<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1688-4221</journal-id>
<journal-title><![CDATA[Ciencias Psicológicas]]></journal-title>
<abbrev-journal-title><![CDATA[Cienc. Psicol.]]></abbrev-journal-title>
<issn>1688-4221</issn>
<publisher>
<publisher-name><![CDATA[Universidad Católica del Uruguay.]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1688-42212025000101209</article-id>
<article-id pub-id-type="doi">10.22235/cp.v19i1.4031</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Evaluation of cyberstalking and its relations with the fear of missing out, the compulsive internet use, and emotional intelligence]]></article-title>
<article-title xml:lang="es"><![CDATA[Evaluación del ciberacoso y sus relaciones con el miedo a perderse algo, uso compulsivo de Internet e inteligencia emocional]]></article-title>
<article-title xml:lang="pt"><![CDATA[Avaliação do cyberstalking e suas relações com o medo de perder algo, o uso compulsivo da Internet e a inteligência emocional]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Gómez Yepes]]></surname>
<given-names><![CDATA[Talía]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Etchezahar]]></surname>
<given-names><![CDATA[Edgardo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Albalá Genol]]></surname>
<given-names><![CDATA[Miguel Ángel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ungaretti]]></surname>
<given-names><![CDATA[Joaquín]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Autónoma de Madrid  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Spain</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Autónoma de Madrid  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Spain</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad Autónoma de Madrid  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Spain</country>
</aff>
<aff id="Af4">
<institution><![CDATA[,Universidad Autónoma de Madrid  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Spain</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2025</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2025</year>
</pub-date>
<volume>19</volume>
<numero>1</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.edu.uy/scielo.php?script=sci_arttext&amp;pid=S1688-42212025000101209&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.edu.uy/scielo.php?script=sci_abstract&amp;pid=S1688-42212025000101209&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.edu.uy/scielo.php?script=sci_pdf&amp;pid=S1688-42212025000101209&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: Cyberstalking is a form of persecution that has spread with the evolution of technology and has gained significant attention in recent years. There are different studies that attempt to investigate variables that could be related to this type of behavior. This research aims to find some validity evidence for the assessment of cyberstalking in the Argentine context. Additionally, it seeks to analyze the relationships between cyberstalking and other emerging digital phenomena, such as Fear of Missing Out (FoMO) and compulsive internet use. The study was conducted with a sample of 1102 participants, with an age range of 18 to 65 years (M = 38.21; SD = 10.45), 53.90 % were identified as female and 46.10 % as male. Regarding the first objective of the study, we observed validity evidence of the cyberstalking scale, confirming its reliability and relevance. Concerning the second objective, the findings provided an analysis between cyberstalking, FoMO, and compulsive internet use. The findings highlight the importance of how compulsive internet use and the fear of missing out are potential factors that favor cyberstalking behaviors. The findings underscore the need for targeted interventions and digital literacy programs aimed at reducing the risk of cyberstalking, especially among vulnerable populations.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: El ciberacoso es una forma de persecución que se ha extendido con la evolución de la tecnología y ha ganado mucha atención en los últimos años. Esta investigación busca encontrar evidencias de validez para la evaluación del ciberacoso en el contexto argentino. Asimismo, busca analizar las relaciones entre el ciberacoso y otros fenómenos digitales emergentes, como el miedo a perderse algo (FoMO) y el uso compulsivo de internet. El estudio se realizó con una muestra de 1102 participantes, con un rango de edad de 18 a 65 años (M = 38.21; DE = 10.45), de los cuales el 53.90 % fueron mujeres y el 46.10 % hombres. Respecto al primer objetivo del estudio, se observaron evidencias de validez de la escala de ciberacoso, lo que confirma su fiabilidad y relevancia. Respecto al segundo objetivo, los resultados proporcionaron un análisis entre el ciberacoso, el FoMO y el uso compulsivo de internet. Los hallazgos resaltan la importancia de que el uso compulsivo de internet y el miedo a perderse algo (FoMO) sean factores potenciales que favorecen las conductas de ciberacoso. Subrayan la necesidad de intervenciones específicas y programas de alfabetización digital para reducir el riesgo de ciberacoso, especialmente entre las poblaciones vulnerables.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo: O Cyberstalking é uma forma de perseguição que se expandiu com a evolução da tecnologia e tem recebido muita atenção nos últimos anos. Esta pesquisa tem como objetivo validar uma escala para avaliação do cyberstalking no contexto argentino. Além disso, busca analisar as relações entre o cyberstalking e outros fenômenos digitais emergentes, como o medo de perder algo (FoMO) e o uso compulsivo da Internet. O estudo foi realizado com uma amostra de 1102 participantes, com faixa etária entre 18 e 65 anos (M = 38,21; DP = 10,45), dos quais 53,90 % eram mulheres e 46,10 % homens. Em relação ao primeiro objetivo do estudo, foram observadas evidências de validade da escala de cyberstalking, confirmando sua confiabilidade e relevância. No que diz respeito ao segundo objetivo, os resultados forneceram uma análise entre o cyberstalking, o FoMO e o uso compulsivo da internet. Os achados destacam como o uso compulsivo da internet e o medo de perder algo (FoMO) são fatores potenciais que favorecem as condutas de cyberstalking. Os achados ressaltam ainda a necessidade de intervenções específicas e programas de alfabetização digital para reduzir o risco de cyberstalking, especialmente entre populações vulneráveis.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[cyberstalking]]></kwd>
