<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">JFR</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Form Res</journal-id>
      <journal-title>JMIR Formative Research</journal-title>
      <issn pub-type="epub">2561-326X</issn>
      <publisher>
        <publisher-name>JMIR Publications</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v6i1e30286</article-id>
      <article-id pub-id-type="pmid">34982712</article-id>
      <article-id pub-id-type="doi">10.2196/30286</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Review</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Review</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Implications and Preventions of Cyberbullying and Social Exclusion in Social Media: Systematic Review</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Torous</surname>
            <given-names>John</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Shava</surname>
            <given-names>Fungai</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Kowalski</surname>
            <given-names>Robin</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib id="contrib1" contrib-type="author">
          <name name-style="western">
            <surname>Ademiluyi</surname>
            <given-names>Adesoji</given-names>
          </name>
          <degrees>BS</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-4673-7062</ext-link>
        </contrib>
        <contrib id="contrib2" contrib-type="author">
          <name name-style="western">
            <surname>Li</surname>
            <given-names>Chuqin</given-names>
          </name>
          <degrees>MS</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0001-6791-5887</ext-link>
        </contrib>
        <contrib id="contrib3" contrib-type="author" corresp="yes">
          <name name-style="western">
            <surname>Park</surname>
            <given-names>Albert</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <address>
            <institution>Department of Software and Information Systems</institution>
            <institution>University of North Carolina at Charlotte Charlotte</institution>
            <addr-line>Woodward 310H</addr-line>
            <addr-line>9201 University City Blvd</addr-line>
            <addr-line>Charlotte, NC, 28223</addr-line>
            <country>United States</country>
            <phone>1 704 687 8668</phone>
            <email>apark11@uncc.edu</email>
          </address>
          <ext-link ext-link-type="orcid">https://orcid.org/0000-0002-2419-0131</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <label>1</label>
        <institution>Department of Bioinformatics and Genomics</institution>
        <institution>University of North Carolina at Charlotte Charlotte</institution>
        <addr-line>Charlotte, NC</addr-line>
        <country>United States</country>
      </aff>
      <aff id="aff2">
        <label>2</label>
        <institution>Department of Software and Information Systems</institution>
        <institution>University of North Carolina at Charlotte Charlotte</institution>
        <addr-line>Charlotte, NC</addr-line>
        <country>United States</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Albert Park <email>apark11@uncc.edu</email></corresp>
      </author-notes>
      <pub-date pub-type="collection">
        <month>1</month>
        <year>2022</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>4</day>
        <month>1</month>
        <year>2022</year>
      </pub-date>
      <volume>6</volume>
      <issue>1</issue>
      <elocation-id>e30286</elocation-id>
      <history>
        <date date-type="received">
          <day>10</day>
          <month>5</month>
          <year>2021</year>
        </date>
        <date date-type="rev-request">
          <day>2</day>
          <month>6</month>
          <year>2021</year>
        </date>
        <date date-type="rev-recd">
          <day>25</day>
          <month>7</month>
          <year>2021</year>
        </date>
        <date date-type="accepted">
          <day>27</day>
          <month>8</month>
          <year>2021</year>
        </date>
      </history>
      <copyright-statement>©Adesoji Ademiluyi, Chuqin Li, Albert Park. Originally published in JMIR Formative Research (https://formative.jmir.org), 04.01.2022.</copyright-statement>
      <copyright-year>2022</copyright-year>
      <license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by/4.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Formative Research, is properly cited. The complete bibliographic information, a link to the original publication on https://formative.jmir.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="https://formative.jmir.org/2022/1/e30286" xlink:type="simple"/>
      <abstract>
        <sec sec-type="background">
          <title>Background</title>
          <p>The growth of social networking has created a paradigm in which many forms of personal communication are being replaced by internet communication technologies, such as social media. This has led to social issues, such as cyberbullying. In response, researchers are investigating cyberbullying to determine its implications in various life sectors.</p>
        </sec>
        <sec sec-type="objective">
          <title>Objective</title>
          <p>This manuscript reviews the methods, results, and limitations of the current cyberbullying research and discusses the physical and mental repercussions of cyberbullying and social exclusion as well as methods of predicting and counteracting these events. On the basis of the findings, we discuss future research directions.</p>
        </sec>
        <sec sec-type="methods">
          <title>Methods</title>
          <p>Using ScienceDirect, ACM Digital Library, and PubMed, 34 research articles were used in this review. A review was conducted using the selected articles with the goal of understanding the current landscape of cyberbullying research.</p>
        </sec>
        <sec sec-type="results">
          <title>Results</title>
          <p>Studies have analyzed correlations between depressive and suicidal ideations in subjects as well as relationships in the social, educational, and financial status of the perpetrators. Studies have explored detection methods for monitoring cyberbullying. Automated detection has yet to become effective and accurate; however, several factors, such as personal background and physical appearance, have been identified to correlate with the likelihood that a person becomes a survivor or perpetrator of web-based cybervictimization. Social support is currently common in recovery efforts but may require diversification for specific applications in web-based incidents.</p>
        </sec>
        <sec sec-type="conclusions">
          <title>Conclusions</title>
          <p>Relations between social status, age, gender, and behaviors have been discovered that offer new insights into the origins and likeliness of cyberbullying events. Rehabilitation from such events is possible; however, automatic detection is not yet a viable solution for prevention of cyberbullying incidents. Effects such as social exclusion and suicidal ideations are closely tied to incidents of cyberbullying and require further study across various social and demographical populations. New studies should be conducted to explore the experiences of survivors and perpetrators and identify causal links. The breadth of research includes demographics from China, Canada, Taiwan, Iran, the United States, and Namibia. Wider ranges of national populations should be considered in future studies for accurate assessments, given global internet communication technology activity. The studies emphasize the need for formal classification terminology. With formal classification, researchers will have a more definite scope, allowing specific research on a single definable topic rather than on general bullying events and symptoms. Of all the studies, 2 used a longitudinal design for their research methodology. The low number of longitudinal studies leaves gaps between causation and correlation, and further research is required to understand the effects of cyberbullying. Research addressing ongoing victimization is required for the various forms of cyberbullying; social support offers the most effective current standard for prevention.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>cyberbullying</kwd>
        <kwd>cybervictimization</kwd>
        <kwd>cyberaggression</kwd>
        <kwd>bullying</kwd>
        <kwd>mental health</kwd>
        <kwd>social isolation</kwd>
        <kwd>social media</kwd>
        <kwd>mobile phone</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Background</title>
        <p>Internet communication technologies (ICTs) include a wide variety of platforms, ranging from social media, instant messaging, and chat rooms to email [<xref ref-type="bibr" rid="ref1">1</xref>]; all of these affect our normal modes of communication [<xref ref-type="bibr" rid="ref2">2</xref>]. The use of ICTs is increasing; meanwhile, negative consequences such as cybervictimization are being overlooked. Cybervictimization, colloquially <italic>cyberbullying</italic>, is a phenomenon proliferating through rising rates of interaction with social media [<xref ref-type="bibr" rid="ref1">1</xref>]. Cyberbullying can be best defined as “an aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly over time against a victim who cannot easily defend him or herself” [<xref ref-type="bibr" rid="ref3">3</xref>]. This could be a distressing message about a victim’s appearance, delivered by a perpetrator over several web-based interactions with the purpose of delivering emotional or mental harm. Cyberaggression is formally defined as the intentional harm delivered by the use of electronic means to a person or group of people irrespective of their age who perceive such as offensive, derogatory, harmful, or unwanted [<xref ref-type="bibr" rid="ref4">4</xref>]. One example is a mocking tweet regarding someone’s race or ethnicity, sent during a web-based interaction. Cyberaggression is inflicted on any individual and is a description of a singular incident as opposed to being repeated and targeted. Cyberbullying relates a cyberaggression event to a cybervictim, and correlates to a history of abuse where the opposing parties know each other on a personal level [<xref ref-type="bibr" rid="ref5">5</xref>]. This implication does not hold for general cyberaggression [<xref ref-type="bibr" rid="ref5">5</xref>]. As we are investigating cyberbullying and not cyberaggressions at large, it is important to recognize this distinction. Discourse surrounding cyberbullying is still new and has only seen consistent studies from 2007 to 2020 [<xref ref-type="bibr" rid="ref3">3</xref>,<xref ref-type="bibr" rid="ref5">5</xref>,<xref ref-type="bibr" rid="ref6">6</xref>]. Researchers from fields such as sociology and psychology, now studying the phenomenon, struggle to classify it concisely because of the various forms it can take and its relation to traditional bullying. Several cyberbullying studies disagree regarding the overlap of cyberbullying and traditional bullying and use separate definitions to discern them from one another [<xref ref-type="bibr" rid="ref5">5</xref>]. The tension stems from the assertion that cyberbullying is more soundly defined within the purview of cyberaggression [<xref ref-type="bibr" rid="ref7">7</xref>]. Cyberbullying narrows the classification of instances of cyber-based attacks to those done over length of time; however, many in the field believe this is detrimental to the identification of events that may happen only once or between strangers [<xref ref-type="bibr" rid="ref7">7</xref>]. In this review, we define cyberbullying and cyberaggression by their formal definitions and examine cyberbullying events on multiple occurrences.</p>
        <p>Cybervictimization has a wide reach given the interconnectivity of each user [<xref ref-type="bibr" rid="ref8">8</xref>]. Youth (ie, aged 11-18 years) are especially susceptible to this form of victimization [<xref ref-type="bibr" rid="ref8">8</xref>] given the influence of peer interactions on social development in early life and conventional [<xref ref-type="bibr" rid="ref9">9</xref>] standards. Several cases of suicide and suicidality and the presence of suicidal ideations and behaviors [<xref ref-type="bibr" rid="ref10">10</xref>] have been found to have direct correlations to cyberbullying [<xref ref-type="bibr" rid="ref11">11</xref>]. There are correlations between cyberbullying and mental health consequences, including depressive symptoms, particularly among youth and student populations [<xref ref-type="bibr" rid="ref12">12</xref>]. Issues with mental health and social strain are also accumulating among college students and young adults, especially those in the age group of 18 to 24 years, who have screened 19% positivity for experiences of psychological distress because of cyberbullying incidents [<xref ref-type="bibr" rid="ref10">10</xref>].</p>
