<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article
  PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "https://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.1" specific-use="sps-1.9" xml:lang="en" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">redie</journal-id>
			<journal-title-group>
				<journal-title>Revista electrónica de investigación educativa</journal-title>
				<abbrev-journal-title abbrev-type="publisher">REDIE</abbrev-journal-title>
			</journal-title-group>
			<issn pub-type="epub">1607-4041</issn>
			<publisher>
				<publisher-name>Universidad Autónoma de Baja California, Instituto de Investigación y Desarrollo Educativo</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="doi">10.24320/redie.2024.26.e06.5992</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Artículos</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>Multidimensional Scale to Assess Digital Security in Adolescents</article-title>
				<trans-title-group xml:lang="es">
					<trans-title>Escala multidimensional para evaluar la seguridad digital en adolescentes</trans-title>
				</trans-title-group>
			</title-group>
			<contrib-group>
				<contrib contrib-type="author">
					<contrib-id contrib-id-type="orcid">0000-0003-2115-8571</contrib-id>
					<name>
						<surname>Peraza-Balderrama</surname>
						<given-names>José Néstor</given-names>
					</name>
					<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
				</contrib>
				<contrib contrib-type="author">
					<contrib-id contrib-id-type="orcid">0000-0001-6559-4151</contrib-id>
					<name>
						<surname>Valdés-Cuervo</surname>
						<given-names>Ángel Alberto</given-names>
					</name>
					<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
				</contrib>
				<contrib contrib-type="author">
					<contrib-id contrib-id-type="orcid">0000-0001-9247-7663</contrib-id>
					<name>
						<surname>Parra-Pérez</surname>
						<given-names>Lizeth Guadalupe</given-names>
					</name>
					<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
				</contrib>
				<contrib contrib-type="author">
					<contrib-id contrib-id-type="orcid">0000-0002-9557-5901</contrib-id>
					<name>
						<surname>Urías-Murrieta</surname>
						<given-names>Maricela</given-names>
					</name>
					<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
				</contrib>
				<aff id="aff1">
					<label>1</label>
					<institution content-type="original">Instituto Tecnológico de Sonora, México</institution>
					<institution content-type="normalized">Instituto Tecnológico de Sonora</institution>
					<institution content-type="orgname">Instituto Tecnológico de Sonora</institution>
					<country country="MX">Mexico</country>
				</aff>
			</contrib-group>
			<author-notes>
				<fn fn-type="other" id="fn2">
					<label>Contribution of each author:</label>
					<p><bold>José Nestor Peraza:</bold> Conception and design, data analysis and article writing. <bold>Ángel Alberti Valdés:</bold> Funding acquisition, data analysis and article writing. <bold>Lizeth Guadalupe Parra:</bold> Methodology and writing review. <bold>Maricela Urías:</bold> Data collection, methodology and writing review.</p>
				</fn>
				<fn fn-type="conflict" id="fn3">
					<label>Declaration of no conflict of interest:</label>
					<p> The authors declare no conflict of interest.</p>
				</fn>
			</author-notes>
			<pub-date date-type="pub" publication-format="electronic">
				<day>08</day>
				<month>05</month>
				<year>2024</year>
			</pub-date>
			<pub-date date-type="collection" publication-format="electronic">
				<year>2024</year>
			</pub-date>
			<volume>26</volume>
			<elocation-id>e06</elocation-id>
			<history>
				<date date-type="received">
					<day>01</day>
					<month>03</month>
					<year>2021</year>
				</date>
				<date date-type="accepted">
					<day>29</day>
					<month>06</month>
					<year>2021</year>
				</date>
			</history>
			<permissions>
				<license license-type="open-access" xlink:href="https://creativecommons.org/licenses/by-nc/4.0/" xml:lang="en">
					<license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution License</license-p>
				</license>
			</permissions>
			<abstract>
				<title>Abstract</title>
				<p>The study examined the psychometric properties of a Digital Security Scale (DSS-A) in a sample of 868 adolescents (460 female, 408 male), made up of 424 early adolescents (<italic>M</italic>age = 11.84 years,<italic>SD</italic>= 0.36) and 444 middle adolescents (<italic>M</italic>age = 13.44,<italic>SD</italic>= 0.49). The sample was randomly split into two for validation (<italic>n</italic>= 434) and cross-validation (<italic>n</italic>= 434) purposes. The results confirmed the fit of a one second-order factor model with four first-order factors (personal data protection, safe relationships, healthy internet use, and self-disclosure). As expected, digital security dimensions were positively associated with parental mediation. Measurement invariance was found in this model by gender and stage of adolescence. Latent mean comparisons showed differences by gender and stage of adolescence. Overall, findings indicate that the measurement model is helpful for measuring adolescents’ digital security behaviors.</p>
			</abstract>
			<trans-abstract xml:lang="es">
				<title>Resumen</title>
				<p>Este estudio analiza las propiedades psicométricas de una escala de seguridad digital (DSS-A) en una muestra de 868 adolescentes (460 chicas, 408 chicos), compuesta por 424 en etapa de adolescencia temprana (<italic>M</italic>edad = 11.84 años,<italic>DE</italic>= 0.36) y 444 en etapa de adolescencia media (<italic>M</italic>edad = 13.44,<italic>DE</italic>= 0.49). La muestra se dividió aleatoriamente en dos con fines de validación (<italic>n</italic> = 434) y validación cruzada (<italic>n</italic> = 434). Se confirmó el ajuste de un modelo de un factor de segundo orden, con cuatro factores de primer orden (protección de datos personales, relaciones seguras, uso saludable de Internet y autorrevelación). Tal como se esperaba, las dimensiones de seguridad digital se asociaron positivamente con la mediación parental. En este modelo, se confirmó la invarianza de medición por género y etapa de la adolescencia. La comparación de medias latentes mostró diferencias por género y etapa de la adolescencia. En general, los hallazgos indican que este modelo de medida es útil para medir los comportamientos de los adolescentes en materia de seguridad digital.</p>
			</trans-abstract>
			<kwd-group xml:lang="en">
				<title>Keywords:</title>
				<kwd>citizenship</kwd>
				<kwd>digital citizenship</kwd>
				<kwd>adolescents</kwd>
			</kwd-group>
			<kwd-group xml:lang="es">
				<title>Palabras clave:</title>
				<kwd>ciudadanía</kwd>
				<kwd>ciudadanía digital</kwd>
				<kwd>adolescentes</kwd>
			</kwd-group>
			<counts>
				<fig-count count="1"/>
				<table-count count="6"/>
				<equation-count count="0"/>
				<ref-count count="61"/>
				<page-count count="19"/>
			</counts>
		</article-meta>
	</front>
	<body>
		<sec sec-type="intro">
			<title>I. Introduction</title>
			<p>The internet influences adolescents’ learning, communication, and social participation (<xref ref-type="bibr" rid="B3">Babaoglu &amp; Akman, 2022</xref>; <xref ref-type="bibr" rid="B24">Hurwitz &amp; Schmitt, 2020</xref>). Adolescents are the largest group of internet users (<xref ref-type="bibr" rid="B44">Organization for Economic Cooperation and Development [OECD], 2022</xref>). In Mexico, 90% of adolescents use the internet (<xref ref-type="bibr" rid="B26">National Institute of Statistics and Geography [INEGI], 2022</xref>). Even though responsible internet use improves adolescents’ learning, psychosocial development, and communication with peers and families (<xref ref-type="bibr" rid="B46">Padilla-Walker et al., 2012</xref>; <xref ref-type="bibr" rid="B48">Pereira et al., 2019</xref>; <xref ref-type="bibr" rid="B54">Skryabin et al., 2015</xref>), it also poses harmful threats associated with problematic and addictive internet use (<xref ref-type="bibr" rid="B2">Aydın et al., 2020</xref>; <xref ref-type="bibr" rid="B47">Pastor et al., 2022</xref>). Civil society organizations and governments have proposed addressing these adverse effects by educating adolescents to engage in healthy and responsible online behaviors. In line with this international strategy, the Mexican government has improved the national education curriculum with content aimed at promoting civic behaviors in online environments (<xref ref-type="bibr" rid="B52">Secretaría de Educación Pública [Secretariat of Public Education, SEP], 2022</xref>).</p>
			<p>Digital citizenship is a suitable framework for fostering healthy and responsible internet behaviors in adolescents (<xref ref-type="bibr" rid="B13">Emejulu &amp; McGregor, 2019</xref>; <xref ref-type="bibr" rid="B28">Jones &amp; Mitchell, 2016</xref>; <xref ref-type="bibr" rid="B50">Ribble, 2015</xref>) and comprises multiple dimensions. One of the most relevant of these dimensions is digital security, which involves practices aimed at keeping internet users safe from any danger caused by internet use (<xref ref-type="bibr" rid="B17">Gallego-Arrufat et al., 2019</xref>; <xref ref-type="bibr" rid="B51">Ribble &amp; Bailey, 2011</xref>). Unsafe internet use may have harmful and dangerous consequences, such as an increased risk of falling victim to sexual offenses (<xref ref-type="bibr" rid="B18">Gottfried et al., 2020</xref>), grooming (<xref ref-type="bibr" rid="B45">Orosco &amp; Pomasunco, 2020</xref>), cyberbullying (<xref ref-type="bibr" rid="B37">Madrid López et al., 2020</xref>), or cyber dating violence (<xref ref-type="bibr" rid="B10">Chugh &amp; Guggisberg, 2022</xref>). Therefore, digital security education remains essential in school settings to support the reduction of risky online behaviors (<xref ref-type="bibr" rid="B11">Curran &amp; Ribble, 2017</xref>; <xref ref-type="bibr" rid="B50">Ribble, 2015</xref>).</p>
