{"id":36,"date":"2011-03-29T16:04:59","date_gmt":"2011-03-29T16:04:59","guid":{"rendered":"http:\/\/www.ciberbullying.com\/cyberbullying\/?page_id=36"},"modified":"2011-06-04T18:01:33","modified_gmt":"2011-06-04T18:01:33","slug":"bibliografia-sobre-ciberbullying","status":"publish","type":"page","link":"https:\/\/www.ciberbullying.com\/cyberbullying\/bibliografia-sobre-ciberbullying\/","title":{"rendered":"Bibliograf\u00eda sobre ciberbullying"},"content":{"rendered":"<p>(Ordenada de m\u00e1s reciente a m\u00e1s antigua, seg\u00fan fecha de publicaci\u00f3n.)<\/p>\n<ul>\n<li><i><a href=\"http:\/\/www.natcen.ac.uk\/study\/the-characteristics-of-bullying-victims-in-schools\">The Characteristics of Bullying Victims in Schools<\/a><\/i>. National Centre for Social Research <b>(Marzo 2010)<\/b><\/li>\n<li><i>La metamorfosis del espacio medi\u00e1tico. La Generaci\u00f3n Interactiva en Iberoam\u00e9rica<\/i>. V Congreso sobre Comunicaci\u00f3n y Realidad. Jorge del R\u00edo P\u00e9rez <b>(2009)<\/b><\/li>\n<li><a href=\"http:\/\/www.pantallasamigas.net\/recursos-educativos-materiales-didacticos\/kit-stop-ciberbullying\/kit-stop-ciberbullying.shtm\">Kit <i>Stop Ciberbullying. Caja de herramientas para la prevenci\u00f3n del ciberacoso<\/i><\/a>. Aftab, P., Flores, J. &amp; Casal, M.<b>(2009)<\/b><\/li>\n<li><i><a href=\"http:\/\/www.inteco.es\/Seguridad\/Observatorio\/Estudios_e_Informes\/Estudios_e_Informes_1\/Estudio_ninos\">Estudio sobre h\u00e1bitos seguros en el uso de las TIC por ni\u00f1os y adolescentes y e-confianza de sus padres<\/a><\/i>. <acronym title=\"Instituto Nacional de Tecnolog\u00edas de la Comunicaci\u00f3n\">INTECO<\/acronym> <b>(Marzo 2009)<\/b><\/li>\n<li><a href=\"http:\/\/www.injuve.migualdad.es\/injuve\/contenidos.item.action?id=805891917&amp;menuId=1885068202\"><i>La salud mental de las personas j\u00f3venes en Espa\u00f1a<\/i><\/a> Revista de Estudios de Juventud N\u00ba 84. <b>(Marzo 09)<\/b>. Coordinadores: Santiago P\u00e9rez Camarero, Nieves Rojo Mora y \u00c1lvaro Hidalgo Vega.<\/li>\n<li><a href=\"http:\/\/www.ibit.org\/home\/difusion\/ver.php?id=2188\"><i>Les TIC i els joves a les Illes Balears<\/i><\/a> Equipo <i>Educaci\u00f3 i Ciutadania<\/i> del Departament de Pedagogia Aplicada i Psicologia de l&#8217;Educaci\u00f3 de la UIB. Jaume Sureda (director), Rub\u00e9n Comas, Bartomeu Mut y Merc\u00e8 Morey. <b>(Marzo 2009)<\/b>.<\/li>\n<li><a href=\"http:\/\/www.cox.com\/takecharge\/safe_teens_2009\/media\/2009_teen_survey_internet_and_wireless_safety.pdf\"><em>Teen Safety Survey<\/em><\/a> Teen Online &amp; Wireless Safety Survey &#8211; Cyberbullying, Sexting, and Parental Controls. Cox Communications. <b>(Mayo 2009)<\/b><\/li>\n<li><i>Cyberbullying and online harassment: Reconceptualizing the victimization of adolescent girls<\/i>. En V. Garcia and J. Clifford [Eds.]. <i>Female crime victims: Reality reconsidered<\/i>. Upper Saddle River, NJ: Prentice Hall. Burgess-Proctor, A., Patchin, J. W., &amp; Hinduja, S. <b>(2009)<\/b>. <\/li>\n<li><i>Bullying beyond the Schoolyard: Preventing and Responding to Cyberbullying.<\/i> Thousand Oaks, CA: Sage Publications. Hinduja, S. &amp; Patchin, J. W. <b>(2009)<\/b>. <\/li>\n<li><em><a href=\"http:\/\/www.beatbullying.org\/pdfs\/Virtual%20Violence%20-\n%20Protecting%20Children%20from%20Cyberbullying.pdf\">Beatbullying, Virtual violence: Protecting Children from cyberbullying<\/a><\/em> London <b>(2009)<\/b>.<\/li>\n<li><i><a href=\"http:\/\/cyber.law.harvard.edu\/pubrelease\/isttf\/\">Enhancing Child Safety and Online Technologies<\/a><\/i>. Final Report of the Internet Safety Technical Task Force to the Multi-State Working Group on Social Networking of State Attorneys General of the United States. Internet Safety Technical Task Force. <b>(Diciembre 2008)<\/b><\/li>\n<li><i><a href=\"http:\/\/www.mchcf.org\/special_initiatives\/specialinitiatives.html\">MetroWest Adolescent Health Survey<\/a><\/i>. MetroWest Community Healthcare Foundation <b>(2008)<\/b><\/li>\n<li><i>Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization<\/i>. Deviant Behavior, 29(2), 129-156. Hinduja, S. &amp; Patchin, J. W. <b>(2008)<\/b>. <\/li>\n<li><a href=\"http:\/\/www.pantallasamigas.net\/recursos-educativos-materiales-didacticos\/pack-ciberbullying\/index.htm\"><i>CiberBullying. Prevenci\u00f3n del Acoso por medio de las <acronym title=\"Nuevas Tecnolog\u00edas de la Informaci\u00f3n y de la Comunicaci\u00f3n\">NTICs<\/acronym><\/i> (pack multimedia)<\/a>. Flores, J. &amp; Casal, M. <b>(2007)<\/b><\/li>\n<li><i>Offline Consequences of Online Victimization: School Violence and Delinquency.