        <p>Social exclusion is a phenomenon that occurs when someone is forcibly or voluntarily separated from groups with whom they perform social interaction on a daily basis [<xref ref-type="bibr" rid="ref13">13</xref>]. In clinical studies, social exclusion is associated with depressive symptoms and an increased risk of mortality [<xref ref-type="bibr" rid="ref14">14</xref>]. It is possible that there are relations between the domains of cyberbullying, internet communications, and social exclusion, given an attack on a cybervictim being received through their preferred avenue of social interaction [<xref ref-type="bibr" rid="ref1">1</xref>]. The likelihood of cyberbullying events among youth and adolescents suggests a considerable risk of social isolation to these populations [<xref ref-type="bibr" rid="ref1">1</xref>]. Correlations between social isolation and workplace bullying have been drawn in adult studies [<xref ref-type="bibr" rid="ref15">15</xref>]. These relations should be explored in school and in web-based environments so that a crisis among young people can be identified and prevented.</p>
      </sec>
      <sec>
        <title>Objectives</title>
        <p>We review the current research in cyberbullying and mental health, its social outcomes, predictive factors, and novel approaches to management and suppression. We look to contribute a contextual understanding of cyberbullying unfound in the domain, make connections to social isolation and other sociological and psychological effects, and investigate methods to prevent the overall manifestation of these events. This analysis sheds light on current measures taken and future opportunities to combat the prevent the spread of cybervictimization.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Search Strategy</title>
        <p>The primary electronic databases that were used in the review are Elsevier, ScienceDirect, PubMed, and ACM Digital Library. Each of these libraries is a globally recognized and reputable medical or scientific database, and they are ubiquitously used in medical and scientific research. Indexing terms for ScienceDirect and ACM Digital Library were used and were presented through the search as s<italic>ocial isolation</italic> OR <italic>social exclusion</italic> OR <italic>social alienation</italic> AND <italic>cyberbullying</italic> AND <italic>social media</italic>. MeSH terms were used for PubMed and were presented through search as <italic>social isolation</italic> OR <italic>social exclusion</italic> OR <italic>social alienation</italic> AND <italic>cyberbullying</italic> AND <italic>social media</italic>. These searches were conducted in accordance with the 2009 Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines. These searches were completed on February 23, 2020.</p>
      </sec>
      <sec>
        <title>Study Screening</title>
        <p>This study’s scope covers cyberbullying factors in their relations to psychological and sociological disorders, social media, and intervening technologies. For these aims, a noted definition of cybervictimization sourced from an article by Smith et al [<xref ref-type="bibr" rid="ref3">3</xref>] describes it as “an aggressive, intentional act carried out by a group or individual, using electronic forms of contact, repeatedly over time against a victim who cannot easily defend him or herself.”</p>
        <p>The criteria for inclusion of the articles were defined by certain expectations. First, the articles were all original research studies that did not involve secondary reviews of underlying study categories. It was imperative that all studies involve primary data for accurate synthesis of the reviewed information. Second, all articles were required to include some form of cyberbullying factors and the effects they incur. Several articles only involved information about social exclusion or only information about social media and were excluded because they were unrelated to the primary topic. Conversely, it was imperative that all articles include social exclusion factors, given its relation to cyberbullying. Social exclusion factors relate specifically to the phenomena of social distance in reaction to a negative social event. The first screening required all articles to be nonreview, on the topic of bullying, and with factors relating to social exclusion. The articles were curated under these constraints and then screened further for 2 additional metrics. In the second screening, articles were excluded if they did not have significant social media factors, even if the included references to cyberbullying and social isolation, given that the research explicitly focuses on the sociological implications. Finally, the full-text screening involved a complete reading of the articles to determine the relevance of their findings. All records with insufficient information or data, such that they did not provide relevant or citable information, were excluded. The full screening is displayed in <xref rid="figure1" ref-type="fig">Figure 1</xref>.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Screening flowchart.</p>
          </caption>
          <graphic xlink:href="formative_v6i1e30286_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <sec>
        <title>Landscape of Cyberbullying Research</title>
        <p>The research surveyed from 2011 to 2020 focuses on the psychological effects of the phenomenon, with 10 of the 34 articles focusing on factors such as suicidal ideations, social agency, and depression [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref16">16</xref>-<xref ref-type="bibr" rid="ref21">21</xref>]. Automated detection studies are studies that dealt with automated identification of cyberbullying events; this takes place through processing of text from logged chat room conversations [<xref ref-type="bibr" rid="ref22">22</xref>]. A total of 3 articles dealt with methods of automated detection. Text filtering was a common strategy, using machine learning to perform sentiment analysis. Risk factor studies focus on characteristics that put someone at risk of cyberaggression [<xref ref-type="bibr" rid="ref23">23</xref>]. Furthermore, 5 articles dealt with risk factors, such as age, oversharing tendencies, financial disposition, educational background, social media activity, and social status [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref26">26</xref>]. Predictive factors are behaviors that correlate with involvement in cyberbullying or cybervictimization, and 4 articles dealt with predictive factors of cybervictimization [<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]. Predictive factors included parental status, access to goods, academic standings, and personal identity. Several articles focused on relationships between cyberbullying and traditional bullying, demographics, motivations, and information security. These articles provided information regarding the similarities and differences of web-based and in-person behavior and how they affect attitude and perception of events.</p>
        <p>The articles dealt with several different ICT platforms, including Facebook, Twitter, Instagram, Tumblr, and many others. Articles that used a direct social media source aimed to discover behaviors and trends that could be used to map potential victims and perpetrators to quantifiable decisions and habits. Facebook and Twitter were the most common platforms used by researchers [<xref ref-type="bibr" rid="ref29">29</xref>].</p>
        <p>The research objectives are displayed in <xref ref-type="table" rid="table1">Table 1</xref>. The widest range of articles were related to psychological effects. These effects are often the focal point of research in cyberbullying. Predictive factors, risk factors, and demographic factors also have a substantial presence in the body of research. There is a smaller emphasis on technological applications in security awareness and automation throughout the research.</p>
        <table-wrap position="float" id="table1">
          <label>Table 1</label>
          <caption>
            <p>Research objectives investigating cyberbullying.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="700"/>
            <col width="300"/>
            <thead>
              <tr valign="top">
                <td>Research objective</td>
                <td>Study</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Victimization risk factors</td>
                <td>[<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref26">26</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Perpetration predictive factors</td>
                <td>[<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref28">28</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Psychological effects</td>
                <td>[<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref16">16</xref>-<xref ref-type="bibr" rid="ref21">21</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Security awareness</td>
                <td>[<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref30">30</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Automated detection</td>
                <td>[<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Cyberbullying demographics</td>
                <td>[<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref33">33</xref>-<xref ref-type="bibr" rid="ref35">35</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Cyberbullying versus in-person bullying</td>
                <td>[<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref36">36</xref>]</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Forms of Cyberbullying</title>
        <p>Limitations relating to the establishment of concrete definitions are an issue in cyberbullying research; however, a new body of research, which began in 2014, created new definitions for cybervictimization and differentiated it from traditional bullying [<xref ref-type="bibr" rid="ref35">35</xref>]. Cyberbullying events can occur in many ways [<xref ref-type="bibr" rid="ref34">34</xref>]. The most prominent methods are flaming, when a person sends angry or vulgar messages; harassment, when there is a consistent stream of offensive messages; denigration, when damaging messages about the target are sent to other associates of the target; masquerading, when the victim’s identity is stolen to imitate harmful or damaging messages produced by another entity; trickery, when the victim is deceived into providing personal information; exclusion, when a victim is ostracized from a social group [<xref ref-type="bibr" rid="ref34">34</xref>]; stalking, when a person hacks or obtains personal information from a victim’s social media profile to determine their location and whereabouts; and blackmailing, when anonymous emails, telephone calls, and private messages are sent to a person to solicit money or actions from the victim [<xref ref-type="bibr" rid="ref34">34</xref>].</p>
      </sec>
      <sec>
        <title>Demographics</title>
        <p>The demographics in this review included children, adults, both genders, and various social groups. People of any age or status can be the subject of a cyberbullying incident [<xref ref-type="bibr" rid="ref33">33</xref>]. Incidents present threats in several circles of interpersonal relations. Employed adults experience work position as a risk factor; 40% of people cyberbullied in the workplace are in some supervisory position [<xref ref-type="bibr" rid="ref33">33</xref>]. Furthermore, 10% of working adults are survivors of cyberbullying [<xref ref-type="bibr" rid="ref33">33</xref>]; however, adolescents between the ages of 13 and 21 years are more vulnerable to peer victimization [<xref ref-type="bibr" rid="ref22">22</xref>]. Internet anonymity and the ability to interact with anyone anywhere pose severe risks [<xref ref-type="bibr" rid="ref22">22</xref>]. Adolescents are using technological resources at the record rates [<xref ref-type="bibr" rid="ref25">25</xref>]. Smartphones are the most common ICTs used by adolescents and can be accessed from any location with cellular service [<xref ref-type="bibr" rid="ref1">1</xref>]. Large percentages of females are exposed to threatening messages (50%), stalkers (32%), requests for sexual information (27%), requests for self-sexual images (20%), and cyberbullying (17%) [<xref ref-type="bibr" rid="ref1">1</xref>]. Adolescent males who had access to social media through ICTs became exposed to threatening messages (26%), requests for sexual information (15%), cyberbullying (14%), stalkers (14%), and requests for self-sexual images (10%) after use [<xref ref-type="bibr" rid="ref1">1</xref>]. The variability in risks, such as substance abuse, self-harm, cybervictimization, and depressive symptoms, caused by these forms of exposure on various age groups is still new in academic study [<xref ref-type="bibr" rid="ref1">1</xref>].</p>