			<sec>
				<title>1.1 Measures of digital security</title>
				<p>There is a consensus on digital security as a multidimensional construct that involves multiple aspects such as personal data protection, safe relationships, healthy internet use, and self-disclosure (<xref ref-type="bibr" rid="B7">Chen et al., 2022</xref>; <xref ref-type="bibr" rid="B11">Curran &amp; Ribble, 2017</xref>; <xref ref-type="bibr" rid="B17">Gallego-Arrufat et al., 2019</xref>; <xref ref-type="bibr" rid="B22">Hamza et al., 2019</xref>; <xref ref-type="bibr" rid="B43">Nowell et al., 2022</xref>). Personal data protection involves actions aimed at averting wide-ranging online problems related to the misuse of personal information (<xref ref-type="bibr" rid="B9">Chen et al., 2021</xref>). Healthy internet use refers to actions necessary to ensure individuals’ physical and psychological health (<xref ref-type="bibr" rid="B7">Chen et al., 2022</xref>; <xref ref-type="bibr" rid="B17">Gallego-Arrufat et al., 2019</xref>; <xref ref-type="bibr" rid="B22">Hamza et al., 2019</xref>). Safe relationships mean being careful about one’s online relations, which can lead to risky and painful outcomes. Finally, self-disclosure involves voluntarily sharing information about online activities and relationships (<xref ref-type="bibr" rid="B33">Lionetti et al., 2016</xref>; <xref ref-type="bibr" rid="B53">Shin &amp; Kang, 2016</xref>). </p>
				<p>Although digital security is a multidimensional construct (e.g. <xref ref-type="bibr" rid="B31">Lauricella et al., 2020</xref>; <xref ref-type="bibr" rid="B38">Martin et al., 2020</xref>; <xref ref-type="bibr" rid="B43">Nowell et al., 2022</xref>), and measure just a single dimension of digital security in isolation (e.g. <xref ref-type="bibr" rid="B33">Lionetti et al., 2016</xref>; <xref ref-type="bibr" rid="B34">Liu et al., 2013</xref>). However, digital security dimensions have been understood as interwoven, and instruments must explore the relationship between them. To address this gap, we aimed to develop a theoretically grounded scale that captures the four aspects of digital security (personal data protection, safe relationships, healthy internet use, and self-disclosure with parents or other adults).</p>
			</sec>
			<sec>
				<title>1.2 Measurement of invariance</title>
				<p>According to several studies (<xref ref-type="bibr" rid="B29">Kapetanovic et al., 2017</xref>; <xref ref-type="bibr" rid="B58">Tifferet, 2019</xref>), online security varies by gender. Females display higher levels of digital security than males during adolescence. Similarly, middle adolescents report higher levels of digital security than do early adolescents (e.g. <xref ref-type="bibr" rid="B35">Livingstone et al., 2011</xref>; <xref ref-type="bibr" rid="B38">Martin et al., 2020</xref>). Regardless of their relevance, these previous studies did not examine measurement invariance by gender or stage of adolescence to ensure the validity of findings. Measurement invariance tests the degree to which measurements conducted with different groups exhibit similar psychometric properties. Therefore, it is critical to make a valid and meaningful group comparison to examine the measurement invariance of digital security scales. These scores can then be used to examine differences in variables associated with digital security behaviors for these groups (<xref ref-type="bibr" rid="B61">Widaman &amp; Olivera-Aguilar, 2023</xref>).</p>
			</sec>
			<sec>
				<title>1.3 Validity evidence based on relations with external variables</title>
				<p>Empirical evidence suggests parenting practices should explain adolescents’ digital security behaviors (<xref ref-type="bibr" rid="B60">Wang &amp; Xing, 2018</xref>). Parental media mediation refers to parents’ practices that regulate children’s internet use (<xref ref-type="bibr" rid="B42">Nikken &amp; Jansz, 2014</xref>). Active mediation occurs when parents speak with their children about media content and its benefits and risks. By contrast, restrictive mediation involves setting rules that limit the time children spend on the internet or the content they access (<xref ref-type="bibr" rid="B42">Nikken &amp; Jansz, 2014</xref>). Empirical evidence has confirmed that active parental mediation enhances adolescent digital security practices (<xref ref-type="bibr" rid="B12">Dedkova &amp; Mýlek, 2022</xref>; <xref ref-type="bibr" rid="B14">Fu et al., 2020</xref>). However, findings for restrictive mediation are inconsistent; some studies report that it helps to improve adolescents’ safety behaviors on the internet (<xref ref-type="bibr" rid="B32">Lee, 2013</xref>; <xref ref-type="bibr" rid="B8">Chen &amp; Shi, 2019</xref>), whereas others point to continued higher risks (<xref ref-type="bibr" rid="B36">Lukavská et al., 2022</xref>; <xref ref-type="bibr" rid="B57">Steinfeld, 2021</xref>). Based on these results, we expected that adolescents’ digital security behaviors would be associated with both types of parental mediation.</p>
			</sec>
			<sec>
				<title>1.4 The present study</title>
				<p>Based on previous work that conceptualizes online security as a multidimensional construct (<xref ref-type="bibr" rid="B7">Chen et al., 2022</xref>; <xref ref-type="bibr" rid="B11">Curran &amp; Ribble, 2017</xref>), this study develops a new measure, the Digital Security Scale in Adolescents (DSS-A), and examines the validity of the scale scores in a sample of Mexican adolescents. We tested the content validity and dimensionality of a second-order measurement model of digital security with four first-order factors: (a) personal data protection, (b) safe relationships, (c) healthy internet use, and (d) self-disclosure. We measured score reliability with McDonald's omega and average variance extracted. Moreover, the discriminant validity of each first-order factor was examined. Measurement invariance by gender and stage of adolescence (early vs. middle) was tested. If scalar invariance was confirmed, latent means across gender and stage of adolescence were compared. Evidence of validity based on relations with external variables was assessed by calculating the relationship between digital security and styles of parental mediation (active and restrictive). Finally, we tested model replicability using an independent sample (cross-validation).</p>
				<p>To accomplish the research goals, we tested the following hypotheses. Hypothesis 1 (internal structure): A second-order model with four first-order factors fits the data. Hypothesis 2 (reliability): The McDonald's omega coefficient and average variance extracted indicate acceptable score validity. Hypothesis 3 (discriminant validity): Each subscale is genuinely distinct. Hypothesis 4 (measurement invariance): The measurement model is psychometrically invariant by gender and stage of adolescence. Hypothesis 5 (means comparisons): Females and middle adolescents display a greater degree of personal data protection behaviors, safe relationships, healthy behaviors, and self-disclosure than do males and early adolescents, respectively. Hypothesis 6 (relations with external variables): Correlations exist between the four dimensions of digital security and the two types of parental mediation examined. Hypothesis 7 (cross-validation): The measurement model replicates in the cross-validation sample.</p>
			</sec>
		</sec>
		<sec sec-type="methods">
			<title>II. Method</title>
			<sec>
				<title>2.1 Participants</title>
				<p>The research participants were students from 52 urban middle schools from Sinaloa and Sonora, Mexico. As public schools in Mexico, these schools include students of low and medium socioeconomic status (<xref ref-type="bibr" rid="B25">National Institute for the Evaluation of Education [INEE], 2019</xref>). The sample includes 868 adolescents (460 female, 408 male), comprising 424 early adolescents (<italic>M</italic> age = 11.84 years, <italic>SD</italic> = 0.36) and 444 middle adolescents (<italic>M</italic> age = 13.44 years, <italic>SD</italic> = 0.49). All the students included in the sample have internet access. The sample was randomly split into two for validation (<italic>n</italic> = 434) and cross-validation (<italic>n</italic> = 434) purposes.</p>
			</sec>
			<sec>
				<title>2.2 Measures</title>
				<p><bold>Digital security.</bold> The initial version of a pool of 16 items aimed to measure the dimensions of digital security (see <xref ref-type="table" rid="t1">Table 1</xref>) on a five-point Likert scale (0 = <italic>Never</italic> to 4 = <italic>Always</italic>). These items were created from focus group discussion analysis. The focus group included 20 adolescents (10 males and 10 females) from middle and high schools, aged between 12 and 18 years (<italic>M</italic>= 15.2 years,<italic>SD</italic>= 2.3). We presented a brief definition of digital security to research participants and asked them to discuss three issues related to this concept: (a) How do you define digital security? (b) What strategies do you use to keep safe online? (c) How have those strategies worked for you?</p>
				<p>The focus group work provided critical information that allowed us to propose a set of items to measure digital security and its four dimensions. Subsequently, we used a panel of experts to assess the content validity of the proposed items; eight experts in educational research were asked to evaluate the relevance of all the items to measure four dimensions of digital security on a 4-point Likert scale (1 = <italic>not relevant</italic> to 4 = <italic>very relevant</italic>). Next, we calculated the item content validity index (CVI). All the items with a CVI &gt; .79 were kept for further analysis (<xref ref-type="bibr" rid="B1">Almanasreh et al., 2019</xref>); the remaining seven items were discarded.</p>
