<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">ResProt</journal-id>
      <journal-id journal-id-type="nlm-ta">JMIR Res Protoc</journal-id>
      <journal-title>JMIR Research Protocols</journal-title>
      <issn pub-type="epub">1929-0748</issn>
      <publisher>
        <publisher-name>JMIR Publications Inc.</publisher-name>
        <publisher-loc>Toronto, Canada</publisher-loc>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">v5i2e83</article-id>
      <article-id pub-id-type="pmid">27220556</article-id>
      <article-id pub-id-type="doi">10.2196/resprot.5292</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Protocol</subject>
        </subj-group>
        <subj-group subj-group-type="article-type">
          <subject>Protocol</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Prevalence, Motivations, and Social, Mental Health and Health Consequences of Cyberbullying Among School-Aged Children and Youth: Protocol of a Longitudinal and Multi-Perspective Mixed Method Study</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="editor">
          <name>
            <surname>Eysenbach</surname>
            <given-names>Gunther</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="reviewer">
          <name>
            <surname>van Geel</surname>
            <given-names>Mitch</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Na</surname>
            <given-names>Hyunjoo</given-names>
          </name>
        </contrib>
        <contrib contrib-type="reviewer">
          <name>
            <surname>Campbell</surname>
            <given-names>Marilyn</given-names>
          </name>
        </contrib>
      </contrib-group>
      <contrib-group>
        <contrib contrib-type="author" id="contrib1" corresp="yes" equal-contrib="yes">
          <name name-style="western">
            <surname>Mishna</surname>
            <given-names>Faye</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <address>
            <institution>University of Toronto</institution>
            <institution>Factor-Inwentash Faculty of Social Work</institution>
            <addr-line>246 Bloor Street West</addr-line>
            <addr-line>Toronto, ON, M5S1V4</addr-line>
            <country>Canada</country>
            <phone>1 416 978 3255</phone>
            <fax>1 416 978 7072</fax>
            <email>f.mishna@utoronto.ca</email>
          </address>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-2538-826X</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib2">
          <name name-style="western">
            <surname>McInroy</surname>
            <given-names>Lauren B</given-names>
          </name>
          <degrees>MSW</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-5426-5782</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib3">
          <name name-style="western">
            <surname>Lacombe-Duncan</surname>
            <given-names>Ashley</given-names>
          </name>
          <degrees>MSW</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-0682-8549</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib4">
          <name name-style="western">
            <surname>Bhole</surname>
            <given-names>Payal</given-names>
          </name>
          <degrees>MSW</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-1783-4955</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib5">
          <name name-style="western">
            <surname>Van Wert</surname>
            <given-names>Melissa</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-1750-8885</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib6">
          <name name-style="western">
            <surname>Schwan</surname>
            <given-names>Kaitlin</given-names>
          </name>
          <degrees>MA</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-1941-2596</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib7">
          <name name-style="western">
            <surname>Birze</surname>
            <given-names>Arija</given-names>
          </name>
          <degrees>MA</degrees>
          <xref rid="aff2" ref-type="aff">2</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-1988-8383</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib8">
          <name name-style="western">
            <surname>Daciuk</surname>
            <given-names>Joanne</given-names>
          </name>
          <degrees>BEd</degrees>
          <xref rid="aff1" ref-type="aff">1</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-0118-5126</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib9">
          <name name-style="western">
            <surname>Beran</surname>
            <given-names>Tanya</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff8" ref-type="aff">8</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0003-0312-3658</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib10">
          <name name-style="western">
            <surname>Craig</surname>
            <given-names>Wendy</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff3" ref-type="aff">3</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-4717-6105</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib11">
          <name name-style="western">
            <surname>Pepler</surname>
            <given-names>Debra J</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff4" ref-type="aff">4</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-2505-289X</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib12">
          <name name-style="western">
            <surname>Wiener</surname>
            <given-names>Judith</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff5" ref-type="aff">5</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-8263-1655</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib13">
          <name name-style="western">
            <surname>Khoury-Kassabri</surname>
            <given-names>Mona</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff6" ref-type="aff">6</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0001-5664-7549</ext-link>
        </contrib>
        <contrib contrib-type="author" id="contrib14">
          <name name-style="western">
            <surname>Johnston</surname>
            <given-names>David</given-names>
          </name>
          <degrees>PhD</degrees>
          <xref rid="aff7" ref-type="aff">7</xref>
          <ext-link ext-link-type="orcid">http://orcid.org/0000-0002-7332-3455</ext-link>
        </contrib>
      </contrib-group>
      <aff id="aff1">
        <sup>1</sup>
        <institution>University of Toronto</institution>
        <institution>Factor-Inwentash Faculty of Social Work</institution>
        <addr-line>Toronto, ON</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff2">
        <sup>2</sup>
        <institution>University of Toronto</institution>
        <institution>Dalla Lana School of Public Health</institution>
        <addr-line>Toronto, ON</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff3">
        <sup>3</sup>
        <institution>Queens University</institution>
        <institution>Department of Psychology</institution>
        <addr-line>Kingston, ON</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff4">
        <sup>4</sup>
        <institution>York University</institution>
        <institution>Department of Psychology, Faculty of Health</institution>
        <country>Canada</country>
      </aff>
      <aff id="aff5">
        <sup>5</sup>
        <institution>University of Toronto</institution>
        <institution>Ontario Institute for Studies in Education</institution>
        <addr-line>Toronto, ON</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff6">
        <sup>6</sup>
        <institution>The Hebrew University of Jerusalem Mount Scopus</institution>
        <institution>School of Social Work &#38; Social Welfare</institution>
        <addr-line>Jerusalem</addr-line>
        <country>Israel</country>
      </aff>
      <aff id="aff7">
        <sup>7</sup>
        <institution>Seneca College</institution>
        <addr-line>Toronto, ON</addr-line>
        <country>Canada</country>
      </aff>
      <aff id="aff8">
        <sup>8</sup>
        <institution>University of Calgary</institution>
        <institution>Cumming School of Medicine</institution>
        <country>Calgary, AB, Canada</country>
      </aff>
      <author-notes>
        <corresp>Corresponding Author: Faye Mishna 
        <email>f.mishna@utoronto.ca</email></corresp>
      </author-notes>
      <pub-date pub-type="collection"><season>Apr-Jun</season><year>2016</year></pub-date>
      <pub-date pub-type="epub">
        <day>24</day>
        <month>05</month>
        <year>2016</year>
      </pub-date>
      <volume>5</volume>
      <issue>2</issue>
      <elocation-id>e83</elocation-id>
      <!--history from ojs - api-xml-->
      <history>
        <date date-type="received">
          <day>28</day>
          <month>10</month>
          <year>2015</year>
        </date>
        <date date-type="rev-request">
          <day>3</day>
          <month>2</month>
          <year>2016</year>
        </date>
        <date date-type="rev-recd">
          <day>15</day>
          <month>2</month>
          <year>2016</year>
        </date>
        <date date-type="accepted">
          <day>20</day>
          <month>2</month>
          <year>2016</year>
        </date>
      </history>
      <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
      <copyright-statement>©Faye Mishna, Lauren B McInroy, Ashley Lacombe-Duncan, Payal Bhole, Melissa Van Wert, Kaitlin Schwan, Arija Birze, Joanne Daciuk, Tanya Beran, Wendy Craig, Debra J Pepler, Judith Wiener, Mona Khoury-Kassabri, David Johnston. Originally published in JMIR Research Protocols (http://www.researchprotocols.org), 24.05.2016.</copyright-statement>
      <copyright-year>2016</copyright-year>
      <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.0/">
        <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in JMIR Research Protocols, is properly cited. The complete bibliographic information, a link to the original publication on http://www.researchprotocols.org, as well as this copyright and license information must be included.</p>
      </license>
      <self-uri xlink:href="http://www.researchprotocols.org/2016/2/e83/" xlink:type="simple"/>
      <abstract>
        <sec sec-type="Background">
          <title>Background</title>
          <p>While the online environment may promote important developmental and social benefits, it also enables the serious and rapidly growing issue of cyberbullying. Cyberbullying constitutes an increasing public health problem – victimized children and youth experience a range of health and mental health concerns, including emotional and psychosomatic problems, maladaptive behaviors, and increased suicidality. Perpetrators demonstrate a lack of empathy, and may also struggle with health and mental health issues.</p>
        </sec>
        <sec sec-type="Objective">
          <title>Objective</title>
          <p>This paper describes the protocols applied in a longitudinal and multi-perspective mixed-methods study with five objectives: (1) to explore children/youth’s experiences, and children/youth’s, parents’, and teachers’ conceptions, definitions, and understanding of cyberbullying; (2) to explore how children/youth view the underlying motivations for cyberbullying; (3) to document the shifting prevalence rates of cyberbullying victimization, witnessing, and perpetration; (4) to identify risk and protective factors for cyberbullying involvement; and (5) to explore social, mental health, and health consequences of cyberbullying.</p>
        </sec>
        <sec sec-type="Methods">
          <title>Methods</title>
          <p>Quantitative survey data were collected over three years (2012-2014) from a stratified random baseline sample of fourth (n=160), seventh (n=243), and tenth (n=267) grade children/youth, their parents (n=246), and their teachers (n=103). Quantitative data were collected from students and teachers during in-person school visits, and from parents via mail-in surveys. Student, parent, and teacher surveys included questions regarding: student experiences with bullying/cyberbullying; student health, mental health, and social and behavioral issues; socio-demographics; and information and communication technology use. In-depth semi-structured qualitative interviews were conducted twice with a sub-sample of students (n=57), purposively selected based on socio-demographics and cyberbullying experience, twice with their parents (n=50), and once with their teachers (n=30).</p>
        </sec>
        <sec sec-type="Results">
          <title>Results</title>
