<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JFR</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Form Res</journal-id>
      <journal-title>JMIR Formative Research</journal-title>
      <issn pub-type="epub">2561-326X</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v5i10e32382</article-id>
      <article-id pub-id-type="pmid">34582355</article-id>
      <article-id pub-id-type="doi">10.2196/32382</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Original Paper</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Original Paper</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Usability of a Technology-Based Bystander Bullying Intervention for Middle School Students in Rural, Low-Income Communities: Mixed Methods Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Nitsch</surname>
            <given-names>Martina</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Doumas</surname>
            <given-names>Diana M</given-names>
          </name>
          <degrees>DPhil</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>Institute for the Study of Behavioral Health and Addiction</institution>
            <institution>Boise State Universtiy</institution>
            <addr-line>1910 University Drive</addr-line>
            <addr-line>Boise, ID, 83702</addr-line>
            <country>United States</country>
            <phone>1 2084261219</phone>
            <email>dianadoumas@boisestate.edu</email>
          </address>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-0714-4723</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Midgett</surname>
            <given-names>Aida</given-names>
          </name>
          <degrees>EdD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-0090-0418</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author">
          <name name-style="western">
            <surname>Myers</surname>
            <given-names>Valerie</given-names>
          </name>
          <degrees>DPhil</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-0549-0320</ext-link>
        </contrib>
        <contrib id="contrib4" contrib-type="author">
          <name name-style="western">
            <surname>Buller</surname>
            <given-names>Mary Klein</given-names>
          </name>
          <degrees>MA</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0003-1996-2018</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Institute for the Study of Behavioral Health and Addiction</institution>
        <institution>Boise State Universtiy</institution>
        <addr-line>Boise, ID</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Department of Counselor Education</institution>
        <institution>Boise State University</institution>
        <addr-line>Boise, ID</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff3">
        <label>3</label>
        <institution>Klein Buendel</institution>
        <addr-line>Golden, CO</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Diana M Doumas <email>dianadoumas@boisestate.edu</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>10</month>
        <year>2021</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>26</day>
        <month>10</month>
        <year>2021</year>
      </pub-date>
      <volume>5</volume>
      <issue>10</issue>
      <elocation-id>e32382</elocation-id>
      <history>
        <date date-type="received">
          <day>13</day>
          <month>8</month>
          <year>2021</year>
        </date>
        <date date-type="rev-request">
          <day>17</day>
          <month>9</month>
          <year>2021</year>
        </date>
        <date date-type="rev-recd">
          <day>22</day>
          <month>9</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>26</day>
          <month>9</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Diana M Doumas, Aida Midgett, Valerie Myers, Mary Klein Buller. Originally published in JMIR Formative Research (https://formative.jmir.org), 26.10.2021.</copyright-statement>
      <copyright-year>2021</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Formative Research, is properly cited. The complete bibliographic information, a link to the original publication on https://formative.jmir.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://formative.jmir.org/2021/10/e32382" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>Students who are targets of bullying and who witness bullying are at high risk for negative mental health outcomes. Bystander training is essential to reduce bullying and the negative associated consequences for targets and bystanders. Resources necessary for program delivery, however, pose significant barriers for schools, particularly those in rural, low-income communities. Technology-based programs can reduce health disparities for students in these communities through cost-effective, easy-to-disseminate programming.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>The aim of this study is to conduct usability testing of a bystander bullying web app prototype, STAC-T (technology-based STAC, which stands for the 4 bystander strategies Stealing the Show, Turning it Over, Accompanying Others, and Coaching Compassion) as an initial step in the development of a full-scale STAC-T intervention. Objectives include assessing usability and acceptability of the STAC-T prototype, understanding school needs and barriers to program implementation, and assessing differences in usability between school personnel and students.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>A sample of 16 participants, including school personnel and students recruited from 3 middle schools in rural, low-income communities, completed usability testing followed by a qualitative interview. Descriptive statistics, 2-tailed independent sample <italic>t</italic> tests, and consensual qualitative research were used to assess usability and program satisfaction and to extract themes related to acceptability, feasibility, needs, barriers, and feedback for intervention development.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Usability testing indicated that the app was easy to use, acceptable, and feasible. Both school personnel (mean rating 89.6, SD 5.1) and students (mean rating 91.8, SD 7.0) rated the app well above the standard cutoff score for above-average usability (ie, 68), and both school personnel (mean rating 5.83, SD 0.41) and students (mean rating 6.10, SD 0.57) gave the app high user-friendliness ratings (0-7 scale, with 7 as high user-friendliness). The overall ratings also suggested that school personnel and students were satisfied with the program. Of the 6 school personnel who said they would recommend the program, 1 (17%), 4 (66%), and 1 (17%) rated the program as 3, 4, and 5 stars, respectively; 80% (8/10) of students said they would recommend the program; and 60% (6/10) and 40% (4/10) rated the program as 4 stars and 5 stars, respectively. Qualitative data revealed that school personnel and students found the STAC-T app to be useful, user-friendly, and relevant, while providing feedback related to the importance of digital learning activities that engage the user. Data from school personnel also indicated positive perceptions regarding program feasibility and probability of program adoption, with the most significant barrier being cost, suggesting the importance of considering the financial resources available to schools in rural, low-income communities when setting the price point for the full-scale STAC-T intervention.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>This study provides support for the full-scale development of the STAC-T app and provides key information for revision to enhance used engagement.</p>
        </sec>
        <sec sec-type="Trial Registration">
          <title>Trial Registration</title>
          <p>ClinicalTrials.gov NCT04681495; https://clinicaltrials.gov/ct2/show/NCT04681495</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>technology-based bullying intervention</kwd>
        <kwd>STAC-T</kwd>
        <kwd>usability testing</kwd>
        <kwd>middle school</kwd>
        <kwd>rural</kwd>
        <kwd>low-income</kwd>
        <kwd>mobile phone</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Bullying is a national public health issue in the United States, with 20.2% of students aged 12 to 18 years reporting being bullied at school and 15.3% reporting being cyberbullied in the previous year [<xref ref-type="bibr" rid="ref1">1</xref>]. Both bullying and cyberbullying peak in middle school, with 28% of students reporting being a target of school bullying, and 33% reporting being cyberbullied [<xref ref-type="bibr" rid="ref2">2</xref>]. Among middle school students, bullying victimization is associated with a variety of mental health problems, including somatic symptoms [<xref ref-type="bibr" rid="ref3">3</xref>-<xref ref-type="bibr" rid="ref7">7</xref>], anxiety [<xref ref-type="bibr" rid="ref6">6</xref>-<xref ref-type="bibr" rid="ref8">8</xref>], social anxiety [<xref ref-type="bibr" rid="ref9">9</xref>-<xref ref-type="bibr" rid="ref11">11</xref>], depression [<xref ref-type="bibr" rid="ref5">5</xref>-<xref ref-type="bibr" rid="ref9">9</xref>], suicidal ideation, and suicide attempts [<xref ref-type="bibr" rid="ref8">8</xref>]. Similarly, being a target of cyberbullying is associated with internalizing symptoms and suicidal ideation [<xref ref-type="bibr" rid="ref12">12</xref>-<xref ref-type="bibr" rid="ref14">14</xref>]. Thus, the development of effective interventions for middle school students is important for reducing bullying and its negative consequences.</p>
      </sec>
      <sec>
        <title>Youth in Rural and Low-Income Communities</title>
        <p>Youth in rural [<xref ref-type="bibr" rid="ref15">15</xref>-<xref ref-type="bibr" rid="ref17">17</xref>] and low-income [<xref ref-type="bibr" rid="ref18">18</xref>-<xref ref-type="bibr" rid="ref20">20</xref>] communities are particularly vulnerable to school bullying and cyberbullying. US national data indicate a higher prevalence of school bullying victimization among students in rural areas (23.8%) compared with students in urban areas (19.9%) [<xref ref-type="bibr" rid="ref1">1</xref>]. Furthermore, students in rural areas are 3% to 5% more likely to report bullying their peers [<xref ref-type="bibr" rid="ref17">17</xref>]. Students at the lowest income levels report the highest rates of bullying (21%-26.6%) compared with students at higher income levels (16.6%-19.8%) [<xref ref-type="bibr" rid="ref1">1</xref>]. Students from low-income households also report the highest rates of physical bullying, bullying-related injury, and cyberbullying, yet they are the least likely to report bullying to an adult [<xref ref-type="bibr" rid="ref1">1</xref>]. In addition, low-income students report the highest rates of consequences associated with bullying victimization, including negative effects on school work, relationships, feelings about oneself, and physical health [<xref ref-type="bibr" rid="ref1">1</xref>]. Among middle school students attending schools in rural, low-income communities, bullying victimization is associated with poor school relationships, negative school experiences [<xref ref-type="bibr" rid="ref19">19</xref>], and depression and anxiety [<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]. These data reveal significant mental health disparities for youth in rural and low-income communities.</p>
      </sec>
      <sec>
        <title>Bullying Bystanders</title>
        <p>Negative consequences are not only limited to targets of bullying but also extend to students who witness bullying [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref22">22</xref>] and cyberbullying [<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref26">26</xref>] as bystanders. Students who witness school bullying are at increased risk for mental health problems, including somatic symptoms [<xref ref-type="bibr" rid="ref7">7</xref>], sadness [<xref ref-type="bibr" rid="ref27">27</xref>], helplessness [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref27">27</xref>], isolation, guilt [<xref ref-type="bibr" rid="ref28">28</xref>], depression, anxiety [<xref ref-type="bibr" rid="ref7">7</xref>,<xref ref-type="bibr" rid="ref22">22</xref>], and suicidal ideation [<xref ref-type="bibr" rid="ref7">7</xref>]. Similarly, witnessing cyberbullying is associated with anxiety, depression [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref26">26</xref>], and somatic symptoms [<xref ref-type="bibr" rid="ref25">25</xref>], even when controlling for the effects of witnessing school bullying [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>]. In addition, bystanders who intervene in bullying situations experience higher rates of anxiety and depressive symptoms than students who remain passive [<xref ref-type="bibr" rid="ref29">29</xref>,<xref ref-type="bibr" rid="ref30">30</xref>], possibly owing to using maladaptive behaviors to defend targets [<xref ref-type="bibr" rid="ref30">30</xref>]. Research indicates 80% of students report witnessing bullying [<xref ref-type="bibr" rid="ref7">7</xref>] and more than 50% witnessing cyberbullying [<xref ref-type="bibr" rid="ref31">31</xref>]. Therefore, developing interventions to teach student bystanders how to appropriately intervene is important, as most students are bullying bystanders.</p>
      </sec>
      <sec>
        <title>School-Based Bullying Interventions</title>
        <p>Results from a recent meta-analysis indicate that training student bystanders to intervene as <italic>defenders</italic> is an important component of comprehensive school-based bullying programs [<xref ref-type="bibr" rid="ref32">32</xref>]. Although up to 80% of students report witnessing bullying [<xref ref-type="bibr" rid="ref7">7</xref>], only 20% to 30% intervene [<xref ref-type="bibr" rid="ref33">33</xref>]; for cyberbullying, as few as 10% may intervene [<xref ref-type="bibr" rid="ref34">34</xref>]. Researchers have demonstrated that when bystanders are trained to act, it not only reduces school bullying but also leads to improved mental health in bystanders [<xref ref-type="bibr" rid="ref35">35</xref>-<xref ref-type="bibr" rid="ref39">39</xref>]. Bystander disapproval of cyberbullying acts can also effectively limit its prevalence [<xref ref-type="bibr" rid="ref40">40</xref>]. Furthermore, self-efficacy for defending is positively related to intervening in both bullying [<xref ref-type="bibr" rid="ref41">41</xref>] and cyberbullying [<xref ref-type="bibr" rid="ref42">42</xref>]; however, few comprehensive, school-based programs incorporate bystander training.</p>
        <p>In addition, there are several barriers to implementing school-based bullying prevention. Available interventions require substantial resources, including demands on teachers, limited access to training, lack of funding, and few school mental health professionals [<xref ref-type="bibr" rid="ref43">43</xref>], reducing access and posing significant barriers to implementation. Rural, low-income communities face economic disparities, creating further obstacles to implementing these programs [<xref ref-type="bibr" rid="ref44">44</xref>]. These barriers include a lower tax base for funding programs, training costs inflated by transportation needs related to bringing in expert trainers, frequent staff turnover with limited resources to reestablish expertise, school closures, staff overload and burnout, and lack of program advocates and local expertise in bullying prevention [<xref ref-type="bibr" rid="ref16">16</xref>]. Therefore, brief programs that focus on bystander training and reduce barriers for implementation are needed to reduce bullying and its negative consequences among middle school students in rural and low-income communities.</p>
      </sec>
      <sec>
        <title>Technology-Based Interventions</title>