        <p>Studies suggest adolescent females are victimized at the highest rates [<xref ref-type="bibr" rid="ref35">35</xref>]. They are more at risk in their teenage years than males, facing cyberbullying rates of 18% at the age of 13, 15% at 14, 24% at 15, and 21% at 16 [<xref ref-type="bibr" rid="ref1">1</xref>]. Studies among college students showed that 44% of the female students reported experiencing some form of cybervictimization [<xref ref-type="bibr" rid="ref35">35</xref>]. Cyberbullying is experienced by both males and females, yet there are many differences in the frequency of victimization that requires investigation.</p>
        <p>University students reported that 50% of the cyberbullying they experienced was from classmates, 57% was from outside sources, and 43% was from unrelated individuals [<xref ref-type="bibr" rid="ref34">34</xref>]. Cyberbullying has become a commonplace in higher education, with half of the college age students encountering it in some form. The investigated demographics are listed in <xref ref-type="table" rid="table2">Table 2</xref>.</p>
        <p>Age, gender, and social status provided the most contextual information in the research. These factors may imply trends in cyberbullying.</p>
        <table-wrap position="float" id="table2">
          <label>Table 2</label>
          <caption>
            <p>Demographics investigated by researchers.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="700"/>
            <col width="300"/>
            <thead>
              <tr valign="top">
                <td>Investigated demographics</td>
                <td>Study</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Gender</td>
                <td>[<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Social status</td>
                <td>[<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref34">34</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Age</td>
                <td>[<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>,<xref ref-type="bibr" rid="ref33">33</xref>]</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Causes</title>
        <p>Predictive factors indicate where cyberbullying may occur. A factor may provide information about the perpetrator or the survivor. The literature identifies several factors that range from visual appearance to personal history. Studies have shown [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref37">37</xref>-<xref ref-type="bibr" rid="ref39">39</xref>] several initiators of cyberbullying. The leading factor among cyberbullying perpetrators is the presence of normative thinking, peer pressure, and involvement in normatively aggressive peer groups [<xref ref-type="bibr" rid="ref37">37</xref>]. The peer group is often the most influential group in a person’s social experience, especially among youth [<xref ref-type="bibr" rid="ref37">37</xref>]. Low self-control and difficulty discerning moral identity are factors that allow peer pressure to inform a person’s actions [<xref ref-type="bibr" rid="ref4">4</xref>]. When a social event is normalized in the peer group, the subject views the interaction as agreeable even when it contradicts pre-existing moral values [<xref ref-type="bibr" rid="ref37">37</xref>].</p>
        <p>An individual’s perspective on their performance affects their decisions, this is known as self-concept [<xref ref-type="bibr" rid="ref19">19</xref>]. Self-concept is formally defined as “the relatively stable schemata of oneself that are generalized to the extent that they refer to an individual’s view of him- or herself across different situations” [<xref ref-type="bibr" rid="ref19">19</xref>]. Social success is a salient indicator of happiness and a driver of behaviors [<xref ref-type="bibr" rid="ref19">19</xref>]. In a study on psychological outcomes in social media interactions, a positive correlation was found between high self-concept and social success in peer groups [<xref ref-type="bibr" rid="ref19">19</xref>]. An individual’s view of themselves is affected by environmental factors, such as household income, parental marriage status, gender, and their access to social resources and community [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]. In a study in Iran by Kabiri et al [<xref ref-type="bibr" rid="ref4">4</xref>], poor performance in school and growing up in a low-income household also had positive correlations with perpetration likelihoods [<xref ref-type="bibr" rid="ref4">4</xref>]. Another study of male boarding students corroborated the correlation of low-income students and cyberbullying [<xref ref-type="bibr" rid="ref23">23</xref>]. These students are more likely to be perpetrators and have a higher vulnerability to peer victimization [<xref ref-type="bibr" rid="ref24">24</xref>], given that early age interactions and social development may be limited when certain activities are prevented by a payment gap. Weak emotional bonds with parents and high discipline levels are common in perpetrators [<xref ref-type="bibr" rid="ref26">26</xref>]. Both genders present similar likelihoods of becoming cyberaggressors [<xref ref-type="bibr" rid="ref38">38</xref>].</p>
        <p>Trends in the studies show the social behaviors of participants who reported receiving negative remarks, unwanted sexual suggestions or images, negativity from peers, humiliating targeted posts or had their accounts hacked [<xref ref-type="bibr" rid="ref28">28</xref>]. The first major identifier was the tendency to post indiscreet information and content on social platforms without security [<xref ref-type="bibr" rid="ref28">28</xref>]. This factor is positively associated with victimization likelihood and accounts for 18% variance in data [<xref ref-type="bibr" rid="ref28">28</xref>]. There is a correlation between security and victimization incidents. Often, those who are victimized lack security on their social media profiles or are not equipped with the skills to implement security on their own [<xref ref-type="bibr" rid="ref28">28</xref>]. A study by Saridakis et al [<xref ref-type="bibr" rid="ref30">30</xref>] demonstrated that higher awareness of security risks and an ability to control generated information actively creates safer and more user-friendly environments, critical in preventing the likelihood of victimizing events.</p>
        <p>Another contributing factor is facial features. A study on visual perception found that survivors of social ostracization (ie, exclusion by general consent from social acceptance of a group) are likely to be those whose faces are perceived as being incompetent and <italic>cold</italic> (unfriendly) [<xref ref-type="bibr" rid="ref39">39</xref>].</p>
        <p>Causes of cybervictimization events include factors of the environment, individual behavior, and ideations of the self and the environment. Several initiators complicate prediction and may need to be addressed individually.</p>
        <p>A detailed list of studies related to causes of perpetration and victimization is shown in <xref ref-type="table" rid="table3">Table 3</xref>.</p>
        <table-wrap position="float" id="table3">
          <label>Table 3</label>
          <caption>
            <p>Causes of cyberbullying perpetration and victimization events.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="700"/>
            <col width="300"/>
            <thead>
              <tr valign="top">
                <td>Causes</td>
                <td>Study</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Social pressures: peer grouping, social success</td>
                <td>[<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Web-based behavior: security awareness, social tendencies</td>
                <td>[<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref30">30</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Self-concept: identity development, social status, educational status</td>
                <td>[<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Public perception: perceived appearance, nonverbal interactions</td>
                <td>[<xref ref-type="bibr" rid="ref39">39</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Familial issues: marital status, home environment, parental relationships</td>
                <td>[<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref26">26</xref>]</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
      </sec>
      <sec>
        <title>Effects of Cyberbullying</title>
        <p>Effects are a crucial portion of the research because they contain results related to suicide and depression. Survivors of cybervictimization present high psychological distress, depression, and substance abuse [<xref ref-type="bibr" rid="ref21">21</xref>]. This phenomenon is distinct from traditional bullying in its psychological effects [<xref ref-type="bibr" rid="ref40">40</xref>]. Stress posting and oversharing are behaviors that often have a heavy correlation with cyberbullying [<xref ref-type="bibr" rid="ref41">41</xref>]. These behaviors also cause the individual to become more likely to be targeted by a cyberbully [<xref ref-type="bibr" rid="ref41">41</xref>] and suggest the possibility of cyclical processes. The scope of negative psychological outcomes of cyberbullying is summarized in <xref ref-type="table" rid="table4">Table 4</xref>.</p>
        <table-wrap position="float" id="table4">
          <label>Table 4</label>
          <caption>
            <p>Negative psychological outcomes of survivors of cyberbullying.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="700"/>
            <col width="300"/>
            <thead>
              <tr valign="top">
                <td>Negative psychological effects</td>
                <td>Study</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Social exclusion</td>
                <td>[<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Self-harm</td>
                <td>[<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref21">21</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Depressive symptoms</td>
                <td>[<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref40">40</xref>,<xref ref-type="bibr" rid="ref41">41</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Substance abuse</td>
                <td>[<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref40">40</xref>]</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>Social isolation, the experience of a person who has been ostracized from a social group, is a common effect of cybervictimization, as exclusion is a main tactic used in web-based cyberbullying [<xref ref-type="bibr" rid="ref13">13</xref>]. When a person is ostracized, it is common for them to lose a sense of agency because of removal from the group that facilitated their social mobility [<xref ref-type="bibr" rid="ref13">13</xref>]. Social agency is the feeling of control over one’s actions and the effects of those actions [<xref ref-type="bibr" rid="ref13">13</xref>]. In some cases, bullies may use others within a social circle to isolate a person without directly involving themselves [<xref ref-type="bibr" rid="ref32">32</xref>]. Facial features that fail to evoke feelings of empathy from viewers play a role in the likelihood of social exclusion [<xref ref-type="bibr" rid="ref39">39</xref>]. High amounts of supplementary web-based communication have been closely associated with feelings of social isolation [<xref ref-type="bibr" rid="ref19">19</xref>]. When a person has been socially ostracized, they find it harder to rally social support, as being isolated may corrode most of their social connections [<xref ref-type="bibr" rid="ref18">18</xref>]. Still, it is uncommon for cyberbullying to spill over into real-world interactions. A study by Pabian et al [<xref ref-type="bibr" rid="ref36">36</xref>] found cases often stay exclusively on the internet or offline.</p>
        <p>Disadvantaged adolescents are often involved with the misuse of ICTs and become tangentially exposed to self-harm, substance abuse, and suicidal ideations [<xref ref-type="bibr" rid="ref21">21</xref>]. These youth tend to develop habits of misusing personal data and neglecting social relationships and schoolwork, leading to sexual abuse, blackmail, threats, and, in some cases, the incitation of violence [<xref ref-type="bibr" rid="ref1">1</xref>]. Events such as social exclusion, self-harm, substance abuse, and depressive symptoms were emphasized heavily in the literature.</p>
      </sec>
      <sec>
        <title>Methods of Prevention and Amelioration</title>
