LISREL 8: User\u2019s reference guide","author":"Joreskog","year":"1993"},{"issue":"3","key":"10.1016\/j.chb.2011.09.004_b0080","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1111\/1467-9450.00295","article-title":"Learning difficulties, social intelligence, and self-concept: Connections to bully-victim problems","volume":"43","author":"Kaukiainen","year":"2002","journal-title":"Scandinavian Journal of Psychology"},{"key":"10.1016\/j.chb.2011.09.004_b0085","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.jadohealth.2007.08.017","article-title":"Electronic bullying among middle school students","volume":"41","author":"Kowalski","year":"2007","journal-title":"Journal of Adolescent Health"},{"key":"10.1016\/j.chb.2011.09.004_b0090","series-title":"Cyberbullying","author":"Kowalski","year":"2008"},{"issue":"4","key":"10.1016\/j.chb.2011.09.004_b0095","doi-asserted-by":"crossref","first-page":"1777","DOI":"10.1016\/j.chb.2005.10.005","article-title":"New bottle but old wine: A research of cyberbullying in schools","volume":"23","author":"Li","year":"2007","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.09.004_b0255","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1037\/1082-989X.1.2.130","article-title":"Power analysis and determination of sample size for covariance structure modeling","volume":"1","author":"MacCallum","year":"1996","journal-title":"Psychological Methods"},{"key":"10.1016\/j.chb.2011.09.004_b0100","series-title":"Bullying and teasing: Social power in children\u2019s groups","author":"Macklem","year":"2003"},{"key":"10.1016\/j.chb.2011.09.004_b0105","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1023\/A:1015322602597","article-title":"Exploring identities through the Internet: Youth experiences online","volume":"31","author":"Maczewski","year":"2002","journal-title":"Child and Youth Care Forum"},{"key":"10.1016\/j.chb.2011.09.004_b0110","series-title":"The development and treatment of childhood aggression","article-title":"Bully\/victim problems among school children: Basic facts and effects of a school based intervention program","author":"Olweus","year":"1991"},{"key":"10.1016\/j.chb.2011.09.004_b0115","series-title":"Bulling at school","author":"Olweus","year":"1993"},{"key":"10.1016\/j.chb.2011.09.004_b0125","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1023\/A:1010019915400","article-title":"Adolescent growth in new forms of problem behavior: Macro- and micro-peer dynamics","volume":"1","author":"Patterson","year":"2000","journal-title":"Prevention Science"},{"key":"10.1016\/j.chb.2011.09.004_b0130","series-title":"Bullying behaviour: Current issues, research, and interventions","first-page":"63","article-title":"The roles of dominance and bullying in the development of early heterosexual relationships","author":"Pelligrini","year":"2001"},{"key":"10.1016\/j.chb.2011.09.004_b0260","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1353\/mpq.2001.0004","article-title":"Dominance in early adolescent boys: Affiliative and aggressive dimensions and possible functions","volume":"47","author":"Pellegrini","year":"2001","journal-title":"Merrill-Palmer Quarterly"},{"key":"10.1016\/j.chb.2011.09.004_b0135","doi-asserted-by":"crossref","first-page":"423","DOI":"10.1089\/cpb.2005.8.423","article-title":"Developing a model of adolescent friendship formation on the Internet","volume":"8","author":"Peter","year":"2005","journal-title":"CyberPsychology and Behavior"},{"key":"10.1016\/j.chb.2011.09.004_b0140","series-title":"A community approach to bullying","author":"Randall","year":"1996"},{"key":"10.1016\/j.chb.2011.09.004_b0145","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1037\/0012-1649.43.3.564","article-title":"Involvement in traditional and electronic bullying among adolescents","volume":"43","author":"Raskauskas","year":"2007","journal-title":"Developmental Psychology"},{"key":"10.1016\/j.chb.2011.09.004_b0150","series-title":"Children and bullying: How parents and educators can reduce bullying at school","author":"Rigby","year":"2008"},{"issue":"1","key":"10.1016\/j.chb.2011.09.004_b0160","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1111\/1467-9450.00166","article-title":"Aggression and sociometric status among peers \u2013 Do gender and type of aggression matter?","volume":"41","author":"Salmivalli","year":"2000","journal-title":"Scandinavian Journal of Psychology"},{"key":"10.1016\/j.chb.2011.09.004_b0165","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/(SICI)1098-2337(1996)22:1<1::AID-AB1>3.0.CO;2-T","article-title":"Bullying as a group process: Participant roles and their relations to social status within the group","volume":"22","author":"Salmivalli","year":"1996","journal-title":"Aggressive Behavior"},{"issue":"4","key":"10.1016\/j.chb.2011.09.004_b0175","first-page":"180","article-title":"Cyberbullying, abusive relationships in cyberspace","volume":"21","author":"Smith","year":"2009","journal-title":"Journal of