          <p>Data collection for this study is complete. Planned analyses include transition probabilities and repeated measures analyses to determine involvement in cyberbullying. Repeated measures analyses, including between-subject factors (eg, socio-demographics), will be utilized to determine factors that protect or increase risk of involvement in cyberbullying. Qualitative analysis utilizing grounded theory is planned, to permit rich understanding of participant experiences and perspectives. Results will be reported in 2016 and 2017.</p>
        </sec>
        <sec sec-type="Conclusions">
          <title>Conclusions</title>
          <p>This study will offer insight into the contemporary phenomenon of cyberbullying while also informing interventions to curb cyberbullying and address its pervasive social, mental health, and health consequences. Knowledge mobilization strategies and implications for research and practice are discussed.</p>
        </sec>
      </abstract>
      <kwd-group>
        <kwd>cyberbullying</kwd>
        <kwd>ICT</kwd>
        <kwd>children</kwd>
        <kwd>youth</kwd>
        <kwd>parents</kwd>
        <kwd>teachers</kwd>
        <kwd>victimization</kwd>
        <kwd>mental health</kwd>
        <kwd>longitudinal</kwd>
        <kwd>mixed methods</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec sec-type="introduction">
      <title>Introduction</title>
      <sec>
        <title>Information and Communication Technology Use Among North American Youth</title>
        <p>Information and communication technologies (ICTs) are pervasive among socio-demographically diverse populations of young people in North America. Use of these technologies is increasingly mobile (eg, cell phones, smartphones, tablets). In the United States in 2014, 92% of adolescents (13-17 years) were online daily (56% several times per day), while 91% of youth went online occasionally, at minimum, through a mobile device [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref2">2</xref>]. The recent advances in ICTs offer immense benefits for children and youth, including innumerable and unprecedented opportunities for education, growth, and development [<xref ref-type="bibr" rid="ref3">3</xref>-<xref ref-type="bibr" rid="ref7">7</xref>], as well as facilitating their health and mental health [<xref ref-type="bibr" rid="ref8">8</xref>]. The ever-growing ubiquity of ICTs has, however, inevitably brought new challenges [<xref ref-type="bibr" rid="ref9">9</xref>,<xref ref-type="bibr" rid="ref10">10</xref>]. Despite their technical proficiency, children and youth do not typically possess the critical thinking and decision-making abilities required to use technology safely [<xref ref-type="bibr" rid="ref11">11</xref>], and may be exposed to significant risks in ICT environments, including cyberbullying.</p>
      </sec>
      <sec>
        <title>Cyberbullying: A Growing Public Health Problem</title>
        <p>In the past few years, there has been an explosion in research on cyberbullying, documenting it as a serious, prevalent, and growing problem. Prevalence rates for cyberbullying vary due to definitional inconsistencies, the population studied, and the time frames and methodologies used [<xref ref-type="bibr" rid="ref12">12</xref>,<xref ref-type="bibr" rid="ref13">13</xref>,<xref ref-type="bibr" rid="ref14">14</xref>]. It has been established, however, that between 10-40% of youth report being cyberbullied, while 50% know someone who has experienced cyberbullying [<xref ref-type="bibr" rid="ref15">15</xref>]. Bullying is generally defined as a form of aggression that can be direct or indirect, and includes hostile physical, verbal, psychological, or relational behaviors. Bullying is characteristically intentional, commonly occurring in the context of a relationship, and comprising a power imbalance among those involved. The aggressive behavior is typically repeated over time, resulting in harm or negative consequences for the victimized child or youth [<xref ref-type="bibr" rid="ref2">2</xref>]. Although consensus on the definition of cyberbullying has been difficult to establish, it may be generally defined as the use of ICTs to bully another person [<xref ref-type="bibr" rid="ref15">15</xref>-<xref ref-type="bibr" rid="ref21">21</xref>]. Young people may be involved in cyberbullying as victim, perpetrator, and/or witness. These roles appear to be more fluid and difficult to distinguish in the case of cyberbullying compared to traditional offline bullying [<xref ref-type="bibr" rid="ref22">22</xref>]. Occurrence of bullying and cyberbullying are also highly correlated [<xref ref-type="bibr" rid="ref14">14</xref>]. Research suggests that regardless of the role played in cyberbullying incidents, all children and youth can experience serious negative social, mental health, and health consequences as a result of involvement [<xref ref-type="bibr" rid="ref19">19</xref>-<xref ref-type="bibr" rid="ref25">25</xref>].</p>
        <p>Cyberbullying constitutes a mounting public health problem, as both victimized youth and perpetrators may experience significant and prolonged distress [<xref ref-type="bibr" rid="ref14">14</xref>,<xref ref-type="bibr" rid="ref17">17</xref>], as well as an array of mental health concerns and problem behaviors. Victimized children and youth are at risk of developing depression, anxiety, poor self-esteem, eating disorders, sleep difficulties, emotional problems (eg, fear, sadness, loneliness), psychosomatic problems (eg, abdominal pains, headaches), and suicidal ideation and behavior [<xref ref-type="bibr" rid="ref26">26</xref>-<xref ref-type="bibr" rid="ref28">28</xref>]. Victimized youth may also be at increased risk of using substances, experiencing difficulties in school, participating in delinquent behavior, and engaging in unsafe sexual practices [<xref ref-type="bibr" rid="ref29">29</xref>-<xref ref-type="bibr" rid="ref31">31</xref>]. Youth who are perpetrators similarly experience increased risk of problems including depressive symptoms, substance use, aggression, and suicidal ideation, and may demonstrate less empathy and more conduct problems [<xref ref-type="bibr" rid="ref23">23</xref>,<xref ref-type="bibr" rid="ref32">32</xref>,<xref ref-type="bibr" rid="ref33">33</xref>]. Students who are marginalized due to particular social markers (such as race/ethnicity, gender, religion, appearance, sexual orientation, socioeconomic status, or disability) may be disproportionately vulnerable to experiencing cyberbullying and associated negative social, mental health, and health consequences [<xref ref-type="bibr" rid="ref34">34</xref>,<xref ref-type="bibr" rid="ref35">35</xref>].</p>
        <p>While research to date has illuminated a great deal about the nature and consequences of cyberbullying, several areas require further examination. Additionally, few studies have employed a longitudinal study design to assess trends in cyberbullying over time. The purpose of this paper is to describe the protocols implemented in a longitudinal and multi-perspective mixed-methods cohort study that contributes to the existing research by investigating several of these underdeveloped areas.</p>
      </sec>
      <sec>
        <title>Study Objectives</title>
        <p>This study had five objectives: (1) to explore children/youth’s experiences, and children/youth’s, their parents’, and their teachers’ conceptions, definitions, and understanding of cyberbullying; (2) to explore how children/youth view the underlying motivations for cyberbullying; (3) to document the shifting prevalence rates of cyberbullying victimization, witnessing, and perpetration; (4) to identify risk and protective factors for cyberbullying involvement; and (5) to explore social, mental health, and health consequences of cyberbullying among children/youth. In this paper, the methods of the study are clearly outlined, and future quantitative and qualitative data analysis plans are discussed.</p>
      </sec>
    </sec>
    <sec sec-type="methods">
      <title>Methods</title>
      <sec>
        <title>Sample</title>
        <p>Three participant groups were included in the baseline study sample: (1) students in 4<sup>th</sup> (n=160), 7<sup>th</sup> (n=243), and 10<sup>th</sup> (n=267) grades; (2) their teachers (n=103); and (3) their parents (n=246). A stratified random sampling strategy was utilized to select participants. First, a random sample of 19 schools was drawn from one of the largest school boards in North America [<xref ref-type="bibr" rid="ref36">36</xref>], situated in Toronto, Canada, which is a large metropolitan city. Schools were stratified into three categories of need (low, medium, and high) based on an index developed by the school board that ranked schools on external challenges to student achievement. The school board developed this index using census data associated with the postal code of students attending each school. Neighborhood-level census data used to develop the index included income and education levels, ratio of households receiving social assistance, and ratio of single parent families [<xref ref-type="bibr" rid="ref37">37</xref>]. The stratification of the sample based on this index ensured representation of ethno-cultural and socioeconomic diversity - factors that potentially impact access to ICTs, experiences of cyberbullying, and the manifestation of negative outcomes [<xref ref-type="bibr" rid="ref1">1</xref>,<xref ref-type="bibr" rid="ref38">38</xref>,<xref ref-type="bibr" rid="ref39">39</xref>]. In year three of the study, 10 additional schools were recruited for participation in order to follow those students transitioning from elementary/middle school to middle/secondary school. A total of 29 schools participated in the study. All students in the selected grades at the original participating schools were offered the opportunity to participate, as were their parents and teachers.</p>
        <p>Participating students and their parents provided data in all three years of the study, while matching teachers provided data in year one only (as student participants’ teachers changed each year). All three participant groups completed quantitative questionnaire packages, and a sub-sample of each group participated in qualitative interviews. Quantitative data were collected from students and parents in each year of the study, while qualitative data were collected only during years one and three, in order to allow for enough time to elapse for any changes in beliefs, perceptions, attitudes, and understanding of cyberbullying to emerge (<xref ref-type="fig" rid="figure1">Figure 1</xref>). Sub-samples of students, parents, and teachers were purposefully selected to participate in interviews based on level of school need, and were representative of gender, grade, and bullying/cyberbullying involvement.</p>
        <fig id="figure1" position="float">
          <label>Figure 1</label>
          <caption>
            <p>Study timeline.</p>
          </caption>
          <graphic xlink:href="resprot_v5i2e83_fig1.png" alt-version="no" mimetype="image" position="float" xlink:type="simple"/>
        </fig>
      </sec>
      <sec>
        <title>Study Team and Training of Research Assistants</title>
        <p>The research team consisted of a principal investigator and five co-investigators (responsible for general study oversight), one research manager responsible for data management (including entry and cleaning), and four research coordinators. The research coordinators worked in collaboration, but were responsible for separate aspects of the project: (1) survey administration and overall coordination, (2) consent and maintenance of administrative databases, (3) qualitative interview coordination, and (4) coordination of supports for students identified as experiencing distress. Coordinators managed a team of approximately 10-15 research assistants (RAs) who held diverse and often multiple roles, including: collecting survey data in the school setting, collecting interview data in the school setting or by phone, following up with students in distress, and assisting with administrative tasks. Most RAs were in progress towards (or held) a Master of Social Work degree, while several were from other related professional faculties, such as public health and education.</p>
        <p>Prior to working on the project, all RAs participated in a two-hour general training on study methods and procedures. RAs were then trained for specific roles and duties depending on their educational background, clinical experience, and interests. Training was provided for administering quantitative surveys in the school setting, conducting qualitative interviews in person or on the phone, completing assessments to evaluate whether a student was in distress, and accomplishing various administrative study tasks.</p>
      </sec>
      <sec>
        <title>Ethics and Consent Process</title>