				<p>Afterward, we conducted nine cognitive interviews, including five adolescents and five middle school teachers, to judge if the 13 proposed items were appropriate for measuring digital security in adolescence. We emphasized the importance of verifying the clarity of the instructions, grammatical or semantic issues, and cultural or contextual issues in all the items. As a result of cognitive interviews, seven items were reworded based on participants’ suggestions. This work led to a theoretically grounded scale validated by educational researchers and revisited by the ultimate users: adolescent students. The final version of the scale employs three items, in each case, to measure personal data protection, safe relationships, and healthy internet use, and four items to assess self-disclosure.</p>
				<p>The final form of the DSS-A comprises 13 items grouped into four dimensions (see Appendix 1): (a)<italic>Personal data protection</italic> (3 items, e.g. “I avoid posting personal information on social media.”); (b)<italic>Safe relationships</italic> (3 items, e.g. “I reject friendship requests from strangers on social media.”); (c)<italic>Healthy internet use</italic> (3 items, e.g. “I limit the time that I spend on the internet in order to avoid physical repercussions such as bad eyesight, backache, and neck pain.”); and (d)<italic>Self-disclosure</italic> (4 items, e.g. “I talk to my parents about my social media friendships.”). </p>
				<p><bold>Parental mediation.</bold> We used the Parental Mediation of Young Children’s Internet Use Scale (<xref ref-type="bibr" rid="B42">Nikken &amp; Jansz, 2014</xref>) to measure how students perceive parents’ actions to mediate their Internet use. The back-translation method was used to translate the scale from English to Spanish. These items were used to measure active mediation and restrictive mediation. Active mediation explores how often parents talk to children about internet use and digital content consumption (8 items, McDonald's omega ω = .84; e.g. “How often do your parents speak with you about the rules you must follow while surfing the internet?”). Restrictive mediation examines how often parents limit and regulate children’s internet use (8 items, ω = .86; e.g. “How often do your parents tell you how long you are allowed to use the internet?”). Responses were given on a five-point Likert scale (0 = <italic>never</italic> to 4 = <italic>always</italic>). Results from confirmatory analysis (CFA) proved the model fit the data (SBX<sup>2</sup> = 30.67, <italic>df</italic> = 13, <italic>p</italic> = .004; SRMR = .06; CFI = .98; TLI = .97; RMSEA = .05, 90% CI [.025, .071].</p>
			</sec>
			<sec>
				<title>2.3 Procedure</title>
				<p>The study gained approval from the Ethical Research Committee of the Technological Institute of Sonora (ITSON). The schools agreed to participate voluntarily in the study. A consent letter was sent to parents/guardians to request permission for children to participate in the study. Permission was denied by about 6% of parents. Finally, adolescents were informed about the study’s purpose and the nature of their potential participation. Data collection was carried out in classrooms during school hours.</p>
			</sec>
			<sec>
				<title>2.4 Statistical analysis</title>
				<p><bold>Item distribution.</bold> The percentage of missing data in the sample was 3%. Missing data were treated using multiple imputation (MI) available in SPSS 27. Then descriptive analyses (means, standard deviation, skewness, and kurtosis) were run for each item of the DSS-A. We tested univariate normality based on the skewness and kurtosis values (<xref ref-type="bibr" rid="B23">Ho, 2014</xref>). The statistical <italic>Z</italic> value is calculated as Z Skew = Skew/√se Skew and <italic>Z</italic> Kurt = Kurt/√se Kurt. If the <italic>Z</italic> value exceeds +- 2.86, the normality assumption at the .01 critical probability level is rejected. Based on the rules of thumb proposed in the literature, we assumed that values of kurtosis smaller than 7 and skewness smaller than 3 indicated that deviation from univariate normality did not affect the model estimation (<xref ref-type="bibr" rid="B4">Bandalos &amp; Finney, 2019</xref>). Furthermore, in the model assessment we used a robust procedure (Satorra-Bentler corrections) that is unaffected by departures from normality (<xref ref-type="bibr" rid="B40">Mueller &amp; Hancock, 2019</xref>).</p>
				<p><bold>Internal structure validity.</bold> To assess the dimensionality of digital security, we examined the fit of a four first-order factor model and calculated all possible covariance between the factors. After confirming the fit of this measurement model, we tested the four factors as indicators of a second-order dimension (see <xref ref-type="fig" rid="f1">Figure 1</xref>). We conducted a confirmatory factor analysis using the diagonally weighted least squares (DWLS) method with LISREL 12 software. Exploratory factor analysis was not carried out due to the soundness of the theory used to develop the scale.</p>
				<p>Based on structural modeling literature, we evaluated the goodness-of-fit indices using the Satorra-Bentler chi-square adjustment (SBX<sup>2</sup> with <italic>p</italic> &gt; .001). Due to the relatively large sample size, additionally, we used the standardized root mean square residual (SRMR ≤ .08), Tucker-Lewis index (TLI ≥ .90), comparative fit index (CFI ≥ .95), and root mean square error of approximation (RMSEA ≤ .08) (<xref ref-type="bibr" rid="B5">Brown, 2023</xref>). We used differences in SBX<sup>2</sup> (ΔSBX<sup>2</sup>) and the Bayesian information criterion (ΔBIC) for the model comparison. When ΔSBX<sup>2</sup> is significant (<italic>p</italic>&lt; .001), a model with a smaller value of SBX<sup>2</sup> provides a better fit. Differences in BIC &gt; 10 suggest a different model fit to the data; a model with lower BIC better fits the data (<xref ref-type="bibr" rid="B41">Muthén &amp; Muthén, 2017</xref>; <xref ref-type="bibr" rid="B59">Vrieze, 2012</xref>). </p>
				<p><bold>Reliability.</bold> Reliability was measured by calculating the average variance extracted (AVE) and McDonald’s omega; AVE &gt; .50 and ω &gt; .70 were indicators of acceptable score reliability (<xref ref-type="bibr" rid="B19">Green &amp; Yang, 2015</xref>; <xref ref-type="bibr" rid="B20">Hair et al., 2010</xref>).</p>
				<p><bold>Discriminant validity.</bold> Discriminant validity indicates the uniqueness of the measurement construct. Scholars suggest that discriminant validity is confirmed when the AVE of the dimensions is larger than the construct’s squared correlation (<italic>R</italic>
 <sup>2</sup>) (<xref ref-type="bibr" rid="B21">Hair et al., 2017</xref>). </p>
				<p><bold>Measurement invariance.</bold> We used a multigroup approach to test several nested models to examine the level of measurement invariance by gender and educational level (<xref ref-type="bibr" rid="B61">Widaman &amp; Olivera-Aguilar, 2023</xref>). We constrained the number of factors and the patterns of factor loadings to be the same across gender and stage of adolescence (configural invariance). Then, we constrained factor loadings to be equal across groups for the two variables (metric invariance). Finally, we constrained the measurement intercepts to be equivalent across groups to assess scalar invariance. Values of ΔSBX<sup>2</sup> with <italic>p</italic> &gt; .05, ΔCFI &lt; .01, and ΔRMSEA &lt; .015 were considered indicators of invariance (Widaman &amp; Olivera-Aguilar, 2023). When the values of these procedures diverged, we relied on ΔCFI and ΔRMSEA.</p>
				<p>As scalar invariance was confirmed, we assessed latent mean differences by gender and stage of adolescence (early vs. middle). To test latent mean differences, we fit gender and stage of adolescence to zero. A <italic>z</italic> statistic was used to calculate the latent mean differences by gender and stage of adolescence.</p>
				<p><bold>Validity evidence based on relations with external variables.</bold> This study examined the correlation between dimensions of the DSS-A and active and restrictive parental mediation. Concurrent validity evidence is confirmed when scores correlate as expected with other constructs measured simultaneously (<xref ref-type="bibr" rid="B16">Furr, 2018</xref>). We adopted guidelines proposed by <xref ref-type="bibr" rid="B15">Funder and Ozer (2019</xref>) to assess the effect size:<italic>r</italic>= .10 small,<italic>r</italic>= .20 medium, and<italic>r</italic>= .30 large.</p>
				<p><bold>Model cross-validation.</bold> As suggested in the literature, we used a multigroup invariance procedure to test measurement model equivalence in the independent sample (see <xref ref-type="bibr" rid="B61">Widaman &amp; Olivera-Aguilar, 2023</xref>). This strategy explores whether a model tested in a specific sample can be replicated over a second independent sample from the same population. Configural, metric, and scalar invariance were estimated using multigroup analysis for the nested models. Model sample invariance was confirmed when ΔSBX<sup>2</sup> was not statistically significant (<italic>p</italic> &gt; .001), ΔCFI &lt; .01, and ΔRMSEA &lt; .015 (<xref ref-type="bibr" rid="B61">Widaman &amp; Olivera-Aguilar, 2023</xref>). Since SBX<sup>2</sup> is sensitive to large sample sizes (<xref ref-type="bibr" rid="B5">Brown, 2023</xref>), we relied on CFI and RMSEA differences when the criteria were inconsistent.</p>
			</sec>
		</sec>
		<sec sec-type="results">
			<title>III. Results</title>
			<sec>
				<title>3.1 Descriptive analysis</title>
				<p>
					<xref ref-type="table" rid="t1">Table 1</xref> shows means, standard deviations, skewness, and kurtosis for the items of the DSS-A. The participants’ responses centered on the categories “seldom” and “sometimes,” suggesting that adolescents frequently forgo digital security practices. Items 1, 8, 9, 11, and 13 depart from normality. Furthermore, skew and kurtosis values are less than 2 and 7, respectively, suggesting that it is unlikely there is substantial distortion in the data (<xref ref-type="bibr" rid="B4">Bandalos &amp; Finney, 2019</xref>).</p>