        <p>There is limited research on approaches for deterring or recovering from cybervictimization. Social support is a generalized approach for social issues brought into the domain of cybervictimization. New research on technical prevention is scarce and have limited effectiveness. We found 3 studies that investigated potential methods for cyberbullying detection [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. A study on the social networking site ASKfm provides research on a machine learning support vector machine classifier that detects instances of aggressive communication [<xref ref-type="bibr" rid="ref22">22</xref>]. Experiments showed that 64% was the highest accuracy achieved by the algorithm [<xref ref-type="bibr" rid="ref22">22</xref>]. A study by Ptaszynski et al [<xref ref-type="bibr" rid="ref31">31</xref>] in 2016 found that natural language processing tested a 30% drop in performance over just a year of testing.</p>
        <p>Cybervictimization incidents are embarrassing events, which can cause repression of experiences and discourage social support requests [<xref ref-type="bibr" rid="ref43">43</xref>]. Social support is the tangible and intangible assistance from friends, partners, family members, and others [<xref ref-type="bibr" rid="ref11">11</xref>]. Members in a community encourage and affirm an individual to stabilize their mental health and improve their self-concept [<xref ref-type="bibr" rid="ref11">11</xref>]. Social support can occur on the internet or in-person. Web-based intervention is useful in isolation as it benefits those without in-person social support systems [<xref ref-type="bibr" rid="ref11">11</xref>]. Assistance through social support occurs before or after an individual encounters cyberaggression [<xref ref-type="bibr" rid="ref24">24</xref>]. Social support has produced reliable results in ameliorating cybervictimization effects [<xref ref-type="bibr" rid="ref24">24</xref>]. Adolescents who perceived high levels of social support from family members were less likely to experience cyberbullying [<xref ref-type="bibr" rid="ref24">24</xref>]. Social support actively reduces the effects of ongoing cyberbullying [<xref ref-type="bibr" rid="ref11">11</xref>]. On average, males required more social support in these instances than females [<xref ref-type="bibr" rid="ref24">24</xref>]. Multiple intersections of gender in the literature may prove to be a salient factor for future research. There were articles on investigating methods of prevention [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref42">42</xref>] and on investigating amelioration [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref42">42</xref>].</p>
      </sec>
      <sec>
        <title>Research Methods of Current Studies</title>
        <p>We identified 4 research methods: exploratory, experimental, longitudinal, and cross-sectional. For this review, exploratory design is defined as research conducted in domains with little or no previous study. These studies are often foundational for future research and promote familiarity with the scope of the research. Experimental design is defined as an approach where the researcher has control of all the variables being manipulated and observed. The focus of these studies is accurately predicting and modeling an outcome based on a hypothesis. Longitudinal design is defined as a study that takes place with a recurring sample over a fixed length of time. Longitudinal studies focus on changes and patterns that develop over long time frames. Cross-sectional design does not rely on time and focuses on existing differences between sample members for one-time data collection. Cross-sectional studies were the most common, given quick access to information through population surveys. The study designs are displayed in <xref ref-type="table" rid="table5">Table 5</xref>.</p>
        <p>There are 2 types of data analysis in the studies: qualitative and quantitative analysesQualitative analysis is defined as descriptions of specific situations; for example, the use of interviews, observations, and documents to describe things. Quantitative analysis is defined as data that are represented in numerical form, such as frequencies and averages: these are measurements. In this study, quantitative analysis was the most prominent. The analysis types by article are listed in <xref ref-type="table" rid="table6">Table 6</xref>.</p>
        <table-wrap position="float" id="table5">
          <label>Table 5</label>
          <caption>
            <p>Designs of the reviewed studies.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="500"/>
            <col width="500"/>
            <thead>
              <tr valign="top">
                <td>Design</td>
                <td>Study</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Cross-sectional</td>
                <td>[<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref11">11</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref25">25</xref>-<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref44">44</xref>,<xref ref-type="bibr" rid="ref45">45</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Experimental</td>
                <td>[<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref20">20</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref43">43</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Longitudinal</td>
                <td>[<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref40">40</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Exploratory</td>
                <td>[<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <table-wrap position="float" id="table6">
          <label>Table 6</label>
          <caption>
            <p>Methods of analysis in the reviewed studies.</p>
          </caption>
          <table width="1000" cellpadding="5" cellspacing="0" border="1" rules="groups" frame="hsides">
            <col width="500"/>
            <col width="500"/>
            <thead>
              <tr valign="top">
                <td>Data type</td>
                <td>Study</td>
              </tr>
            </thead>
            <tbody>
              <tr valign="top">
                <td>Quantitative analysis</td>
                <td>[<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref10">10</xref>-<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref18">18</xref>-<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref23">23</xref>-<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref30">30</xref>-<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>,<xref ref-type="bibr" rid="ref37">37</xref>-<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref43">43</xref>,<xref ref-type="bibr" rid="ref45">45</xref>]</td>
              </tr>
              <tr valign="top">
                <td>Qualitative analysis</td>
                <td>[<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref36">36</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]</td>
              </tr>
            </tbody>
          </table>
        </table-wrap>
        <p>Throughout the review, important factors across the articles were determined. <xref ref-type="supplementary-material" rid="app1">Multimedia Appendix 1</xref> [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref10">10</xref>-<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref16">16</xref>,<xref ref-type="bibr" rid="ref18">18</xref>-<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref31">31</xref>-<xref ref-type="bibr" rid="ref44">44</xref>] summarizes salient information relating to the research processes used in each study. The author’s findings and limitations are summarized for reference. Methods for the deployment of individual studies were recorded as well as the target age demographics. Information relevant to the scope of the review discovered was recorded under social media factors.</p>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <sec>
        <title>Principal Findings</title>
        <p>Our review examines current articles relating to cyberbullying and identifies trends in perpetration and victimization. This contributes to the discussion of cyberbullying prevention approaches given the lack of sufficient technologies to censor it from its victims, likely perpetrators and victims, and consequences of their occurrence. The results provide predictive information relating to age, social status, and gender as well as information on types of cyberbullying, where they occur, and their effects.</p>
        <p>We found various forms of cyberbullying in the literature that carry specific psychological effects. Gaps in research design limit the understanding of these events. Cyberbullying incidents carry serious mental health effects for victims leading to psychological disorders and suicidal ideations. New studies have shown that cyberbullying leads to real-world decisions, such as self-harm, abuse, and substance abuse [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref10">10</xref>]. Our review discerned information about the types of people and behaviors associated with cyberbullying victimization and perpetration. Most of those who are affected are adolescents and college students as well as children. Cyberbullying perpetration varies by age, social class, family life, and academic standing. The resources a person has in their community also affect the way someone can cope with being victimized. Cyberbullying is preventable and mitigatable. The most successful form of prevention of cyberbullying is robust social support systems, as technology cannot provide solid methods for counteraction in real time.</p>
        <p>There is a lack in information on cybervictimization perpetrators because of the self-report nature of most surveys [<xref ref-type="bibr" rid="ref23">23</xref>]. First, many involved in cyberaggression and victimization refuse to participate in studies even when anonymity is ensured by the facilitators [<xref ref-type="bibr" rid="ref23">23</xref>]. Second, a wide margin of the survey-based studies used cross-sectional methods making it difficult to discern causation of the discovered effects [<xref ref-type="bibr" rid="ref2">2</xref>,<xref ref-type="bibr" rid="ref10">10</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref24">24</xref>,<xref ref-type="bibr" rid="ref26">26</xref>,<xref ref-type="bibr" rid="ref27">27</xref>,<xref ref-type="bibr" rid="ref38">38</xref>]. It is not possible to make concrete causal links to behaviors without a long-term process [<xref ref-type="bibr" rid="ref34">34</xref>]. Of the studies that used longitudinal methods, causal links, such as the direct relation to victimization and substance abuse, were discovered [<xref ref-type="bibr" rid="ref21">21</xref>]. Third, given the emergent status of cybervictimization, there are various discoveries throughout the literature that reveal new factors not previously associated with cybervictimization that have value in its scope [<xref ref-type="bibr" rid="ref33">33</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]. The impact of technologies on social relationships is likely an important factor relating to risk factors [<xref ref-type="bibr" rid="ref33">33</xref>]. Fourth, there are significant limitations on the basis of demographics surveyed in many of the cross-sectional studies [<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref42">42</xref>,<xref ref-type="bibr" rid="ref46">46</xref>]. Cybervictimization is closely linked with social habits that may vary across different countries and in different social spheres [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref19">19</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref30">30</xref>,<xref ref-type="bibr" rid="ref37">37</xref>,<xref ref-type="bibr" rid="ref41">41</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. Most of the literature focuses on participants above the age of 17; however, there are several indications that it may become rampant in children and teenage social spheres [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref17">17</xref>,<xref ref-type="bibr" rid="ref23">23</xref>]. Trends in access to technology allow vulnerable age groups to access ICTs [<xref ref-type="bibr" rid="ref1">1</xref>]. Research should focus on these phenomena using longitudinal design to interpret the unique issues in child cyberbullying. Finally, studies that included text monitoring systems did not experience acceptable success rates within their testing periods [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. High rates of accuracy are required for filtering methods to be efficient; among the studies, 65% accuracy was the highest rate produced given the limitations in syntactic nuance [<xref ref-type="bibr" rid="ref22">22</xref>]. Syntactic analysis of aggressive interactions is difficult to discern from healthy interactions given disparate standards of communication across web-based platforms [<xref ref-type="bibr" rid="ref22">22</xref>]. Research on language in insular internet communities should be investigated to expand understandings of web-based communication.</p>