<kwd lng="en"><![CDATA[digital emergent phenomena]]></kwd>
<kwd lng="en"><![CDATA[Fear of Missing Out]]></kwd>
<kwd lng="en"><![CDATA[FoMO]]></kwd>
<kwd lng="en"><![CDATA[compulsive internet use]]></kwd>
<kwd lng="en"><![CDATA[emotional intelligence]]></kwd>
<kwd lng="es"><![CDATA[ciberacoso]]></kwd>
<kwd lng="es"><![CDATA[fenómenos digitales emergentes]]></kwd>
<kwd lng="es"><![CDATA[miedo a perderse algo]]></kwd>
<kwd lng="es"><![CDATA[FOMO]]></kwd>
<kwd lng="es"><![CDATA[uso compulsivo de internet]]></kwd>
<kwd lng="es"><![CDATA[inteligencia emocional]]></kwd>
<kwd lng="pt"><![CDATA[cyberstalking]]></kwd>
<kwd lng="pt"><![CDATA[fenômenos digitais emergentes]]></kwd>
<kwd lng="pt"><![CDATA[medo de perder algo]]></kwd>
<kwd lng="pt"><![CDATA[FoMO]]></kwd>
<kwd lng="pt"><![CDATA[uso compulsivo da internet]]></kwd>
<kwd lng="pt"><![CDATA[inteligência emocional]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abiyoga]]></surname>
<given-names><![CDATA[M. I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Emotional intelligence, social support, and anxiety among victims of cyberbullying: A literature study]]></article-title>
<source><![CDATA[Proceeding Series of Psychology]]></source>
<year>2024</year>
<volume>2</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Abu-Ulbeh]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Altalhi]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Abualigah]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Almazroi]]></surname>
<given-names><![CDATA[A. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Sumari]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Gandomi]]></surname>
<given-names><![CDATA[A. H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberstalking victimization model using criminological theory: A systematic literature review, taxonomies, applications, tools, and validations]]></article-title>
<source><![CDATA[Electronics]]></source>
<year>2021</year>
<volume>10</volume>
<numero>14</numero>
<issue>14</issue>
<page-range>1670</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ahlgrim]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Terrance]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Perceptions of cyberstalking: Impact of perpetrator gender and cyberstalker/victim relationship]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2018</year>
<volume>36</volume>
<numero>7-8</numero>
<issue>7-8</issue>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Albalá Genol]]></surname>
<given-names><![CDATA[M. Á.]]></given-names>
</name>
<name>
<surname><![CDATA[Etchezahar]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Maldonado Rico]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gómez Yepes]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Representations of social justice and digital civic engagement: The influence of psychosocial variables in teacher training]]></article-title>
<source><![CDATA[Sustainability]]></source>
<year>2022</year>
<volume>14</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>7096</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Al-Sarayra]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The predictive power of emotional intelligence in cyberbullying among Jordanian university students]]></article-title>
<source><![CDATA[Journal of Educational and Developmental Psychology]]></source>
<year>2022</year>
<volume>12</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>31-42</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barberis]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Martino]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Calaresi]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[&#381;velc]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Development of the Italian version of the test of object relations-short form]]></article-title>
<source><![CDATA[Clinical Neuropsychiatry]]></source>
<year>2020</year>
<volume>17</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>24-33</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Begotti]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Acquadro Maran]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Characteristics of cyberstalking behavior, consequences, and coping strategies: A cross-sectional study in a sample of Italian university students]]></article-title>
<source><![CDATA[Future Internet]]></source>
<year>2019</year>
<volume>11</volume>
<page-range>120</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[B&#322;achnio]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Przepiorka]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Personality and positive orientation in Internet and Facebook addiction. An empirical report from Poland]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2016</year>
<volume>59</volume>
<page-range>230-6</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bocij]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Griffiths]]></surname>
<given-names><![CDATA[M. D.]]></given-names>
</name>
<name>
<surname><![CDATA[McFarlane]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberstalking: A new challenge for criminal law]]></article-title>