Psychology"},{"key":"10.1016\/j.chb.2011.09.004_b0180","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1159\/000276524","article-title":"Rough and tumble play, aggression, and dominance: Perception and behavior in children\u2019s encounters","volume":"33","author":"Smith","year":"1990","journal-title":"Human Development"},{"key":"10.1016\/j.chb.2011.09.004_b0185","series-title":"Using multivariate statistics","author":"Tabachnick","year":"2001"},{"key":"10.1016\/j.chb.2011.09.004_b0195","series-title":"Improving the social and intellectual climate in elementary schools by addressing bully-victim-bystander power struggles","article-title":"Chapter 10 in caring classrooms\/intelligent schools: The social emotional education of young children","author":"Twemlow","year":"2001"},{"key":"10.1016\/j.chb.2011.09.004_b0200","series-title":"Social aggression among girls","author":"Underwood","year":"2003"},{"key":"10.1016\/j.chb.2011.09.004_b0205","doi-asserted-by":"crossref","DOI":"10.1300\/J008v19n02_10","article-title":"Bullying is power: Implications for school intervention programs","author":"Vaillancourt","year":"2003","journal-title":"Journal of Applied School Psychology"},{"issue":"6","key":"10.1016\/j.chb.2011.09.004_b0210","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1177\/0165025408095553","article-title":"Bullying: Are researchers and children\/youth talking about the same thing?","volume":"32","author":"Vaillancourt","year":"2008","journal-title":"International Journal of Behavioral Development"},{"key":"10.1016\/j.chb.2011.09.004_b0215","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1177\/1461444805052282","article-title":"Adolescents\u2019 identity experiments on the Internet","volume":"7","author":"Valkenburg","year":"2005","journal-title":"New Media and Society"},{"key":"10.1016\/j.chb.2011.09.004_b0265","unstructured":"Viegas, F. B. (2005). Bloggers\u2019 expectations of privacy and accountability: An initial survey. Journal of Computer-Mediated Communication, 10. Retrieved Aug, 2011 ."},{"key":"10.1016\/j.chb.2011.09.004_b0270","doi-asserted-by":"crossref","first-page":"2538","DOI":"10.1016\/j.chb.2006.05.002","article-title":"Selective self-presentation in computer-mediated communication: Hyperpersonal dimensions of technology, language, and cognition","volume":"23","author":"Walther","year":"2007","journal-title":"Computers in Human Behavior"},{"key":"10.1016\/j.chb.2011.09.004_b0220","doi-asserted-by":"crossref","first-page":"611","DOI":"10.1177\/0265407504045890","article-title":"Relation of shyness with aspects of online relationship involvement","volume":"21","author":"Ward","year":"2004","journal-title":"Journal of Social and Personal Relationships"},{"key":"10.1016\/j.chb.2011.09.004_b0225","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1007\/s10964-009-9419-7","article-title":"Involvement in internet aggression during early adolescence","volume":"39","author":"Werner","year":"2010","journal-title":"Journal of Youth and Adolescence"},{"key":"10.1016\/j.chb.2011.09.004_b0230","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1111\/j.1467-9507.2004.00280.x","article-title":"Peer relationship influences on the development of relational and physical aggression during middle childhood: The roles of peer rejection and association with aggressive friends","volume":"13","author":"Werner","year":"2004","journal-title":"Social Development"},{"issue":"6","key":"10.1016\/j.chb.2011.09.004_b0275","doi-asserted-by":"crossref","first-page":"607","DOI":"10.1007\/s10964-009-9419-7","article-title":"Involvement in internet aggression during early adolescence","volume":"39","author":"Werner","year":"2010","journal-title":"Journal of Youth and Adolescence"},{"key":"10.1016\/j.chb.2011.09.004_b0235","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.jadohealth.2007.09.004","article-title":"Examining the overlap in internet harassment and school bullying: Implications for school intervention","volume":"41","author":"Ybarra","year":"2007","journal-title":"Journal of Adolescent Health"},{"key":"10.1016\/j.chb.2011.09.004_b0240","doi-asserted-by":"crossref","first-page":"1308","DOI":"10.1111\/j.1469-7610.2004.00328.x","article-title":"Online aggressor\/targets, aggressors, and targets: A comparison of associated youth characteristics","volume":"45","author":"Ybarra","year":"2004","journal-title":"Journal of Child Psychology and Psychiatry"}],"container-title":["Computers in Human Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S074756321100197X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S074756321100197X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,6,16]],"date-time":"2019-06-16T23:14:52Z","timestamp":1560726892000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S074756321100197X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["S074756321100197X"],"URL":"https:\/\/doi.org\/10.1016\/j.chb.2011.09.004","relation":{},"ISSN":["0747-5632"],"issn-type":[{"value":"0747-5632","type":"print"}],"subject":[],"published":{"date-parts":[[2012,1]]}}}