<\/i> Journal of School Violence, 6(3), 89-112. Hinduja, S. &amp; Patchin, J. W. <b>(2007)<\/b>. <\/li>\n<li><i><a href=\"http:\/\/www.pewinternet.org\/Reports\/2007\/Cyberbullying.aspx\">Ciberbullying<\/a>.<\/i> Pew Research Center&#8217;s Internet &amp; American Life Project. Pew Research Center <b>(2007)<\/b><\/li>\n<li><i>C\u00f3mo usan Internet los j\u00f3venes: h\u00e1bitos, riesgos y control parental<\/i>. Garitaonandia, C. &amp; Garmendia, M. <b>(2007)<\/b><\/li>\n<li><a href=\"http:\/\/www.pantallasamigas.net\/recursos-educativos-materiales-didacticos\/guia-ciberbullying\/index.htm\"><i>CiberBullying. Gu\u00eda pr\u00e1ctica para madres, padres y personal docente<\/i><\/a>. Aftab, P. <b>(2006)<\/b><\/li>\n<li><i>Bullies Move beyond the Schoolyard: A Preliminary Look at Cyberbullying<\/i>. Youth Violence and Juvenile Justice, 4(2), 148-169. Patchin, J. &amp; Hinduja, S. <b>(2006)<\/b>. <\/li>\n<li><i>Cyber-bullying and schools in an electronic era<\/i>. En S. Tettegah &amp; R. Hunter (Eds.) Technology and Education: Issues in administration, policy and applications in k12 school. PP. 17-28. London: Elsevier. Tettegah, S. Y. , Betout, D., &amp; Taylor, K. R. <b>(2006)<\/b>. <\/li>\n<li><i>Online victimization of youth: 5 years later<\/i>. Alexandria, VA: National Center for Missing &amp; Exploited Children. Wolak, J. Mitchell, K.J., &amp; Finkelhor, D. <b>(2006)<\/b>. <\/li>\n<li><i>Cyber-bullying: Creating a Culture of Respect in a Cyber World<\/i>. Reclaiming Children &amp; Youth, 13(4), 224-228. Keith, S. &amp; Martin, M. E. <b>(2005)<\/b>. <\/li>\n<li><a href=\"http:\/\/www.nch.org.uk\/uploads\/documents\/Mobile_bullying_%20report.pdf\"><i>Putting U in the picture. Mobile Bullying Survey 2005<\/i><\/a>. National Children&#8217;s Home. <b>(2005)<\/b>. <\/li>\n<li><i>Online aggressor\/targets, aggressors and targets: A comparison of associated youth characteristics.<\/i> Journal of Child Psychology and Psychiatry, 45, 1308-1316. Ybarra, M. L. &amp; Mitchell, J. K. <b>(2004)<\/b>.<\/li>\n<li><i>Linkages between depressive symptomatology and Internet harassment among young regular Internet users.<\/i> Cyberpsychol and Behavior. Apr;7(2):247-57. Ybarra ML <b>(2004)<\/b>. <\/li>\n<li><i>Youth engaging in online harassment: associations with caregiver-child relationships, Internet use, and personal characteristics.<\/i> Journal of Adolescence. Jun;27(3):319-36. Ybarra ML, Mitchell KJ <b>(2004)<\/b>. <\/li>\n<li><i>Emerging risks of violence in the digital age: Lessons for educators from an online study of adolescent girls in the United States<\/i>. Journal of School Violence, 1(2), 51-71. Berson, I. R., Berson, M. J., &amp; Ferron, J. M. <b>(2002)<\/b> <\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>(Ordenada de m\u00e1s reciente a m\u00e1s antigua, seg\u00fan fecha de publicaci\u00f3n.) The Characteristics of Bullying Victims in Schools. National Centre for Social Research (Marzo 2010) La metamorfosis del espacio medi\u00e1tico. La Generaci\u00f3n Interactiva en Iberoam\u00e9rica. V Congreso sobre Comunicaci\u00f3n y Realidad. Jorge del R\u00edo P\u00e9rez (2009) Kit Stop Ciberbullying. Caja de herramientas para la prevenci\u00f3n [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-36","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bibliograf\u00eda sobre ciberbullying - CIBERBULLYING<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ciberbullying.com\/cyberbullying\/bibliografia-sobre-ciberbullying\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bibliograf\u00eda sobre ciberbullying - CIBERBULLYING\" \/>\n<meta property=\"og:description\" content=\"(Ordenada de m\u00e1s reciente a m\u00e1s antigua, seg\u00fan fecha de publicaci\u00f3n.) The Characteristics of Bullying Victims in Schools. National Centre for Social Research (Marzo 2010) La metamorfosis del