      </sec>
      <sec>
        <title>Forms of Cyberbullying</title>
        <p>Among the types of cyberbullying (flaming, harassment, denigration, masquerading, trickery, exclusion, stalking, and blackmailing), some give rise to dangerous effects, such as social isolation and suicidal ideations. Information on the frequency of the various types of cyberbullying events should be investigated to determine the implications of each form. Research should be driven on the forms that have the highest correlation to suicidality and depressive symptoms. Behaviors that lead to physical harm and death require the quickest responses.</p>
      </sec>
      <sec>
        <title>Demographics</title>
        <p>Recent reviews of cyberbullying literature lack detailed information on salient factors in predicting and preventing its occurrence in youth and adults. Given that cyberbullying is beginning to be seen in places such as elementary schools, with as high as 85% rates of web-based messaging use in preteen populations, research is crucial to assure the mental health of younger students. Adults are less vulnerable; yet, more research is required to fully understand the complex relations in the workplace surrounding cybervictimization [<xref ref-type="bibr" rid="ref23">23</xref>]. Gender may play a role in the likelihood of victimization, as females see higher rates of exposure to cyberbullying [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref35">35</xref>]. Females receive more consistent support than males [<xref ref-type="bibr" rid="ref11">11</xref>]. Peer groups and setting plays a large role in determining if someone may cyberbully or be victimized. Developing children are exposed to fluctuations of these dimensions of their social experience before understanding the complexities of social interactions [<xref ref-type="bibr" rid="ref9">9</xref>]. Counseling resources are effective in handling distress in cyberbullying event. Those who are likely to be victimized share information at high frequencies on social media accounts, have high engagement levels with social media platforms, and have very little understanding of the importance of personal information security [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref28">28</xref>,<xref ref-type="bibr" rid="ref30">30</xref>]. This emphasizes the need for research on young children with access to ICTs.</p>
      </sec>
      <sec>
        <title>Negative Mental Health Outcomes</title>
        <p>Cybervictimization can result in negative mental health outcomes, including depressive symptoms, suicidal ideations, and substance abuse, which are prevalent for young adults and adolescents between the ages of 15 and 23 [<xref ref-type="bibr" rid="ref10">10</xref>]. These victimization events cause depression and can lead to the deterioration of self-concept and academic performance of students. Social exclusion, a process where individuals are excluded from their social circles, can cause them to lose their perceived agency and expediate other negative mental processes [<xref ref-type="bibr" rid="ref13">13</xref>]. This can result in unhappiness that drives victims to depend on web-based interactions for social experience [<xref ref-type="bibr" rid="ref12">12</xref>]. The dangers as well as mental abuse, sexual abuse, and drug use are even more of a threat to younger victims as they will have less utility to navigate social complexities than their older counterparts [<xref ref-type="bibr" rid="ref1">1</xref>]. This is problematic in a time when intentional studies prove that victimization events on occasion escalate to face-to-face interactions and altercations [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref8">8</xref>].</p>
      </sec>
      <sec>
        <title>Effective Cyberbullying Prevention</title>
        <p>The effects of cyberbullying can be ameliorated by social support [<xref ref-type="bibr" rid="ref11">11</xref>]. Web-based social support is effective for those who lack strong social connections [<xref ref-type="bibr" rid="ref11">11</xref>]. College students and working age adults who are away from family environments for work or school could benefit from these web-based systems. Children and adolescents whose families are present in day-to-day life benefit more from in-person social support intervention, where development of communication and support practices occur through pre-existing relationships. One challenge for social support outreach is that social ostracization can cause victims to lose their sense of agency and steer away from forms of social support [<xref ref-type="bibr" rid="ref24">24</xref>]. Negative feelings associated with cyberbullying can cause victims to feel incapable of expressing their experiences and suppress them [<xref ref-type="bibr" rid="ref43">43</xref>]. During these events outreach can only be initiated if the victim is willing to divulge information about the instance. Given the volatility of events after initiation and the tendency for victims to become isolated, preventive measures are key in protecting the mental stability of the victim [<xref ref-type="bibr" rid="ref13">13</xref>].</p>
        <p>The current methods of automatic detection [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref31">31</xref>] struggle with nuance in web-based communications. Ptaszynski et al [<xref ref-type="bibr" rid="ref31">31</xref>] extracted phrases and categorized them by harmfulness, based on seed words detected in specific phrases. This study used syntactic positioning of words to determine harmfulness within the messages [<xref ref-type="bibr" rid="ref31">31</xref>]. This approach achieved up to 90% accuracy but dropped in performance because of the limitations in further data extraction and issues categorizing nonharmful phrases [<xref ref-type="bibr" rid="ref31">31</xref>]. Future models should continue optimization and include nonharmful entries and neutral phrases. Van Hee et al [<xref ref-type="bibr" rid="ref22">22</xref>] used ASKfm training data sets for phrase annotation with the objective of classifying the role of the participants of the cyberbullying event and the type of cyberbullying that occurred. This approach achieved up to 64% accuracy but lacked context for concise classification of cyberbullying types and could not accurately determine participant roles [<xref ref-type="bibr" rid="ref22">22</xref>]. A new model that detects sentiments of the victim, rather than incitement from the perpetrator should be studied for more accurate determination of cyberaggression [<xref ref-type="bibr" rid="ref22">22</xref>]. The language of different social groups can take many forms in web-based discourse and can range a wide spectrum of literal and coded speech that is rarely clear cut for unexperienced readers. The model should identify speech patterns on the basis of a sizable history of interaction to make accurate predictions rather than simply classifying based on detected words and phrases.</p>
        <p>Early intervention is a potential approach for prevention. Research should be headed to investigate the effects of poverty, social stressors, parent marital status, and environment on internet behaviors and tendencies [<xref ref-type="bibr" rid="ref4">4</xref>,<xref ref-type="bibr" rid="ref37">37</xref>]. Cyberbullying can be combated by intervention, with different methods for web-based spaces. Given additional data, victim prevention and treatment can be improved. Research on how cyberbullying effects specific geographic regions, ethnic groups, and age ranges [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref18">18</xref>,<xref ref-type="bibr" rid="ref21">21</xref>,<xref ref-type="bibr" rid="ref23">23</xref>] should also be continued; these factors may often determine the psychological outcomes of the victim. New research should offer new perspectives for preventing the proliferation of cyberbullying and social isolation.</p>
        <p>There are many technologies that are in development today that could be beneficial if applied to the study and prevention of cyberbullying [<xref ref-type="bibr" rid="ref22">22</xref>,<xref ref-type="bibr" rid="ref31">31</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]. Natural language processing is widely studied today and can be the basis for understanding and preventing cyberbullying [<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref42">42</xref>]. Methods of recovery are also being studied through social support programs [<xref ref-type="bibr" rid="ref24">24</xref>]. Recovery efforts are common for general depression and anxiety and should be improved to focus on issues specifically related to cyberbullying. An example of this is social support programs that promote emotional health [<xref ref-type="bibr" rid="ref11">11</xref>]. Similarly, a method of deployment of social support programs to isolated individuals using technology should be further investigated to provide for the event of social isolation caused by cyberbullying</p>
      </sec>
      <sec>
        <title>Limitations</title>
        <p>The review was limited to 3 specific databases, therefore information about surveys and other research studies on other major and minor databases is excluded from this review. This narrows the scope of information available for consideration in the review to the largest and most beneficial database but may omit potentially useful granular data. The search did not include any articles that lacked information specific to cyberbullying, this means that information pertaining to more general bullying studies that proved pertinent was included. Articles on young children were limited in data about social phenomena influencing behaviors relating to ICTs, making it more difficult to assess the relationship between young children and cyberbullying trends. More longitudinal studies would assist in the understanding of perpetrators and the relations of victim likelihood within adult and child populations [<xref ref-type="bibr" rid="ref26">26</xref>]. In future research, longitudinal studies are required [<xref ref-type="bibr" rid="ref26">26</xref>] for tracking cyberbullying victims and perpetrators to support a comprehensive evaluation of their behaviors and outcomes.</p>
      </sec>
      <sec>
        <title>Conclusions</title>
        <p>Cyberbullying is a newly emerging phenomenon that has proliferated through the global rise of ICTs that began to converge internationally between 2000 and 2008 [<xref ref-type="bibr" rid="ref2">2</xref>]. Previous reviews have highlighted the severity of the phenomenon [<xref ref-type="bibr" rid="ref6">6</xref>,<xref ref-type="bibr" rid="ref47">47</xref>,<xref ref-type="bibr" rid="ref48">48</xref>], yet do not address solutions combating the rapid advance of cybervictimization in the social media era. To confront cybervictimization in the social media era, reevaluation of factors in the scope of the current research and longer-term longitudinal studies for causal links to be ascertained regarding suicidal or depressive symptoms is required. A larger emphasis on demographic groups should be taken to make clear determinations about how cyberbullying effects people of varying age, race, gender, and economic class. Ho et al [<xref ref-type="bibr" rid="ref2">2</xref>] noted a wide range of ICT activity across resource-limited and transitional countries; however, few countries have been explicitly studied. Future research should be carried out in more geographic locations, as it requires holistic representation of disparate racial and gender populations. Relations between cyberbullying and predictive factors, such as low socioeconomic status, gender, and the presence of divorce, were identified in addition to studies drawing associations between cybervictimization and mental health outcomes, such as depressive and suicidal ideations. Ideations have been shown to lead to lower academic performance, retaliatory action, and suicide. Detection is a relevant method of counteracting the effects of cyberbullying on youth and adult populations and needs consistent research to keep pace with the rate of ICT growth. Detecting instances of cyberaggression is a challenging process given the nuances of web-based communication and the self-report nature of events [<xref ref-type="bibr" rid="ref12">12</xref>]. Discovery of ongoing victimization incidents is necessary to reach current victims of cyberbullying, while predictive factors and preventive measures are required to halt future growth.</p>