<source><![CDATA[The Criminal Lawyer]]></source>
<year>2004</year>
<volume>122</volume>
<page-range>3-5</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Borrajo]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Calvete]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber dating abuse: Prevalence, context, and relationship with offline dating aggression]]></article-title>
<source><![CDATA[Psychological Reports]]></source>
<year>2015</year>
<volume>116</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>565-85</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Brackett]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Salovey]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Measuring emotional intelligence with the Mayer-Salovey-Caruso Emotional Intelligence Test (MSCEIT)]]></article-title>
<source><![CDATA[Psicothema]]></source>
<year>2006</year>
<volume>18</volume>
<page-range>34-41</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cavezza]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[McEwan]]></surname>
<given-names><![CDATA[T. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberstalking versus off-line stalking in a forensic sample]]></article-title>
<source><![CDATA[Psychology, Crime and Law]]></source>
<year>2014</year>
<volume>20</volume>
<numero>10</numero>
<issue>10</issue>
<page-range>955-70</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberbullying and cyberstalking: examination of profiles and emotional intelligence of Taiwanese perpetrators]]></article-title>
<source><![CDATA[Educational Psychology]]></source>
<year>2017</year>
<volume>37</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>496-514</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Roberts]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The revised online disinhibition effect: Implications for digital behavior]]></article-title>
<source><![CDATA[Journal of Digital Psychology]]></source>
<year>2021</year>
<volume>3</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>15-28</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chotpitayasunondh]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Douglas]]></surname>
<given-names><![CDATA[K. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How &#8220;phubbing&#8221; becomes the norm: The antecedents and consequences of snubbing via smartphone]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2016</year>
<volume>63</volume>
<page-range>9-18</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="">
<collab>Comisión Económica para América Latina y el Caribe</collab>
<source><![CDATA[Panorama Social de América Latina y el Caribe 2023: la inclusión laboral como eje central para el desarrollo social inclusive]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cook]]></surname>
<given-names><![CDATA[T. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Campbell]]></surname>
<given-names><![CDATA[D. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Shadish]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Experimental and quasi-experimental designs for generalized causal inference]]></source>
<year>2002</year>
<publisher-name><![CDATA[Houghton Mifflin]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="">
<collab>Council of Europe</collab>
<source><![CDATA[Cyberstalking: the technological dimension of stalking]]></source>
<year>2007</year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[D&#8217;Arienzo]]></surname>
<given-names><![CDATA[M. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Boursier]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Griffiths]]></surname>
<given-names><![CDATA[M. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Addiction to social media and attachment styles: A systematic literature review]]></article-title>
<source><![CDATA[International Journal of Mental Health and Addiction]]></source>
<year>2019</year>
<volume>17</volume>
<page-range>1094-118</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dreßing]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Bailer]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Anders]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Wagner]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Gallas]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberstalking in a large sample of social network users: Prevalence, characteristics, and impact upon victims]]></article-title>
<source><![CDATA[Cyberpsychology, Behavior, and Social Networking]]></source>
<year>2014</year>
<volume>17</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>61-7</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Durao]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Etchezahar]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Genol]]></surname>
<given-names><![CDATA[M. Á. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Muller]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Fear of Missing Out, Emotional Intelligence and Attachment in Older Adults in Argentina]]></article-title>
<source><![CDATA[Journal of Intelligence]]></source>
<year>2023</year>
<volume>11</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>22</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Durao]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Etchezahar]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Genol]]></surname>
<given-names><![CDATA[M. Á. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Muller]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adaptation and validation of the Fear of Missing Out (FoMO) scale to the Argentine context]]></article-title>
<source><![CDATA[Current Psychology]]></source>
<year>2024</year>
<volume>43</volume>
<numero>41</numero>
<issue>41</issue>