        <p>National data in the United States indicate that the number 1 barrier to implementing educational technology is that school districts do not have the funding [<xref ref-type="bibr" rid="ref45">45</xref>]. Technology-based interventions may be one way to increase access and reduce implementation challenges specific to rural and low-income communities [<xref ref-type="bibr" rid="ref16">16</xref>]. Computer access and internet connectivity in middle school is high; 86% of students have computers in school [<xref ref-type="bibr" rid="ref46">46</xref>], and only 6% of schools do not meet federal connectivity marks for broadband capacity [<xref ref-type="bibr" rid="ref47">47</xref>]. Notably, low-income students have similar access to school computers compared with middle to high income peers [<xref ref-type="bibr" rid="ref46">46</xref>]. Some rural areas have higher rates of poor internet connectivity; however, to assist in reducing this disparity, eligible rural and low-income schools receive discounts ranging from 20% to 90% for telecommunications services, including internet access and broadband services through the Telecommunications Act of 1996 [<xref ref-type="bibr" rid="ref48">48</xref>]. Grants are also available through the US Department of Agriculture to build broadband infrastructure in rural areas [<xref ref-type="bibr" rid="ref49">49</xref>], and more recently, the US Department of Education for discounted internet service for low-income households [<xref ref-type="bibr" rid="ref50">50</xref>]. Thus, most students in rural, low-income communities have access to the infrastructure needed for technology-based programs.</p>
      </sec>
      <sec>
        <title>The STAC Intervention</title>
        <p>STAC, which stands for the 4 bystander strategies Stealing the Show, Turning it Over, Accompanying Others, and Coaching Compassion, [<xref ref-type="bibr" rid="ref51">51</xref>] is a brief, stand-alone bystander intervention developed to reduce barriers to program implementation for middle school students. STAC was originally designed as a 90-minute in-person intervention, including didactic and experiential role-play components, as well as 2 booster sessions. The didactic training includes education about bullying and cyberbullying, consequences of bullying, bystander roles, and a description of the 4 STAC strategies: (1) <italic>stealing the show</italic>—using humor or distraction to interrupt the bullying situation, removing the attention away from the target; (2) <italic>turning it over</italic>—informing an adult about the bullying and asking for help; (3) <italic>accompanying others</italic>—befriending or providing supporting the targeted student; and (4) <italic>coaching compassion</italic>—gently confronting the perpetrator to increase empathy for target. The experiential component includes role-plays in which students practice using the STAC strategies in hypothetical bullying situations. Students also participate in 2 biweekly 15-minute booster sessions to reinforce their skill acquisition. Research indicates that the STAC intervention is effective in reducing bullying [<xref ref-type="bibr" rid="ref52">52</xref>,<xref ref-type="bibr" rid="ref53">53</xref>] and negative mental health outcomes for bystanders [<xref ref-type="bibr" rid="ref35">35</xref>-<xref ref-type="bibr" rid="ref39">39</xref>]. Researchers have also adapted the STAC intervention to be culturally appropriate for middle school students in rural, low-income communities [<xref ref-type="bibr" rid="ref54">54</xref>-<xref ref-type="bibr" rid="ref56">56</xref>] with similar positive effects on bullying reduction [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref57">57</xref>] and improved mental health [<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref58">58</xref>].</p>
      </sec>
      <sec>
        <title>Need for a Technology-Based STAC Intervention</title>
        <p>Most bullying programs are comprehensive school-wide interventions that require significant resources, creating implementation barriers for schools. Although the STAC intervention reduces some of these barriers, in-person interventions pose implementation challenges, particularly for schools in rural, low-income communities. To increase access for these schools, we propose to translate the STAC intervention into a technology-based format. As a first step, we conducted a needs assessment with the goal of understanding needs and perceived program implementation challenges for schools in rural, low-income communities to provide information on how to best serve students in these schools [<xref ref-type="bibr" rid="ref59">59</xref>]. Findings from interviews and focus groups with key school personnel (ie, administrators, teachers, and school counselors) from 3 middle schools in rural, low-income communities indicated a strong interest in a technology-based bullying intervention. Participants also described positive conditions for implementation, including support from the administration and technology readiness of their schools. Participants identified implementation challenges, such as time and financial resources. In addition, participants provided feedback related to translating the intervention into a technology-based format, including the importance of activities that require user input to increase user engagement. Overall, the findings supported the need for the proposed technology-based STAC (STAC-T) intervention and provided feedback on challenges that need to be addressed for successful adoption and sustained implementation in middle schools in rural, low-income communities.</p>
      </sec>
      <sec>
        <title>STAC-T Intervention</title>
        <p>The STAC-T web-based app is intended to shift program delivery from an in-person intervention to a technology-delivered intervention, thereby increasing accessibility and eliminating implementation barriers. STAC-T will also allow large groups of students to be trained simultaneously, accessed from a computer, tablet, or smartphone. The STAC-T app is designed to be a modular program that can be customized to meet the needs of individual schools. The app will allow students to customize their experience by selecting avatars and bullying scenarios. Assessment and personalized feedback components are also infused through the program to individualize the user experience to promote behavior change [<xref ref-type="bibr" rid="ref60">60</xref>,<xref ref-type="bibr" rid="ref61">61</xref>]. The innovative, user-centered design of the STAC-T app will be inherently sensitive to the cultural needs of students and identify personally appropriate strategies. The STAC-T app addresses both bullying and negative mental health outcomes for targets and bystanders through an evidence-based approach that is adapted for a broader audience and uses technology to effectively implement bullying prevention.</p>
        <p>The success of the STAC-T design can be evaluated through usability testing. Usability testing is an important step in the development of technology-based programs, providing information from end users on what works and gaps in how the program functions [<xref ref-type="bibr" rid="ref62">62</xref>], as well as the acceptability and relevance of program content. Usability ultimately affects the likelihood that the program will be adopted [<xref ref-type="bibr" rid="ref63">63</xref>] and thus is a critical component of technology-based intervention development [<xref ref-type="bibr" rid="ref64">64</xref>]. Assessing usability with school personnel and students is also important, as school personnel make decisions about program adoption [<xref ref-type="bibr" rid="ref65">65</xref>], and students, as end-users, need to understand and respond positively to the program to benefit from the content [<xref ref-type="bibr" rid="ref62">62</xref>,<xref ref-type="bibr" rid="ref66">66</xref>].</p>
      </sec>
      <sec>
        <title>Study Objectives</title>
        <p>This study aims to evaluate the usability and acceptability of the STAC-T prototype to inform full-scale development of the STAC-T intervention app. To achieve this aim, we implemented usability testing with key stakeholders (ie, school personnel and students) at 3 middle schools in rural, low-income communities (N=16). The study had the following objectives: (1) to assess the usability and acceptability of the STAC-T prototype, (2) to understand school needs for and barriers to program implementation, and (3) to assess the differences in usability between school personnel and students. We used a mixed-methods design to assess the usability and acceptability of the app prototype, as well as ways to improve the app, likelihood of program use, and potential implementation barriers.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Participants</title>
        <p>Participants were key school personnel (ie, administrators, teachers, and school counselors) and students were recruited from 3 middle schools in rural, low-income communities in the Northwest region of the United States. The schools were selected based on previous and ongoing research partnerships. The 3 schools were Title 1 schools, with 52.9% (339/641), 68.98% (725/1051), and 98.8% (663/671) of the student population at the 3 schools being below the poverty line. A total of 6 school personnel and 10 students were recruited. Among the school personnel, the age ranged from 28 to 59 years (mean 42.0 years, SD 10.8 years) and the majority were women (5/6, 83%) and White (6/6, 100%). For students, age ranged from 11 to 14 years (mean 12.2 years, SD 0.9 years), with 40% (4/10) in grade 6, 30% (3/10) in grade 7, and 30% (3/10) in grade 8, and the majority were girls (8/10, 80%) and White (7/10, 70%).</p>
      </sec>
      <sec>
        <title>Development of the STAC Prototype App</title>
        <p>We used a multitheoretical framework to guide prototype production. We translated the STAC in-person intervention into a technology framework guided by Persuasive System Design, a theoretical guide for translating clinical aims to health-related technology frameworks [<xref ref-type="bibr" rid="ref67">67</xref>-<xref ref-type="bibr" rid="ref69">69</xref>]. Instructional objectives and design of STAC-T were guided by the existing STAC intervention for rural and low-income students, and input from an expert advisory board, school personnel, and students. The STAC-T prototype was developed using AGILE programming, a collaborative and incremental programming methodology [<xref ref-type="bibr" rid="ref67">67</xref>-<xref ref-type="bibr" rid="ref69">69</xref>]. The prototype was functional on all web browsers that support HTML5 and was built on a full stack web application using HTML or JavaScript as the main interface. React.js was used as the front-end framework. The system was accessible on desktop computers, iOS, Android tablets, and smartphones. Design ideas were created in written form, combined with scripts, flowcharts, and storyboards, before creating actual images and authoring elements. Programmers produced the STAC-T prototype, alpha- and beta tested it in-house for stability and code errors, tested it for usability, and revised it following an iterative, agile production process.</p>
        <p>The initial prototype was created with clickable wireframes that showed the progression of content with still graphics (<xref rid="figure1" ref-type="fig">Figure 1</xref>). In addition to Persuasive System Design, User-centered Design [<xref ref-type="bibr" rid="ref70">70</xref>,<xref ref-type="bibr" rid="ref71">71</xref>], and the ADDIE (Analyze, Design, Develop, Implement, and Evaluate) model [<xref ref-type="bibr" rid="ref72">72</xref>-<xref ref-type="bibr" rid="ref74">74</xref>], we followed a user interface and instructional design approach to develop the STAC-T prototype. User input was solicited through iterative cycles, with adjustments made based on feedback [<xref ref-type="bibr" rid="ref75">75</xref>], resulting in enhanced user experience and more reliable and effective results [<xref ref-type="bibr" rid="ref76">76</xref>,<xref ref-type="bibr" rid="ref77">77</xref>]. Design elements such as space (colors and visual space), components (characters and objects), and mechanics (actions) were determined for program features (ie, activities and games). Consistent with research on mobile health strategies for adolescents [<xref ref-type="bibr" rid="ref78">78</xref>-<xref ref-type="bibr" rid="ref80">80</xref>], the program development approach emphasized gaming as a teaching strategy, and interactive components were the centerpiece of the STAC-T intervention. STAC strategy practice required students to select between 2 avatars, view a bullying event, select actions to operationalize the STAC strategy, view the avatar enacting the selected action, and receive feedback on its effectiveness. To reward learning and bolster adherence, <italic>badges</italic> (visual reward icons eg, <italic>Stealing the</italic> <italic>Show badge</italic>) were included for intermittent awards to encourage user engagement.</p>
        <p>The STAC prototype content comprised 3 overarching modules: (1) What is Bullying? Users were presented with background information on bullying, including bullying definitions (ie, physical, verbal, relationship, and cyberbullying), bullying facts and statistics, characteristics of students who bullied, and negative consequences of bullying; (2) What are Bystanders? Users were taught what a bystander is, and how bystanders affect bullying outcomes. This module explained the 4 bystander roles: (1) <italic>Assistants</italic>: those who intentionally help the bully; (2) <italic>Reinforcers</italic>: those who are not directly involved in hurting another student, but encourage the bully by standing around, laughing, or watching quietly; (3) <italic>Outsiders</italic>: those who do not take sides while witnessing bullying; and (4) <italic>Defenders</italic>: those who do something to stop the bullying situation or help the target in some way, and (3) STAC strategies: Users were introduced to 4 STAC strategies: (1) stealing the show, (2) turning it over, (3) accompanying others, and (4) coaching compassion. The module also included the STAC strategy practice using avatars selected by the user.</p>
        <p>Iterative focus groups (3 rounds) with middle school students (N=21; 14 girls and 7 boys) attending schools in rural, low-income communities informed prototype development. Groups ascertained whether the app concept was easily understood and engaging and identified essential features for a successful prototype. The first round (n=10) was conducted with students who had been trained in the in-person STAC intervention. The second (n=6) and third (n=5) rounds were conducted with students who were naive to the STAC program. Group 1 provided feedback on the translation of the in-person STAC program content to a technology-based format for prototype 1. Group 1 reported that the content was realistic, expressed interest in a web translation, and made suggestions for modifications for web translation that were incorporated into prototype 1. For group 2, prototype 1 was very well received; participants thought the content was useful, important, and understandable and were enthusiastic about using the program. Group 2 participants suggested more interactivity (eg, short clips, videos, thought bubbles, graphs, and cartoons) to increase engagement. Group 3 evaluated prototype 2, reporting that they liked the program content and ease of navigation. Participants liked the sketches and discussed changes to characters (eg, wear hoodies instead of clothes with buttons) and surroundings (eg, school bus looked too clean) to more closely match the middle school environment. Input from the focus groups informed the development of the final prototype used in this study<italic>.</italic></p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Samples from the STAC-T (technology-based Stealing the Show, Turning it Over, Accompanying Others, Coaching Compassion) prototype.</p>
          </caption>
          <graphic xlink:href="formative_v5i10e32382_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Procedures</title>
        <p>Participant recruitment and usability testing occurred during the spring of 2020. All research procedures were approved by the University Institutional Review Board and by the School District or Administration. The researchers provided the school counselor from each school with an email script describing the purpose and procedures of the study. School counselors were also provided with rubrics developed by the research team to identify key school personnel and students who demonstrated the following characteristics assessed by the rubric: school personnel: (1) caring for students, (2) desire to be a positive influence on school climate, (3) approachable to students, (4) caring about addressing the problem of bullying, and (5) leadership qualities; and students: (1) leadership, (2) maturity, (3) responsibility, (4) caring toward others, (5) influence, and (6) a desire to be a positive influence on peers. For each item, school personnel and students were assessed on a 3-point scale, which included the ratings of <italic>yes</italic> and <italic>somewhat</italic> to <italic>no</italic> for each item described above. School personnel and students who scored <italic>yes</italic> or <italic>somewhat</italic> on all inclusion criteria were eligible to participate. The school counselor used the rubric to identify and contact key school personnel and students and then used the script to invite them to participate in the study. Usability testing and interviews were conducted remotely. Researchers obtained informed consent for school personnel and parental consent and student assent for students and collected demographic information from participants immediately before usability testing.</p>