				<p>
					<table-wrap id="t1">
						<label>Table 1</label>
						<caption>
							<title>Descriptive statistics for the digital security scale</title>
						</caption>
						<table>
							<colgroup>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
							</colgroup>
							<thead>
								<tr>
									<th align="left">Item</th>
									<th align="center">M</th>
									<th align="center">SD</th>
									<th align="center">Skew</th>
									<th align="center">Z<sub>skew</sub></th>
									<th align="center">Kurt</th>
									<th align="center">Z<sub>kurt</sub></th>
									<th align="center">CVI</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td align="left">1. I avoid posting personal information on social networks.</td>
									<td align="center">2.20</td>
									<td align="center">1.67</td>
									<td align="center">-0.18 (0.12)</td>
									<td align="center">-0.52</td>
									<td align="center">-1.63 (0.23)</td>
									<td align="center">-3.39**</td>
									<td align="center">.87</td>
								</tr>
								<tr>
									<td align="left">2. I make a copy of important information in digital files or in the cloud.</td>
									<td align="center">1.82</td>
									<td align="center">1.49</td>
									<td align="center">0.20 (0.12)</td>
									<td align="center">0.59</td>
									<td align="center">-1.36 (0.23)</td>
									<td align="center">-2.83</td>
									<td align="center">.90</td>
								</tr>
								<tr>
									<td align="left">3. I only provide personal information on trusted websites.</td>
									<td align="center">2.56</td>
									<td align="center">1.37</td>
									<td align="center">-0.46 (0.12)</td>
									<td align="center">-1.35</td>
									<td align="center">-1.05 (0.23)</td>
									<td align="center">-2.18</td>
									<td align="center">.88</td>
								</tr>
								<tr>
									<td align="left">4. On social networks, I reject friend requests from people I do not know offline.</td>
									<td align="center">2.85</td>
									<td align="center">1.42</td>
									<td align="center">-0.91 (0.12)</td>
									<td align="center">-2.67</td>
									<td align="center">-0.62 (0.23)</td>
									<td align="center">-1.29</td>
									<td align="center">.86</td>
								</tr>
								<tr>
									<td align="left">5. I block people who try to harm me from my social networks.</td>
									<td align="center">2.74</td>
									<td align="center">1.42</td>
									<td align="center">-0.71 (0.12)</td>
									<td align="center">2.09</td>
									<td align="center">-0.89 (0.23)</td>
									<td align="center">-1.85</td>
									<td align="center">.92</td>
								</tr>
								<tr>
									<td align="left">6. I block people who make me feel stressed, anxious or uncomfortable from my social networks.</td>
									<td align="center">2.13</td>
									<td align="center">1.35</td>
									<td align="center">-0.08 (0.12)</td>
									<td align="center">-0.23</td>
									<td align="center">-1.07 (0.23)</td>
									<td align="center">-2.23</td>
									<td align="center">.94</td>
								</tr>
								<tr>
									<td align="left">7. I limit the time I spend online to avoid causing harm to my physical health.</td>
									<td align="center">2.58</td>
									<td align="center">1.30</td>
									<td align="center">-0.51 (0.12)</td>
									<td align="center">-1.50</td>
									<td align="center">-0.88 (0.23)</td>
									<td align="center">-1.83</td>
									<td align="center">.84</td>
								</tr>
								<tr>
									<td align="left">8. I can easily go several hours without connecting to the internet.</td>
									<td align="center">2.31</td>
									<td align="center">1.51</td>
									<td align="center">-0.24 (0.12)</td>
									<td align="center">-0.70</td>
									<td align="center">-1.42 (0.23)</td>
									<td align="center">2.95**</td>
									<td align="center">.93</td>
								</tr>
								<tr>
									<td align="left">9. I avoid internet sites that cause me concern, discomfort or stress. </td>
									<td align="center">2.14</td>
									<td align="center">1.53</td>
									<td align="center">-0.09 (0.12)</td>
									<td align="center">-0.26</td>
									<td align="center">-1.43 (0.23)</td>
									<td align="center">3.04**</td>
									<td align="center">.86</td>
								</tr>
								<tr>
									<td align="left">10. I ask my parents for help when I have problems with personal information online.</td>
									<td align="center">2.07</td>
									<td align="center">1.45</td>
									<td align="center">-0.05 (0.12)</td>
									<td align="center">-0.14</td>
									<td align="center">-1.32 (0.23)</td>
									<td align="center">-2.75</td>
									<td align="center">.85</td>
								</tr>
								<tr>
									<td align="left">11. I talk to my parents about my best online friends.</td>
									<td align="center">1.98</td>
									<td align="center">1.54</td>
									<td align="center">0.03 (0.12)</td>
									<td align="center">.009</td>
									<td align="center">1.48 (0.23)</td>
									<td align="center">-3.08**</td>
									<td align="center">.92</td>
								</tr>
								<tr>
									<td align="left">12. I ask my parents for help when I feel that using digital media is harming my physical health.</td>
									<td align="center">1.89</td>
									<td align="center">1.44</td>
									<td align="center">0.11 (0.12)</td>
									<td align="center">0.32</td>
									<td align="center">-1.31 (0.23)</td>
									<td align="center">-2.73</td>
									<td align="center">.89</td>
								</tr>
								<tr>
									<td align="left">13. I talk to my parents about the harmful psychological effects of internet use (e.g. stress, worry or unease).</td>
									<td align="center">2.20</td>
									<td align="center">1.67</td>
									<td align="center">-0.18 (0.12)</td>
									<td align="center">0.53</td>
									<td align="center">-1.63 (0.23)</td>
									<td align="center">3.39**</td>
									<td align="center">.94</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
				</p>
			</sec>
			<sec>
				<title>3.2 Validity evidence based on internal structure</title>
				<p>The CFA results confirmed the goodness-of-fit of the first-order four-dimensional model (Model A) to data. The correlations between the four factors were statistically significant, from moderate (<italic>r</italic> = .33) to high (<italic>r</italic> = .51), suggesting that a second-order model is plausible. Then, we tested a second-order model (Model B) with four first-order digital security factors that fit the data well (see <xref ref-type="fig" rid="f1">Figure 1</xref>). The difference in fit between Model A and Model B was statistically significant (ΔSBX<sup>2</sup> = 10.96, <italic>df</italic> = 1, <italic>p</italic> &lt; .001). Additionally, the change in the BIC was greater than 10, indicating a difference between the fit data for the models. Thus, based on statistical and theoretical considerations, we decided to work with the second-order measurement model (see <xref ref-type="table" rid="t2">Table 2</xref>).</p>
				<p>
					<table-wrap id="t2">
						<label>Table 2</label>
						<caption>
							<title>Goodness-of-fit statistics of the hypothesized first-order factor models </title>
						</caption>
						<table>
							<colgroup>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
							</colgroup>
							<thead>
								<tr>
									<th align="justify">Model</th>
									<th align="center">SBX<sup>2</sup></th>
									<th align="center"><italic>df</italic></th>
									<th align="center"><italic>p</italic></th>
									<th align="center">SRMR</th>
									<th align="center">AGFI</th>
									<th align="center">CFI</th>
									<th align="center">TLI</th>
									<th align="center">RMSEA</th>
									<th align="center">BIC</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td align="justify">First-order </td>
									<td align="justify">77.79</td>
									<td align="justify">58</td>
									<td align="justify">.042</td>
									<td align="justify">.03</td>
									<td align="justify">.96</td>
									<td align="justify">.98</td>
									<td align="justify">.97</td>
									<td align="justify">.03</td>
									<td align="justify">278.20</td>
								</tr>
								<tr>
									<td align="justify">Second-order</td>
									<td align="justify">66.83</td>
									<td align="justify">59</td>
									<td align="justify">.226</td>
									<td align="justify">.03</td>
									<td align="justify">.96</td>
									<td align="justify">.98</td>
									<td align="justify">.97</td>
									<td align="justify">.02</td>
									<td align="justify">265.17</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
				</p>
				<p>Standardized factor loadings ranging between .63 and .91 were significant at <italic>p</italic>&lt; .001 (see <xref ref-type="fig" rid="f1">Figure 1</xref>). The reliability values of the <italic>personal data protection (</italic>AVE = .50, ( ω = .72), <italic>safe relationships</italic> (AVE = .52, ( ω = .70), <italic>healthy internet use</italic> (AVE = .57, ( ω = .71), and <italic>self-disclosure</italic> (AVE = .54, ( ω = .76) dimensions were acceptable. </p>
				<p>
					<fig id="f1">
						<label>Figure 1</label>
						<caption>
							<title>Confirmatory factor analysis results for the second-order factor model of digital security</title>
						</caption>
						<graphic xlink:href="1607-4041-redie-26-e06-gf1.jpg"/>
						<attrib><italic>Note</italic>: Standardized coefficients are reported. All standardized coefficients are significant <italic>p</italic> &lt; .001</attrib>
					</fig>
				</p>
			</sec>
			<sec>
				<title>3.3 Assessing invariance by gender and stage of adolescence</title>