<page-range>32143-53</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Etchezahar]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Durao]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Albalá Genol]]></surname>
<given-names><![CDATA[M. Á.]]></given-names>
</name>
<name>
<surname><![CDATA[Muller]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Validation of the Perceived Phubbing Scale to the Argentine Context]]></article-title>
<source><![CDATA[Behavioral Sciences]]></source>
<year>2023</year>
<volume>13</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>192</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Etikan]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Musa]]></surname>
<given-names><![CDATA[S. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Alkassim]]></surname>
<given-names><![CDATA[R. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comparison of convenience sampling and purposive sampling]]></article-title>
<source><![CDATA[American Journal of Theoretical and Applied Statistics]]></source>
<year>2016</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-4</page-range></nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Extremera Pacheco]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Fernández Berrocal]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Inteligencia emocional percibida y diferencias individuales en el meta-conocimiento de los estados emocionales: una revisión de los estudios con el TMMS]]></article-title>
<source><![CDATA[Ansiedad y estrés]]></source>
<year>2005</year>
<volume>11</volume>
<numero>2-3</numero>
<issue>2-3</issue>
<page-range>101-22</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fansher]]></surname>
<given-names><![CDATA[A. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Randa]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Risky social media behaviors and the potential for victimization: A descriptive look at college students victimized by someone met online]]></article-title>
<source><![CDATA[Violence and Gender]]></source>
<year>2019</year>
<volume>6</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>115-23</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fissel]]></surname>
<given-names><![CDATA[E. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Reyns]]></surname>
<given-names><![CDATA[B. W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The aftermath of cyberstalking: School, work, social, and health costs of victimization]]></article-title>
<source><![CDATA[American Journal of Criminal Justice]]></source>
<year>2020</year>
<volume>45</volume>
<page-range>70-87</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[George]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Mallery]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[SPSS for Windows step by step. A simple study guide and reference]]></source>
<year>2010</year>
<publisher-name><![CDATA[Pearson Education]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Goleman]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Emotional intelligence]]></source>
<year>1995</year>
<publisher-name><![CDATA[Bantam Books]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gross]]></surname>
<given-names><![CDATA[E. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Juvonen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Gable]]></surname>
<given-names><![CDATA[S. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Internet use and emotional intelligence: The impact of digital communication technologies on adolescent emotional competence]]></article-title>
<source><![CDATA[Journal of Youth and Adolescence]]></source>
<year>2016</year>
<volume>45</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>431-44</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hair]]></surname>
<given-names><![CDATA[J. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Black]]></surname>
<given-names><![CDATA[W. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Babin]]></surname>
<given-names><![CDATA[B. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Anderson]]></surname>
<given-names><![CDATA[R. E.]]></given-names>
</name>
</person-group>
<source><![CDATA[Multivariate Data Analysis]]></source>
<year>2010</year>
<publisher-name><![CDATA[Pearson]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hanel]]></surname>
<given-names><![CDATA[P. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Vione]]></surname>
<given-names><![CDATA[K. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Do student samples provide an accurate estimate of the general public?]]></article-title>
<source><![CDATA[PloS One]]></source>
<year>2016</year>
<volume>11</volume>
<numero>12</numero>
<issue>12</issue>
</nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Harris]]></surname>
<given-names><![CDATA[B. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Woodlock]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital coercive control: Insights from two landmark domestic violence studies]]></article-title>
<source><![CDATA[The British Journal of Criminology]]></source>
<year>2019</year>
<volume>59</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>530-50</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="">
<collab>Instituto Nacional contra la Discriminación, la Xenofobia y el Racismo</collab>
<source><![CDATA[Mapa Nacional de Discriminación 2013-2019]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="">
<collab>Instituto Nacional de Estadística y Geografía</collab>
<source><![CDATA[Módulo sobre Ciberacoso (MOCIBA)]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kim]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A multilevel meta-analysis of cyberstalking: Domains (and subdomains) of contributing factors]]></article-title>
<source><![CDATA[Journal of Criminal Justice]]></source>
<year>2023</year>
<volume>87</volume>
</nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kircaburun]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Jonason]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Griffiths]]></surname>
<given-names><![CDATA[M. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Dark Tetrad traits and problematic social media use: The mediating role of cyberbullying and cyberstalking]]></article-title>
<source><![CDATA[Personality and Individual Differences]]></source>
<year>2018</year>
<volume>135</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>264-9</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Maple]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Short]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Brown]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cyberstalking in the United Kingdom: An analysis of the ECHO pilot survey]]></source>
<year>2011</year>
<publisher-name><![CDATA[National Centre for Cyberstalking Research: University of Bedfordshire]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Marcum]]></surname>
<given-names><![CDATA[C. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Higgins]]></surname>
<given-names><![CDATA[G. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Nicholson]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[I&#8217;m watching you: Cyberstalking behaviors of university students in romantic relationships]]></article-title>
<source><![CDATA[American Journal of Criminal Justice]]></source>
<year>2017</year>
<volume>42</volume>
<page-range>373-88</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Meerkerk]]></surname>
<given-names><![CDATA[G. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Van Den Eijnden]]></surname>
<given-names><![CDATA[R. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Vermulst]]></surname>
<given-names><![CDATA[A. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Garretsen]]></surname>
<given-names><![CDATA[H. F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The compulsive internet use scale (CIUS): some psychometric properties]]></article-title>
<source><![CDATA[Cyberpsychology and Behavior]]></source>
<year>2009</year>
<volume>12</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-6</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Melton]]></surname>
<given-names><![CDATA[H. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Stalking: A review of the literature and direction for the future]]></article-title>
<source><![CDATA[Criminal Justice Review]]></source>
<year>2000</year>
<volume>25</volume>
<page-range>246-62</page-range></nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Melton]]></surname>
<given-names><![CDATA[H. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Predicting the occurrence of stalking in relationships characterized by domestic violence]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2007</year>
<volume>22</volume>
<page-range>3-25</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Menard]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Short-and Long-Term Consequences of Adolescent Victimization]]></article-title>
<source><![CDATA[OJJDP Youth Violence Research Bulletin, February 2002]]></source>
<year>2002</year>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Muusses]]></surname>
<given-names><![CDATA[L. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Finkenauer]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Kerkhof]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Billedo]]></surname>
<given-names><![CDATA[C. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A longitudinal study of the association between compulsive internet use and wellbeing]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2014</year>
<volume>36</volume>
<page-range>21-8</page-range></nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Navarro]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Ávila Reyes]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
<name>
<surname><![CDATA[Tapia-Ladino]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Cristovão]]></surname>
<given-names><![CDATA[V. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Moritz]]></surname>
<given-names><![CDATA[M. E. W.]]></given-names>
</name>
<name>
<surname><![CDATA[Narváez Cardona]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Bazerman]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Panorama histórico y contrastivo de los estudios sobre lectura y escritura en educación superior publicados en América Latina]]></article-title>
<source><![CDATA[Revista Signos]]></source>
<year>2016</year>
<volume>49</volume>
<page-range>78-99</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nobles]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Reyns]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Fox]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Fisher]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Protection against pursuit: A conceptual and empirical comparison of cyberstalking and stalking victimization among a national sample]]></article-title>
<source><![CDATA[Justice Quarterly]]></source>
<year>2014</year>
<volume>31</volume>
<page-range>986-1014</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pereira]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Spitzberg]]></surname>
<given-names><![CDATA[B. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Matos]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber-harassment victimization in Portugal: Prevalence, fear and help-seeking among adolescents]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2016</year>
<volume>62</volume>
<page-range>136-46</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Przybylski]]></surname>
<given-names><![CDATA[A. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Murayama]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[DeHaan]]></surname>
