<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1688-4221</journal-id>
<journal-title><![CDATA[Ciencias Psicológicas]]></journal-title>
<abbrev-journal-title><![CDATA[Cienc. Psicol.]]></abbrev-journal-title>
<issn>1688-4221</issn>
<publisher>
<publisher-name><![CDATA[Universidad Católica del Uruguay.]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1688-42212021000101208</article-id>
<article-id pub-id-type="doi">10.22235/cp.v15i1.2397</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Grooming online, sexting y problemas emocionales en adolescentes argentinos]]></article-title>
<article-title xml:lang="pt"><![CDATA[Grooming online, sexting e problemas emocionais em adolescentes argentinos]]></article-title>
<article-title xml:lang="en"><![CDATA[Grooming online, sexting and emotional problems in Argentinean adolescents]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Resett]]></surname>
<given-names><![CDATA[Santiago]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Católica Argentina  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Argentina</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2021</year>
</pub-date>
<volume>15</volume>
<numero>1</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.edu.uy/scielo.php?script=sci_arttext&amp;pid=S1688-42212021000101208&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.edu.uy/scielo.php?script=sci_abstract&amp;pid=S1688-42212021000101208&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.edu.uy/scielo.php?script=sci_pdf&amp;pid=S1688-42212021000101208&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: El grooming online hacia niños y adolescentes es una problemática de suma gravedad. El objetivo de esta investigación fue medir los niveles de grooming online padecido y si el género, la edad, el sexting y los problemas emocionales eran predictores de dicha conducta. Se constituyó una muestra intencional de 727 adolescentes entre 12 y 16 años (59% mujeres) de dos escuelas privadas de la ciudad de Paraná, Argentina. Se detectó un 20% de casos de grooming, con 17% recibiendo solicitaciones por parte de adultos y un 12% de interacciones con adultos. Más varones que mujeres sufrían de grooming -aunque marginalmente- e interacciones. También a mayor edad de los adolescentes se incrementaba linealmente el grooming, las solicitaciones e interacciones. Se observó que se predecía una varianza del 23% para el grooming, de 22% para solicitudes y 23% para interacciones, con la edad, la depresión y el sexting como los predictores significativos. Los resultados indicarían que esta problemática presenta porcentajes alarmantes en dicha población.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[Resumo: O grooming online para crianças e adolescentes é um problema muito grave. O objetivo desta pesquisa foi medir os níveis de grooming online sofridos e se o gênero, a idade, o sexting e os problemas emocionais eram preditores de tal comportamento. Foi constituída uma amostra intencional de 727 adolescentes de 12 a 16 anos (59% mulheres) de duas escolas particulares da cidade do Paraná, Argentina. Foram detectados 20% de casos de grooming, com 17% recebendo solicitações de adultos e 12% de interações com adultos. Mais homens do que mulheres sofreram grooming - embora marginalmente - e interações. Além disso, com o aumento da idade dos adolescentes se incrementaram linearmente o grooming, as solicitações e as interações. Observou-se que o resultado previa uma variância de 23% para grooming, 22% para solicitações e 23% para interações, com a idade, a depressão e o sexting como preditores significativos. Os resultados indicam que este problema apresenta percentuais alarmantes na referida população.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: Online grooming towards children and adolescents is a very serious problem. Thus, the objective of this research was to measure levels of online Grooming suffered and if gender, age, sexting and emotional problems (depression and anxiety) were predictors of such behavior. An intentional sample of 727 adolescents between 12 and 16 years old (59% women) was constituted from two private schools in the city of Paraná, Argentina. 20% of grooming cases were detected - at least once in the last year -, with 17% receiving solicitations by adults and 12% interactions. More men than women suffered from grooming -albeit marginally- and interactions. Besides, at older teenagers, grooming, requests and interactions increased linearly. From hierarchical regressions it was observed that a variance of 23% was predicted for grooming, 22% for requests and 23% for interactions, with age, depression and sexting being significant predictors. These results would indicate that this problem presents alarming percentages in said population.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[grooming]]></kwd>
<kwd lng="es"><![CDATA[sexting]]></kwd>
<kwd lng="es"><![CDATA[problemas emocionales]]></kwd>
<kwd lng="es"><![CDATA[género]]></kwd>
<kwd lng="es"><![CDATA[edad]]></kwd>
<kwd lng="pt"><![CDATA[grooming]]></kwd>
<kwd lng="pt"><![CDATA[sexting]]></kwd>
<kwd lng="pt"><![CDATA[problemas emocionais]]></kwd>
<kwd lng="pt"><![CDATA[gênero]]></kwd>
<kwd lng="pt"><![CDATA[idade]]></kwd>
<kwd lng="en"><![CDATA[grooming]]></kwd>
<kwd lng="en"><![CDATA[sexting]]></kwd>
<kwd lng="en"><![CDATA[emotional problems]]></kwd>
<kwd lng="en"><![CDATA[gender]]></kwd>
<kwd lng="en"><![CDATA[age]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Agustina]]></surname>
<given-names><![CDATA[J. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Gómez-Durán]]></surname>
<given-names><![CDATA[E. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sexting: Research criteria of a globalized social phenomenon]]></article-title>
<source><![CDATA[Archives of Sexual Behavior]]></source>
<year>2012</year>
<volume>41</volume>