        <p>Ethics approval was sought and received from the University of Toronto Research Ethics Board (Protocol #26753). The External Research Review Committee at the partnering school board also provided ethics approval for this project.</p>
        <p>Consent to participate in the study was obtained actively in year one and, with approval of the school board, passively in years two and three. In year one, RAs visited each 4<sup>th</sup>, 7<sup>th</sup>, and 10<sup>th</sup> grade classroom from the 19 selected schools to explain the study and distribute consent forms. Parents/guardians were asked to sign the form if they agreed to allow their child to participate, if they were interested in participating themselves, and/or if they permitted the research team to ask their child’s teacher to participate. After collection of the parent/student consent forms, teachers were asked if they would like to participate, and completed a consent form. In years two and three (passive consent), parents/guardians were mailed a letter reminding them that they had consented for their child and/or themselves to participate in the study, and that the next year of the study was ready to commence. The letter also provided detailed instructions on how to withdraw from the study if desired.</p>
        <p>A $5 gift card was offered to all students, teachers, and parents who participated in the quantitative survey portion of the research in each of the three years. A $10 gift card was offered to all participants who took part in an interview (in person or by telephone) in years one and three.</p>
        <p>In anticipation that some questions could lead to distress or disclosure of information of a potentially sensitive or distressing nature, a Research Ethics Board-approved protocol (agreed upon by both the University and school board) was established to identify and assist students categorized as being <italic>in distress</italic> through their questionnaire and/or qualitative interview responses. Student participants were classified as <italic>in distress</italic> if they met one (or more) of the following five criteria: (1) indicated on the Bullying &#38; Cyberbullying: Perpetrators, Victims &#38; Witnesses Survey (B&#38;C:PVWS) that they needed help and would like to speak to a researcher; (2) endorsed item related to fire-setting on the Youth Self Report (YSR); (3) endorsed items related to self-harm/suicide on the YSR; (4) scored above the 85th percentile on the YSR, which is indicative of experiencing numerous behavioral problems; and/or (5) indicated during qualitative interviews that they were highly stressed and in need of support. All children and youth identified as <italic>in distress</italic> were individually interviewed in a private and confidential school setting by a clinically trained researcher, who was a Master of Social Work student or who possessed equivalent education and experience [<xref ref-type="bibr" rid="ref40">40</xref>]. Children and youth were interviewed regardless of whether the nature of their distress was bullying related. Participants were then connected to appropriate services established within the school board. This attention to the distress of participants was particularly salient in the research context, as access to mental health services in Canada remains problematic [<xref ref-type="bibr" rid="ref41">41</xref>].</p>
      </sec>
      <sec>
        <title>Data Collection</title>
        <sec>
          <title>Quantitative Data Collection Methods</title>
          <p>In year one, students in 4<sup>th</sup>grade (n=160), 7<sup>th</sup> grade (n=243), and 10<sup>th</sup> grade (n=267) completed a 45-60 minute survey in the school setting, while parents (n=246) completed a 30-45 minute survey by mail. This procedure changed somewhat for years two and three of the study, with some students completing questionnaire packages by mail due to changing schools. Questionnaires for teachers (n=103), which took approximately 45-60 minutes to complete, were administered in the participating schools. Teachers were given approximately two weeks to complete the questionnaires about their students participating in the study, which were then collected by the research team.</p>
        </sec>
        <sec>
          <title>Quantitative Data Collection Measures</title>
          <p>This study utilized a variety of quantitative measures, including both standardized measures as well as measures developed specifically for the study (<xref ref-type="table" rid="table1">Table 1</xref>). Student, parent, and teacher surveys collected information regarding experiences with bullying/cyberbullying, socio-demographics, ICT use, and student mental health, health, social, and behavioral issues.</p>
          <table-wrap position="float" id="table1">
            <label>Table 1</label>
            <caption>
              <p>Measures completed by students, parents, and teachers.</p>
            </caption>
            <table width="624" border="1" cellpadding="7" cellspacing="0" rules="groups" frame="hsides">
              <col width="97"/>
              <col width="93"/>
              <col width="188"/>
              <col width="20"/>
              <col width="11"/>
              <col width="14"/>
              <col width="44"/>
              <col width="51"/>
              <thead>
                <tr valign="top">
                  <td><break/></td>
                  <td><break/></td>
                  <td><break/></td>
                  <td colspan="3">Students</td>
                  <td>Parents</td>
                  <td>Teachers</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td><break/></td>
                  <td><break/></td>
                  <td colspan="3"><bold>Grade Level</bold></td>
                  <td><break/></td>
                  <td><break/></td>
                </tr>
                <tr valign="top">
                  <td><bold>Area</bold></td>
                  <td><bold>Measure</bold></td>
                  <td><bold>Captures</bold></td>
                  <td><bold>4</bold></td>
                  <td><bold>7</bold></td>
                  <td><bold>10</bold></td>
                  <td><break/></td>
                  <td><break/></td>
                </tr>
              </thead>
              <tbody><tr valign="top">
                  <td>Experiences with Bullying/ Cyberbullying</td>
                  <td><italic>Bullying &#38; Cyberbullying: Perpetrators, Victims &#38; Witnesses Survey</italic>(B&#38;C:PVWS)</td>
                  <td>Experiences as victims, perpetrators, and/or witnesses of both bullying/cyberbullying; Experiences with bullying/cyberbullying types (eg, physical, verbal, social, sexual); Experiences with (and content of) bullying/cyberbullying specific to a variety of socio-demographic factors (eg, race, sexual orientation, gender, disability, appearance, religion); Responses to bullying/cyberbullying; Thoughts about potential interventions to address bullying/cyberbullying. <italic>Measure used to identify distress.</italic></td>
                  <td><break/> <break/> <break/> <break/> <break/> <break/>✓</td>
                  <td><break/> <break/> <break/> <break/> <break/> <break/>✓</td>
                  <td><break/> <break/> <break/> <break/> <break/> <break/>✓</td>
                  <td><break/></td>
                  <td><break/></td>
                </tr>
                <tr valign="top">
                  <td>Mental Health, Health, Social, &#38; Behavioral Issues</td>
                  <td><italic>Youth Self-report</italic>(YSR) [ <xref ref-type="bibr" rid="ref42">42</xref>]</td>
                  <td>Youth’s self-reported anxiety/depression, suicidal ideation, self-harm, somatic complaints, social, thought and attention problems, delinquent (eg setting fires) and aggressive (eg hurting others) behaviors; <italic>Measure used to identify distress.</italic></td>
                  <td><break/></td>
                  <td><break/> <break/> <break/> <break/>✓</td>
                  <td><break/> <break/> <break/> <break/>✓</td>
                  <td><break/></td>
                  <td><break/></td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td><italic>Child Behavior Checklist</italic>(CBCL) [ <xref ref-type="bibr" rid="ref43">43</xref>]</td>
                  <td>Parent counterpart to YSR.</td>
                  <td><break/></td>
                  <td><break/></td>
                  <td><break/></td>
                  <td><break/> <break/>✓</td>
                  <td><break/></td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td><italic>Teacher Report Form</italic>(TRF) [ <xref ref-type="bibr" rid="ref44">44</xref>]</td>
                  <td>Educator counterpart to YSR.</td>
                  <td><break/></td>
                  <td><break/></td>
                  <td><break/></td>
                  <td><break/></td>
                  <td><break/> <break/>✓</td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td><italic>Self-Perception Profile for Children</italic>(SPPC) [<xref ref-type="bibr" rid="ref45">45</xref>]</td>
                  <td>Self-esteem.</td>
                  <td><break/> <break/>✓</td>
                  <td><break/> <break/>✓</td>
                  <td><break/> <break/> <break/></td>
                  <td><break/></td>
                  <td><break/></td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td><italic>Self-Perception Profile for Adolescents</italic>(SPPA) [ <xref ref-type="bibr" rid="ref46">46</xref>]</td>
                  <td>Self-concept.</td>
                  <td><break/> <break/> <break/></td>
                  <td><break/> <break/> <break/></td>
                  <td><break/> <break/>✓</td>
                  <td><break/></td>
                  <td><break/></td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td><italic>Social Support Scale for Children</italic>[ <xref ref-type="bibr" rid="ref47">47</xref>]</td>
                  <td>Children’s perceived support and regard from parents, teachers, close friends, and classmates.</td>
                  <td><break/> <break/>✓</td>
                  <td><break/> <break/>✓</td>
                  <td><break/></td>
                  <td><break/></td>
                  <td><break/></td>
                </tr>
                <tr valign="top">
                  <td><break/></td>
                  <td><italic>Social Support Behaviors Scale</italic>[ <xref ref-type="bibr" rid="ref48">48</xref>]</td>
                  <td>Youth’s perceived support from family members and peers with subscales: emotional, socializing, practical assistance, financial, advice/guidance.</td>
                  <td><break/></td>
                  <td><break/></td>
                  <td><break/> <break/>✓</td>
                  <td><break/></td>
                  <td><break/></td>
                </tr>
                <tr valign="top">
                  <td>Socio-Demographics</td>
                  <td>Developed for the purpose of this study (Multiple Versions)</td>
                  <td>Gender, age, country of birth, country of parents’ birth, main language spoken at home, race/ethnicity, sexual orientation, disability, family composition, grades, and other socio-demographic characteristics. Four versions: (1) 4<sup>th</sup>Grade; (2) 7<sup>th</sup>and 10<sup>th</sup>Grade; (3) Parents; (4) Teachers.</td>
                  <td><break/> <break/> <break/> <break/>✓</td>
                  <td><break/> <break/> <break/> <break/>✓</td>
                  <td><break/> <break/> <break/> <break/>✓</td>
                  <td><break/> <break/> <break/> <break/>✓</td>
                  <td><break/> <break/> <break/> <break/>✓</td>
                </tr>
                <tr valign="bottom">
                  <td>Information &#38; Communication Technology Use</td>
                  <td>Developed for the purpose of this study (Multiple Versions)</td>
                  <td>Access to ICTs at home, activities while using ICTs, frequency of activities, online friends and connections. Four versions: (1) 4<sup>th</sup>Grade; (2) 7<sup>th</sup>and 10<sup>th</sup>Grade; (3) Parents; (4) Teachers.</td>
                  <td><break/> <break/> <break/> <break/>✓</td>
                  <td><break/> <break/> <break/> <break/>✓</td>
                  <td><break/> <break/> <break/> <break/>✓</td>
                  <td><break/> <break/> <break/> <break/>✓</td>
                  <td><break/> <break/> <break/> <break/>✓</td>
                </tr>
              </tbody>
            </table>
          </table-wrap>