<given-names><![CDATA[C. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Gladwell]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Motivational, emotional, and behavioral correlates of fear of missing out]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2013</year>
<volume>29</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>1841-8</page-range></nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Saladino]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Verrastro]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Cannavò]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Emotion dysregulation and problematic social media use: the role of need fulfillment and fear of missing out]]></article-title>
<source><![CDATA[Current Psychology]]></source>
<year>2024</year>
<volume>43</volume>
<page-range>22200-11</page-range></nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salguero]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Fernández-Berrocal]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Ruíz-Aranda]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Cabello]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Propiedades psicométricas de la versión reducida de la Trait Meta-Mood Scale: TMMS-12]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Fernández-Berrocal]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Avances en el estudio de la Inteligencia Emocional]]></source>
<year>2009</year>
<page-range>129-33</page-range><publisher-name><![CDATA[Fundación Marcelino Botín]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salovey]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Emotional attention, clarity and repair: exploring emotional intelligence using the Trait Meta-Mood Scale]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Pennebaker]]></surname>
<given-names><![CDATA[J.W.]]></given-names>
</name>
</person-group>
<source><![CDATA[Emotion, disclosure, and health]]></source>
<year>1995</year>
<page-range>125-54</page-range><publisher-name><![CDATA[APA]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B52">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salovey]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Mayer]]></surname>
<given-names><![CDATA[J.D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Emotional Intelligence]]></article-title>
<source><![CDATA[Imagination, Cognition, and Personality]]></source>
<year>1990</year>
<volume>9</volume>
<page-range>185-211</page-range></nlm-citation>
</ref>
<ref id="B53">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Salovey]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Stroud]]></surname>
<given-names><![CDATA[L. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Woolery]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Epel]]></surname>
<given-names><![CDATA[E. S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Perceived emotional intelligence, stress reactivity, and symptom reports: Further explorations using the trait meta-mood scale]]></article-title>
<source><![CDATA[Psychology and Health]]></source>
<year>2002</year>
<volume>17</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>611-27</page-range></nlm-citation>
</ref>
<ref id="B54">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sánchez-Pujalte]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Gómez Yepes]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Etchezahar]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Navarro Mateu]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Teachers at risk: Depressive symptoms, emotional intelligence, and burnout during COVID-19]]></article-title>
<source><![CDATA[Frontiers in Public Health]]></source>
<year>2023</year>
<volume>11</volume>
<page-range>1-8</page-range></nlm-citation>
</ref>
<ref id="B55">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sánchez-Pujalte]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Navarro Mateu]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Etchezahar]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Gómez Yepes]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Teachers&#8217; Burnout during COVID-19 Pandemic in Spain: Trait Emotional Intelligence and Socioemotional Competencies]]></article-title>
<source><![CDATA[Sustainability]]></source>
<year>2021</year>
<volume>13</volume>
<numero>13</numero>
<issue>13</issue>
<page-range>1-11</page-range></nlm-citation>
</ref>
<ref id="B56">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sheridan]]></surname>
<given-names><![CDATA[L. P.]]></given-names>
</name>
<name>
<surname><![CDATA[Grant]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Is cyberstalking different?]]></article-title>
<source><![CDATA[Psychology, Crime and Law]]></source>
<year>2007</year>
<volume>13</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>627-40</page-range></nlm-citation>
</ref>
<ref id="B57">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Silva Santos]]></surname>
<given-names><![CDATA[I. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Pimentel]]></surname>
<given-names><![CDATA[C. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Mariano]]></surname>
<given-names><![CDATA[T. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberstalking scale: development and relations with gender, FOMO and social media engagement]]></article-title>
<source><![CDATA[Current Psychology]]></source>
<year>2023</year>
<volume>42</volume>
<page-range>4802-10</page-range></nlm-citation>
</ref>
<ref id="B58">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Duggan]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital interaction model: Understanding online behaviors]]></article-title>
<source><![CDATA[Advances in Digital Communication]]></source>