<page-range>1325-8</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arnett]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Adolescence and Emerging Adulthood. A cultural approach]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Nueva Jersey ]]></publisher-loc>
<publisher-name><![CDATA[Prentice Hall]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barrense-Dias]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Berchtold]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Surís]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Akre]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sexting and the Definition Issue]]></article-title>
<source><![CDATA[Journal of Adolescent Health]]></source>
<year>2018</year>
<volume>61</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>544-54</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baumgartner]]></surname>
<given-names><![CDATA[S. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Valkenburg]]></surname>
<given-names><![CDATA[P.M.]]></given-names>
</name>
<name>
<surname><![CDATA[Peter]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Unwanted online solicitation and risky sexual online behavior across the lifespan]]></article-title>
<source><![CDATA[Journal of Applied Developmental Psychology]]></source>
<year>2010</year>
<volume>31</volume>
<page-range>439-47</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Benotsch]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Snipes]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Martin]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bull]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sexting, Substance Use, and Sexual Risk Behavior in Young Adults]]></article-title>
<source><![CDATA[The Journal of Adolescent Health: official publication of the Society for Adolescent Medicine]]></source>
<year>2012</year>
<volume>52</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>307-13</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bergen]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Davidson]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Schulz]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Schuhmann]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Johansson]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Santtila]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Jern]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The effects of using identity deception and suggesting secrecy on the outcomes of adult-adult and adult-child or-adolescent online sexual interactions]]></article-title>
<source><![CDATA[Victims &amp; Offenders]]></source>
<year>2014</year>
<volume>9</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>276-98</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cohen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Quantitative methods in psychology: A power primer]]></article-title>
<source><![CDATA[Psychological Bulletin]]></source>
<year>1992</year>
<volume>112</volume>
<page-range>155-9</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cooper]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Quayle]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Jonsson]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Svedin]]></surname>
<given-names><![CDATA[C. G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Adolescents and self-taken sexual images: A review of the literature]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2016</year>
<volume>55</volume>
<page-range>706-16</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Crimmins]]></surname>
<given-names><![CDATA[D. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Siegfried-Spellar]]></surname>
<given-names><![CDATA[K.C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Peer attachment, sexual experiences, and risky online behaviors as predictors of sexting behaviors among undergraduate students]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2014</year>
<volume>32</volume>
<page-range>268-75</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[De Santisteban]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Estrategias de persuasión en grooming online de menores: un análisis cualitativo con agresores en prisión]]></article-title>
<source><![CDATA[Psychosocial Intervention]]></source>
<year>2017</year>
<volume>26</volume>
<page-range>139-46</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Döring]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Consensual sexting among adolescents: Risk prevention through abstinence education or safer sexting]]></article-title>
<source><![CDATA[Cyberpsychology]]></source>
<year>2014</year>
<volume>8</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-18</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Facio]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Resett]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Argentina]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Arnett]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Adolescent Psychology around the World]]></source>
<year>2012</year>
<page-range>151-62</page-range><publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Psychological Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Facio]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Resett]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Mistrorigo]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Micocci]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[Los adolescentes argentinos. Cómo piensan y sienten]]></source>
<year>2006</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[Editorial Lugar]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="book">
<collab>Fondo de las Naciones Unidas para la Infancia UNICEF</collab>
<source><![CDATA[Los y las adolescentes. Su percepción sobre la seguridad online]]></source>