        <p>Participants interacted with the STAC prototype app by selecting an avatar and environment to tailor content and talked aloud while completing the tasks and identifying problems and solutions attempted. Researchers and users were on videoconference and shared screens. Researchers could see what participants were doing, and they were able to communicate with each other in real time. The researchers observed the users as they worked through the tasks and asked questions to gather more data. Participants were asked to complete a brief usability survey followed by a semistructured interview protocol. All participants were asked to provide information about their perceptions of (1) program utility, (2) relevance and appropriateness of program content, and (3) ways they would improve the program. School personnel were also asked about (1) their thoughts on implementation feasibility, (2) likelihood of school program adoption, and (3) barriers to program use. All individual interviews lasted for 1 hour and were audio-recorded. School personnel received a web-based US $50 Amazon gift card as an incentive for participation in the usability testing and individual interview. There were no incentives for student participants.</p>
      </sec>
      <sec>
        <title>Measures</title>
        <sec>
          <title>Demographics</title>
          <p>Participants self-reported their age, ethnicity, race, and gender. Students also reported their grade level.</p>
        </sec>
        <sec>
          <title>Usability</title>
          <p>Usability was assessed using the System Usability Scale (SUS) [<xref ref-type="bibr" rid="ref81">81</xref>]. The SUS is a widely used 10-item validated tool used to measure the usability and acceptability of technology-based programs. Responses were measured on a 5-point Likert scale ranging from 0 (<italic>strongly disagree</italic>) to 4 (<italic>strongly agree</italic>). Items were summed, and the total was multiplied by 2.5, creating an overall SUS score ranging from 0 to 100. An SUS score of ≥68 was considered above average [<xref ref-type="bibr" rid="ref82">82</xref>].</p>
        </sec>
        <sec>
          <title>User-friendliness</title>
          <p>One item was used to assess the user-friendliness of the program. Participants were asked to rate the user-friendliness with the question: <italic>Overall, I would rate the user-friendliness of this program as...</italic> with a 7-point scale ranging from 0 (<italic>worst imaginable</italic>) to 7 (<italic>best imaginable</italic>).</p>
        </sec>
        <sec>
          <title>Program Satisfaction</title>
          <p>Two items were used to assess the program satisfaction. Participants were asked the question, “Would you tell your friends/colleagues to use the program?” with response choices <italic>yes</italic>, <italic>no</italic>, and <italic>don’t know</italic>. Participants were also asked how many stars they would give the program (1 star being the lowest and 5 stars being the highest).</p>
        </sec>
        <sec>
          <title>Interview Questions</title>
          <p>Following the usability testing sessions, participants were asked a series of open-ended questions about the utility and relevance of the app prototype, as well as ways to improve the app, likelihood of program use, and potential implementation barriers. School personnel and students were asked the following: (1) Please talk about your perception of how useful this program could be to helping to address the problem of bullying at school, (2) Please share your thoughts on whether you think the content of this program is relevant and appropriate for students at your school and your community, and (3) Can you talk about ways that you would improve the program? School personnel were asked the following: (4) What are your thoughts on how practical or workable you think it would be to use this program at your school? (5) What do you believe is the likelihood that your school would use this intervention? and (6) What, if anything, would keep you from using this program?</p>
        </sec>
      </sec>
      <sec>
        <title>Data Analyses</title>
        <sec>
          <title>Quantitative</title>
          <p>Quantitative data from the questionnaires were analyzed using the SPSS version 25.0. Before conducting statistical analyses, the data were examined for outliers and normality, and all variables were within the normal range for skewness and kurtosis. Descriptive statistics were used and presented separately for the school personnel and students. We examined the differences between school personnel and students using 2-tailed independent sample <italic>t</italic> tests for continuous variables and chi-square analyses for categorical variables. All analyses were considered significant at <italic>P</italic>&#60;.05.</p>
        </sec>
        <sec>
          <title>Qualitative</title>
          <p>Qualitative data from open-ended questions were analyzed separately for the school personnel and students. A team member who participated in conducting the usability tests transcribed the data verbatim. We used thematic analysis [<xref ref-type="bibr" rid="ref83">83</xref>,<xref ref-type="bibr" rid="ref84">84</xref>] to identify, analyze, organize, describe, and report themes found within the qualitative data. NVivo was used to track quotes and organize themes. Two trained master’s students with previous experience in qualitative data analysis and a faculty member with expertise in qualitative methodologies analyzed the data. Before analyzing the data, the analysts discussed their assumptions and expectations regarding possible findings. Themes for each question were determined based on consensus. The process began with each team member individually developing initial themes for each question for school personnel and students. Next, the team met 2 times in person and conducted email communications over a 4-week period to arrive at a consensus on themes and frequency categories supported by participant quotations. During the first meeting, the lead analyst trained the team on thematic coding procedures, and each analyst coded the data separately. Next, the team met again for a second time to share each of their themes, followed by team members commenting and voicing agreement or disagreement. The analysts relied on participants’ quotes to resolve disagreements. Once the team reached a consensus, an external auditor reviewed the interview transcripts and themes. Overall, the auditor agreed with the team’s findings but provided an alternative way to organize one of the findings. The analysts used email correspondence to discuss and incorporate the auditor’s feedback and obtain a final consensus for themes. The external auditor agreed with the team’s final themes. Interview data were deidentified to ensure anonymity, and quotes were identified by participant type (ie, school personnel or students).</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Quantitative Analysis</title>
        <sec>
          <title>Usability</title>
          <p>The usability scores of the SUS are presented in <xref ref-type="table" rid="table1">Table 1</xref>. Overall, the scores for both school personnel and students suggested a very high level of usability, functionality, and acceptability. As presented in <xref ref-type="table" rid="table1">Table 1</xref>, there were no differences in any of the individual items or the SUS total score between school personnel and students, with both participant groups scoring the STAC-T app at a very high level of usability.</p>
          <table-wrap position="float" id="table1">
            <label>Table 1</label>
            <caption>
              <p>Means and SDs for the System Usability Scale (SUS) by school personnel and students (N=16)<sup>a</sup>.</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="500"/>
              <col width="170"/>
              <col width="150"/>
              <col width="100"/>
              <col width="80"/>
              <thead>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>School personnel (n=6), mean (SD)</td>
                  <td>Students (n=10), mean (SD)</td>
                  <td><italic>t</italic> test (<italic>df</italic>)</td>
                  <td><italic>P</italic> value</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td>I think that I would like to use the program frequently</td>
                  <td>3.33 (0.82)</td>
                  <td>3.40 (0.52)</td>
                  <td>−0.20 (14)</td>
                  <td>.84</td>
                </tr>
                <tr valign="top">
                  <td>I found the program to be more complex than it needed to be</td>
                  <td>0.67 (0.52)</td>
                  <td>0.40 (0.70)</td>
                  <td>0.81 (14)</td>
                  <td>.43</td>
                </tr>
                <tr valign="top">
                  <td>I thought the program was easy to use</td>
                  <td>3.50 (0.55)</td>
                  <td>3.80 (0.42)</td>
                  <td>−1.24 (14)</td>
                  <td>.24</td>
                </tr>
                <tr valign="top">
                  <td>I think that I would need the support of a technical person to be able to use this program</td>
                  <td>0.17 (0.41)</td>
                  <td>0.20 (0.42)</td>
                  <td>−0.16 (14)</td>
                  <td>.88</td>
                </tr>
                <tr valign="top">
                  <td>I found the various functions in the program were well put together with each other</td>
                  <td>3.33 (0.52)</td>
                  <td>3.50 (0.53)</td>
                  <td>−0.62 (14)</td>
                  <td>.55</td>
                </tr>
                <tr valign="top">
                  <td>I thought there was too much inconsistency in this program</td>
                  <td>0.17 (0.41)</td>
                  <td>0.40 (0.52)</td>
                  <td>−0.94 (14)</td>
                  <td>.36</td>
                </tr>
                <tr valign="top">
                  <td>I imagine that most people would learn to use this program very quickly</td>
                  <td>3.50 (0.55)</td>
                  <td>3.60 (0.70)</td>
                  <td>−0.30 (14)</td>
                  <td>.77</td>
                </tr>
                <tr valign="top">
                  <td>I found the program very awkward to use</td>
                  <td>0.17 (0.41)</td>
                  <td>0.10 (0.32)</td>
                  <td>0.37 (14)</td>
                  <td>.72</td>
                </tr>
                <tr valign="top">
                  <td>I felt very sure that I could use the program correctly</td>
                  <td>3.33 (0.82)</td>
                  <td>3.60 (0.52)</td>
                  <td>−0.81 (14)</td>
                  <td>.43</td>
                </tr>
                <tr valign="top">
                  <td>I needed to learn a lot of things before I could get going with this program</td>
                  <td>0.00 (0.00)</td>
                  <td>0.10 (0.32)</td>
                  <td>−0.76 (14)</td>
                  <td>.46</td>
                </tr>
                <tr valign="top">
                  <td>SUS total score</td>
                  <td>89.58 (5.10)</td>
                  <td>91.75 (6.98)</td>
                  <td>−0.66 (14)</td>
                  <td>.52</td>
                </tr>
              </tbody>
            </table>
            <table-wrap-foot>
              <fn id="table1fn1">
                <p><sup>a</sup>Responses were scored on a 5-point Likert scale ranging from 0 (strongly disagree) to 4 (strongly agree).</p>
              </fn>
            </table-wrap-foot>
          </table-wrap>
        </sec>
        <sec>
          <title>User-friendliness</title>
          <p>School personnel and students rated the program high regarding user-friendliness. For school personnel, scores on user-friendliness ranged from 5 to 6 (mean 5.83, SD 0.41). For students, scores on user-friendliness ranged from 5 to 7 (mean 6.10, SD 0.57). There were no differences in scores between school personnel and students in terms of user-friendliness (<italic>t</italic><sub>14</sub>=−1.00; <italic>P</italic>=.33).</p>
        </sec>
        <sec>
          <title>Program Satisfaction</title>
          <p>The program satisfaction ratings are listed in <xref ref-type="table" rid="table2">Table 2</xref>. Overall ratings suggested that school personnel and students were satisfied with the program. There were no differences in scores between school personnel and students on program recommendation (<italic>χ</italic><sup>2</sup><sub>1</sub>=1.3; <italic>P</italic>=.24, or star ratings, <italic>χ</italic><sup>2</sup><sub>1</sub>=2.3; <italic>P</italic>=.31).</p>
          <table-wrap position="float" id="table2">
            <label>Table 2</label>
            <caption>
              <p>Program satisfaction by school personnel and students (N=16).</p>
            </caption>
            <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
              <col width="30"/>
              <col width="370"/>
              <col width="350"/>
              <col width="250"/>
              <thead>
                <tr valign="top">
                  <td colspan="2">Variables</td>
                  <td>School personnel (n=6), n (%)</td>
                  <td>Students (n=10), n (%)</td>
                </tr>
              </thead>
              <tbody>
                <tr valign="top">
                  <td colspan="4">
                    <bold>Recommend</bold>
                    <bold>program</bold>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Yes</td>
                  <td>6 (100)</td>
                  <td>8 (80)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>No</td>
                  <td>0 (0)</td>
                  <td>0 (0)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>Unsure</td>
                  <td>0 (0)</td>
                  <td>2 (20)</td>
                </tr>
                <tr valign="top">
                  <td colspan="4">
                    <bold>Star</bold>
                    <bold>rating</bold>
                  </td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>1 star</td>
                  <td>0 (0)</td>
                  <td>0 (0)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>2 stars</td>
                  <td>0 (0)</td>
                  <td>0 (0)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>3 stars</td>
                  <td>1 (17)</td>
                  <td>0 (0)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>4 stars</td>
                  <td>4 (66)</td>
                  <td>6 (60)</td>
                </tr>
                <tr valign="top">
                  <td>
                    <break/>
                  </td>
                  <td>5 stars</td>
                  <td>1 (17)</td>
                  <td>4 (40)</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
        </sec>
      </sec>
      <sec>
        <title>Qualitative Analysis</title>
        <sec>
          <title>Overview</title>
          <p>Qualitative feedback for the STAC-T prototype supported the quantitative findings and was very positive overall, with participants sharing the perception that the STAC app is useful, relevant, and appropriate, as well as ways to improve the program. In addition, school personnel shared positive thoughts about program feasibility, a high likelihood of program adoption, and implementation barriers. The results are presented below, organized by the following themes: (1) utility and user-friendliness, (2) relevance, (3) program feedback, (4) feasibility, and (5) program adoption.</p>
        </sec>
        <sec>
          <title>Utility and User-friendliness</title>
          <p>Regarding participants’ perceptions on the program’s utility, school personnel and students indicated that STAC-T is useful and delivers helpful educational content to intervene in bullying. For example, 1 teacher stated, “this program is definitely one that can give strategies to students that they can apply and they also have a variety of strategies that they can choose from.”</p>