      </sec>
    </sec>
  </body>
  <back>
    <app-group>
      <supplementary-material id="app1">
        <label>Multimedia Appendix 1</label>
        <p>Summary of individual studies.</p>
        <media xlink:href="formative_v6i1e30286_app1.docx" xlink:title="DOCX File , 30 KB"/>
      </supplementary-material>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">ICT</term>
          <def>
            <p>internet communication technology</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>The project was supported, in part, by funds provided by the University of North Carolina at Charlotte.</p>
    </ack>
    <fn-group>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Maoneke</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Shava</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Gamundani</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Bere-Chitauro</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Nhamu</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>ICTs use and cyberspace risks faced by adolescents in Namibia</article-title>
          <source>Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities</source>
          <year>2018</year>
          <conf-name>AfriCHI '18: 2nd African Conference for Human Computer Interaction</conf-name>
          <conf-date>Dec 3-7, 2018</conf-date>
          <conf-loc>Windhoek Namibia</conf-loc>
          <pub-id pub-id-type="doi">10.1145/3283458.3283483</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Doong</surname>
              <given-names>SH</given-names>
            </name>
            <name name-style="western">
              <surname>Ho</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>The impact of ICT development on the global digital divide</article-title>
          <source>Electron Commer Res Appl</source>
          <year>2012</year>
          <volume>11</volume>
          <issue>5</issue>
          <fpage>518</fpage>
          <lpage>33</lpage>
          <pub-id pub-id-type="doi">10.1016/j.elerap.2012.02.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>PK</given-names>
            </name>
            <name name-style="western">
              <surname>Mahdavi</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Carvalho</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Fisher</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Russell</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Tippett</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying: its nature and impact in secondary school pupils</article-title>
          <source>J Child Psychol Psychiatry</source>
          <year>2008</year>
          <month>04</month>
          <volume>49</volume>
          <issue>4</issue>
          <fpage>376</fpage>
          <lpage>85</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1469-7610.2007.01846.x</pub-id>
          <pub-id pub-id-type="medline">18363945</pub-id>
          <pub-id pub-id-type="pii">JCPP1846</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kabiri</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Shadmanfaat</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Choi</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Yun</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>The impact of life domains on cyberbullying perpetration in Iran: a partial test of Agnew's general theory of crime</article-title>
          <source>J Crim Justice</source>
          <year>2020</year>
          <volume>66</volume>
          <fpage>101633</fpage>
          <pub-id pub-id-type="doi">10.1016/j.jcrimjus.2019.101633</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Olweus</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Limber</surname>
              <given-names>SP</given-names>
            </name>
          </person-group>
          <article-title>Some problems with cyberbullying research</article-title>
          <source>Curr Opin Psychol</source>
          <year>2018</year>
          <month>02</month>
          <volume>19</volume>
          <fpage>139</fpage>
          <lpage>43</lpage>
          <pub-id pub-id-type="doi">10.1016/j.copsyc.2017.04.012</pub-id>
          <pub-id pub-id-type="medline">29279213</pub-id>
          <pub-id pub-id-type="pii">S2352-250X(17)30103-3</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bottino</surname>
              <given-names>SM</given-names>
            </name>
            <name name-style="western">
              <surname>Bottino</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Regina</surname>
              <given-names>CG</given-names>
            </name>
            <name name-style="western">
              <surname>Correia</surname>
              <given-names>AV</given-names>
            </name>
            <name name-style="western">
              <surname>Ribeiro</surname>
              <given-names>WS</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying and adolescent mental health: systematic review</article-title>
          <source>Cad Saude Publica</source>
          <year>2015</year>
          <month>03</month>
          <volume>31</volume>
          <issue>3</issue>
          <fpage>463</fpage>
          <lpage>75</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://www.scielo.br/scielo.php?script=sci_arttext&#38;pid=S0102-311X2015000300463&#38;lng=en&#38;nrm=iso&#38;tlng=en"/>
          </comment>
          <pub-id pub-id-type="doi">10.1590/0102-311x00036114</pub-id>
          <pub-id pub-id-type="medline">25859714</pub-id>
          <pub-id pub-id-type="pii">S0102-311X2015000300463</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Corcoran</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Guckin</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Prentice</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying or cyber aggression?: a review of existing definitions of cyber-based peer-to-peer aggression</article-title>
          <source>Societies</source>
          <year>2015</year>
          <month>03</month>
          <day>27</day>
          <volume>5</volume>
          <issue>2</issue>
          <fpage>245</fpage>
          <lpage>55</lpage>
          <pub-id pub-id-type="doi">10.3390/soc5020245</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Donegan</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Bullying and cyberbullying: history, statistics, law, prevention and analysis</article-title>
          <source>Elon J Undergrad Res Commun</source>
          <year>2012</year>
          <volume>3</volume>
          <fpage>33</fpage>
          <lpage>42</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Coley</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Spielvogel</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Kruzik</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Miller</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Betancur</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Votruba-Drzal</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Explaining income disparities in young children’s development: the role of community contexts and family processes✰</article-title>
          <source>Early Child Res Q</source>
          <year>2021</year>
          <volume>55</volume>
          <fpage>295</fpage>
          <lpage>311</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ecresq.2020.12.006</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cénat</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Hébert</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Derivois</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Cybervictimization and suicidality among French undergraduate students: a mediation model</article-title>
          <source>J Affect Disord</source>
          <year>2019</year>
          <month>04</month>
          <day>15</day>
          <volume>249</volume>
          <fpage>90</fpage>
          <lpage>5</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jad.2019.02.026</pub-id>
          <pub-id pub-id-type="medline">30769296</pub-id>
          <pub-id pub-id-type="pii">S0165-0327(18)32366-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cole</surname>
              <given-names>DA</given-names>
            </name>
            <name name-style="western">
              <surname>Nick</surname>
              <given-names>EA</given-names>
            </name>
            <name name-style="western">
              <surname>Zelkowitz</surname>
              <given-names>RL</given-names>
            </name>
            <name name-style="western">
              <surname>Roeder</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Spinelli</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Online social support for young people: does it recapitulate in-person social support; can it help?</article-title>
          <source>Comput Human Behav</source>
          <year>2017</year>
          <month>03</month>
          <volume>68</volume>
          <fpage>456</fpage>
          <lpage>64</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28993715"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.chb.2016.11.058</pub-id>
          <pub-id pub-id-type="medline">28993715</pub-id>
          <pub-id pub-id-type="pmcid">PMC5630180</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Williford</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Orsi</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>DePaolis</surname>
              <given-names>KJ</given-names>
            </name>
            <name name-style="western">
              <surname>Debbie</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Cyber and traditional peer victimization: examining unique associations with children’s internalizing difficulties</article-title>
          <source>Child Youth Serv Rev</source>
          <year>2018</year>
          <month>10</month>
          <volume>93</volume>
          <fpage>51</fpage>
          <lpage>9</lpage>
          <pub-id pub-id-type="doi">10.1016/j.childyouth.2018.07.001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Malik</surname>
              <given-names>RA</given-names>
            </name>
            <name name-style="western">
              <surname>Obhi</surname>
              <given-names>SS</given-names>
            </name>
          </person-group>
          <article-title>Social exclusion reduces the sense of agency: evidence from intentional binding</article-title>
          <source>Conscious Cogn</source>
          <year>2019</year>
          <month>05</month>
          <volume>71</volume>
          <fpage>30</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.1016/j.concog.2019.03.004</pub-id>
          <pub-id pub-id-type="medline">30925284</pub-id>
          <pub-id pub-id-type="pii">S1053-8100(18)30534-8</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cacioppo</surname>
              <given-names>JT</given-names>
            </name>
            <name name-style="western">
              <surname>Cacioppo</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Capitanio</surname>
              <given-names>JP</given-names>
            </name>
            <name name-style="western">
              <surname>Cole</surname>
              <given-names>SW</given-names>
            </name>
          </person-group>
          <article-title>The neuroendocrinology of social isolation</article-title>
          <source>Annu Rev Psychol</source>
          <year>2015</year>
          <month>01</month>
          <day>03</day>
          <volume>66</volume>
          <fpage>733</fpage>
          <lpage>67</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/25148851"/>
          </comment>
          <pub-id pub-id-type="doi">10.1146/annurev-psych-010814-015240</pub-id>
          <pub-id pub-id-type="medline">25148851</pub-id>
          <pub-id pub-id-type="pmcid">PMC5130104</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Einarsen</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Hoel</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Notelaers</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Measuring exposure to bullying and harassment at work: validity, factor structure and psychometric properties of the Negative Acts Questionnaire-Revised</article-title>
          <source>Work Stress</source>
          <year>2009</year>
          <month>01</month>
          <volume>23</volume>
          <issue>1</issue>
          <fpage>24</fpage>
          <lpage>44</lpage>
          <pub-id pub-id-type="doi">10.1080/02678370902815673</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kim</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Shim</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Hay</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Unpacking the dynamics involved in the impact of bullying victimization on adolescent suicidal ideation: testing general strain theory in the Korean context</article-title>