<year>2020</year>
<publisher-loc><![CDATA[Buenos Aires ]]></publisher-loc>
<publisher-name><![CDATA[UNICEF]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<collab>Fundación Telefónica</collab>
<source><![CDATA[La generación interactiva en Iberoamérica]]></source>
<year>2008</year>
<publisher-loc><![CDATA[Barcelona ]]></publisher-loc>
<publisher-name><![CDATA[Ariel]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Escuela de padres 3.0. Guía para educar a los niños en el uso positivo de Internet]]></source>
<year>2017</year>
<publisher-loc><![CDATA[Madrid ]]></publisher-loc>
<publisher-name><![CDATA[Pirámide]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Almendros]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Borrajo]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Calvete]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Prevalence and Association of Sexting and Online Sexual Victimization Among Spanish Adults]]></article-title>
<source><![CDATA[Sexuality Research and Social Policy]]></source>
<year>2015</year>
<volume>12</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>145-54</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Almendros]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Calvete]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[De Santisteban]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Persuasion strategies and sexual solicitations and interactions in online sexual grooming of adolescents: Modeling direct and indirect pathways]]></article-title>
<source><![CDATA[Journal of Adolescence]]></source>
<year>2018</year>
<volume>63</volume>
<page-range>11-8</page-range></nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[De Santisteban]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Alcazar]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The construction and psychometric properties of the questionnaire for online sexual solicitation and interaction of minors with adults]]></article-title>
<source><![CDATA[Sexual Abuse: A Journal of Research and Treatment]]></source>
<year>2017</year>
<volume>30</volume>
<numero>8</numero>
<issue>8</issue>
<page-range>1-17</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[De Santisteban]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Resett]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sexting among Spanish adolescents: Prevalence and personality profiles]]></article-title>
<source><![CDATA[Psicothema]]></source>
<year>2017</year>
<volume>29</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>29-34</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gámez-Guadix]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Mateo-Pérez]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Longitudinal and reciprocal relationships between sexting, online sexual solicitations, and cyberbullying among minors]]></article-title>
<source><![CDATA[Computers in Human Behavior]]></source>
<year>2019</year>
<volume>94</volume>
<page-range>70-6</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Howell]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Statistical method for psychology]]></source>
<year>2007</year>
<publisher-loc><![CDATA[Belmont, CA ]]></publisher-loc>
<publisher-name><![CDATA[Thomson Wadsworth]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jones]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[K. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Finkelhor]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Trends in youth Internet victimization: Findings from three youth Internet safety surveys 2000-2010]]></article-title>
<source><![CDATA[Journal of Adolescent Health]]></source>
<year>2012</year>
<volume>50</volume>
<page-range>179-86</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kline]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Principles and practice of structural equation modeling]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[Guilford]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kloess]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Beech]]></surname>
<given-names><![CDATA[A. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Harkins]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Online child sexual exploitation prevalence, process, and offender characteristics]]></article-title>
<source><![CDATA[Trauma, Violence, &amp; Abuse]]></source>
<year>2014</year>
<volume>15</volume>
<page-range>126-39</page-range></nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kovacs]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Children&#8217;s Depression Inventory Manual]]></source>
<year>1992</year>
<publisher-loc><![CDATA[North Tonawanda ]]></publisher-loc>
<publisher-name><![CDATA[Multi-Health Systems]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Livingstone]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Olafsson]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Staksrud]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[EU Kids online: Social networking, age and privacy]]></source>
<year>2011</year>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Machimbarrena]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Calvete]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Fernández-González]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Álvarez-Bardón]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Álvarez-Fernández]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[González-Cabrera]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Internet Risks: An Overview of Victimization in Cyberbullying, Cyber Dating Abuse, Sexting, Online Grooming and Problematic Internet Use]]></article-title>
<source><![CDATA[International Journal of Environmental Research and Public Health]]></source>
<year>2018</year>
<volume>15</volume>