          <p>A student shared:</p>
          <disp-quote>
            <p>I thought it was pretty good. It gave lots of information; gave different ways to deal with the problem or kind of bullying.</p>
          </disp-quote>
          <p>Furthermore, students emphasized that the program allowed them to learn about bullying. One student reflected, “I think it’d be really really good cause there’s some things I didn’t know and I learned about it.”</p>
          <p>School personnel also indicated that the program is user-friendly and straightforward, and that developing the program on the web is a strength. A school counselor indicated:</p>
          <disp-quote>
            <p>I love that it’s gonna be digital because that’s right now what we do. We compete with the Minecraft’s [videogames] of the world.</p>
          </disp-quote>
        </sec>
        <sec>
          <title>Relevance</title>
          <p>Participants were also asked to share their thoughts regarding the relevance and appropriateness of the program content for students at their school and their community. School personnel indicated that the program is relevant and can help increase students’ understanding of relationships. For example, a school counselor stated, “I definitively think that it’s relevant, just like we talked about, especially the online portion.”</p>
          <p>Another school counselor indicated that the program helps “...kids to continue to understand the differences...” (between people). Students also indicated that the program was age-appropriate. One student said:</p>
          <disp-quote>
            <p>I think it is very appropriate and relevant. I think it’s a great idea, and it has great examples so kids can see [bullying] if they haven’t seen it before or see different situations it [bullying] could be in.</p>
          </disp-quote>
          <p>Another student shared:</p>
          <disp-quote>
            <p>Yeah I think it’s really good cause I’ve had some programs that use really big words, and so you can’t understand, or it explains every word like you’re a little child. Your program was perfect, like right at my level.</p>
          </disp-quote>
        </sec>
        <sec>
          <title>Program Feedback</title>
          <p>When asked for feedback regarding how to improve the program, school personnel suggested that it is important to follow through while making the program interactive. One teacher stated:</p>
          <disp-quote>
            <p>I’d have to kind of see how all of the avatars work together, how the animation works together, how relevant that would work with keeping students’ attention. Because right now currently I’d have to read everything and know students aren’t going to read everything.</p>
          </disp-quote>
          <p>A school counselor said, “I definitely think having, like you already talked about, the piece of it being interactive, definitely needs to have that.”</p>
          <p>Students suggested adding colors, including realistic pictures. One student stated:</p>
          <disp-quote>
            <p>I would definitely add color to the pictures, that’s one thing. I bet that would catch somebody’s eye. I know people who have more creative minds tend to pay attention to color more, cause I’m one of those people.</p>
          </disp-quote>
        </sec>
        <sec>
          <title>Feasibility</title>
          <p>School personnel were also asked to speak about the feasibility of the program implementation. Participants provided positive responses indicating that the program was user-friendly and would align with existing programs that address social and emotional development. One school counselor indicated:</p>
          <disp-quote>
            <p>...it’s very user-friendly, even for me who had struggles getting going. It really gives you very clear, concise steps to be able to move forward and directions of what you need to do.</p>
          </disp-quote>
          <p>A teacher stated, “So, for me I can easily put it into the current curriculum or the current places in which we are but I think that would be up to individual teachers.”</p>
        </sec>
        <sec>
          <title>Program Adoption</title>
          <p>Finally, when asked about the likelihood of program adoption, the school personnel indicated that their school would be open to using this program. One teacher stated: “I know I would really enjoy it personally because I think it’s the strategies that are important for kids to understand and be able to use and apply.”</p>
          <p>A school counselor indicated, “I think our school has been pretty open to learning new or picking up new tools that would enrich out student population.”</p>
          <p>The school personnel indicated that resource constraints were the major barriers to adopting the program. A school counselor shared:</p>
          <disp-quote>
            <p>Money, money, and cost. But honestly, as far as implementation, it’s simple because it’s online. It really does come down to the time and how much does it cost.</p>
          </disp-quote>
        </sec>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>This study aims to examine the usability of a technology-based bystander bullying intervention designed specifically for middle schools in rural, low-income communities. We were particularly interested in perspectives from both middle school personnel and students, as these participant groups represent key stakeholders who are in the position of making decisions regarding bullying programming and are the end users of the program. We aimed to test the usability of the STAC-T prototype; assess program utility, user-friendliness, and relevance; and gain an in-depth understanding of the needs and challenges related to program adoption and feedback regarding program content and delivery. Quantitative analysis of the survey data demonstrated a very positive response to the program, which was supported by qualitative data from individual interviews. Overall, the results indicate that participants perceived the STAC-T app to be useful, user-friendly, and appropriate for students at their schools and reported high levels of satisfaction with the program. Findings from this study indicate that the STAC-T app is relevant and feasible for implementation in middle schools in rural, low-income communities.</p>
        <p>The findings of this study support the usability of the STAC-T app. For both school personnel (mean 89.58, SD 5.10) and students (mean 91.75, SD 6.98), scores on the SUS indicated a very high level of usability, well exceeding the standard cutoff score of 68 [<xref ref-type="bibr" rid="ref82">82</xref>]. The user-friendliness of the program was also rated very high by both school personnel, with all participants rating the STAC app at ≥5 on a 0 to 7 point scale. We found no differences between school personnel and students in terms of SUS scores or user-friendliness ratings, suggesting that all participants found the program to be highly usable. Qualitative data supported these results, with both school personnel and students indicating that they perceived the program to be user-friendly, as well as age-appropriate and relevant for middle school students in rural, low-income communities. Furthermore, both school personnel and students reported high levels of satisfaction with the program, with most participants indicating that they would recommend the program to others. These findings are particularly important, as usability and acceptability are associated with both program adoption and implementation [<xref ref-type="bibr" rid="ref63">63</xref>].</p>
        <p>Regarding feasibility of implementation, school personnel indicated that they believed that their school would use the STAC-T app if the intervention was cost-effective. This finding is consistent with research indicating that administrators in rural middle schools would support a technology-based bullying program [<xref ref-type="bibr" rid="ref59">59</xref>] and parallels research on bullying prevention in rural communities, identifying cost as a barrier to program implementation [<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref59">59</xref>]. These findings also echo research suggesting the number 1 barrier to implementing educational technology is the lack of school district funding [<xref ref-type="bibr" rid="ref45">45</xref>] and that financial resources and program effectiveness are necessary conditions for program implementation and sustainability of delivery of school-based programs [<xref ref-type="bibr" rid="ref65">65</xref>].</p>
        <p>Both school personnel and students discussed STAC-T program strengths and considerations for increasing user engagement. Qualitative findings suggested that participants perceived the STAC-T app to be useful and helpful in addressing the problem of bullying. They also indicated that the content of the program was appropriate for their schools, confirming the need for bullying programming that teaches students skills to use to intervene in bullying situations. This finding is consistent with previous research in which school personnel in rural, low-income communities indicated a need for bystander training that teaches students strategies to intervene on behalf of targets of bullying and includes having students actively practice these strategies across different scenarios [<xref ref-type="bibr" rid="ref59">59</xref>]. Regarding user engagement, participants suggested adding more color and more realistic pictures, as well as increasing interactivity. This feedback is consistent with research suggesting that the motivating elements of technology-based interventions, including program content, length, and interactivity, are important in promoting behavior change [<xref ref-type="bibr" rid="ref85">85</xref>].</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>This study supports the usability, relevance, and feasibility of the STAC-T prototype, providing valuable information for the development of a full-scale STAC-T app. However, certain limitations of this study must be noted. Participants were recruited from 3 schools in rural, low-income areas from 1 state in the Northwestern region of the United States. Although participants were recruited from 3 different counties to increase generalizability, school personnel and students from different regions of the country may have a different perspective. Furthermore, most participants in this study were female, further limiting the generalizability of the study. Although variability was low in the quantitative data and we did not identify divergent responses among participant interview responses, interpretation of the results for males should be made cautiously as females comprised approximately 81% (13/16) of the sample. Further formative research conducted during the development of the full-scale STAC app should include purposeful sampling to ensure appropriate representation of male participants. Furthermore, although most participants were White (13/16, 81%), this parallels the ethnic and racial composition of rural communities in the United States [<xref ref-type="bibr" rid="ref86">86</xref>]. It is also possible that social desirability influenced participants as they were aware that the goal of the study was to translate the in-person STAC intervention into a technology-based format.</p>
      </sec>
      <sec>
        <title>Implications</title>
        <p>This study has important implications for the development of a technology-based bullying intervention that addresses the needs and challenges specific to middle schools in rural, low-income communities. First, participants provided very high usability ratings for the STAC-T prototype, with qualitative data supporting the usability, utility, and relevance of the program. In addition, participants indicated that program implementation is feasible as long as the program is cost-effective. These findings support the development of the full-scale STAC-T app, while keeping the price point as an important consideration. Program cost considerations are particularly important in rural schools, as they face significant financial challenges due to a lower tax base for funding programs [<xref ref-type="bibr" rid="ref16">16</xref>]. Furthermore, to enhance program implementation and sustainability, sufficient resources must be available [<xref ref-type="bibr" rid="ref65">65</xref>]. Thus, the STAC-T app needs to be designed to be low in cost to be successfully adopted by schools in rural, low-income communities.</p>
        <p>The findings from this study provide a strong scientific premise for moving forward with a full-scale production of the STAC-T app and have implications for program development. The full-scale STAC-T app will include 3 core modules, including strategy training, in which students select customized avatars as they move through role-plays in which they practice the STAC strategies. On the basis of participant feedback on the STAC-T prototype, all core modules will be built to include gaming and features requiring user input (eg, drag and drop, hover, click and reveal, and video). Real instances of game dynamics and mechanics will include several options, such as badges, leaderboards, levels, points, achievements, avatars, content unlocking, quests, social recognition, teams, and tokens. These items target the social cognitive theory components of modeling, outcome expectancies, self-efficacy, self-regulation, identification, and reciprocity. Consistent with research on mobile health strategies for adolescents [<xref ref-type="bibr" rid="ref78">78</xref>-<xref ref-type="bibr" rid="ref80">80</xref>], this design emphasizes gaming as a teaching strategy. The outcomes of each game will be used to ensure information uptake and demonstrate comprehension (eg, users must achieve a targeted score to receive a reward), thus providing feedback to participants early and often. To reinforce learning and bolster adherence, <italic>badges</italic> (ie, visual icons), which are highly effective gaming tools used to encourage user engagement and build game <italic>loyalty</italic> [<xref ref-type="bibr" rid="ref87">87</xref>,<xref ref-type="bibr" rid="ref88">88</xref>], will be awarded intermittently. These components will be the centerpiece of the program and are designed to increase engagement and learning.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>Bullying is a significant public health issue for middle schools in rural, low-income communities. Schools in these communities face multiple and competing demands on their time and have limited access to training, funding, and mental health professionals to implement bullying programming. The findings of this study demonstrate the usability, relevance, and feasibility of a brief, technology-based bystander bullying intervention. This study provides support for the development of the full-scale development of the STAC-T app and provides information that can be used to enhance program usability while addressing the unique needs of schools in rural, low-income communities.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group/>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">ADDIE</term>
          <def>
            <p>Analyze, Design, Develop, Implement, and Evaluate</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">STAC</term>
          <def>
            <p>Stealing the Show, Turning it Over, Accompanying Others, Coaching Compassion</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">STAC-T</term>
          <def>
            <p>technology-based STAC</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">SUS</term>
          <def>
            <p>System Usability Scale</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This study was registered with ClinicalTrials.gov (identifier NCT04681495). This research was supported by the National Institute on Minorities and Health Disparities of the National Institutes of Health under award number R41MD014943. The content is solely the responsibility of the authors and does not necessarily represent the official views of the National Institutes of Health.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>MKB is the owner of Klein Buendel, Inc, the organization that received the National Institutes of Health grant award for this project. As it is a small business technology transfer, a concerted effort to commercialize a final product that may result from this and subsequent National Institutes of Health–funded research will be made, and the organization may receive royalties or revenue from the commercialization. DMD and AM may also receive royalties or revenue from the commercialization.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <article-title>Student reports of bullying: results from the 2017 school crime supplement to the national crime victimization survey</article-title>