          <p>Children/youth’s experiences with bullying and cyberbullying were measured using the B&#38;C:PVWS, which is a compilation of survey questions developed from the research team’s previous studies. The bullying and cyberbullying literature was reviewed and feedback was sought from the participating school board in order to ensure age-appropriate language. Specific questions were adapted or removed based on the feedback from the school board (eg, questions regarding online sex). For the questions measuring experiences of being bullied and bullying others, the Cronbach alphas were .77 and .71, respectively, indicating good internal consistency.</p>
          <p>Children/youth’s mental health, health, social, and behavioral issues were captured for 4<sup>th</sup>, 7<sup>th</sup> and 10<sup>th</sup> grade cohorts. We captured mental health, health, and behavioral issues using the YSR, intended for children aged eleven and older [<xref ref-type="bibr" rid="ref42">42</xref>]. Parents completed the Child Behavior Checklist (CBCL), which is the parental counterpart to the students’ YSR [<xref ref-type="bibr" rid="ref43">43</xref>], while teachers completed the Teacher Report Form (TRF), which is the educator counterpart to the YSR and CBCL [<xref ref-type="bibr" rid="ref44">44</xref>]. These surveys are widely used measures with excellent reported test-retest reliability [<xref ref-type="bibr" rid="ref42">42</xref>-<xref ref-type="bibr" rid="ref44">44</xref>]. We captured children/youth’s social issues, including self-esteem, using subscales from the Self-Perception Profile for Children (SPPC) [<xref ref-type="bibr" rid="ref45">45</xref>] and the Self-Perception Profile for Adolescents (SPPA) [<xref ref-type="bibr" rid="ref46">46</xref>]. These scales have adequate internal consistency, and both measures have a stable factor structure [<xref ref-type="bibr" rid="ref45">45</xref>,<xref ref-type="bibr" rid="ref46">46</xref>]. We measured social support for students in the 4<sup>th</sup> and 7<sup>th</sup> grade cohorts using the Social Support Scale for Children, a 24-item instrument which assesses children’s perceived support and regard from parents, teachers, close friends, and classmates [<xref ref-type="bibr" rid="ref47">47</xref>]. The internal consistencies of the four subscales range from .72 to .88 using Cronbach alphas [<xref ref-type="bibr" rid="ref47">47</xref>]. Adolescents in the 10<sup>th</sup> grade cohort completed the Social Support Behaviors Scale to assess perceived support from family members and peers (emotional, social, practical assistance, financial, and advice/guidance) [<xref ref-type="bibr" rid="ref48">48</xref>]. Strong internal consistency (Cronbach alpha exceeding .85) has been reported for this scale, which includes several college samples [<xref ref-type="bibr" rid="ref48">48</xref>,<xref ref-type="bibr" rid="ref49">49</xref>].</p>
          <p>Socio-demographics were collected using two versions of the student demographic questionnaire, capturing characteristics such as age, gender, and country of birth, which were developed by the research team with feedback from the school board (one for the 4<sup>th</sup> grade cohort and one for 7<sup>th</sup> and 10<sup>th</sup> grade cohorts). The questionnaires included similar items for both age groups and were based on previous instruments administered by the school board, instruments developed by co-investigators for similar studies, and a review of the literature. The questionnaire for the older cohorts included items regarding sexuality, which were not included in the version for 4<sup>th</sup> grade students. Similar questionnaires (two versions) were developed for parents and teachers.</p>
          <p>Lastly, we collected data on ICT use, using two versions of the student ICT usage questionnaire (one for the 4<sup>th</sup> grade cohort and one for 7<sup>th</sup> and 10<sup>th</sup> grade cohorts), developed by the research team. Again, both included similar questions, soliciting information on access to ICTs at home, activities while using ICTs, frequency of activities (6-point scale, ranging from <italic>never to more than once a day</italic>), and online friends and connections. The questionnaire for older cohorts included items related to taking and distributing intimate and/or sexual photos, which were not included in the 4<sup>th</sup> grade version. These questionnaires were adapted from two previous studies. Parents and teachers also completed ICT usage questionnaires (two versions) similar to those filled out by students.</p>
        </sec>
        <sec>
          <title>Qualitative Data Collection Methods</title>
          <p>Student participants from 4<sup>th</sup> grade (n=20), 7<sup>th</sup> grade (n=21), and 10<sup>th</sup> grade (n=16) in the qualitative sub-sample were purposefully selected from the larger quantitative sample for qualitative interviews based on diversity of gender, grade, school need level, and whether they reported bullying/cyberbullying victimization, perpetration, and/or witnessing. Subsequent to selecting student participants, their teachers (n=30), and their parents (n=50) were also invited to participate in in-depth interviews. Interviews lasted approximately one hour, ranging in length from thirty to ninety minutes. All year one interviews (with students, parents, and teachers) took place in the school setting, and utilized a semi-structured interview guide. Following preliminary analysis, this interview guide was expanded and refined for use in the year three follow-up phone interviews with the students and parents (<xref ref-type="app" rid="app1">Multimedia Appendix 1</xref>). Interviews provided nuance and context to the information obtained through the quantitative measures. Areas explored included views and understanding of cyberbullying and how it compares with traditional offline bullying, experiences of online aggression, and others’ attitudes and responses to the issue. Questions were guided by existing literature and the research team’s considerable experience. Parent and teacher interviews included questions about their awareness and understanding of cyberbullying, their child or student’s involvement in cyberbullying, links between cyber and traditional bullying, supports, and their responses to cyberbullying.</p>
        </sec>
        <sec>
          <title>Data Management</title>
          <p>All participants were assigned a unique code to maintain anonymity. Participants’ names do not appear anywhere in the quantitative survey packages or qualitative transcripts. Paper surveys were scanned using Cardiff Teleform software, and entered into a project-specific IBM SPSS Statistics 22 database. Entry and cleaning of quantitative data took place throughout the study, and all cases were cross-referenced by hand twice (during entry and after preliminary data sets were compiled) to ensure accuracy of entries. Qualitative data were transcribed verbatim, anonymized, and prepared for analysis. The same unique identifiers were used to identify the qualitative interviews and quantitative surveys, in order to facilitate matching these two data sources for individual participants.</p>
        </sec>
      </sec>
    </sec>
    <sec sec-type="results">
      <title>Results</title>
      <p>Data collection for this study is complete. Results of the proposed analyses, outlined below, will be reported in 2016 and 2017.</p>
      <sec>
        <title>Proposed Quantitative Data Analyses</title>
        <p>Descriptive analyses will be conducted to calculate frequencies for categorical variables, and means and standard deviations for continuous variables. We will summarize socio-demographic variables among participants in each grade level (4, 7, 10) and differences between grades will be assessed using Student t-tests for continuous variables, and χ2 analyses or Fisher’s exact tests for categorical variables. Items for each outcome scale (eg, Social Support Scale for Children) will be summed to calculate total or subscale scores for each measure. Reliability of scaled measures will be described using Cronbach alphas. Advanced statistical analyses are also planned. An example of a more advanced analysis that will be conducted is transition probabilities, which will determine involvement in cyberbullying, consistent with our objective of documenting the shifting prevalence rates of cyberbullying victimization, witnessing, and perpetration. To meet our objective of identifying factors that protect against (or increase risk of) involvement in cyberbullying, between-subject factors will be included in a repeated measures analysis. These factors include demographic variables, CBCL scales, self-esteem, and social support to determine their individual and combined contribution to cyberbullying experiences. Considering participants are clustered in classrooms, independence of the data cannot be assumed, and the data are dependent to some degree. Thus, classroom will be included as a dummy variable in the regressions. Multilevel analysis will be used to assess the contribution of school need level (low, high, and medium) on individual cyberbullying experience.</p>
      </sec>
      <sec>
        <title>Proposed Qualitative Data Analyses</title>
        <p>Using the systematic procedures of a rigorous grounded theory inquiry, a theory about children/youth’s, parents’, and teachers’ conceptions of cyberbullying and underlying motivations will be generated. Using this approach, researchers concurrently collect, analyze, and theorize about data in a reciprocal process of constant comparison to inductively construct empirically corroborated, explanatory theories [<xref ref-type="bibr" rid="ref50">50</xref>-<xref ref-type="bibr" rid="ref53">53</xref>]. The iterative process permits the analytical and theoretical categories developed by previously collected data to inform, as well as refine and focus, subsequent collection of data [<xref ref-type="bibr" rid="ref52">52</xref>,<xref ref-type="bibr" rid="ref54">54</xref>,<xref ref-type="bibr" rid="ref55">55</xref>]. This refining and focusing commenced during data collection for this study, particularly between the qualitative interview phases (years 1 and 3), and is ongoing. With future analyses, emergent themes among youth, parents, and teachers over time will continue to be identified, and children’s and adults’ views compared.</p>
        <p>While the intent is to develop a theoretical model, grounded theory methods will simultaneously allow for further exploration of interpersonal processes and experiences in a process of reciprocal analysis. Line-by-line and open coding of transcripts were, and will continue to be, conducted to establish preliminary analytic focuses, and subsequently emerging categories will be built and expanded. Axial coding will promote connections both within and between categories and sub-categories, and facilitate synthesis and explanation [<xref ref-type="bibr" rid="ref50">50</xref>,<xref ref-type="bibr" rid="ref51">51</xref>,<xref ref-type="bibr" rid="ref56">56</xref>]. Several measures have been employed to ensure trustworthiness and authenticity. The researchers’ prolonged engagement through many years of research and practice in this area will guide development of the grounded theory. Theory development will continue until saturation occurs. Reflexive journaling, bracketing, an audit trail, and dense descriptions will further ensure trustworthiness and transferability [<xref ref-type="bibr" rid="ref50">50</xref>,<xref ref-type="bibr" rid="ref51">51</xref>,<xref ref-type="bibr" rid="ref54">54</xref>].</p>
      </sec>
    </sec>
    <sec sec-type="discussion">
      <title>Discussion</title>
      <p>The study described in this paper provides one of the first assessments of the understanding and experiences of children and youth involved in cyberbullying as victims, perpetrators, and/or witnesses, and involved the investigation of their perceptions, as well as those of their parents and teachers. We followed a baseline sample of 4<sup>th</sup> (n=160), 7<sup>th</sup> (n=243), and 10<sup>th</sup> (n=267) grade children/youth and their parents (n=246), for three years (2012-2014), along with collecting baseline data from their teachers (n=103). This study’s multi-perspective approach allows for triangulated analysis of cyberbullying issues, and the design was strengthened by tracking participants longitudinally, during a period in which ICT use has continued to expand rapidly [<xref ref-type="bibr" rid="ref57">57</xref>]. Recruiting students across grades/ages/socio-economic status permits the comparison of experiences across diverse socio-demographic groups and allows for an examination of trends in primary, middle, and secondary schools. Data collection for this study is complete, with results of proposed analyses anticipated in 2016 and 2017.</p>