<page-range>1-15</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Manlove]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Terry-Humen]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Ikramullah]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Young teenagers and older sexual partners: Correlates and consequences for males and females]]></article-title>
<source><![CDATA[Perspectives on Sexual and Reproductive Health]]></source>
<year>2006</year>
<volume>38</volume>
<page-range>197-207</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McRae]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Gross]]></surname>
<given-names><![CDATA[J. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Weber]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Robertson]]></surname>
<given-names><![CDATA[E. R.]]></given-names>
</name>
<name>
<surname><![CDATA[Sokol-Hessner]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Ray]]></surname>
<given-names><![CDATA[R. D.]]></given-names>
</name>
<name>
<surname><![CDATA[Gabrieli]]></surname>
<given-names><![CDATA[J. D. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Ochsner]]></surname>
<given-names><![CDATA[K. N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The development of emotion regulation: An fMRI study of cognitive reappraisal in children, adolescents and young adults]]></article-title>
<source><![CDATA[Social Cognitive and Affective Neuroscience]]></source>
<year>2012</year>
<volume>7</volume>
<page-range>11-22</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[K. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Finkelhor]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Jones]]></surname>
<given-names><![CDATA[L. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Wolak]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Prevalence and characteristics of youth sexting: a national study]]></article-title>
<source><![CDATA[Pediatrics]]></source>
<year>2012</year>
<volume>129</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>13-20</page-range></nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[K. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Finkelhor]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Wolak]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Youth Internet users at risk for the most serious online sexual solicitations]]></article-title>
<source><![CDATA[American Journal of Preventive Medicine]]></source>
<year>2007</year>
<volume>32</volume>
<page-range>532-7</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[K. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wolak]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Finkelhor]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Are blogs putting youth at risk for online sexual solicitation or harassment?]]></article-title>
<source><![CDATA[Child Abuse &amp; Neglect]]></source>
<year>2008</year>
<volume>32</volume>
<page-range>277-94</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Montiel]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Carbonell]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Pereda]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Multiple online victimization of Spanish adolescents: Results from a community sample]]></article-title>
<source><![CDATA[Child Abuse &amp; Neglect]]></source>
<year>2016</year>
<volume>52</volume>
<page-range>123-34</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Morelli]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bianchi]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Baiocco]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Pezzuti]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Chirumbolo]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sexting, psychological distress and dating violence among adolescents and young adults]]></article-title>
<source><![CDATA[Psicothema]]></source>
<year>2016</year>
<volume>28</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>137-42</page-range></nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Paolucci]]></surname>
<given-names><![CDATA[E.O.]]></given-names>
</name>
<name>
<surname><![CDATA[Genuis]]></surname>
<given-names><![CDATA[M.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Violato]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A meta-analysis of the published research on the effects of child sexual abuse]]></article-title>
<source><![CDATA[Journal of Psychology]]></source>
<year>2001</year>
<volume>135</volume>
<page-range>17-36</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Quesada]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Fernández-González]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Calvete]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sexting en la Adolescencia: Prevalencia y Asociación con la Victimización de Acoso Online y Violencia en el Noviazgo]]></article-title>
<source><![CDATA[Psicología Conductual]]></source>
<year>2018</year>
<volume>26</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>225-42</page-range></nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Resett]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Análisis psicométrico del Cuestionario de Solicitación e Interacciones Sexuales en Menores]]></source>
<year>2019</year>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reyns]]></surname>
<given-names><![CDATA[B.W.]]></given-names>
</name>
<name>
<surname><![CDATA[Burek]]></surname>
<given-names><![CDATA[M.W.]]></given-names>
</name>
<name>
<surname><![CDATA[Henson]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Fisher]]></surname>
<given-names><![CDATA[B.S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The unintended consequences of digital technology: Exploring the relationship between sexting and cybervictimization]]></article-title>
<source><![CDATA[Journal of Crime and Justice]]></source>
<year>2013</year>