          <source>Child Youth Serv Rev</source>
          <year>2020</year>
          <month>03</month>
          <volume>110</volume>
          <fpage>104781</fpage>
          <pub-id pub-id-type="doi">10.1016/j.childyouth.2020.104781</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pantic</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Online social networking and mental health</article-title>
          <source>Cyberpsychol Behav Soc Netw</source>
          <year>2014</year>
          <month>10</month>
          <volume>17</volume>
          <issue>10</issue>
          <fpage>652</fpage>
          <lpage>7</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/25192305"/>
          </comment>
          <pub-id pub-id-type="doi">10.1089/cyber.2014.0070</pub-id>
          <pub-id pub-id-type="medline">25192305</pub-id>
          <pub-id pub-id-type="pmcid">PMC4183915</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Wang</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Chang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Hu</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Yen</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Relationships between traditional and cyber harassment and self-identity confusion among Taiwanese gay and bisexual men in emerging adulthood</article-title>
          <source>Compr Psychiatry</source>
          <year>2019</year>
          <month>04</month>
          <volume>90</volume>
          <fpage>14</fpage>
          <lpage>20</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S0010-440X(18)30217-7"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.comppsych.2018.12.015</pub-id>
          <pub-id pub-id-type="medline">30639893</pub-id>
          <pub-id pub-id-type="pii">S0010-440X(18)30217-7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Khan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Gagné</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Yang</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Shapka</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Exploring the relationship between adolescents' self-concept and their offline and online social worlds</article-title>
          <source>Comput Human Behav</source>
          <year>2016</year>
          <month>02</month>
          <volume>55</volume>
          <fpage>940</fpage>
          <lpage>5</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2015.09.046</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="confproc">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Birk</surname>
              <given-names>MV</given-names>
            </name>
            <name name-style="western">
              <surname>Buttlar</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Bowey</surname>
              <given-names>JT</given-names>
            </name>
            <name name-style="western">
              <surname>Poeller</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Thomson</surname>
              <given-names>SC</given-names>
            </name>
            <name name-style="western">
              <surname>Baumann</surname>
              <given-names>N</given-names>
            </name>
            <name name-style="western">
              <surname>Mandryk</surname>
              <given-names>RL</given-names>
            </name>
          </person-group>
          <article-title>The effects of social exclusion on play experience and hostile cognitions in digital games</article-title>
          <source>Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems</source>
          <year>2016</year>
          <conf-name>CHI '16: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems</conf-name>
          <conf-date>May 7 - 12, 2016</conf-date>
          <conf-loc>San Jose California USA</conf-loc>
          <pub-id pub-id-type="doi">10.1145/2858036.2858061</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cénat</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Blais</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Lavoie</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Caron</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Hébert</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying victimization and substance use among Quebec high schools students: the mediating role of psychological distress</article-title>
          <source>Comput Human Behav</source>
          <year>2018</year>
          <month>8</month>
          <volume>89</volume>
          <fpage>207</fpage>
          <lpage>12</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2018.08.014</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Van Hee</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Jacobs</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Emmery</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Desmet</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Lefever</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Verhoeven</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>De Pauw</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Daelemans</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Hoste</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <article-title>Automatic detection of cyberbullying in social media text</article-title>
          <source>PLoS One</source>
          <year>2018</year>
          <month>10</month>
          <day>8</day>
          <volume>13</volume>
          <issue>10</issue>
          <fpage>e0203794</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://dx.plos.org/10.1371/journal.pone.0203794"/>
          </comment>
          <pub-id pub-id-type="doi">10.1371/journal.pone.0203794</pub-id>
          <pub-id pub-id-type="medline">30296299</pub-id>
          <pub-id pub-id-type="pii">PONE-D-17-04760</pub-id>
          <pub-id pub-id-type="pmcid">PMC6175271</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Li</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Sidibe</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Shen</surname>
              <given-names>X</given-names>
            </name>
            <name name-style="western">
              <surname>Hesketh</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Incidence, risk factors and psychosomatic symptoms for traditional bullying and cyberbullying in Chinese adolescents</article-title>
          <source>Child Youth Serv Rev</source>
          <year>2019</year>
          <month>12</month>
          <volume>107</volume>
          <fpage>104511</fpage>
          <pub-id pub-id-type="doi">10.1016/j.childyouth.2019.104511</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Shaheen</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Hamdan</surname>
              <given-names>KM</given-names>
            </name>
            <name name-style="western">
              <surname>Albqoor</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Othman</surname>
              <given-names>AK</given-names>
            </name>
            <name name-style="western">
              <surname>Amre</surname>
              <given-names>HM</given-names>
            </name>
            <name name-style="western">
              <surname>Hazeem</surname>
              <given-names>MN</given-names>
            </name>
          </person-group>
          <article-title>Perceived social support from family and friends and bullying victimization among adolescents</article-title>
          <source>Child Youth Serv Rev</source>
          <year>2019</year>
          <month>12</month>
          <volume>107</volume>
          <fpage>104503</fpage>
          <pub-id pub-id-type="doi">10.1016/j.childyouth.2019.104503</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lareki</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Martínez de Morentin</surname>
              <given-names>JI</given-names>
            </name>
            <name name-style="western">
              <surname>Altuna</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Amenabar</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Teenagers' perception of risk behaviors regarding digital technologies</article-title>
          <source>Comput Human Behav</source>
          <year>2017</year>
          <month>03</month>
          <volume>68</volume>
          <fpage>395</fpage>
          <lpage>402</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2016.12.004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Livazović</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Ham</surname>
              <given-names>E</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying and emotional distress in adolescents: the importance of family, peers and school</article-title>
          <source>Heliyon</source>
          <year>2019</year>
          <month>06</month>
          <volume>5</volume>
          <issue>6</issue>
          <fpage>e01992</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2405-8440(19)35617-8"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.heliyon.2019.e01992</pub-id>
          <pub-id pub-id-type="medline">31338460</pub-id>
          <pub-id pub-id-type="pii">S2405-8440(19)35617-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC6606990</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Young</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Len-Ríos</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Young</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Romantic motivations for social media use, social comparison, and online aggression among adolescents</article-title>
          <source>Comput Human Behav</source>
          <year>2017</year>
          <month>10</month>
          <volume>75</volume>
          <fpage>385</fpage>
          <lpage>95</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2017.04.021</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kokkinos</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Saripanidis</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>A lifestyle exposure perspective of victimization through Facebook among university students. Do individual differences matter?</article-title>
          <source>Comput Human Behav</source>
          <year>2017</year>
          <month>09</month>
          <volume>74</volume>
          <fpage>235</fpage>
          <lpage>45</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2017.04.036</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Laranjo</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Social media and health behavior change</article-title>
          <source>Participatory Health Through Social Media</source>
          <year>2016</year>
          <publisher-loc>Cambridge</publisher-loc>
          <publisher-name>Academic Press</publisher-name>
          <fpage>83</fpage>
          <lpage>111</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Saridakis</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Benson</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Ezingeard</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Tennakoon</surname>
              <given-names>H</given-names>
            </name>
          </person-group>
          <article-title>Individual information security, user behaviour and cyber victimisation: an empirical study of social networking users</article-title>
          <source>Technol Forecast Soc Change</source>
          <year>2016</year>
          <month>01</month>
          <volume>102</volume>
          <fpage>320</fpage>
          <lpage>30</lpage>
          <pub-id pub-id-type="doi">10.1016/j.techfore.2015.08.012</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ptaszynski</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Masui</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Nitta</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Hatakeyama</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Kimura</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Rzepka</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Araki</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <article-title>Sustainable cyberbullying detection with category-maximized relevance of harmful phrases and double-filtered automatic optimization</article-title>
          <source>Int J Child Comput Interac</source>
          <year>2016</year>
          <month>05</month>
          <volume>8</volume>
          <fpage>15</fpage>
          <lpage>30</lpage>
          <pub-id pub-id-type="doi">10.1016/j.ijcci.2016.07.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Sánchez-Medina</surname>
              <given-names>AJ</given-names>
            </name>
            <name name-style="western">