				<p>As shown in <xref ref-type="table" rid="t3">Table 3</xref>, the measurement model is equivalent in both genders. The unconstrained model served as a baseline showing that the data has an acceptable fit (SBX<sup>2</sup> = 159.32, <italic>df</italic> = 118, <italic>p</italic> = .007; SRMR = .05; CFI = .96; TLI = .95; RMSEA = .03, 90% CI [.01, .03]) (configural invariance). We found no statistically significant differences when constraining the factor loadings to be equal between males and females (ΔSBX<sup>2</sup> = 8.83, Δ<italic>df</italic> = 9, <italic>p</italic> = .008; ΔCFI &lt; .001 and ΔRMSEA &lt; .015) (metric invariance). In addition, we constrained the item intercepts to be equivalent between males and females (scalar invariance), and no statistically significant differences were found between the two groups (ΔSBX<sup>2</sup> = 59.2, Δ<italic>df</italic> = 35, <italic>p</italic> = .006; ΔCFI &lt; .001 and ΔRMSEA &lt; .015).</p>
				<p>Additionally, the analysis confirms model invariance in early and middle adolescents. The unconstrained baseline model fit the data well (SBX<sup>2</sup> = 164.21, <italic>df</italic> = 118, <italic>p</italic> = .003; SRMR = .06; AGFI = .92; CFI = .96; TLI = .94; RMSEA = .03; CI 90 [.01, .04]). The results confirm metric (ΔSBX<sup>2</sup> = 6.70, Δ<italic>df</italic> = 9, <italic>p</italic> = .006; ΔCFI &lt; .001 and ΔRMSEA &lt; .015) and scalar invariance (ΔSBX<sup>2</sup> = 60.97, Δ<italic>df</italic> = 35, <italic>p</italic> = .004; ΔCFI &lt; .001 and ΔRMSEA &lt; .015). </p>
				<p>
					<table-wrap id="t3">
						<label>Table 3</label>
						<caption>
							<title>Results of the invariance analysis by gender and stage of adolescence </title>
						</caption>
						<table>
							<colgroup>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
							</colgroup>
							<thead>
								<tr>
									<th align="justify">Invariance</th>
									<th align="center">SBΧ<sup>
 <italic>2</italic>
</sup></th>
									<th align="center"><italic>df</italic></th>
									<th align="center">ΔSBX<sup>2</sup></th>
									<th align="center"><bold>Δ<italic>df</italic>
</bold></th>
									<th align="center"><italic>p</italic></th>
									<th align="center">ΔCFI</th>
									<th align="center">ΔRMSEA</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td align="justify" colspan="8">Gender </td>
								</tr>
								<tr>
									<td align="justify">Configural</td>
									<td align="center">159.32</td>
									<td align="center">118</td>
									<td align="center"> </td>
									<td align="center"> </td>
									<td align="center"> </td>
									<td align="center"> </td>
									<td align="center"> </td>
								</tr>
								<tr>
									<td align="justify">Metric</td>
									<td align="center">168.15</td>
									<td align="center">127</td>
									<td align="center">8.83</td>
									<td align="center">9</td>
									<td align="center">.008</td>
									<td align="center">.001</td>
									<td align="center">.001</td>
								</tr>
								<tr>
									<td align="justify">Scalar </td>
									<td align="center">227.35</td>
									<td align="center">162</td>
									<td align="center">59.2</td>
									<td align="center">35</td>
									<td align="center">.006</td>
									<td align="center">.003</td>
									<td align="center">.001</td>
								</tr>
								<tr>
									<td align="justify" colspan="8">Stage of adolescence (early vs. middle) </td>
								</tr>
								<tr>
									<td align="justify">Configural</td>
									<td align="center">164.21</td>
									<td align="center">118</td>
									<td align="center"> </td>
									<td align="center"> </td>
									<td align="center"> </td>
									<td align="center"> </td>
									<td align="center"> </td>
								</tr>
								<tr>
									<td align="justify">Metric</td>
									<td align="center">170.91</td>
									<td align="center">127</td>
									<td align="center">6.70</td>
									<td align="center">9</td>
									<td align="center">.006</td>
									<td align="center">.003</td>
									<td align="center">.002</td>
								</tr>
								<tr>
									<td align="justify">Scalar</td>
									<td align="center">231.88</td>
									<td align="center">162</td>
									<td align="center">60.97</td>
									<td align="center">35</td>
									<td align="center">.004</td>
									<td align="center">.003</td>
									<td align="center">.001</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
				</p>
			</sec>
			<sec>
				<title>3.4 Assessing between-group latent mean differences</title>
				<p>To assess latent mean differences between males and females, we chose males and middle adolescents as the reference groups by constraining their latent means to zero. The results showed no differences in personal data protection between the two genders. However, the latent means of females are greater than those of males in the safe relationships, healthy internet use, and self-disclosure dimensions. To examine latent mean differences by stage of adolescence (early vs. middle), we set middle adolescence to zero. Early adolescents had a higher score for safe relationships and self-disclosure. The differences in personal data protection and healthy internet use were not statistically significant (see <xref ref-type="table" rid="t4">Table 4</xref>).</p>
				<p>
					<table-wrap id="t4">
						<label>Table 4</label>
						<caption>
							<title>Differences in means by gender and stage of adolescence for digital security behaviors</title>
						</caption>
						<table>
							<colgroup>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
							</colgroup>
							<thead>
								<tr>
									<th align="left">Variable</th>
									<th align="center">Factor</th>
									<th align="center"><italic>M</italic>
 <sub>diff</sub></th>
									<th align="center"><bold>
 <italic>Z-</italic>statistics</bold></th>
									<th align="center"><italic>p</italic></th>
									<th align="center"><bold>Cohen’s <italic>d</italic>
</bold></th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td align="justify" rowspan="4">Gender</td>
									<td align="left">Personal data protection</td>
									<td align="center">0.07</td>
									<td align="center">0.64</td>
									<td align="center">.522</td>
									<td align="center">0.06</td>
								</tr>
								<tr>
									<td align="left">Safe relationships </td>
									<td align="center">0.17</td>
									<td align="center">2.21</td>
									<td align="center">.027</td>
									<td align="center">0.21</td>
								</tr>
								<tr>
									<td align="left">Healthy internet use</td>
									<td align="center">-0.24</td>
									<td align="center">2.53</td>
									<td align="center">.011</td>
									<td align="center">0.24</td>
								</tr>
								<tr>
									<td align="left">Self-disclosure</td>
									<td align="center">0.33</td>
									<td align="center">3.52</td>
									<td align="center">&lt; .001</td>
									<td align="center">0.34</td>
								</tr>
								<tr>
									<td align="left" rowspan="4">Stage of adolescence</td>
									<td align="left">Personal data protection</td>
									<td align="center">-0.17</td>
									<td align="center">-1.47</td>
									<td align="center">.140</td>
									<td align="center">0.14</td>
								</tr>
								<tr>
									<td align="left">Safe relationships </td>
									<td align="center">0.17</td>
									<td align="center">2.15</td>
									<td align="center">.031</td>
									<td align="center">0.20</td>
								</tr>
								<tr>
									<td align="left">Healthy internet use</td>
									<td align="center">0.13</td>
									<td align="center">1.40</td>
									<td align="center">.160</td>
									<td align="center">0.13</td>
								</tr>
								<tr>
									<td align="left">Self-disclosure</td>
									<td align="center">-0.37</td>
									<td align="center">3.79</td>
									<td align="center">&lt; .001</td>
									<td align="center">0.36</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
				</p>
			</sec>
			<sec>
				<title>3.5 Discriminant validity</title>
				<p>The AVE is greater than the squares of the correlations between dimensions. According to the guidelines proposed in the literature, the results confirm the uniqueness of each dimension of the DSS-A (see <xref ref-type="table" rid="t5">Table 5</xref>).</p>
			</sec>
			<sec>
				<title>3.6 Validity evidence based on relations with external variables</title>
				<p>Spearman’s correlation coefficient was used to examine the relations between variables (see <xref ref-type="table" rid="t5">Table 5</xref>). The results show the expected significant positive correlations between dimensions of the DSS-A and types of parental mediation of children’s internet use.</p>
				<p>
					<table-wrap id="t5">
						<label>Table 5</label>
						<caption>
							<title>Correlations between digital security and types of parental mediation</title>
						</caption>
						<table>
							<colgroup>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
							</colgroup>
							<thead>
								<tr>
									<th align="left">Variable</th>
									<th align="center">1</th>
									<th align="center">2</th>
									<th align="center">3 AVE = .50</th>
									<th align="center">4 AVE = .52</th>
									<th align="center">5 AVE = .57</th>
									<th align="center">6 AVE = .54</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td align="left">1. Active parental mediation</td>
									<td align="center">-</td>
									<td align="left"> </td>
									<td align="center"> </td>
									<td align="center"> </td>
									<td align="center"> </td>
									<td align="center"> </td>
								</tr>
								<tr>
									<td align="left">2. Restrictive parental mediation</td>
									<td align="center">.43**</td>
									<td align="justify">-</td>
									<td align="center"> </td>
									<td align="center"> </td>