      <p>This research will elucidate the complex dynamics of cyberbullying incidents and contributes to the growing body of literature on the rates of cyberbullying, as well as risk and protective factors of involvement. In addition, this study will explicate how children/youth understand cyberbullying and how they experience and judge the underlying motivations for involvement. This inquiry addresses the lack of research capturing children and youth’s experiences, feelings, and conceptions of cyberbullying, and uniquely examines the congruence or incongruence of children and youth’s views with those of significant adults in their lives. Identifying how children, youth, and adults conceptualize cyberbullying is critical to ensuring the understanding of its extent and impact, and developing effective prevention and intervention strategies [<xref ref-type="bibr" rid="ref15">15</xref>]. Developing informed strategies relevant to contemporary young people’s lives and contexts is especially salient, as increasing recognition of the negative consequences of cyberbullying “has lead parents, educators, and policymakers to embrace intervention efforts, and there is now substantial educational and clinical interest in programs that help to mitigate… harmful outcomes” [<xref ref-type="bibr" rid="ref58">58</xref>]. For emerging findings based upon study objectives, please refer to <xref ref-type="app" rid="app2">Multimedia Appendix 2</xref> .</p>
      <p>Knowledge translation and exchange activities will be a priority in order to translate study findings for study participants, educators, helping/healthcare professionals, and the broader community. Presentations will be made to the partner school board and a report will be provided to schools, participants, and community members. Any requests by individual schools for presentations will be accommodated by a member of the research team. Findings will be disseminated within the academic community through refereed journals and presentations at juried Canadian and international conferences. We will publish in relevant academic journals, and results will be disseminated to policy makers and practitioners, and presentations will be made to professional organizations and to the community.</p>
      <p>Most importantly, these findings can inform interventions to curb cyberbullying among young people in an effort to prevent the negative social, mental health, and health consequences. In keeping with the preliminary findings of this study, previous research has indicated that most children and youth do not disclose their experience with cyberbullying to parents, and are even less likely to disclose cyberbullying experiences to school-based adults (eg, teachers, administrators) [<xref ref-type="bibr" rid="ref12">12</xref>]. Such lack of disclosure indicates a critical need to provide prevention and intervention efforts in school settings as a way to promote disclosure [<xref ref-type="bibr" rid="ref12">12</xref>]. Further, little evidence for best practices in intervention efforts exists [<xref ref-type="bibr" rid="ref13">13</xref>]. The study described in this paper can inform intervention efforts by offering insight into student perceptions of what is helpful or not helpful when experiencing, perpetrating, and/or witnessing cyberbullying, as well as the contexts in which prevention and intervention efforts may be most effective (including via ICTs) [<xref ref-type="bibr" rid="ref12">12</xref>]. Results of our quantitative data analysis exploring the social, mental health, and health consequences of cyberbullying can inform the development of resources at the school-level. Moreover, future papers focusing on the research process of this study may glean important insights into the challenges of conducting longitudinal studies with children and youth in a school-based setting (ie, participant retention), and potential strategies to mitigate these challenges (ie, the use of passive consent). Future research may also focus on mechanisms, beyond built-in research study protocols, to support students in distress.</p>
      <p>The burgeoning body of literature on the phenomenon of cyberbullying is a relatively recent scholarly development, highlighting the crucial need to engage in discourse regarding this emerging field of research. This unique study offers insight into cyberbullying and provides a foundation for future research in this important and flourishing field. Importantly, as the frequency of ICT use is constantly growing, and with younger and younger children increasingly using ICTs, understanding the social, mental health, and health consequences of cyberbullying across grade levels may point to differing developmental impacts and inform targeted interventions.</p>
    </sec>
  </body>
  <back>
    <app-group>
      <app id="app1">
        <title>Multimedia Appendix 1</title>
        <p>Qualitative interview guide.</p>
        <media xlink:href="resprot_v5i2e83_app1.pdf" xlink:title="PDF File (Adobe PDF File), 45KB"/>
      </app>
      <app id="app2">
        <title>Multimedia Appendix 2</title>
        <p>Preliminary results.</p>
        <media xlink:href="resprot_v5i2e83_app2.pdf" xlink:title="PDF File (Adobe PDF File), 43KB"/>
      </app>
    </app-group>
    <glossary>
      <title>Abbreviations</title>
      <def-list>
        <def-item>
          <term id="abb1">B&#38;C</term>
          <def>
            <p>PVWS: Bullying &#38; Cyberbullying: Perpetrators, Victims &#38; Witnesses Survey</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb2">CBCL</term>
          <def>
            <p>Child Behavior Checklist</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb3">ICT</term>
          <def>
            <p>Information and communication technology</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb4">RA</term>
          <def>
            <p>Research assistant</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb5">SPPA</term>
          <def>
            <p>Self-Perception Profile for Adolescents</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb6">SPPC</term>
          <def>
            <p>Self-Perception Profile for Children</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb7">TRF</term>
          <def>
            <p>Teacher Report Form</p>
          </def>
        </def-item>
        <def-item>
          <term id="abb8">YSR</term>
          <def>
            <p>Youth Self-Report</p>
          </def>
        </def-item>
      </def-list>
    </glossary>
    <ack>
      <p>This study was funded by a Social Sciences and Humanities Research Council Grant (Grant #410-2011-1001). We would like to acknowledge first and foremost the Toronto District School Board for their utmost commitment to participating in the study, as well as each school for their dedication to both data collection and ensuring the mental health needs of students identified through the study were addressed. Thank you to the students, parents, and teachers for sharing your experiences with us. Thank you to the research assistants, without whom we could not have completed this large study.</p>
    </ack>
    <fn-group>
      <fn fn-type="con">
        <p>FM, WC, TB, DJP, JW, and DJ, KS, JD conceived of the study and developed the initial study protocol. FM, ALD, LBM, KS, PB, and AB and MVW contributed to writing the protocol for publication and provided ongoing data collection oversight during the duration of the study. JD managed the data throughout the duration of the study and contributed to writing the protocol for publication. All authors read and approved the final protocol for publication.</p>
      </fn>
      <fn fn-type="conflict">
        <p>None declared.</p>
      </fn>
    </fn-group>
    <ref-list>
      <ref id="ref1">
        <label>1</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Lenhart</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Duggan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Perrin</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Stepler</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Rainie</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Parker</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <source>Pew Research Center</source>
          <year>2015</year>
          <access-date>2016-02-13</access-date>
          <publisher-loc>Washington, DC</publisher-loc>
          <comment>Teens, social media &#38; technology overview 2015 
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.pewinternet.org/files/2015/04/PI_TeensandTech_Update2015_0409151.pdf">http://www.pewinternet.org/files/2015/04/PI_TeensandTech_Update2015_0409151.pdf</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6fH8k4Hz4"/></comment>
        </nlm-citation>
      </ref>
      <ref id="ref2">
        <label>2</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mishna</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Cook</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Gadalla</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Daciuk</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Solomon</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Cyber bullying behaviors among middle and high school students</article-title>
          <source>Am J Orthopsychiatry</source>
          <year>2010</year>
          <month>07</month>
          <volume>80</volume>
          <issue>3</issue>
          <fpage>362</fpage>
          <lpage>74</lpage>
          <pub-id pub-id-type="doi">10.1111/j.1939-0025.2010.01040.x</pub-id>
          <pub-id pub-id-type="medline">20636942</pub-id>
          <pub-id pub-id-type="pii">AJOP1040</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref3">
        <label>3</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Blumenfeld</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Cooper</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>LGBT and allied youth responses to cyberbullying: policy implications</article-title>
          <source>IJCP</source>
          <year>2010</year>
          <volume>31</volume>
          <fpage>114</fpage>
          <lpage>33</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref4">
        <label>4</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Craig</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>McInroy</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>You can form a part of yourself online: the influence of new media on identity development and coming out for LGBTQ youth</article-title>
          <source>J Gay Lesbian Mental</source>
          <year>2014</year>
          <volume>18</volume>
          <fpage>95</fpage>
          <lpage>109</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref5">
        <label>5</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Elwell</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Grogan</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Coulson</surname>
              <given-names>N</given-names>
            </name>
          </person-group>
          <article-title>Adolescents living with cancer: the role of computer-mediated support groups</article-title>
          <source>J Health Psychol</source>
          <year>2011</year>
          <month>03</month>
          <volume>16</volume>
          <issue>2</issue>
          <fpage>236</fpage>
          <lpage>48</lpage>
          <pub-id pub-id-type="doi">10.1177/1359105310371398</pub-id>
          <pub-id pub-id-type="medline">20733012</pub-id>
          <pub-id pub-id-type="pii">1359105310371398</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref6">
        <label>6</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Johnson</surname>
              <given-names>G</given-names>
            </name>
            <name name-style="western">
              <surname>Puplampu</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <source>Canadian Journal of Learning &#38; Technology</source>
          <year>2008</year>
          <access-date>2016-02-13</access-date>
          <comment>Internet use during childhood and the ecological techno-subsystem 
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.cjlt.ca/index.php/cjlt/article/view/172/168.Archived">http://www.cjlt.ca/index.php/cjlt/article/view/172/168.Archived</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6fH9DUzUN"/></comment>
        </nlm-citation>
      </ref>
      <ref id="ref7">
        <label>7</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Strom</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Strom</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Growing up with social networks and online communities</article-title>
          <source>The Education Digest</source>
          <year>2012</year>
          <volume>78</volume>
          <fpage>48</fpage>
          <lpage>51</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref8">
        <label>8</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ammerlaan</surname>
              <given-names>JJ</given-names>
            </name>
            <name name-style="western">
              <surname>Scholtus</surname>
              <given-names>LW</given-names>