          <source>U.S. Department of Education - NCES 2019-054</source>
          <year>2019</year>
          <access-date>2021-09-20</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://nces.ed.gov/pubs2019/2019054.pdf">https://nces.ed.gov/pubs2019/2019054.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="web">
          <article-title>Injury prevention and control: #StopBullying</article-title>
          <source>Centers for Disease Control and Prevention, National Center for Injury Prevention and Control</source>
          <access-date>2021-09-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.cdc.gov/injury/features/stop-bullying/index.html">https://www.cdc.gov/injury/features/stop-bullying/index.html</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ching</surname>
              <given-names>CB</given-names>
            </name>
            <name name-style="western">
              <surname>Lee</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Mason</surname>
              <given-names>MD</given-names>
            </name>
            <name name-style="western">
              <surname>Clayton</surname>
              <given-names>DB</given-names>
            </name>
            <name name-style="western">
              <surname>Thomas</surname>
              <given-names>JC</given-names>
            </name>
            <name name-style="western">
              <surname>Pope</surname>
              <given-names>JC</given-names>
            </name>
            <name name-style="western">
              <surname>Adams</surname>
              <given-names>MC</given-names>
            </name>
            <name name-style="western">
              <surname>Brock</surname>
              <given-names>JW</given-names>
            </name>
            <name name-style="western">
              <surname>Tanaka</surname>
              <given-names>ST</given-names>
            </name>
          </person-group>
          <article-title>Bullying and lower urinary tract symptoms: why the pediatric urologist should care about school bullying</article-title>
          <source>J Urol</source>
          <year>2015</year>
          <month>02</month>
          <volume>193</volume>
          <issue>2</issue>
          <fpage>650</fpage>
          <lpage>4</lpage>
          <pub-id pub-id-type="doi">10.1016/j.juro.2014.08.103</pub-id>
          <pub-id pub-id-type="medline">25196655</pub-id>
          <pub-id pub-id-type="pii">S0022-5347(14)04358-4</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>van Geel</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Goemans</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Vedder</surname>
              <given-names>PH</given-names>
            </name>
          </person-group>
          <article-title>The relation between peer victimization and sleeping problems: a meta-analysis</article-title>
          <source>Sleep Med Rev</source>
          <year>2016</year>
          <month>06</month>
          <volume>27</volume>
          <fpage>89</fpage>
          <lpage>95</lpage>
          <pub-id pub-id-type="doi">10.1016/j.smrv.2015.05.004</pub-id>
          <pub-id pub-id-type="medline">26140869</pub-id>
          <pub-id pub-id-type="pii">S1087-0792(15)00074-X</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fekkes</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Pijpers</surname>
              <given-names>FI</given-names>
            </name>
            <name name-style="western">
              <surname>Verloove-Vanhorick</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Bullying behavior and associations with psychosomatic complaints and depression in victims</article-title>
          <source>J Pediatr</source>
          <year>2004</year>
          <month>01</month>
          <volume>144</volume>
          <issue>1</issue>
          <fpage>17</fpage>
          <lpage>22</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jpeds.2003.09.025</pub-id>
          <pub-id pub-id-type="medline">14722513</pub-id>
          <pub-id pub-id-type="pii">S0022-3476(03)00610-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hase</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Goldberg</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Stuck</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Campain</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Impacts of traditional bullying and cyberbullying on the mental health of middle school and high school students</article-title>
          <source>Psychol Schs</source>
          <year>2015</year>
          <month>05</month>
          <day>22</day>
          <volume>52</volume>
          <issue>6</issue>
          <fpage>607</fpage>
          <lpage>17</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1002/pits.21841"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/pits.21841</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rivers</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Poteat</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Noret</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Ashurst</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Observing bullying at school: the mental health implications of witness status</article-title>
          <source>Sch Psychol Q</source>
          <year>2009</year>
          <month>12</month>
          <volume>24</volume>
          <issue>4</issue>
          <fpage>211</fpage>
          <lpage>23</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1037/a0018164"/>
          </comment>
          <pub-id pub-id-type="doi">10.1037/a0018164</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Jack</surname>
              <given-names>AH</given-names>
            </name>
            <name name-style="western">
              <surname>Egan</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Childhood bullying, paranoid thinking and the misappraisal of social threat: trouble at school</article-title>
          <source>School Ment Health</source>
          <year>2018</year>
          <month>11</month>
          <day>22</day>
          <volume>10</volume>
          <issue>1</issue>
          <fpage>26</fpage>
          <lpage>34</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/29503671"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s12310-017-9238-z</pub-id>
          <pub-id pub-id-type="medline">29503671</pub-id>
          <pub-id pub-id-type="pii">9238</pub-id>
          <pub-id pub-id-type="pmcid">PMC5830450</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Juvonen</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Graham</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Schuster</surname>
              <given-names>MA</given-names>
            </name>
          </person-group>
          <article-title>Bullying among young adolescents: the strong, the weak, and the troubled</article-title>
          <source>Pediatrics</source>
          <year>2003</year>
          <month>12</month>
          <day>03</day>
          <volume>112</volume>
          <issue>6 Pt 1</issue>
          <fpage>1231</fpage>
          <lpage>7</lpage>
          <pub-id pub-id-type="doi">10.1542/peds.112.6.1231</pub-id>
          <pub-id pub-id-type="medline">14654590</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Siegel</surname>
              <given-names>RS</given-names>
            </name>
            <name name-style="western">
              <surname>La Greca</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Harrison</surname>
              <given-names>HM</given-names>
            </name>
          </person-group>
          <article-title>Peer victimization and social anxiety in adolescents: prospective and reciprocal relationships</article-title>
          <source>J Youth Adolesc</source>
          <year>2009</year>
          <month>09</month>
          <day>22</day>
          <volume>38</volume>
          <issue>8</issue>
          <fpage>1096</fpage>
          <lpage>109</lpage>
          <pub-id pub-id-type="doi">10.1007/s10964-009-9392-1</pub-id>
          <pub-id pub-id-type="medline">19636774</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Storch</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Masia-Warner</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>The relationship of peer victimization to social anxiety and loneliness in adolescent females</article-title>
          <source>J Adolesc</source>
          <year>2004</year>
          <month>06</month>
          <volume>27</volume>
          <issue>3</issue>
          <fpage>351</fpage>
          <lpage>62</lpage>
          <pub-id pub-id-type="doi">10.1016/j.adolescence.2004.03.003</pub-id>
          <pub-id pub-id-type="medline">15159093</pub-id>
          <pub-id pub-id-type="pii">S0140197104000351</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Fisher</surname>
              <given-names>BW</given-names>
            </name>
            <name name-style="western">
              <surname>Gardella</surname>
              <given-names>JH</given-names>
            </name>
            <name name-style="western">
              <surname>Teurbe-Tolon</surname>
              <given-names>AR</given-names>
            </name>
          </person-group>
          <article-title>Peer cybervictimization among adolescents and the associated internalizing and externalizing problems: a meta-analysis</article-title>
          <source>J Youth Adolesc</source>
          <year>2016</year>
          <month>09</month>
          <day>22</day>
          <volume>45</volume>
          <issue>9</issue>
          <fpage>1727</fpage>
          <lpage>43</lpage>
          <pub-id pub-id-type="doi">10.1007/s10964-016-0541-z</pub-id>
          <pub-id pub-id-type="medline">27447707</pub-id>
          <pub-id pub-id-type="pii">10.1007/s10964-016-0541-z</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kowalski</surname>
              <given-names>RM</given-names>
            </name>
            <name name-style="western">
              <surname>Giumetti</surname>
              <given-names>GW</given-names>
            </name>
            <name name-style="western">
              <surname>Schroeder</surname>
              <given-names>AN</given-names>
            </name>
            <name name-style="western">
              <surname>Lattanner</surname>
              <given-names>MR</given-names>
            </name>
          </person-group>
          <article-title>Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth</article-title>
          <source>Psychol Bull</source>
          <year>2014</year>
          <month>07</month>
          <volume>140</volume>
          <issue>4</issue>
          <fpage>1073</fpage>
          <lpage>137</lpage>
          <pub-id pub-id-type="doi">10.1037/a0035618</pub-id>
          <pub-id pub-id-type="medline">24512111</pub-id>
          <pub-id pub-id-type="pii">2014-04307-001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sticca</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Perren</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Is cyberbullying worse than traditional bullying? Examining the differential roles of medium, publicity, and anonymity for the perceived severity of bullying</article-title>
          <source>J Youth Adolesc</source>
          <year>2013</year>
          <month>05</month>
          <day>27</day>
          <volume>42</volume>
          <issue>5</issue>
          <fpage>739</fpage>
          <lpage>50</lpage>
          <pub-id pub-id-type="doi">10.1007/s10964-012-9867-3</pub-id>
          <pub-id pub-id-type="medline">23184483</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dulmus</surname>
              <given-names>CN</given-names>
            </name>
            <name name-style="western">
              <surname>Theriot</surname>
              <given-names>MT</given-names>
            </name>
            <name name-style="western">
              <surname>Sowers</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Blackburn</surname>
              <given-names>JA</given-names>
            </name>
          </person-group>
          <article-title>Student reports of peer bullying victimization in a rural school</article-title>
          <source>Stress Trauma Crisis</source>
          <year>2004</year>
          <month>01</month>
          <volume>7</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>16</lpage>
          <pub-id pub-id-type="doi">10.1080/15434610490281093</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Leadbeater</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Sukhawathanakul</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Thompson</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Gladstone</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Sklar</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Bullying and victimization in rural schools: risks, reasons, and responses</article-title>
          <source>J Rural Community Dev</source>
          <year>2013</year>
          <volume>8</volume>
          <issue>1</issue>
          <fpage>31</fpage>
          <lpage>47</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://journals.brandonu.ca/jrcd/article/view/680"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nansel</surname>
              <given-names>TR</given-names>
            </name>
            <name name-style="western">
              <surname>Overpeck</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Pilla</surname>
              <given-names>RS</given-names>
            </name>
            <name name-style="western">
              <surname>Ruan</surname>
              <given-names>WJ</given-names>
            </name>
            <name name-style="western">
              <surname>Simons-Morton</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Scheidt</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Bullying behaviors among US youth: prevalence and association with psychosocial adjustment</article-title>
          <source>J Am Med Assoc</source>
          <year>2001</year>
          <month>04</month>
          <day>25</day>
          <volume>285</volume>
          <issue>16</issue>
          <fpage>2094</fpage>
          <lpage>100</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/11311098"/>
          </comment>
          <pub-id pub-id-type="doi">10.1001/jama.285.16.2094</pub-id>
          <pub-id pub-id-type="medline">11311098</pub-id>
          <pub-id pub-id-type="pii">joc01746</pub-id>
          <pub-id pub-id-type="pmcid">PMC2435211</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Azeredo</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Rinaldi</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>de Moraes</surname>
              <given-names>Cl</given-names>
            </name>
            <name name-style="western">
              <surname>Levy</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Menezes</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>School bullying: a systematic review of contextual-level risk factors in observational studies</article-title>
          <source>Aggr Violent Behav</source>
          <year>2015</year>
          <month>05</month>
          <volume>22</volume>
          <fpage>65</fpage>
          <lpage>76</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.avb.2015.04.006"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.avb.2015.04.006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Evans</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Smokowski</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Cotter</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Cumulative bullying victimization: an investigation of the dose–response relationship between victimization and the associated mental health outcomes, social supports, and school experiences of rural adolescents</article-title>
          <source>Child Youth Serv Rev</source>
          <year>2014</year>
          <month>09</month>
          <volume>44</volume>
          <fpage>256</fpage>