									<td align="center"> </td>
									<td align="center"> </td>
								</tr>
								<tr>
									<td align="left">3. Personal data protection</td>
									<td align="center">.23**</td>
									<td align="justify">.17**</td>
									<td align="center">-</td>
									<td align="center"> </td>
									<td align="center"> </td>
									<td align="center"> </td>
								</tr>
								<tr>
									<td align="left">4. Safe relationships </td>
									<td align="center">.43**</td>
									<td align="justify">.24**</td>
									<td align="center">.39**(.15)</td>
									<td align="center">-</td>
									<td align="center"> </td>
									<td align="center"> </td>
								</tr>
								<tr>
									<td align="left">5. Healthy internet use</td>
									<td align="center">.39**</td>
									<td align="justify">.28**</td>
									<td align="center">.33**(.11)</td>
									<td align="center">.38**(.14)</td>
									<td align="center">-</td>
									<td align="center"> </td>
								</tr>
								<tr>
									<td align="left">6. Self-disclosure</td>
									<td align="center">.54**</td>
									<td align="justify">.51**</td>
									<td align="center">.25**(.06)</td>
									<td align="center">.33**(.11)</td>
									<td align="center">.41**(.17)</td>
									<td align="center">-</td>
								</tr>
							</tbody>
						</table>
						<table-wrap-foot>
							<fn id="TFN1">
								<p><italic>Note:</italic> Squared correlations are reported in parentheses (<italic>R</italic>
 <sup>
 <italic>2</italic>
</sup> ). </p>
							</fn>
							<fn id="TFN2">
								<p>**<italic>p</italic> &lt; .001</p>
							</fn>
						</table-wrap-foot>
					</table-wrap>
				</p>
			</sec>
			<sec>
				<title>3.7 Cross-validation analysis</title>
				<p>The unconstrained model fit the data (SBX<sup>2</sup> = 148.73,<italic>df</italic>= 118,<italic>p</italic>= .029; SRMR = .04; CFI = .97; TLI = .96; RMSEA = .02, 90% CI [.01, .03]). We examined the measurement and structural model invariance. The results indicate that the measurement model (relations between unobserved and observed variables) and structural model (relations between latent variables) are invariant in both samples (see <xref ref-type="table" rid="t6">Table 6</xref>). Overall, these results support the equivalence of the measurement model in both samples.</p>
				<p>
					<table-wrap id="t6">
						<label>Table 6</label>
						<caption>
							<title>Model invariance in calibration and cross-validation samples</title>
						</caption>
						<table>
							<colgroup>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
								<col/>
							</colgroup>
							<thead>
								<tr>
									<th align="justify">Invariance</th>
									<th align="center">SBΧ<sup>
 <italic>2</italic>
</sup></th>
									<th align="center"><italic>df</italic></th>
									<th align="center">ΔSBX<sup>2</sup></th>
									<th align="center"><bold>Δ<italic>df</italic>
</bold></th>
									<th align="center"><italic>p</italic></th>
									<th align="center">ΔCFI</th>
									<th align="center">ΔRMSEA</th>
								</tr>
							</thead>
							<tbody>
								<tr>
									<td align="justify">Configural</td>
									<td align="center">148.73</td>
									<td align="center">118</td>
									<td align="center"> </td>
									<td align="center"> </td>
									<td align="center">.029</td>
									<td align="center"> </td>
									<td align="center"> </td>
								</tr>
								<tr>
									<td align="justify">Metric</td>
									<td align="center">153.69</td>
									<td align="center">127</td>
									<td align="center">4.96</td>
									<td align="center">9</td>
									<td align="center">.054</td>
									<td align="center">.004</td>
									<td align="center">.003</td>
								</tr>
								<tr>
									<td align="justify">Scalar </td>
									<td align="center">184.71</td>
									<td align="center">162</td>
									<td align="center">31.02</td>
									<td align="center">35</td>
									<td align="center">.066</td>
									<td align="center">.001</td>
									<td align="center">.001</td>
								</tr>
							</tbody>
						</table>
					</table-wrap>
				</p>
			</sec>
		</sec>
		<sec sec-type="discussion">
			<title>IV. Discussion</title>
			<p>Improving digital security in adolescents is essential for reducing online risks and developing digital citizenship. Unfortunately, researchers need a theoretically grounded and robust psychometric instrument to measure online security behaviors accurately. This study expands on the literature by developing a reliable, valid, and invariant self-report scale to measure early and middle adolescents’ digital security. To our knowledge, this study is the first attempt to offer a scale proving that a second-order online security model fits the data well. Overall, a second-order factor suggests that digital security is a construct that displays four unique dimensions: personal data protection, safe relationships, healthy internet use, and self-disclosure. By accounting for the second-order digital security factor and specific dimensions of adolescents’ online security behaviors, it becomes possible to gain insight into how global and specific online security behaviors are associated with protective and risky outcomes.</p>
			<sec>
				<title>4.1 Online security as a multidimensional construct</title>
				<p>Consistent with the literature on online security (<xref ref-type="bibr" rid="B11">Curran &amp; Ribble, 2017</xref>; <xref ref-type="bibr" rid="B7">Chen et al., 2022</xref>; <xref ref-type="bibr" rid="B22">Hamza et al., 2019</xref>; <xref ref-type="bibr" rid="B17">Gallego-Arrufat et al., 2019</xref>), our findings provide evidence supporting online security as a multidimensional construct. We found online security to be a one second-order factor model that includes four first-order factors, confirming that digital security should be conceptualized and measured as a multidimensional construct. A multidimensional online security measure - as opposed to considering each dimension separately - offers a more profound representation of how adolescents protect personal data, exercise caution in their relationships, use the internet healthily, and share information with their parents or other adults. Approaching online security as a multidimensional construct also allows us to appreciate the influence of these dimensions, together or separately, on psychosocial outcomes.</p>
			</sec>
			<sec>
				<title>4.2 Discriminant validity</title>
				<p>The second-order factor captures the common variance shared by four dimensions of adolescents’ online security. On the other hand, each dimension of online security represents the uniqueness captured by each factor in the construct’s variance. These findings support the conceptualization that personal data protection, safe relationships, healthy internet use, and self-disclosure, although empirically related, also represent specific factors that capture specific variance in the construct. The researchers examined the relations of each type of security behavior with antecedent and consequent variables. Furthermore, the multidimensional scale can be used in educational settings or psychological interventions to identify the digital security dimensions where adolescents encounter difficulties. Additionally, a global measurement of online security may be relevant for testing educational policy issues related to adolescent online security behaviors.</p>
			</sec>
			<sec>
				<title>4.3 Measurement invariance</title>
				<p>Confirming measurement invariance by gender and stage of adolescence (early vs. middle adolescence) enables researchers to make meaningful inferences in future research. Our findings support measurement invariance in the scale, confirming that item content is interpreted similarly across the tested groups. An analysis by gender showed that mean scores for safe relationships and self-disclosure were higher for females, whereas males scored more highly in healthy internet use. These results suggest that digital safety behaviors vary by gender and across dimensions. This finding may shed light on the inconsistencies reported throughout the literature regarding safety behavior differences in internet use by gender (see <xref ref-type="bibr" rid="B6">Casaló &amp; Escario, 2019</xref>; <xref ref-type="bibr" rid="B27">Jiang et al., 2017</xref>; <xref ref-type="bibr" rid="B29">Kapetanovic et al., 2017</xref>; <xref ref-type="bibr" rid="B58">Tifferet, 2019</xref>). We suggest focusing future research on analyzing the factors that might cause these gender differences in online security practices, specifically in a Mexican context. </p>
				<p>Regarding differences by stage of adolescence, we found that early adolescents exhibited higher levels of self-disclosure and safe relationships than middle adolescents; no differences were found in personal data protection and healthy internet use. This finding aligns with previous research showing that middle adolescents tend to diminish their self-disclosure to parents and become more involved in unsafe online relationships (<xref ref-type="bibr" rid="B55">Smetana et al., 2009</xref>; <xref ref-type="bibr" rid="B56">Son &amp; Padilla-Walker, 2019</xref>; <xref ref-type="bibr" rid="B30">Koutamanis et al., 2015</xref>). Therefore, we recommend conducting future research to analyze the variables that affect each dimension of digital security and examine how these dimensions can be undermined by adolescents’ need for autonomy.</p>
			</sec>
			<sec>
				<title>4.4 Validity evidence based on relations with external variables</title>