            </name>
            <name name-style="western">
              <surname>Drossaert</surname>
              <given-names>CH</given-names>
            </name>
            <name name-style="western">
              <surname>van Os-Medendorp</surname>
              <given-names>H</given-names>
            </name>
            <name name-style="western">
              <surname>Prakken</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Kruize</surname>
              <given-names>AA</given-names>
            </name>
            <name name-style="western">
              <surname>Bijlsma</surname>
              <given-names>JJ</given-names>
            </name>
          </person-group>
          <article-title>Feasibility of a website and a hospital-based online portal for young adults with juvenile idiopathic arthritis: views and experiences of patients</article-title>
          <source>JMIR Res Protoc</source>
          <year>2015</year>
          <volume>4</volume>
          <issue>3</issue>
          <fpage>e102</fpage>
          <comment>
            <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.researchprotocols.org/2015/3/e102/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/resprot.3952</pub-id>
          <pub-id pub-id-type="medline">26276373</pub-id>
          <pub-id pub-id-type="pii">v4i3e102</pub-id>
          <pub-id pub-id-type="pmcid">PMC4705016</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref9">
        <label>9</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Gasser</surname>
              <given-names>U</given-names>
            </name>
            <name name-style="western">
              <surname>Maclay</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Palfrey Jr</surname>
              <given-names>JG</given-names>
            </name>
          </person-group>
          <source>Berkman Center Research Publication</source>
          <year>2016</year>
          <month>06</month>
          <day>16</day>
          <access-date>2016-02-13</access-date>
          <comment>Working towards a deeper understanding of digital safety for children and young people in developing nations 
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://dmlhub.net/wp-content/uploads/files/SSRN-id1628276.pdf">http://dmlhub.net/wp-content/uploads/files/SSRN-id1628276.pdf</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6fHC6NF3e"/></comment>
        </nlm-citation>
      </ref>
      <ref id="ref10">
        <label>10</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Livingstone</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Haddon</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Risky experiences for children online: charting European research on children and the Internet</article-title>
          <source>Child Soc</source>
          <year>2008</year>
          <volume>22</volume>
          <fpage>314</fpage>
          <lpage>23</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref11">
        <label>11</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Burrow-Sanchez</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Call</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Zheng</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Drew</surname>
              <given-names>C</given-names>
            </name>
          </person-group>
          <article-title>How school counselors can help prevent online victimization</article-title>
          <source>J Couns Dev</source>
          <year>2011</year>
          <volume>89</volume>
          <fpage>3</fpage>
          <lpage>10</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref12">
        <label>12</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>DePaolis</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Williford</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>The nature and prevalence of cyber victimization among elementary school children</article-title>
          <source>Child Youth Care Forum</source>
          <year>2015</year>
          <volume>44</volume>
          <issue>3</issue>
          <fpage>377</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref13">
        <label>13</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Faucher</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Jackson</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Cassidy</surname>
              <given-names>W</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying among university students: gendered experiences, impacts, and perspectives</article-title>
          <source>Educ Res Int</source>
          <year>2014</year>
          <fpage>1</fpage>
        </nlm-citation>
      </ref>
      <ref id="ref14">
        <label>14</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Modecki</surname>
              <given-names>KL</given-names>
            </name>
            <name name-style="western">
              <surname>Minchin</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Harbaugh</surname>
              <given-names>AG</given-names>
            </name>
            <name name-style="western">
              <surname>Guerra</surname>
              <given-names>NG</given-names>
            </name>
            <name name-style="western">
              <surname>Runions</surname>
              <given-names>KC</given-names>
            </name>
          </person-group>
          <article-title>Bullying prevalence across contexts: a meta-analysis measuring cyber and traditional bullying</article-title>
          <source>J Adolesc Health</source>
          <year>2014</year>
          <month>11</month>
          <volume>55</volume>
          <issue>5</issue>
          <fpage>602</fpage>
          <lpage>11</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jadohealth.2014.06.007</pub-id>
          <pub-id pub-id-type="medline">25168105</pub-id>
          <pub-id pub-id-type="pii">S1054-139X(14)00254-7</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref15">
        <label>15</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kowalski</surname>
              <given-names>RM</given-names>
            </name>
            <name name-style="western">
              <surname>Giumetti</surname>
              <given-names>GW</given-names>
            </name>
            <name name-style="western">
              <surname>Schroeder</surname>
              <given-names>AN</given-names>
            </name>
            <name name-style="western">
              <surname>Lattanner</surname>
              <given-names>MR</given-names>
            </name>
          </person-group>
          <article-title>Bullying in the digital age: a critical review and meta-analysis of cyberbullying research among youth</article-title>
          <source>Psychol Bull</source>
          <year>2014</year>
          <month>07</month>
          <volume>140</volume>
          <issue>4</issue>
          <fpage>1073</fpage>
          <lpage>137</lpage>
          <pub-id pub-id-type="doi">10.1037/a0035618</pub-id>
          <pub-id pub-id-type="medline">24512111</pub-id>
          <pub-id pub-id-type="pii">2014-04307-001</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref16">
        <label>16</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ahlfors</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <article-title>Many sources, one theme: analysis of cyberbullying prevention and intervention websites</article-title>
          <source>J Soc Sci</source>
          <year>2010</year>
          <month>04</month>
          <day>01</day>
          <volume>6</volume>
          <issue>4</issue>
          <fpage>515</fpage>
          <lpage>522</lpage>
          <pub-id pub-id-type="doi">10.3844/jssp.2010.515.522</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref17">
        <label>17</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cassidy</surname>
              <given-names>W</given-names>
            </name>
            <name name-style="western">
              <surname>Faucher</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Jackson</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying among youth: a comprehensive review of current international research and its implications and application to policy and practice</article-title>
          <source>Sch Psychol Int</source>
          <year>2013</year>
          <volume>34</volume>
          <fpage>575</fpage>
          <lpage>612</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref18">
        <label>18</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Collier</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Patchin</surname>
              <given-names>JW</given-names>
            </name>
            <name name-style="western">
              <surname>Hinduja</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Living Internet: some context for the cyberbullying discussion</article-title>
          <source>Cyberbullying Prevention and Response: Expert Perspectives</source>
          <year>2012</year>
          <publisher-loc>New York</publisher-loc>
          <publisher-name>Routledge</publisher-name>
          <fpage>1</fpage>
          <lpage>12</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref19">
        <label>19</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hinduja</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Patchin</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>Bullying beyond the schoolyard: preventing and responding to cyberbullying. 2nd ed</source>
          <year>2009</year>
          <publisher-loc>Thousand Oaks, CA</publisher-loc>
          <publisher-name>Sage Publications</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref20">
        <label>20</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mishna</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Van Wert</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>Bullying in Canada</source>
          <year>2015</year>
          <publisher-loc>Toronto</publisher-loc>
          <publisher-name>Oxford University Press Canada</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref21">
        <label>21</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>del Barrio</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Tokunaga</surname>
              <given-names>R</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Bauman</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Cross</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Walker</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <article-title>Definitions of bullying and cyberbullying: how useful are the terms?</article-title>
          <source>Principles of cyberbullying research: definition, methods, and measures</source>
          <year>2013</year>
          <publisher-loc>New York</publisher-loc>
          <publisher-name>Routledge</publisher-name>
          <fpage>26</fpage>
          <lpage>40</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref22">
        <label>22</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Barlińska</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Szuster</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Winiewski</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying among adolescent bystanders: role of the communication medium, form of violence, and empathy</article-title>
          <source>J Community Appl Soc Psychol</source>
          <year>2013</year>
          <volume>23</volume>
          <fpage>37</fpage>
          <lpage>51</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref23">
        <label>23</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ang</surname>
              <given-names>RP</given-names>
            </name>
            <name name-style="western">
              <surname>Goh</surname>
              <given-names>DH</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying among adolescents: the role of affective and cognitive empathy, and gender</article-title>
          <source>Child Psychiatry Hum Dev</source>
          <year>2010</year>
          <month>08</month>
          <volume>41</volume>
          <issue>4</issue>
          <fpage>387</fpage>
          <lpage>97</lpage>
          <pub-id pub-id-type="doi">10.1007/s10578-010-0176-3</pub-id>
          <pub-id pub-id-type="medline">20238160</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref24">
        <label>24</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Beran</surname>
              <given-names>TN</given-names>
            </name>
            <name name-style="western">
              <surname>Li</surname>
              <given-names>Q</given-names>
            </name>
          </person-group>
          <article-title>The relationship between cyberbullying and school bullying</article-title>
          <source>J Stud Wellbeing</source>