          <lpage>64</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.childyouth.2014.06.021"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.childyouth.2014.06.021</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Tippett</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Wolke</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Socioeconomic status and bullying: a meta-analysis</article-title>
          <source>Am J Public Health</source>
          <year>2014</year>
          <month>06</month>
          <volume>104</volume>
          <issue>6</issue>
          <fpage>e48</fpage>
          <lpage>59</lpage>
          <pub-id pub-id-type="doi">10.2105/AJPH.2014.301960</pub-id>
          <pub-id pub-id-type="medline">24825231</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smokowski</surname>
              <given-names>PR</given-names>
            </name>
            <name name-style="western">
              <surname>Cotter</surname>
              <given-names>KL</given-names>
            </name>
            <name name-style="western">
              <surname>Robertson</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Guo</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Demographic, psychological, and school environment correlates of bullying victimization and school hassles in rural youth</article-title>
          <source>J Criminol</source>
          <year>2013</year>
          <month>06</month>
          <day>11</day>
          <volume>2013</volume>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <pub-id pub-id-type="doi">10.1155/2013/137583</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>DM</given-names>
            </name>
          </person-group>
          <article-title>Witnessing bullying at school: the association between being a bystander and anxiety and depressive symptoms</article-title>
          <source>School Ment Health</source>
          <year>2019</year>
          <month>1</month>
          <day>25</day>
          <volume>11</volume>
          <issue>3</issue>
          <fpage>454</fpage>
          <lpage>63</lpage>
          <pub-id pub-id-type="doi">10.1007/s12310-019-09312-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Witnessing cyberbullying and internalizing symptoms among middle school students</article-title>
          <source>Eur J Investig Health Psychol Educ</source>
          <year>2020</year>
          <month>10</month>
          <day>04</day>
          <volume>10</volume>
          <issue>4</issue>
          <fpage>957</fpage>
          <lpage>66</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/34542429"/>
          </comment>
          <pub-id pub-id-type="doi">10.3390/ejihpe10040068</pub-id>
          <pub-id pub-id-type="medline">34542429</pub-id>
          <pub-id pub-id-type="pii">ejihpe10040068</pub-id>
          <pub-id pub-id-type="pmcid">PMC8314310</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The association between witnessing cyberbullying and depressive symptoms and social anxiety among elementary school students</article-title>
          <source>Psychol Schs</source>
          <year>2020</year>
          <month>12</month>
          <day>15</day>
          <volume>58</volume>
          <issue>3</issue>
          <fpage>622</fpage>
          <lpage>37</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1002/pits.22467"/>
          </comment>
          <pub-id pub-id-type="doi">10.1002/pits.22467</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The relationship between witnessing cyberbullying and depressive symptoms and social anxiety among middle school students: is witnessing school bullying a moderator?</article-title>
          <source>J Child Adolesc Couns</source>
          <year>2021</year>
          <month>08</month>
          <day>18</day>
          <fpage>1</fpage>
          <lpage>12</lpage>
          <pub-id pub-id-type="doi">10.1080/23727810.2021.1934369</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wright</surname>
              <given-names>MF</given-names>
            </name>
            <name name-style="western">
              <surname>Wachs</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Harper</surname>
              <given-names>BD</given-names>
            </name>
          </person-group>
          <article-title>The moderation of empathy in the longitudinal association between witnessing cyberbullying, depression, and anxiety</article-title>
          <source>Cyber Psychol</source>
          <year>2018</year>
          <month>12</month>
          <day>29</day>
          <volume>12</volume>
          <issue>4</issue>
          <fpage>11419</fpage>
          <pub-id pub-id-type="doi">10.5817/cp2018-4-6</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Janson</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Carney</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Hazler</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Oh</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Bystanders' reactions to witnessing repetitive abuse experiences</article-title>
          <source>J Couns Dev</source>
          <year>2009</year>
          <volume>87</volume>
          <issue>3</issue>
          <fpage>319</fpage>
          <lpage>26</lpage>
          <pub-id pub-id-type="doi">10.1002/j.1556-6678.2009.tb00113.x</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hutchinson</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Exploring the impact of bullying on young bystanders</article-title>
          <source>Educ Psychol Pract</source>
          <year>2012</year>
          <month>11</month>
          <day>08</day>
          <volume>28</volume>
          <issue>4</issue>
          <fpage>425</fpage>
          <lpage>42</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1080/02667363.2012.727785"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/02667363.2012.727785</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lambe</surname>
              <given-names>LJ</given-names>
            </name>
            <name name-style="western">
              <surname>Hudson</surname>
              <given-names>CC</given-names>
            </name>
            <name name-style="western">
              <surname>Craig</surname>
              <given-names>WM</given-names>
            </name>
            <name name-style="western">
              <surname>Pepler</surname>
              <given-names>DJ</given-names>
            </name>
          </person-group>
          <article-title>Does defending come with a cost? Examining the psychosocial correlates of defending behaviour among bystanders of bullying in a Canadian sample</article-title>
          <source>Child Abuse Negl</source>
          <year>2017</year>
          <month>03</month>
          <volume>65</volume>
          <fpage>112</fpage>
          <lpage>23</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chiabu.2017.01.012</pub-id>
          <pub-id pub-id-type="medline">28131946</pub-id>
          <pub-id pub-id-type="pii">S0145-2134(17)30012-1</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wu</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Luu</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Luh</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Defending behaviors, bullying roles, and their associations with mental health in junior high school students: a population-based study</article-title>
          <source>BMC Public Health</source>
          <year>2016</year>
          <month>10</month>
          <day>10</day>
          <volume>16</volume>
          <issue>1</issue>
          <fpage>1066</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://bmcpublichealth.biomedcentral.com/articles/10.1186/s12889-016-3721-6"/>
          </comment>
          <pub-id pub-id-type="doi">10.1186/s12889-016-3721-6</pub-id>
          <pub-id pub-id-type="medline">27724881</pub-id>
          <pub-id pub-id-type="pii">10.1186/s12889-016-3721-6</pub-id>
          <pub-id pub-id-type="pmcid">PMC5057406</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>DeSmet</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bastiaensens</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Van Cleemput</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Poels</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Vandebosch</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Cardon</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>De Bourdeaudhuij</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Deciding whether to look after them, to like it, or leave it: a multidimensional analysis of predictors of positive and negative bystander behavior in cyberbullying among adolescents</article-title>
          <source>Comput Hum Behav</source>
          <year>2016</year>
          <month>04</month>
          <volume>57</volume>
          <fpage>398</fpage>
          <lpage>415</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.chb.2015.12.051"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.chb.2015.12.051</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gaffney</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Ttofi</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Farrington</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Evaluating the effectiveness of school-bullying prevention programs: an updated meta-analytical review</article-title>
          <source>Aggr Violent Behav</source>
          <year>2019</year>
          <month>03</month>
          <volume>45</volume>
          <fpage>111</fpage>
          <lpage>33</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1016/j.avb.2018.07.001"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.avb.2018.07.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Salmivalli</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Voeten</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Connections between attitudes, group norms, and behaviour in bullying situations</article-title>
          <source>Int J Behav Dev</source>
          <year>2016</year>
          <month>06</month>
          <day>30</day>
          <volume>28</volume>
          <issue>3</issue>
          <fpage>246</fpage>
          <lpage>58</lpage>
          <pub-id pub-id-type="doi">10.1080/01650250344000488</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lenhart</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Madden</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Smit</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Purcell</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Zickuhr</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Teens, kindness and cruelty on social network sites</article-title>
          <source>Pew Research Center</source>
          <year>2011</year>
          <access-date>2021-09-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.pewresearch.org/internet/2011/11/09/teens-kindness-and-cruelty-on-social-network-sites/">https://www.pewresearch.org/internet/2011/11/09/teens-kindness-and-cruelty-on-social-network-sites/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Watts</surname>
              <given-names>AD</given-names>
            </name>
          </person-group>
          <article-title>The impact of a brief, bullying bystander intervention on internalizing symptoms: is gender a moderator of intervention effects?</article-title>
          <source>Sch Psychol Int</source>
          <year>2019</year>
          <month>02</month>
          <day>14</day>
          <volume>40</volume>
          <issue>3</issue>
          <fpage>275</fpage>
          <lpage>93</lpage>
          <pub-id pub-id-type="doi">10.1177/0143034319830149</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>DM</given-names>
            </name>
          </person-group>
          <article-title>The impact of a brief bullying bystander intervention on depressive symptoms</article-title>
          <source>J Couns Dev</source>
          <year>2019</year>
          <month>06</month>
          <day>13</day>
          <volume>97</volume>
          <issue>3</issue>
          <fpage>270</fpage>
          <lpage>80</lpage>
          <pub-id pub-id-type="doi">10.1002/jcad.12267</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Trull</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Evaluation of a brief, school-based bullying bystander intervention for elementary school students</article-title>
          <source>Prof Sch Couns</source>
          <year>2018</year>
          <month>02</month>
          <day>15</day>
          <volume>20</volume>
          <issue>1</issue>
          <fpage>172</fpage>
          <lpage>83</lpage>
          <pub-id pub-id-type="doi">10.5330/1096-2409-20.1.172</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Trull</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Johnston</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>A randomized controlled study evaluating a brief, bystander bullying intervention with junior high school students</article-title>
          <source>J Sch Couns</source>
          <year>2017</year>
          <volume>15</volume>
          <issue>9</issue>
          <fpage>1</fpage>
          <lpage>34</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://jsc.montana.edu/articles/v15n9.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Watts</surname>
              <given-names>AD</given-names>
            </name>
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Efficacy of a brief, school‐based bystander bullying intervention on high school students' alcohol use</article-title>
          <source>J Addict Offender Couns</source>
          <year>2019</year>
          <month>10</month>
          <day>07</day>
          <volume>40</volume>
          <issue>2</issue>
          <fpage>66</fpage>
          <lpage>83</lpage>
          <pub-id pub-id-type="doi">10.1002/jaoc.12066</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Macháčková</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Dedkova</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Sevcikova</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Cerna</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Bystanders' support of cyberbullied schoolmates</article-title>
          <source>J Community Appl Soc Psychol</source>
          <year>2012</year>
          <month>12</month>
          <day>27</day>
          <volume>23</volume>
          <issue>1</issue>
          <fpage>25</fpage>
          <lpage>36</lpage>
          <pub-id pub-id-type="doi">10.1002/casp.2135</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sjögren</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Thornberg</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Wänström</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Gini</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Bystander behaviour in peer victimisation: moral disengagement, defender self-efficacy and student-teacher relationship quality</article-title>
          <source>Res Pap Educ</source>
          <year>2020</year>
          <month>02</month>
          <day>12</day>
          <volume>36</volume>
          <issue>5</issue>
          <fpage>588</fpage>
          <lpage>610</lpage>
          <pub-id pub-id-type="doi">10.1080/02671522.2020.1723679</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bussey</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Fitzpatrick</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Raman</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The role of moral disengagement and self-efficacy in cyberbullying</article-title>
          <source>J Sch Violence</source>
          <year>2014</year>
          <month>09</month>
          <day>30</day>
          <volume>14</volume>
          <issue>1</issue>
          <fpage>30</fpage>
          <lpage>46</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1177%2F0002764289032005003"/>
          </comment>
          <pub-id pub-id-type="doi">10.1080/15388220.2014.954045</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Reinke</surname>
              <given-names>WM</given-names>
            </name>
            <name name-style="western">
              <surname>Stormont</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Herman</surname>
              <given-names>KC</given-names>
            </name>
            <name name-style="western">
              <surname>Puri</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Goel</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Supporting children's mental health in schools: teacher perceptions of needs, roles, and barriers</article-title>
          <source>Sch Psychol Q</source>
          <year>2011</year>
          <month>03</month>