espacio medi\u00e1tico. La Generaci\u00f3n Interactiva en Iberoam\u00e9rica. V Congreso sobre Comunicaci\u00f3n y Realidad. Jorge del R\u00edo P\u00e9rez (2009) Kit Stop Ciberbullying. Caja de herramientas para la prevenci\u00f3n [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ciberbullying.com\/cyberbullying\/bibliografia-sobre-ciberbullying\/\" \/>\n<meta property=\"og:site_name\" content=\"CIBERBULLYING\" \/>\n<meta property=\"article:modified_time\" content=\"2011-06-04T18:01:33+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/bibliografia-sobre-ciberbullying\\\/\",\"url\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/bibliografia-sobre-ciberbullying\\\/\",\"name\":\"Bibliograf\u00eda sobre ciberbullying - CIBERBULLYING\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/#website\"},\"datePublished\":\"2011-03-29T16:04:59+00:00\",\"dateModified\":\"2011-06-04T18:01:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/bibliografia-sobre-ciberbullying\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/bibliografia-sobre-ciberbullying\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/bibliografia-sobre-ciberbullying\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bibliograf\u00eda sobre ciberbullying\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/#website\",\"url\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/\",\"name\":\"CIBERBULLYING\",\"description\":\"Acoso escolar \u2013 Ciberacoso entre iguales\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bibliograf\u00eda sobre ciberbullying - CIBERBULLYING","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ciberbullying.com\/cyberbullying\/bibliografia-sobre-ciberbullying\/","og_locale":"es_ES","og_type":"article","og_title":"Bibliograf\u00eda sobre ciberbullying - CIBERBULLYING","og_description":"(Ordenada de m\u00e1s reciente a m\u00e1s antigua, seg\u00fan fecha de publicaci\u00f3n.) The Characteristics of Bullying Victims in Schools. National Centre for Social Research (Marzo 2010) La metamorfosis del espacio medi\u00e1tico. La Generaci\u00f3n Interactiva en Iberoam\u00e9rica. V Congreso sobre Comunicaci\u00f3n y Realidad. Jorge del R\u00edo P\u00e9rez (2009) Kit Stop Ciberbullying. Caja de herramientas para la prevenci\u00f3n [&hellip;]","og_url":"https:\/\/www.ciberbullying.com\/cyberbullying\/bibliografia-sobre-ciberbullying\/","og_site_name":"CIBERBULLYING","article_modified_time":"2011-06-04T18:01:33+00:00","twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ciberbullying.com\/cyberbullying\/bibliografia-sobre-ciberbullying\/","url":"https:\/\/www.ciberbullying.com\/cyberbullying\/bibliografia-sobre-ciberbullying\/","name":"Bibliograf\u00eda sobre ciberbullying - CIBERBULLYING","isPartOf":{"@id":"https:\/\/www.ciberbullying.com\/cyberbullying\/#website"},"datePublished":"2011-03-29T16:04:59+00:00","dateModified":"2011-06-04T18:01:33+00:00","breadcrumb":{"@id":"https:\/\/www.ciberbullying.com\/cyberbullying\/bibliografia-sobre-ciberbullying\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ciberbullying.com\/cyberbullying\/bibliografia-sobre-ciberbullying\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ciberbullying.com\/cyberbullying\/bibliografia-sobre-ciberbullying\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.ciberbullying.com\/cyberbullying\/"},{"@type":"ListItem","position":2,"name":"Bibliograf\u00eda sobre ciberbullying"}]},{"@type":"WebSite","@id":"https:\/\/www.ciberbullying.com\/cyberbullying\/#website","url":"https:\/\/www.ciberbullying.com\/cyberbullying\/","name":"CIBERBULLYING","description":"Acoso escolar \u2013 Ciberacoso entre iguales","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ciberbullying.com\/cyberbullying\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/pages\/36","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/comments?post=36"}],"version-history":[{"count":7,"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/pages\/36\/revisions"}],"predecessor-version":[{"id":39,"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/pages\/36\/revisions\/39"}],"wp:attachment":[{"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/media?parent=36"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}