          <year>2007</year>
          <volume>1</volume>
          <fpage>16</fpage>
          <lpage>33</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref25">
        <label>25</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Beran</surname>
              <given-names>T</given-names>
            </name>
            <name name-style="western">
              <surname>Stanton</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Hetherington</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Mishna</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Shariff</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Development of the bullying and health experiences scale</article-title>
          <source>Interact J Med Res</source>
          <year>2012</year>
          <volume>1</volume>
          <issue>2</issue>
          <fpage>e13</fpage>
          <comment>
            <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.i-jmr.org/2012/2/e13/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/ijmr.1835</pub-id>
          <pub-id pub-id-type="medline">23612028</pub-id>
          <pub-id pub-id-type="pii">v1i2e13</pub-id>
          <pub-id pub-id-type="pmcid">PMC3626124</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref26">
        <label>26</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Campbell</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Spears</surname>
              <given-names>B</given-names>
            </name>
            <name name-style="western">
              <surname>Slee</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Butler</surname>
              <given-names>D</given-names>
            </name>
            <name name-style="western">
              <surname>Kift</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Victims' perceptions of traditional and cyberbullying, and the psychosocial correlates of their victimisation</article-title>
          <source>J Emot Behav Diff</source>
          <year>2012</year>
          <volume>17</volume>
          <fpage>389</fpage>
          <lpage>401</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref27">
        <label>27</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bonanno</surname>
              <given-names>RA</given-names>
            </name>
            <name name-style="western">
              <surname>Hymel</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <article-title>Cyber bullying and internalizing difficulties: above and beyond the impact of traditional forms of bullying</article-title>
          <source>J Youth Adolesc</source>
          <year>2013</year>
          <month>05</month>
          <volume>42</volume>
          <issue>5</issue>
          <fpage>685</fpage>
          <lpage>97</lpage>
          <pub-id pub-id-type="doi">10.1007/s10964-013-9937-1</pub-id>
          <pub-id pub-id-type="medline">23512485</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref28">
        <label>28</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Dehue</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Bolman</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Völlink</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying: youngsters' experiences and parental perception</article-title>
          <source>Cyberpsychol Behav</source>
          <year>2008</year>
          <month>04</month>
          <volume>11</volume>
          <issue>2</issue>
          <fpage>217</fpage>
          <lpage>23</lpage>
          <pub-id pub-id-type="doi">10.1089/cpb.2007.0008</pub-id>
          <pub-id pub-id-type="medline">18422417</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref29">
        <label>29</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Litwiller</surname>
              <given-names>BJ</given-names>
            </name>
            <name name-style="western">
              <surname>Brausch</surname>
              <given-names>AM</given-names>
            </name>
          </person-group>
          <article-title>Cyber bullying and physical bullying in adolescent suicide: the role of violent behavior and substance use</article-title>
          <source>J Youth Adolesc</source>
          <year>2013</year>
          <month>05</month>
          <volume>42</volume>
          <issue>5</issue>
          <fpage>675</fpage>
          <lpage>84</lpage>
          <pub-id pub-id-type="doi">10.1007/s10964-013-9925-5</pub-id>
          <pub-id pub-id-type="medline">23381779</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref30">
        <label>30</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mitchell</surname>
              <given-names>KJ</given-names>
            </name>
            <name name-style="western">
              <surname>Ybarra</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Finkelhor</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>The relative importance of online victimization in understanding depression, delinquency, and substance use</article-title>
          <source>Child Maltreat</source>
          <year>2007</year>
          <month>11</month>
          <volume>12</volume>
          <issue>4</issue>
          <fpage>314</fpage>
          <lpage>24</lpage>
          <pub-id pub-id-type="doi">10.1177/1077559507305996</pub-id>
          <pub-id pub-id-type="medline">17954938</pub-id>
          <pub-id pub-id-type="pii">12/4/314</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref31">
        <label>31</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ybarra</surname>
              <given-names>ML</given-names>
            </name>
            <name name-style="western">
              <surname>Diener-West</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Leaf</surname>
              <given-names>PJ</given-names>
            </name>
          </person-group>
          <article-title>Examining the overlap in internet harassment and school bullying: implications for school intervention</article-title>
          <source>J Adolesc Health</source>
          <year>2007</year>
          <month>12</month>
          <volume>41</volume>
          <issue>6 Suppl 1</issue>
          <fpage>S42</fpage>
          <lpage>50</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jadohealth.2007.09.004</pub-id>
          <pub-id pub-id-type="medline">18047944</pub-id>
          <pub-id pub-id-type="pii">S1054-139X(07)00369-2</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref32">
        <label>32</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Calvete</surname>
              <given-names>E</given-names>
            </name>
            <name name-style="western">
              <surname>Orue</surname>
              <given-names>I</given-names>
            </name>
            <name name-style="western">
              <surname>Estevez</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Villardon</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Padilla</surname>
              <given-names>P</given-names>
            </name>
          </person-group>
          <article-title>Cyberbullying in adolescents: modalities and aggressors' profile</article-title>
          <source>Comput Human Behav</source>
          <year>2010</year>
          <volume>26</volume>
          <fpage>1128</fpage>
          <lpage>35</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref33">
        <label>33</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ybarra</surname>
              <given-names>ML</given-names>
            </name>
            <name name-style="western">
              <surname>Mitchell</surname>
              <given-names>KJ</given-names>
            </name>
          </person-group>
          <article-title>Prevalence and frequency of Internet harassment instigation: implications for adolescent health</article-title>
          <source>J Adolesc Health</source>
          <year>2007</year>
          <month>08</month>
          <volume>41</volume>
          <issue>2</issue>
          <fpage>189</fpage>
          <lpage>95</lpage>
          <pub-id pub-id-type="doi">10.1016/j.jadohealth.2007.03.005</pub-id>
          <pub-id pub-id-type="medline">17659224</pub-id>
          <pub-id pub-id-type="pii">S1054-139X(07)00136-X</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref34">
        <label>34</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Cappadocia</surname>
              <given-names>MC</given-names>
            </name>
            <name name-style="western">
              <surname>Weiss</surname>
              <given-names>JA</given-names>
            </name>
            <name name-style="western">
              <surname>Pepler</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Bullying experiences among children and youth with autism spectrum disorders</article-title>
          <source>J Autism Dev Disord</source>
          <year>2012</year>
          <month>02</month>
          <volume>42</volume>
          <issue>2</issue>
          <fpage>266</fpage>
          <lpage>77</lpage>
          <pub-id pub-id-type="doi">10.1007/s10803-011-1241-x</pub-id>
          <pub-id pub-id-type="medline">21499672</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref35">
        <label>35</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Kosciw</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Bartkiewicz</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Greytak</surname>
              <given-names>EA</given-names>
            </name>
          </person-group>
          <article-title>Promising strategies for prevention of the bullying of lesbian, gay, bisexual, and transgender youth</article-title>
          <source>Prev Res</source>
          <year>2012</year>
          <volume>19</volume>
          <fpage>10</fpage>
          <lpage>3</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref36">
        <label>36</label>
        <nlm-citation citation-type="web">
          <source>Toronto District School Board</source>
          <year>2014</year>
          <access-date>2016-02-13</access-date>
          <comment>Quick facts 
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.tdsb.on.ca/AboutUs/QuickFacts.aspx">http://www.tdsb.on.ca/AboutUs/QuickFacts.aspx</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6fH9PvbV6"/></comment>
        </nlm-citation>
      </ref>
      <ref id="ref37">
        <label>37</label>
        <nlm-citation citation-type="web">
          <source>Toronto District School Board</source>
          <year>2014</year>
          <access-date>2016-02-13</access-date>
          <comment>The 2014 Learning opportunities index: questions and answers 
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.tdsb.on.ca/Portals/0/AboutUs/Research/LOI2014.pdf">http://www.tdsb.on.ca/Portals/0/AboutUs/Research/LOI2014.pdf</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6fH9XXntM"/></comment>
        </nlm-citation>
      </ref>
      <ref id="ref38">
        <label>38</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Roberts</surname>
              <given-names>DF</given-names>
            </name>
            <name name-style="western">
              <surname>Foehr</surname>
              <given-names>UG</given-names>
            </name>
          </person-group>
          <article-title>Trends in media use</article-title>
          <source>Future Child</source>
          <year>2008</year>
          <volume>18</volume>
          <issue>1</issue>
          <fpage>11</fpage>
          <lpage>37</lpage>
          <pub-id pub-id-type="medline">21338004</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref39">
        <label>39</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Steeves</surname>
              <given-names>V</given-names>
            </name>
          </person-group>
          <source>MediaSmarts</source>
          <year>2014</year>
          <access-date>2016-02-13</access-date>
          <comment>Young Canadians in a wired world, phase III 
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://mediasmarts.ca/young-canadians-wired-world-phase-iii-0">http://mediasmarts.ca/young-canadians-wired-world-phase-iii-0</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6fHCxA4pv"/></comment>
        </nlm-citation>
      </ref>
      <ref id="ref40">
        <label>40</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Mishna</surname>
              <given-names>F</given-names>
            </name>
            <name name-style="western">
              <surname>Schwan</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Lefebvre</surname>
              <given-names>R</given-names>
            </name>
            <name name-style="western">
              <surname>Bhole</surname>
              <given-names>P</given-names>
            </name>
            <name name-style="western">