          <volume>26</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <pub-id pub-id-type="doi">10.1037/a0022714</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="web">
          <article-title>NetSupport DNA - IT asset management for schools</article-title>
          <source>NetSupport DNA</source>
          <access-date>2021-09-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.netsupportdna.com/us/education/">http://www.netsupportdna.com/us/education/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Duffin</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>E-learning and digital education - Statistics and facts</article-title>
          <source>Statista</source>
          <year>2020</year>
          <access-date>2021-09-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.statista.com/topics/3115/e-learning-and-digital-education/">https://www.statista.com/topics/3115/e-learning-and-digital-education/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="web">
          <article-title>Survey questionnaires results: students' computer access and use</article-title>
          <source>National Assessment of Educational Progress (NAEP)</source>
          <year>2015</year>
          <access-date>2021-09-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.nationsreportcard.gov/sq_computer/">https://www.nationsreportcard.gov/sq_computer/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Riddell</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Is E-Rate doing enough to effectively expand broadband in rural schools?</article-title>
          <source>K-12 Dive</source>
          <year>2018</year>
          <access-date>2021-09-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.k12dive.com/news/is-e-rate-doing-enough-to-effectively-expand-broadband-in-rural-schools/519788/">https://www.k12dive.com/news/is-e-rate-doing-enough-to-effectively-expand-broadband-in-rural-schools/519788/</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rachfal</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Gilroy</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Broadband internet access and the digital divide: federal assistance programs</article-title>
          <source>Congressional Research Service</source>
          <year>2019</year>
          <access-date>2021-09-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://sgp.fas.org/crs/misc/RL30719.pdf">https://sgp.fas.org/crs/misc/RL30719.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="web">
          <article-title>USDA launches new program to create high-speed internet e-connectivity in rural America</article-title>
          <source>U.S. Department of Agriculture</source>
          <year>2018</year>
          <access-date>2021-09-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.usda.gov/media/press-releases/2018/12/13/usda-launches-new-program-create-high-speed-internet-e-connectivity">https://www.usda.gov/media/press-releases/2018/12/13/usda-launches-new-program-create-high-speed-internet-e-connectivity</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="web">
          <article-title>Department of education releases resource to help schools improve ventilation systems to prevent COVID-19</article-title>
          <source>U.S. Department of Education</source>
          <year>2021</year>
          <access-date>2021-07-23</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ed.gov/news/press-releases/department-education-releases-resource-help-schools-improve-ventilation-systems-prevent-covid-19">https://www.ed.gov/news/press-releases/department-education-releases-resource-help-schools-improve-ventilation-systems-prevent-covid-19</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Sears</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Lundquist</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Hausheer</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>A bystander bullying psychoeducation program with middle school students: a preliminary report</article-title>
          <source>Prof Couns</source>
          <year>2015</year>
          <month>12</month>
          <volume>5</volume>
          <issue>4</issue>
          <fpage>486</fpage>
          <lpage>500</lpage>
          <pub-id pub-id-type="doi">10.15241/am.5.4.486</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Johnston</surname>
              <given-names>AD</given-names>
            </name>
          </person-group>
          <article-title>Establishing school counselors as leaders in bullying curriculum delivery</article-title>
          <source>Prof Sch Couns</source>
          <year>2018</year>
          <month>05</month>
          <day>28</day>
          <volume>21</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1177/2156759x18778781</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Trull</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Training students who occasionally bully to be peer advocates: is a bystander intervention effective in reducing bullying behavior?</article-title>
          <source>J Child Adolesc Couns</source>
          <year>2017</year>
          <month>01</month>
          <day>19</day>
          <volume>3</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <pub-id pub-id-type="doi">10.1080/23727810.2016.1277116</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>DM</given-names>
            </name>
          </person-group>
          <article-title>Acceptability and short-term outcomes of a brief, bystander intervention program to decrease bullying in an ethnically blended school in low-income community</article-title>
          <source>Contemp School Psychol</source>
          <year>2020</year>
          <month>09</month>
          <day>18</day>
          <volume>24</volume>
          <issue>4</issue>
          <fpage>508</fpage>
          <lpage>17</lpage>
          <pub-id pub-id-type="doi">10.1007/s40688-020-00321-w</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Moran</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Gallo</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Cultural adaptation of a school-based bullying intervention</article-title>
          <source>J Educ Psycholo Res</source>
          <year>2020</year>
          <fpage>2</fpage>
          <lpage>60</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://scholarworks.boisestate.edu/cgi/viewcontent.cgi?article=2778&#38;context=td"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Moran</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Moody</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Porchia</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>A mixed method evaluation of a culturally adapted, brief, bullying bystander intervention for middle school students</article-title>
          <source>J Child Adolesc Couns</source>
          <year>2019</year>
          <volume>5</volume>
          <issue>3</issue>
          <fpage>221</fpage>
          <lpage>38</lpage>
          <pub-id pub-id-type="doi">10.1080/23727810.2019.1669372</pub-id>
          <pub-id pub-id-type="medline">33015352</pub-id>
          <pub-id pub-id-type="pmcid">PMC7531519</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Moran</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>DM</given-names>
            </name>
          </person-group>
          <article-title>Evaluation of a brief, bystander bullying intervention (STAC) for ethnically blended middle schools in low-income communities</article-title>
          <source>Prof Sch Couns</source>
          <year>2020</year>
          <month>07</month>
          <day>20</day>
          <volume>23</volume>
          <issue>1</issue>
          <fpage>2156759X2094064</fpage>
          <pub-id pub-id-type="doi">10.1177/2156759x20940641</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>DM</given-names>
            </name>
            <name name-style="western">
              <surname>Peralta</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Bond</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Flay</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Impact of a brief, bystander bullying prevention program on depressive symptoms and passive suicidal ideation: a program evaluation model for school personnel</article-title>
          <source>J Prev Health Promot</source>
          <year>2020</year>
          <month>07</month>
          <day>26</day>
          <volume>1</volume>
          <issue>1</issue>
          <fpage>80</fpage>
          <lpage>103</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/33738442"/>
          </comment>
          <pub-id pub-id-type="doi">10.1177/2632077020942959</pub-id>
          <pub-id pub-id-type="medline">33738442</pub-id>
          <pub-id pub-id-type="pmcid">PMC7968865</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref59">
        <label>59</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Midgett</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Doumas</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Myers</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Moody</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Doud</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Technology-based bullying intervention for rural schools: perspectives on needs, challenges, and design</article-title>
          <source>Rural Ment Health</source>
          <year>2021</year>
          <month>01</month>
          <volume>45</volume>
          <issue>1</issue>
          <fpage>14</fpage>
          <lpage>30</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://doi.org/10.1037/rmh0000151"/>
          </comment>
          <pub-id pub-id-type="doi">10.1037/rmh0000151</pub-id>
          <pub-id pub-id-type="medline">33777286</pub-id>
          <pub-id pub-id-type="pmcid">PMC7992991</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref60">
        <label>60</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>DiClemente</surname>
              <given-names>CC</given-names>
            </name>
            <name name-style="western">
              <surname>Marinilli</surname>
              <given-names>AS</given-names>
            </name>
            <name name-style="western">
              <surname>Singh</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Bellino</surname>
              <given-names>LE</given-names>
            </name>
          </person-group>
          <article-title>The role of feedback in the process of health behavior change</article-title>
          <source>Am J Health Behav</source>
          <year>2001</year>
          <volume>25</volume>
          <issue>3</issue>
          <fpage>217</fpage>
          <lpage>27</lpage>
          <pub-id pub-id-type="medline">11322620</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref61">
        <label>61</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>DT</given-names>
            </name>
            <name name-style="western">
              <surname>Prentice</surname>
              <given-names>DA</given-names>
            </name>
          </person-group>
          <article-title>Changing norms to change behavior</article-title>
          <source>Annu Rev Psychol</source>
          <year>2016</year>
          <volume>67</volume>
          <fpage>339</fpage>
          <lpage>61</lpage>
          <pub-id pub-id-type="doi">10.1146/annurev-psych-010814-015013</pub-id>
          <pub-id pub-id-type="medline">26253542</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref62">
        <label>62</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wichansky</surname>
              <given-names>AM</given-names>
            </name>
          </person-group>
          <article-title>Usability testing in 2000 and beyond</article-title>
          <source>Ergonomics</source>
          <year>2000</year>
          <month>07</month>
          <day>10</day>
          <volume>43</volume>
          <issue>7</issue>
          <fpage>998</fpage>
          <lpage>1006</lpage>
          <pub-id pub-id-type="doi">10.1080/001401300409170</pub-id>
          <pub-id pub-id-type="medline">10929833</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref63">
        <label>63</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lyon</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Bruns</surname>
              <given-names>EJ</given-names>
            </name>
          </person-group>
          <article-title>User-centered redesign of evidence-based psychosocial interventions to enhance implementation-hospitable soil or better seeds?</article-title>
          <source>JAMA Psychiatry</source>
          <year>2019</year>
          <month>01</month>
          <day>01</day>
          <volume>76</volume>
          <issue>1</issue>
          <fpage>3</fpage>
          <lpage>4</lpage>
          <pub-id pub-id-type="doi">10.1001/jamapsychiatry.2018.3060</pub-id>
          <pub-id pub-id-type="medline">30427985</pub-id>
          <pub-id pub-id-type="pii">2712978</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref64">
        <label>64</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Proctor</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Silmere</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Raghavan</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Hovmand</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Aarons</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Bunger</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Griffey</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Hensley</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Outcomes for implementation research: conceptual distinctions, measurement challenges, and research agenda</article-title>
          <source>Adm Policy Ment Health</source>
          <year>2011</year>
          <month>03</month>
          <volume>38</volume>
          <issue>2</issue>
          <fpage>65</fpage>
          <lpage>76</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/20957426"/>
          </comment>
          <pub-id pub-id-type="doi">10.1007/s10488-010-0319-7</pub-id>
          <pub-id pub-id-type="medline">20957426</pub-id>
          <pub-id pub-id-type="pmcid">PMC3068522</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref65">
        <label>65</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Han</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Weiss</surname>
              <given-names>B</given-names>
            </name>
          </person-group>
          <article-title>Sustainability of teacher implementation of school-based mental health programs</article-title>
          <source>J Abnorm Child Psychol</source>
          <year>2005</year>
          <month>12</month>
          <volume>33</volume>
          <issue>6</issue>
          <fpage>665</fpage>
          <lpage>79</lpage>
          <pub-id pub-id-type="doi">10.1007/s10802-005-7646-2</pub-id>
          <pub-id pub-id-type="medline">16328743</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref66">
        <label>66</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ritterband</surname>
              <given-names>LM</given-names>
            </name>
            <name name-style="western">
              <surname>Gonder-Frederick</surname>
              <given-names>LA</given-names>
            </name>
            <name name-style="western">
              <surname>Cox</surname>
              <given-names>DJ</given-names>
            </name>
            <name name-style="western">
              <surname>Clifton</surname>
              <given-names>AD</given-names>
            </name>
            <name name-style="western">
              <surname>West</surname>
              <given-names>RW</given-names>
            </name>
            <name name-style="western">
              <surname>Borowitz</surname>
              <given-names>SM</given-names>
            </name>
          </person-group>
          <article-title>Internet interventions: in review, in use, and into the future</article-title>
          <source>Prof Psychol Res Pr</source>
          <year>2003</year>
          <volume>34</volume>
          <issue>5</issue>
          <fpage>527</fpage>
          <lpage>34</lpage>
          <pub-id pub-id-type="doi">10.1037/0735-7028.34.5.527</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref67">
        <label>67</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kelders</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Kok</surname>
              <given-names>RN</given-names>
            </name>
            <name name-style="western">
              <surname>Ossebaard</surname>
              <given-names>HC</given-names>