				<p>We found the expected relationship between parental mediation and online security behaviors in adolescents. Moreover, the effect size of these correlations suggests that the results have theoretical and practical implications. These findings are consistent with other research (e.g., <xref ref-type="bibr" rid="B39">Mesch, 2018</xref>; <xref ref-type="bibr" rid="B60">Wang &amp; Xing, 2018</xref>) and thus provide evidence of the concurrent validity of our scale. Overall, results confirm that parental mediation is critical in explaining positive online behaviors in adolescents. We suggest that future research address how forms of parental mediation lead to specific online security practices in adolescents.</p>
			</sec>
		</sec>
		<sec sec-type="conclusions">
			<title>V. Conclusions</title>
			<p>This research confirmed the value of measuring online security as a multidimensional construct. Findings have shown that a one-dimensional digital security measure reveals no differences between online security practices. Practitioners may examine digital security across four dimensions that vary between adolescents, thus targeting interventions based on these results. Following on from previous research demonstrating links between digital security and adolescents’ online risk behaviors (<xref ref-type="bibr" rid="B17">Gallego-Arrufat et al., 2019</xref>; <xref ref-type="bibr" rid="B51">Ribble &amp; Bailey, 2011</xref>), school counseling should consider targeted intervention for different dimensions of digital security in order to promote responsible and safe internet use in adolescents. Adolescents with lower scores in particular dimensions or lower overall scores across all dimensions could be identified for counseling support. Finally, differences in means help to identify groups of students at risk for unsafe and problematic internet use. </p>
			<p>These findings have methodological implications for researchers and practitioners seeking to enhance digital citizenship in adolescents, who base their efforts partly on the extent to which adolescents demonstrate digital security behaviors, such as personal data protection, safe relationships, healthy internet use, and self-disclosure. In education, interventions to improve digital security in adolescents include digital education for students, teachers, and parents; integrating digital citizenship in the school curriculum; involving parents in the digital citizenship education process; and creating a peer mentorship program. </p>
			<p>The results presented in this paper should be treated cautiously since the study has some limitations. First, we used a second-order factor model to examine the scale’s dimensionality. Additional methods of analysis, such as the bifactor model, should ensure the interpretability of the total and subscale information (<xref ref-type="bibr" rid="B49">Reise et al., 2023</xref>). Second, we relied on self-report instruments to assess online security, and responses may be biased by social desirability. We recommend that future studies assess the construct based on multiple data sources, such as parents’ or teachers’ reports. Different measurement methods (e.g. observation) should also offer a more accurate construct evaluation. Third, the data pertain to Mexican adolescents, and youth from different countries may experience different digital security issues and may understand the scale differently. Using cross-cultural samples across diverse contexts to extrapolate the results to other populations would offer more precise insight. Lastly, the cross-sectional design used for this study limits any analysis of changes over the stages of adolescence. Longitudinal designs are warranted to analyze differences across ages more accurately.</p>
		</sec>
	</body>
	<back>
		<ref-list>
			<title>References</title>
			<ref id="B1">
				<mixed-citation>Almanasreh, E., Moles, R., &amp; Chen, T. F. (2019). Evaluation of methods used for estimating content validity. <italic>Research in Social and Administrative Pharmacy</italic>, <italic>15</italic>(2), 214-221. https://doi.org/10.1016/j.sapharm.2018.03.066</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Almanasreh</surname>
							<given-names>E.</given-names>
						</name>
						<name>
							<surname>Moles</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Chen</surname>
							<given-names>T. F.</given-names>
						</name>
					</person-group>
					<year>2019</year>
					<article-title>Evaluation of methods used for estimating content validity</article-title>
					<source>Research in Social and Administrative Pharmacy</source>
					<volume>15</volume>
					<issue>2</issue>
					<fpage>214</fpage>
					<lpage>221</lpage>
					<pub-id pub-id-type="doi">10.1016/j.sapharm.2018.03.066</pub-id>
				</element-citation>
			</ref>
			<ref id="B2">
				<mixed-citation>Aydın O., Güçlü, M., Ünal-Aydın, P., &amp; Spada, M. M. (2020). Metacognitions and emotion recognition in Internet Gaming Disorder among adolescents. <italic>Addictive Behavior Reports</italic>, <italic>12</italic>, e100296. https://doi.org/10.1016/j.abrep.2020.100296</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Aydın</surname>
							<given-names>O.</given-names>
						</name>
						<name>
							<surname>Güçlü</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Ünal-Aydın</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Spada</surname>
							<given-names>M. M.</given-names>
						</name>
					</person-group>
					<year>2020</year>
					<article-title>Metacognitions and emotion recognition in Internet Gaming Disorder among adolescents</article-title>
					<source>Addictive Behavior Reports</source>
					<volume>12</volume>
					<pub-id pub-id-type="doi">10.1016/j.abrep.2020.100296</pub-id>
				</element-citation>
			</ref>
			<ref id="B3">
				<mixed-citation>Babaoglu C., &amp; Akman, E. (2022). Participation with social media: The case of Turkish metropolitan municipalities in Facebook. In Information Resources Management Association (Ed.), <italic>Research anthology on citizen engagement and activism for social change</italic> (pp. 104-125). IGI Global.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Babaoglu</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Akman</surname>
							<given-names>E.</given-names>
						</name>
					</person-group>
					<year>2022</year>
					<chapter-title>Participation with social media: The case of Turkish metropolitan municipalities in Facebook</chapter-title>
					<person-group person-group-type="editor">
						<collab>Information Resources Management Association</collab>
					</person-group>
					<source>Research anthology on citizen engagement and activism for social change</source>
					<fpage>104</fpage>
					<lpage>125</lpage>
					<publisher-name>IGI Global</publisher-name>
				</element-citation>
			</ref>
			<ref id="B4">
				<mixed-citation>Bandalos, D. L., &amp; Finney, S. J. (2019). Factor analysis: Exploratory and confirmatory. In G. R. Hancock, L. M. Stapleton, &amp; R. O. Mueller (Eds.), <italic>The reviewer’s guide to quantitative methods in the social sciences</italic> (pp. 98-122). Routledge. </mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="editor">
						<name>
							<surname>Bandalos</surname>
							<given-names>D. L.</given-names>
						</name>
						<name>
							<surname>Finney</surname>
							<given-names>S. J.</given-names>
						</name>
					</person-group>
					<year>2019</year>
					<chapter-title>Factor analysis: Exploratory and confirmatory</chapter-title>
					<person-group person-group-type="editor">
						<name>
							<surname>Hancock</surname>
							<given-names>G. R.</given-names>
						</name>
						<name>
							<surname>Stapleton</surname>
							<given-names>L. M.</given-names>
						</name>
						<name>
							<surname>Mueller</surname>
							<given-names>R. O.</given-names>
						</name>
					</person-group>
					<source>The reviewer’s guide to quantitative methods in the social sciences</source>
					<fpage>98</fpage>
					<lpage>122</lpage>
					<publisher-name>Routledge</publisher-name>
				</element-citation>
			</ref>
			<ref id="B5">
				<mixed-citation>Brown, T. A. (2023). Confirmatory factorial analysis. In R. H. Hoyle (Ed.), <italic>Handbook of structural equation modeling</italic> (2nd ed., pp. 261-276). The Guildford Press. </mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Brown</surname>
							<given-names>T. A.</given-names>
						</name>
					</person-group>
					<year>2023</year>
					<chapter-title>Confirmatory factorial analysis</chapter-title>
					<person-group person-group-type="editor">
						<name>
							<surname>Hoyle</surname>
							<given-names>R. H.</given-names>
						</name>
					</person-group>
					<source>Handbook of structural equation modeling</source>
					<edition>(2nd ed</edition>
					<fpage>261</fpage>
					<lpage>276</lpage>
					<publisher-name>The Guildford Press</publisher-name>
				</element-citation>
			</ref>
			<ref id="B6">
				<mixed-citation>Casaló, L. V., &amp; Escario, J.-J. (2019). Predictors of excessive internet use among adolescents in Spain: The relevance of the relationship between parents and their children.<italic>Computers in Human Behavior</italic>, <italic>92</italic>, 344-351. https://doi.org/10.1016/j.chb.2018.11.042</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Casaló</surname>
							<given-names>L. V.</given-names>
						</name>
						<name>
							<surname>Escario</surname>
							<given-names>J.-J.</given-names>
						</name>
					</person-group>
					<year>2019</year>
					<article-title>Predictors of excessive internet use among adolescents in Spain: The relevance of the relationship between parents and their children</article-title>
					<source>Computers in Human Behavior</source>
					<volume>92</volume>
					<fpage>344</fpage>
					<lpage>351</lpage>
					<pub-id pub-id-type="doi">10.1016/j.chb.2018.11.042</pub-id>
				</element-citation>
			</ref>
			<ref id="B7">
				<mixed-citation>Chen, A., Rosli, S. A., Basri, R., &amp; Hoe, C. Y. W. (2022). Investigation of screen time inclination and the accompanying visual and musculoskeletal discomfort in young smartphone users. <italic>Trends in Sciences</italic>, <italic>19</italic>(2), e1753. https://doi.org/10.48048/tis.2022.1753</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Chen</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Rosli</surname>