              <surname>Johnston</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Students in distress: unanticipated findings in a cyber bullying study</article-title>
          <source>Child Youth Serv Rev</source>
          <year>2014</year>
          <volume>44</volume>
          <fpage>341</fpage>
          <lpage>8</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref41">
        <label>41</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Ewen</surname>
              <given-names>V</given-names>
            </name>
            <name name-style="western">
              <surname>Mushquash</surname>
              <given-names>AR</given-names>
            </name>
            <name name-style="western">
              <surname>Bailey</surname>
              <given-names>K</given-names>
            </name>
            <name name-style="western">
              <surname>Haggarty</surname>
              <given-names>JM</given-names>
            </name>
            <name name-style="western">
              <surname>Dama</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Mushquash</surname>
              <given-names>CJ</given-names>
            </name>
          </person-group>
          <article-title>Same-day counseling: study protocol for the evaluation of a new mental health service</article-title>
          <source>JMIR Res Protoc</source>
          <year>2016</year>
          <volume>5</volume>
          <issue>1</issue>
          <fpage>e22</fpage>
          <comment>
            <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.researchprotocols.org/2016/1/e22/"/>
          </comment>
          <pub-id pub-id-type="doi">10.2196/resprot.5206</pub-id>
          <pub-id pub-id-type="medline">26842891</pub-id>
          <pub-id pub-id-type="pii">v5i1e22</pub-id>
          <pub-id pub-id-type="pmcid">PMC4757779</pub-id>
        </nlm-citation>
      </ref>
      <ref id="ref42">
        <label>42</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Achenbach</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <source>Achenbach System of Empirically Based Assessment (ASEBA)</source>
          <year>2001</year>
          <access-date>2016-04-25</access-date>
          <comment>Youth self-report 
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.aseba.org/forms/ysr.pdf">http://www.aseba.org/forms/ysr.pdf</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6h1Ks0uZm"/></comment>
        </nlm-citation>
      </ref>
      <ref id="ref43">
        <label>43</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Achenbach</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <source>Achenbach System of Empirically Based Assessment (ASEBA)</source>
          <year>2001</year>
          <access-date>2016-02-13</access-date>
          <comment>The child behavior checklist 
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.aseba.org/schoolage.html">http://www.aseba.org/schoolage.html</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6h1KvivYP"/></comment>
        </nlm-citation>
      </ref>
      <ref id="ref44">
        <label>44</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Achenbach</surname>
              <given-names>T</given-names>
            </name>
          </person-group>
          <source>University of Vermont</source>
          <year>2001</year>
          <access-date>2016-02-13</access-date>
          <comment>Teacher report form 
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.aseba.org/schoolage.html">http://www.aseba.org/schoolage.html</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6h1L1FhEh"/></comment>
        </nlm-citation>
      </ref>
      <ref id="ref45">
        <label>45</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Harter</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>University of Denver</source>
          <year>2012</year>
          <access-date>2016-02-13</access-date>
          <comment>The self-perception profile for children 
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://portfolio.du.edu/SusanHarter/page/44210">https://portfolio.du.edu/SusanHarter/page/44210</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6fH9sAYGT"/></comment>
        </nlm-citation>
      </ref>
      <ref id="ref46">
        <label>46</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Harter</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>University of Denver</source>
          <year>2012</year>
          <access-date>2016-02-13</access-date>
          <comment>Manual for the self-perception profile for adolescents 
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://portfolio.du.edu/SusanHarter/page/44210">https://portfolio.du.edu/SusanHarter/page/44210</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6fH9sAYGT"/></comment>
        </nlm-citation>
      </ref>
      <ref id="ref47">
        <label>47</label>
        <nlm-citation citation-type="web">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Harter</surname>
              <given-names>S</given-names>
            </name>
          </person-group>
          <source>University of Denver</source>
          <year>2012</year>
          <access-date>2016-02-13</access-date>
          <comment>Manual for the social support scale for children 
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="https://portfolio.du.edu/SusanHarter/page/44343">https://portfolio.du.edu/SusanHarter/page/44343</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6fH9yldNw"/></comment>
        </nlm-citation>
      </ref>
      <ref id="ref48">
        <label>48</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Vaux</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Riedel</surname>
              <given-names>S</given-names>
            </name>
            <name name-style="western">
              <surname>Stewart</surname>
              <given-names>D</given-names>
            </name>
          </person-group>
          <article-title>Modes of social support: the social support behaviors (SS-B) scale</article-title>
          <source>Am J Community Psychol</source>
          <year>1987</year>
          <volume>15</volume>
          <fpage>209</fpage>
          <lpage>37</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref49">
        <label>49</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Hogan</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Parker</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Wiener</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Watters</surname>
              <given-names>C</given-names>
            </name>
            <name name-style="western">
              <surname>Wood</surname>
              <given-names>L</given-names>
            </name>
            <name name-style="western">
              <surname>Oke</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <article-title>Academic success in adolescence: relationships among verbal IQ, social support and emotional intelligence</article-title>
          <source>Aust J Psychol</source>
          <year>2010</year>
          <volume>62</volume>
          <fpage>30</fpage>
          <lpage>41</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref50">
        <label>50</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Birks</surname>
              <given-names>M</given-names>
            </name>
            <name name-style="western">
              <surname>Mills</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>Grounded theory: a practical guide. 1st Ed</source>
          <year>2011</year>
          <publisher-loc>Thousand Oaks, CA</publisher-loc>
          <publisher-name>Sage Publications Inc</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref51">
        <label>51</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Corbin</surname>
              <given-names>J</given-names>
            </name>
            <name name-style="western">
              <surname>Strauss</surname>
              <given-names>A</given-names>
            </name>
          </person-group>
          <source>Basics of qualitative research: techniques and procedures for developing grounded theory. 3rd ed</source>
          <year>2008</year>
          <publisher-loc>Thousand Oaks, CA</publisher-loc>
          <publisher-name>Sage Publications Inc</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref52">
        <label>52</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Patton</surname>
              <given-names>M</given-names>
            </name>
          </person-group>
          <source>Qualitative research and evaluation methods. 3rd ed</source>
          <year>2002</year>
          <publisher-loc>Thousand Oaks, CA</publisher-loc>
          <publisher-name>Sage Publications Inc</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref53">
        <label>53</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Strauss</surname>
              <given-names>A</given-names>
            </name>
            <name name-style="western">
              <surname>Corbin</surname>
              <given-names>J</given-names>
            </name>
          </person-group>
          <source>Basics of qualitative research: techniques and procedures for developing grounded theory. 2nd ed</source>
          <year>1998</year>
          <publisher-loc>Thousand Oaks, CA</publisher-loc>
          <publisher-name>Sage Publications Inc</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref54">
        <label>54</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Bowen</surname>
              <given-names>G</given-names>
            </name>
          </person-group>
          <article-title>Grounded theory and sensitizing concepts</article-title>
          <source>Int J Qual Methods</source>
          <year>2006</year>
          <volume>5</volume>
          <fpage>12</fpage>
          <lpage>23</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref55">
        <label>55</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Charmaz</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <source>Constructing grounded theory: a practical guide through qualitative analysis</source>
          <year>2006</year>
          <publisher-loc>Thousand Oaks, CA</publisher-loc>
          <publisher-name>Sage Publications Inc</publisher-name>
        </nlm-citation>
      </ref>
      <ref id="ref56">
        <label>56</label>
        <nlm-citation citation-type="book">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Charmaz</surname>
              <given-names>K</given-names>
            </name>
          </person-group>
          <person-group person-group-type="editor">
            <name name-style="western">
              <surname>Smith</surname>
              <given-names>JA</given-names>
            </name>
          </person-group>
          <article-title>Grounded theory</article-title>
          <source>Qualitative psychology: a practical guide to research methods</source>
          <year>2008</year>
          <publisher-loc>Thousand Oaks, CA</publisher-loc>
          <publisher-name>Sage Publications Inc</publisher-name>
          <fpage>81</fpage>
          <lpage>110</lpage>
        </nlm-citation>
      </ref>
      <ref id="ref57">
        <label>57</label>
        <nlm-citation citation-type="web">
          <source>Pew Research Center</source>
          <year>2015</year>
          <access-date>2016-02-13</access-date>
          <comment>Device ownership over time 
          <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.pewinternet.org/data-trend/mobile/device-ownership/">http://www.pewinternet.org/data-trend/mobile/device-ownership/</ext-link>
          <ext-link ext-link-type="webcite" xlink:href="6fHA64Fep"/></comment>
        </nlm-citation>
      </ref>
      <ref id="ref58">
        <label>58</label>
        <nlm-citation citation-type="journal">
          <person-group person-group-type="author">
            <name name-style="western">
              <surname>Modecki</surname>
              <given-names>KL</given-names>
            </name>
            <name name-style="western">
              <surname>Barber</surname>
              <given-names>BL</given-names>
            </name>
            <name name-style="western">
              <surname>Vernon</surname>
              <given-names>L</given-names>
            </name>
          </person-group>
          <article-title>Mapping developmental precursors of cyber-aggression: trajectories of risk predict perpetration and victimization</article-title>
          <source>J Youth Adolesc</source>
          <year>2013</year>
          <month>05</month>
          <volume>42</volume>
          <issue>5</issue>
          <fpage>651</fpage>
          <lpage>61</lpage>
          <pub-id pub-id-type="doi">10.1007/s10964-012-9887-z</pub-id>
          <pub-id pub-id-type="medline">23242509</pub-id>
        </nlm-citation>
      </ref>
    </ref-list>
  </back>
</article>