            </name>
            <name name-style="western">
              <surname>Van Gemert-Pijnen</surname>
              <given-names>JE</given-names>
            </name>
          </person-group>
          <article-title>Persuasive system design does matter: a systematic review of adherence to web-based interventions</article-title>
          <source>J Med Internet Res</source>
          <year>2012</year>
          <volume>14</volume>
          <issue>6</issue>
          <fpage>e152</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jmir.org/2012/6/e152/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.2104</pub-id>
          <pub-id pub-id-type="medline">23151820</pub-id>
          <pub-id pub-id-type="pii">v14i6e152</pub-id>
          <pub-id pub-id-type="pmcid">PMC3510730</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref68">
        <label>68</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oinas-Kukkonen</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Harjumaa</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Persuasive systems design: key issues, process model, and system features</article-title>
          <source>Commun Assoc Inf Syst</source>
          <year>2009</year>
          <volume>24</volume>
          <issue>1</issue>
          <fpage>28</fpage>
          <pub-id pub-id-type="doi">10.17705/1cais.02428</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref69">
        <label>69</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Oinas-Kukkonen</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Harjumaa</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Oinas-Kukkonen</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Hasle</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Harjumaa</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Segerståhl</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Øhrstrøm</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>A systematic framework for designing and evaluating persuasive systems</article-title>
          <source>Persuasive Technology</source>
          <year>2008</year>
          <publisher-loc>Berlin, Heidelberg</publisher-loc>
          <publisher-name>Springer</publisher-name>
          <fpage>164</fpage>
          <lpage>76</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref70">
        <label>70</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Abras</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Maloney-Krichmar</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Preece</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Bainbridge</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>User-centered design</article-title>
          <source>Encyclopedia of Human-Computer Interaction. Vol 37</source>
          <year>2004</year>
          <publisher-loc>Thousand Oaks, CA</publisher-loc>
          <publisher-name>SAGE Publications</publisher-name>
          <fpage>445</fpage>
          <lpage>56</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref71">
        <label>71</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Norman</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Draper</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>User Centered System Design: New Perspectives on Human-Computer Interaction</source>
          <year>1986</year>
          <publisher-loc>Hillsdale, NJ</publisher-loc>
          <publisher-name>Lawrence Erlbaum Associates Inc</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref72">
        <label>72</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gustafson</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Branch</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Reiser</surname>
              <given-names>RA</given-names>
            </name>
            <name name-style="western">
              <surname>Dempsey</surname>
              <given-names>JV</given-names>
            </name>
          </person-group>
          <article-title>What is instructional design?</article-title>
          <source>Trends and Issues in Instructional Design and Technology</source>
          <year>2002</year>
          <publisher-loc>Columbus, OH</publisher-loc>
          <publisher-name>Merril/Prentice Hall</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref73">
        <label>73</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Molenda</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>In search of the elusive ADDIE Model</article-title>
          <source>Perf Improv</source>
          <year>2015</year>
          <month>02</month>
          <day>19</day>
          <volume>54</volume>
          <issue>2</issue>
          <fpage>40</fpage>
          <lpage>2</lpage>
          <pub-id pub-id-type="doi">10.1002/pfi.21461</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref74">
        <label>74</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Peterson</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Bringing ADDIE to life: instructional design at its best</article-title>
          <source>J Educ Multimedia Hypermedia</source>
          <year>2003</year>
          <volume>12</volume>
          <issue>3</issue>
          <fpage>227</fpage>
          <lpage>41</lpage>
          <pub-id pub-id-type="doi">10.1007/978-0-387-09506-6_3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref75">
        <label>75</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mazzara</surname>
              <given-names>ML</given-names>
            </name>
          </person-group>
          <article-title>Application of theory: minimalism and user centered design</article-title>
          <source>Society for Technical Communication</source>
          <year>2001</year>
          <publisher-loc>Hanover, Germany</publisher-loc>
          <publisher-name>TIB University Library</publisher-name>
          <fpage>327</fpage>
          <lpage>31</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref76">
        <label>76</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nicholson</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>A user-centered theoretical framework for meaningful gamification</article-title>
          <source>Proceedings of the Games+Learning+Society Conference 8.0</source>
          <year>2012</year>
          <conf-name>Games+Learning+Society Conference 8.0</conf-name>
          <conf-date>June 13-15, 2012</conf-date>
          <conf-loc>Madison, WI</conf-loc>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://scottnicholson.com/pubs/meaningfulframework.pdf"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref77">
        <label>77</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pagulayan</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Keeker</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Fuller</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Wixon</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Romero</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Gunn</surname>
              <given-names>DV</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Sears</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Jacko</surname>
              <given-names>JA</given-names>
            </name>
          </person-group>
          <article-title>User-centered design in games</article-title>
          <source>Human-Computer Interaction Handbook: Fundamentals, Evolving Technologies and Emerging Applications</source>
          <year>2002</year>
          <publisher-loc>Mahwah, NJ</publisher-loc>
          <publisher-name>Lawrence Erlbaum Associaties, Inc</publisher-name>
          <fpage>883</fpage>
          <lpage>906</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref78">
        <label>78</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cafazzo</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Casselman</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Hamming</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Katzman</surname>
              <given-names>DK</given-names>
            </name>
            <name name-style="western">
              <surname>Palmert</surname>
              <given-names>MR</given-names>
            </name>
          </person-group>
          <article-title>Design of an mHealth app for the self-management of adolescent type 1 diabetes: a pilot study</article-title>
          <source>J Med Internet Res</source>
          <year>2012</year>
          <volume>14</volume>
          <issue>3</issue>
          <fpage>e70</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://www.jmir.org/2012/3/e70/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.2058</pub-id>
          <pub-id pub-id-type="medline">22564332</pub-id>
          <pub-id pub-id-type="pii">v14i3e70</pub-id>
          <pub-id pub-id-type="pmcid">PMC3799540</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref79">
        <label>79</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Graafland</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Dankbaar</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Mert</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Lagro</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>De</surname>
              <given-names>WL</given-names>
            </name>
            <name name-style="western">
              <surname>Schuit</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Schaafstal</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Schijven</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>How to systematically assess serious games applied to health care</article-title>
          <source>JMIR Serious Games</source>
          <year>2014</year>
          <volume>2</volume>
          <issue>2</issue>
          <fpage>e11</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://games.jmir.org/2014/2/e11/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/games.3825</pub-id>
          <pub-id pub-id-type="medline">25654163</pub-id>
          <pub-id pub-id-type="pii">v2i2e11</pub-id>
          <pub-id pub-id-type="pmcid">PMC4307812</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref80">
        <label>80</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hieftje</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>A tablet game for risk reduction and HIV prevention in adolescents</article-title>
          <source>J Mob Technol Med</source>
          <year>2012</year>
          <month>12</month>
          <volume>1</volume>
          <issue>4S</issue>
          <fpage>8</fpage>
          <pub-id pub-id-type="doi">10.7309/jmtm.32</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref81">
        <label>81</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Brooke</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Jordan</surname>
              <given-names>PW</given-names>
            </name>
            <name name-style="western">
              <surname>Thomas</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Weerdmeester</surname>
              <given-names>BA</given-names>
            </name>
            <name name-style="western">
              <surname>McClelland</surname>
              <given-names>AL</given-names>
            </name>
          </person-group>
          <article-title>SUS: A 'Quick and Dirty' usability scale</article-title>
          <source>Usability Evaluation in Industry</source>
          <year>1996</year>
          <publisher-loc>London</publisher-loc>
          <publisher-name>Taylor and Francis</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref82">
        <label>82</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bangor</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Kortum</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Determining what individual SUS scores mean: adding an adjective rating scale</article-title>
          <source>J Usability Studies</source>
          <year>2009</year>
          <volume>4</volume>
          <issue>3</issue>
          <fpage>114</fpage>
          <lpage>23</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://uxpajournal.org/determining-what-individual-sus-scores-mean-adding-an-adjective-rating-scale/"/>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref83">
        <label>83</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Braun</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Clarke</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Using thematic analysis in psychology</article-title>
          <source>Qual Res Psychol</source>
          <year>2006</year>
          <month>01</month>
          <volume>3</volume>
          <issue>2</issue>
          <fpage>77</fpage>
          <lpage>101</lpage>
          <pub-id pub-id-type="doi">10.1191/1478088706qp063oa</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref84">
        <label>84</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Nowell</surname>
              <given-names>LS</given-names>
            </name>
            <name name-style="western">
              <surname>Norris</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>White</surname>
              <given-names>DE</given-names>
            </name>
            <name name-style="western">
              <surname>Moules</surname>
              <given-names>NJ</given-names>
            </name>
          </person-group>
          <article-title>Thematic analysis: striving to meet the trustworthiness criteria</article-title>
          <source>Int J Qual Methods</source>
          <year>2017</year>
          <month>10</month>
          <day>02</day>
          <volume>16</volume>
          <issue>1</issue>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <pub-id pub-id-type="doi">10.1177/1609406917733847</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref85">
        <label>85</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lehto</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Oinas-Kukkonen</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Persuasive features in web-based alcohol and smoking interventions: a systematic review of the literature</article-title>
          <source>J Med Internet Res</source>
          <year>2011</year>
          <month>07</month>
          <day>22</day>
          <volume>13</volume>
          <issue>3</issue>
          <fpage>e46</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.jmir.org/2011/3/e46/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/jmir.1559</pub-id>
          <pub-id pub-id-type="medline">21795238</pub-id>
          <pub-id pub-id-type="pii">v13i3e46</pub-id>
          <pub-id pub-id-type="pmcid">PMC3222186</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref86">
        <label>86</label>
        <nlm-citation citation-type="web">
          <article-title>Rural America at a glance</article-title>
          <source>U.S. Department of Agriculture</source>
          <year>2020</year>
          <access-date>2021-09-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.ers.usda.gov/data-products/chart-gallery/gallery/chart-detail/?chartId=99538">https://www.ers.usda.gov/data-products/chart-gallery/gallery/chart-detail/?chartId=99538</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref87">
        <label>87</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Casilli</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Knight</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>7 things you should know about badges</article-title>
          <source>EDUCAUSE</source>
          <year>2012</year>
          <access-date>2021-09-21</access-date>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://net.educause.edu/ir/library/pdf/ELI7085.pdf">https://net.educause.edu/ir/library/pdf/ELI7085.pdf</ext-link>
          </comment>
        </nlm-citation>
      </ref>
      <ref id="ref88">
        <label>88</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>AS</given-names>
            </name>
            <name name-style="western">
              <surname>Cafazzo</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Seto</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>A game plan: gamification design principles in mHealth applications for chronic disease management</article-title>
          <source>Health Informatics J</source>
          <year>2014</year>
          <month>07</month>
          <day>1</day>
          <fpage>184</fpage>
          <lpage>93</lpage>
          <pub-id pub-id-type="doi">10.1177/1460458214537511</pub-id>
          <pub-id pub-id-type="medline">24986104</pub-id>
          <pub-id pub-id-type="pii">1460458214537511</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