<year>2020</year>
<volume>45</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>321-35</page-range></nlm-citation>
</ref>
<ref id="B59">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Smoker]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[March]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Predicting perpetration of intimate partner cyberstalking: Gender and the Dark Tetrad]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2017</year>
<volume>72</volume>
<page-range>390-6</page-range></nlm-citation>
</ref>
<ref id="B60">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Spitzberg]]></surname>
<given-names><![CDATA[B. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Hoobler]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberstalking and the technologies of interpersonal terrorism]]></article-title>
<source><![CDATA[New Media and Society]]></source>
<year>2002</year>
<volume>4</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>71-92</page-range></nlm-citation>
</ref>
<ref id="B61">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tallat]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Saeed]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Zia]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[University students&#8217; internet addiction and cyberstalking: A moderating model of psychological resilience]]></article-title>
<source><![CDATA[Online Media &amp; Society]]></source>
<year>2024</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-11</page-range></nlm-citation>
</ref>
<ref id="B62">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Taylor]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Parker]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Brown]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Emotional regulation in digital spaces: A framework for understanding cyberbullying]]></article-title>
<source><![CDATA[Journal of Cyberpsychology]]></source>
<year>2022</year>
<volume>12</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>201-15</page-range></nlm-citation>
</ref>
<ref id="B63">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Thompson]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Dennison]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Defining relational stalking in research: Understanding sample composition in relation to repetition and duration of harassment]]></article-title>
<source><![CDATA[Psychiatry, Psychology and Law]]></source>
<year>2008</year>
<page-range>482-99</page-range></nlm-citation>
</ref>
<ref id="B64">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tokunaga]]></surname>
<given-names><![CDATA[R. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Rains]]></surname>
<given-names><![CDATA[S. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyberstalking victimization: Impact on mental and physical health, victim blaming, and help-seeking behaviors]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2019</year>
<volume>34</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>249-69</page-range></nlm-citation>
</ref>
<ref id="B65">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Villanueva-Blasco]]></surname>
<given-names><![CDATA[V. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Belda-Ferri]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Rial-Boubeta]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Problematic Internet use and online risk behaviors in adults from Latin America]]></article-title>
<source><![CDATA[Behavioral Psychology]]></source>
<year>2024</year>
<volume>32</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>487-502</page-range></nlm-citation>
</ref>
<ref id="B66">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Walker]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Green]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Digital ecosystems: A systems approach to online behavior]]></article-title>
<source><![CDATA[Digital Society Research]]></source>
<year>2023</year>
<volume>9</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>101-20</page-range></nlm-citation>
</ref>
<ref id="B67">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wilson]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Sheridan]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Garratt-Reed]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[What is Cyberstalking? A review of measurements]]></article-title>
<source><![CDATA[Journal of Interpersonal Violence]]></source>
<year>2021</year>
<volume>37</volume>
<numero>11-12</numero>
<issue>11-12</issue>
</nlm-citation>
</ref>
<ref id="B68">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wolak]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Finkelhor]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[K. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ybarra]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Online &#8220;predators&#8221; and their victims: myths, realities, and implications for prevention and treatment]]></article-title>
<source><![CDATA[American Psychologist]]></source>
<year>2008</year>
<volume>63</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>111</page-range></nlm-citation>
</ref>
<ref id="B69">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yosep]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Mardhiyah]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Kurniawan]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Maulana]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The relationship between emotional intelligence and bullying in adolescents: A scoping review]]></article-title>
<source><![CDATA[OBM Neurobiology]]></source>
<year>2024</year>
<volume>8</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>251</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