              <surname>Galván-Sánchez</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Fernández-Monroy</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Applying artificial intelligence to explore sexual cyberbullying behaviour</article-title>
          <source>Heliyon</source>
          <year>2020</year>
          <month>01</month>
          <day>25</day>
          <volume>6</volume>
          <issue>1</issue>
          <fpage>e03218</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2405-8440(20)30063-3"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.heliyon.2020.e03218</pub-id>
          <pub-id pub-id-type="medline">32042968</pub-id>
          <pub-id pub-id-type="pii">S2405-8440(20)30063-3</pub-id>
          <pub-id pub-id-type="pmcid">PMC7002833</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Forssell</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Exploring cyberbullying and face-to-face bullying in working life – prevalence, targets and expressions</article-title>
          <source>Comput Human Behav</source>
          <year>2016</year>
          <month>05</month>
          <volume>58</volume>
          <fpage>454</fpage>
          <lpage>60</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2016.01.003</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Peled</surname>
              <given-names>Y</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying and its influence on academic, social, and emotional development of undergraduate students</article-title>
          <source>Heliyon</source>
          <year>2019</year>
          <month>03</month>
          <day>23</day>
          <volume>5</volume>
          <issue>3</issue>
          <fpage>e01393</fpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://linkinghub.elsevier.com/retrieve/pii/S2405-8440(18)35947-4"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.heliyon.2019.e01393</pub-id>
          <pub-id pub-id-type="medline">30963126</pub-id>
          <pub-id pub-id-type="pii">S2405-8440(18)35947-4</pub-id>
          <pub-id pub-id-type="pmcid">PMC6434491</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Selkie</surname>
              <given-names>EM</given-names>
            </name>
            <name name-style="western">
              <surname>Kota</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Moreno</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying behaviors among female college students: witnessing, perpetration, and victimization</article-title>
          <source>Coll Stud J</source>
          <year>2016</year>
          <volume>50</volume>
          <issue>2</issue>
          <fpage>278</fpage>
          <lpage>87</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28966413"/>
          </comment>
          <pub-id pub-id-type="medline">28966413</pub-id>
          <pub-id pub-id-type="pmcid">PMC5615856</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Pabian</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Erreygers</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Vandebosch</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Van Royen</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Dare</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Costello</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Green</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Hawk</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Cross</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>“Arguments online, but in school we always act normal”: the embeddedness of early adolescent negative peer interactions within the whole of their offline and online peer interactions</article-title>
          <source>Child Youth Serv Rev</source>
          <year>2018</year>
          <month>02</month>
          <volume>86</volume>
          <fpage>1</fpage>
          <lpage>13</lpage>
          <pub-id pub-id-type="doi">10.1016/j.childyouth.2018.01.007</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ho</surname>
              <given-names>SS</given-names>
            </name>
            <name name-style="western">
              <surname>Chen</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Ng</surname>
              <given-names>AP</given-names>
            </name>
          </person-group>
          <article-title>Comparing cyberbullying perpetration on social media between primary and secondary school students</article-title>
          <source>Comput Educ</source>
          <year>2017</year>
          <month>06</month>
          <volume>109</volume>
          <fpage>74</fpage>
          <lpage>84</lpage>
          <pub-id pub-id-type="doi">10.1016/j.compedu.2017.02.004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Beckman</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Hagquist</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Hellström</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Discrepant gender patterns for cyberbullying and traditional bullying – an analysis of Swedish adolescent data</article-title>
          <source>Comput Human Behav</source>
          <year>2013</year>
          <month>9</month>
          <volume>29</volume>
          <issue>5</issue>
          <fpage>1896</fpage>
          <lpage>903</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2013.03.010</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Rudert</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Reutner</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Greifeneder</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Walker</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Faced with exclusion: perceived facial warmth and competence influence moral judgments of social exclusion</article-title>
          <source>J Exper Soc Psychol</source>
          <year>2017</year>
          <month>01</month>
          <volume>68</volume>
          <fpage>101</fpage>
          <lpage>12</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jesp.2016.06.005</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Landoll</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>La Greca</surname>
              <given-names>AM</given-names>
            </name>
            <name name-style="western">
              <surname>Lai</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Chan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Herge</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Cyber victimization by peers: prospective associations with adolescent social anxiety and depressive symptoms</article-title>
          <source>J Adolesc</source>
          <year>2015</year>
          <month>07</month>
          <volume>42</volume>
          <fpage>77</fpage>
          <lpage>86</lpage>
          <pub-id pub-id-type="doi">10.1016/j.adolescence.2015.04.002</pub-id>
          <pub-id pub-id-type="medline">25938204</pub-id>
          <pub-id pub-id-type="pii">S0140-1971(15)00079-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bunney</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Zink</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Holm</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Billington</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Kotz</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Orexin activation counteracts decreases in nonexercise activity thermogenesis (NEAT) caused by high-fat diet</article-title>
          <source>Physiol Behav</source>
          <year>2017</year>
          <month>07</month>
          <day>01</day>
          <volume>176</volume>
          <fpage>139</fpage>
          <lpage>48</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28363838"/>
          </comment>
          <pub-id pub-id-type="doi">10.1016/j.physbeh.2017.03.040</pub-id>
          <pub-id pub-id-type="medline">28363838</pub-id>
          <pub-id pub-id-type="pii">S0031-9384(16)31214-8</pub-id>
          <pub-id pub-id-type="pmcid">PMC5510739</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Blackwell</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Dimond</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Schoenebeck</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Lampe</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>Classification and its consequences for online harassment: design insights from HeartMob</article-title>
          <source>Proc ACM Hum Comput Interact</source>
          <year>2017</year>
          <month>11</month>
          <volume>1</volume>
          <issue>CSCW</issue>
          <fpage>1</fpage>
          <lpage>19</lpage>
          <pub-id pub-id-type="doi">10.1145/3134659</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Horner</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Asher</surname>
              <given-names>Y</given-names>
            </name>
            <name name-style="western">
              <surname>Fireman</surname>
              <given-names>GD</given-names>
            </name>
          </person-group>
          <article-title>The impact and response to electronic bullying and traditional bullying among adolescents</article-title>
          <source>Comput Human Behav</source>
          <year>2015</year>
          <month>08</month>
          <volume>49</volume>
          <fpage>288</fpage>
          <lpage>95</lpage>
          <pub-id pub-id-type="doi">10.1016/j.chb.2015.03.007</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lev-On</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The third-person effect on Facebook: the significance of perceived proficiency</article-title>
          <source>Telemat Inform</source>
          <year>2017</year>
          <month>07</month>
          <volume>34</volume>
          <issue>4</issue>
          <fpage>252</fpage>
          <lpage>60</lpage>
          <pub-id pub-id-type="doi">10.1016/j.tele.2016.07.002</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Camacho</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Hassanein</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Head</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying impacts on victims’ satisfaction with information and communication technologies: the role of Perceived Cyberbullying Severity</article-title>
          <source>Inform Manag</source>
          <year>2018</year>
          <month>06</month>
          <volume>55</volume>
          <issue>4</issue>
          <fpage>494</fpage>
          <lpage>507</lpage>
          <pub-id pub-id-type="doi">10.1016/j.im.2017.11.004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Walker</surname>
              <given-names>CM</given-names>
            </name>
            <name name-style="western">
              <surname>Sockman</surname>
              <given-names>BR</given-names>
            </name>
            <name name-style="western">
              <surname>Koehn</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>An exploratory study of cyberbullying with undergraduate university students</article-title>
          <source>Tech Trends</source>
          <year>2011</year>
          <month>3</month>
          <volume>55</volume>
          <issue>2</issue>
          <fpage>31</fpage>
          <lpage>8</lpage>
          <pub-id pub-id-type="doi">10.1007/s11528-011-0481-0</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hutson</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Kelly</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Militello</surname>
              <given-names>LK</given-names>
            </name>
          </person-group>
          <article-title>Systematic review of cyberbullying interventions for youth and parents with implications for evidence-based practice</article-title>
          <source>Worldviews Evid Based Nurs</source>
          <year>2018</year>
          <month>02</month>
          <volume>15</volume>
          <issue>1</issue>
          <fpage>72</fpage>
          <lpage>9</lpage>
          <comment>
            <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="http://europepmc.org/abstract/MED/28859246"/>
          </comment>
          <pub-id pub-id-type="doi">10.1111/wvn.12257</pub-id>
          <pub-id pub-id-type="medline">28859246</pub-id>
          <pub-id pub-id-type="pmcid">PMC8074991</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Zych</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Ortega-Ruiz</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Marín-López</surname>
              <given-names>I</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying: a systematic review of research, its prevalence and assessment issues in Spanish studies</article-title>
          <source>Psicología Educativa</source>
          <year>2016</year>
          <month>06</month>
          <volume>22</volume>
          <issue>1</issue>
          <fpage>5</fpage>
          <lpage>18</lpage>
          <pub-id pub-id-type="doi">10.1016/j.pse.2016.03.002</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