<volume>36</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-17</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ricketts]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Maloney]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Marcum]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Higgins]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Effect of Internet Related Problems on the Sexting Behaviors of Juveniles]]></article-title>
<source><![CDATA[American Journal of Criminal Justice]]></source>
<year>2015</year>
<volume>40</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>270-84</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rosenberg]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Society and the adolescent self-image]]></source>
<year>1965</year>
<publisher-loc><![CDATA[Princeton, NJ ]]></publisher-loc>
<publisher-name><![CDATA[Princeton University Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sainani]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Dealing with non-normal data]]></article-title>
<source><![CDATA[PM&amp;R]]></source>
<year>2012</year>
<volume>4</volume>
<numero>12</numero>
<issue>12</issue>
<page-range>1001-5</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Smith]]></surname>
<given-names><![CDATA[P. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Thompson]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Davidson]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Cyber safety for adolescent girls: Bullying, harassment, sexting, pornography, and solicitation]]></article-title>
<source><![CDATA[Current Opinion in Obstetrics and Gynecology]]></source>
<year>2014</year>
<volume>26</volume>
<page-range>360-5</page-range></nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Steinberg]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Adolescence]]></source>
<year>2010</year>
<publisher-loc><![CDATA[Nueva York ]]></publisher-loc>
<publisher-name><![CDATA[McGraw Hill]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tabachnick]]></surname>
<given-names><![CDATA[B. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Fidell]]></surname>
<given-names><![CDATA[L. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Using multivariate statistics]]></source>
<year>2014</year>
<publisher-loc><![CDATA[Massachusetts ]]></publisher-loc>
<publisher-name><![CDATA[Allyn &amp; Bacon/Pearson Education]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wachs]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Whittle]]></surname>
<given-names><![CDATA[H.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hamilton-Giachritsis]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Wolf]]></surname>
<given-names><![CDATA[K.D.]]></given-names>
</name>
<name>
<surname><![CDATA[Vazsonyi]]></surname>
<given-names><![CDATA[A.T.]]></given-names>
</name>
<name>
<surname><![CDATA[Junger]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Correlates of mono-and dual-victims of cybergrooming and cyberbullying: Evidence from four countries]]></article-title>
<source><![CDATA[Cyberpsychology, Behavior, and Social Networking]]></source>
<year>2017</year>
<volume>21</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>91-8</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Walker]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sanci]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Temple-Smith]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sexting: Young women's and men's views on its nature and origins]]></article-title>
<source><![CDATA[Journal of Adolescent Health]]></source>
<year>2013</year>
<volume>52</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>697-701</page-range></nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wolak]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Finkelhor]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[K. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Ybarra]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Online &#8220;predators&#8221; and their victims: Myths, realities, and implications for prevention and treatment]]></article-title>
<source><![CDATA[Psychology of Violence]]></source>
<year>2010</year>
<volume>1</volume>
<page-range>13-35</page-range></nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wurtele]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Kenny]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Technology-Related Sexual Solicitation of Adolescents: A Review of Prevention Efforts]]></article-title>
<source><![CDATA[Child Abuse Review]]></source>
<year>2016</year>
<volume>25</volume>
<page-range>332-44</page-range></nlm-citation>
</ref>
<ref id="B50">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ybarra]]></surname>
<given-names><![CDATA[M.L.]]></given-names>
</name>
<name>
<surname><![CDATA[Leaf]]></surname>
<given-names><![CDATA[P.J.]]></given-names>
</name>
<name>
<surname><![CDATA[Diener-West]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Sex Differences in Youth-Reported Depressive Symptomatology and Unwanted Internet Sexual Solicitation]]></article-title>
<source><![CDATA[Journal of Medical Internet Research]]></source>
<year>2004</year>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>5</page-range></nlm-citation>
</ref>
<ref id="B51">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ybarra]]></surname>
<given-names><![CDATA[M. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Mitchell]]></surname>
<given-names><![CDATA[K.J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[How risky are social networking sites? A comparison of places online where youth sexual solicitation and harassment occur us]]></article-title>
<source><![CDATA[Pediatrics]]></source>
<year>2008</year>
<volume>121</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>350-7</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