							<given-names>S. A.</given-names>
						</name>
						<name>
							<surname>Basri</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Hoe</surname>
							<given-names>C. Y. W.</given-names>
						</name>
					</person-group>
					<year>2022</year>
					<article-title>Investigation of screen time inclination and the accompanying visual and musculoskeletal discomfort in young smartphone users</article-title>
					<source>Trends in Sciences</source>
					<volume>19</volume>
					<issue>2</issue>
					<pub-id pub-id-type="doi">10.48048/tis.2022.1753</pub-id>
				</element-citation>
			</ref>
			<ref id="B8">
				<mixed-citation>Chen, L., &amp; Shi, J. (2019). Reducing harm from media: A meta-analysis of parental mediation. <italic>Journalism &amp; Mass Communication Quarterly</italic>, <italic>96</italic>(1), 173-193.</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Chen</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Shi</surname>
							<given-names>J.</given-names>
						</name>
					</person-group>
					<year>2019</year>
					<article-title>Reducing harm from media: A meta-analysis of parental mediation</article-title>
					<source>Journalism &amp; Mass Communication Quarterly</source>
					<volume>96</volume>
					<issue>1</issue>
					<fpage>173</fpage>
					<lpage>193</lpage>
				</element-citation>
			</ref>
			<ref id="B9">
				<mixed-citation>Chen, Y. T., Shih, W. L., Lee, C. H., Wu, P. L, &amp; Tsai, C. Y. (2021). Relationships among undergraduates’ problematic information security behavior, compulsive internet use, and mindful awareness in Taiwan. <italic>Computers &amp; Education</italic>, <italic>164</italic>, e104131. https://doi.org/10.1016/j.compedu.2021.104131</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Chen</surname>
							<given-names>Y. T.</given-names>
						</name>
						<name>
							<surname>Shih</surname>
							<given-names>W. L.</given-names>
						</name>
						<name>
							<surname>Lee</surname>
							<given-names>C. H.</given-names>
						</name>
						<name>
							<surname>Wu</surname>
							<given-names>P. L,</given-names>
						</name>
						<name>
							<surname>Tsai</surname>
							<given-names>C. Y.</given-names>
						</name>
					</person-group>
					<year>2021</year>
					<article-title>Relationships among undergraduates’ problematic information security behavior, compulsive internet use, and mindful awareness in Taiwan</article-title>
					<source>Computers &amp; Education</source>
					<volume>164</volume>
					<pub-id pub-id-type="doi">10.1016/j.compedu.2021.104131</pub-id>
				</element-citation>
			</ref>
			<ref id="B10">
				<mixed-citation>Chugh, R., &amp; Guggisberg, M. (2022). Stalking and other forms of dating violence: Lessons learned from <italic>You</italic> in relation to cyber safety. <italic>Journal of Interpersonal Violence</italic>, <italic>37</italic>(9-10), 6760-6784. https://doi.org/10.1177/0886260520966674</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Chugh</surname>
							<given-names>R.</given-names>
						</name>
						<name>
							<surname>Guggisberg</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<year>2022</year>
					<article-title>Stalking and other forms of dating violence: Lessons learned from You in relation to cyber safety</article-title>
					<source>Journal of Interpersonal Violence</source>
					<volume>37</volume>
					<issue>9-10</issue>
					<fpage>6760</fpage>
					<lpage>6784</lpage>
					<pub-id pub-id-type="doi">10.1177/0886260520966674</pub-id>
				</element-citation>
			</ref>
			<ref id="B11">
				<mixed-citation>Curran, M. B. F. X., &amp; Ribble M. (2017). P-20 model of digital citizenship. <italic>New Directions for Student Leadership</italic>, <italic>2017</italic>(153), 35-46. https://doi.org/10.1002/yd.20228</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Curran</surname>
							<given-names>M. B. F. X.</given-names>
						</name>
						<name>
							<surname>Ribble</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<year>2017</year>
					<article-title>P-20 model of digital citizenship</article-title>
					<source>New Directions for Student Leadership</source>
					<volume>2017</volume>
					<issue>153</issue>
					<fpage>35</fpage>
					<lpage>46</lpage>
					<pub-id pub-id-type="doi">10.1002/yd.20228</pub-id>
				</element-citation>
			</ref>
			<ref id="B12">
				<mixed-citation>Dedkova, L., &amp; Mýlek, V. (2022). Parental mediation of online interactions and its relation to adolescents’ contacts with new people online: The role of risk perception. <italic>Information, Communication &amp; Society</italic>, <italic>26</italic>(16), 3179-3196. https://doi.org/10.1080/1369118X.2022.2146985</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Dedkova</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Mýlek</surname>
							<given-names>V.</given-names>
						</name>
					</person-group>
					<year>2022</year>
					<article-title>Parental mediation of online interactions and its relation to adolescents’ contacts with new people online: The role of risk perception</article-title>
					<source>Information, Communication &amp; Society</source>
					<volume>26</volume>
					<issue>16</issue>
					<fpage>3179</fpage>
					<lpage>3196</lpage>
					<pub-id pub-id-type="doi">10.1080/1369118X.2022.2146985</pub-id>
				</element-citation>
			</ref>
			<ref id="B13">
				<mixed-citation>Emejulu, A., &amp; McGregor, C. (2019). Towards a radical digital citizenship in digital education. <italic>Critical Studies in Education</italic>, <italic>60</italic>(1), 131-147. https://doi.org/10.1080/17508487.2016.1234494</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Emejulu</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>McGregor</surname>
							<given-names>C.</given-names>
						</name>
					</person-group>
					<year>2019</year>
					<article-title>Towards a radical digital citizenship in digital education</article-title>
					<source>Critical Studies in Education</source>
					<volume>60</volume>
					<issue>1</issue>
					<fpage>131</fpage>
					<lpage>147</lpage>
					<pub-id pub-id-type="doi">10.1080/17508487.2016.1234494</pub-id>
				</element-citation>
			</ref>
			<ref id="B14">
				<mixed-citation>Fu, X., Liu, J., Liu, R.-D., Ding, Y., Hong, W., &amp; Jiang, S. (2020). The impact of parental active mediation on adolescent mobile phone dependency: A moderated mediation model. <italic>Computers in Human Behavior</italic>, <italic>107</italic>, e106280. https://doi.org/10.1016/j.chb.2020.106280</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Fu</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Liu</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Liu</surname>
							<given-names>R.-D.</given-names>
						</name>
						<name>
							<surname>Ding</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>Hong</surname>
							<given-names>W.</given-names>
						</name>
						<name>
							<surname>Jiang</surname>
							<given-names>S.</given-names>
						</name>
					</person-group>
					<year>2020</year>
					<article-title>The impact of parental active mediation on adolescent mobile phone dependency: A moderated mediation model</article-title>
					<source>Computers in Human Behavior</source>
					<volume>107</volume>
					<pub-id pub-id-type="doi">10.1016/j.chb.2020.106280</pub-id>
				</element-citation>
			</ref>
			<ref id="B15">
				<mixed-citation>Funder, D. C., &amp; Ozer, D. J. (2019). Evaluating effect size in psychological research: Sense and nonsense. <italic>Advances in Methods and Practices in Psychological Science</italic>, 2(2), 156-168. https://doi.org/10.1177/2515245919847202</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Funder</surname>
							<given-names>D. C.</given-names>
						</name>
						<name>
							<surname>Ozer</surname>
							<given-names>D. J.</given-names>
						</name>
					</person-group>
					<year>2019</year>
					<article-title>Evaluating effect size in psychological research: Sense and nonsense</article-title>
					<source>Advances in Methods and Practices in Psychological Science</source>
					<volume>2</volume>
					<issue>2</issue>
					<fpage>156</fpage>
					<lpage>168</lpage>
					<pub-id pub-id-type="doi">10.1177/2515245919847202</pub-id>
				</element-citation>
			</ref>
			<ref id="B16">
				<mixed-citation>Furr, R. M. (2018). <italic>Psychometrics. An introduction</italic> (3rd ed.). Sage.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Furr</surname>
							<given-names>R. M.</given-names>
						</name>
					</person-group>
					<year>2018</year>
					<source>Psychometrics. An introduction</source>
					<edition>3rd ed.</edition>
					<publisher-name>Sage</publisher-name>
				</element-citation>
			</ref>
			<ref id="B17">
				<mixed-citation>Gallego-Arrufat, M. J., Torres-Hernández, N., &amp; Pessoa, T. (2019). Competence of future teachers in the digital security area. <italic>Comunicar</italic>, <italic>61</italic>(27), 53-62. https://doi.org/10.3916/C61-2019-05</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Gallego-Arrufat</surname>
							<given-names>M. J.</given-names>
						</name>
						<name>
							<surname>Torres-Hernández</surname>
							<given-names>N.</given-names>
						</name>
						<name>
							<surname>Pessoa</surname>
							<given-names>T.</given-names>
						</name>
					</person-group>
					<year>2019</year>
					<article-title>Competence of future teachers in the digital security area</article-title>
					<source>Comunicar</source>
					<volume>61</volume>
					<issue>27</issue>
					<fpage>53</fpage>
					<lpage>62</lpage>
					<pub-id pub-id-type="doi">10.3916/C61-2019-05</pub-id>
				</element-citation>
			</ref>
			<ref id="B18">
				<mixed-citation>Gottfried, E. D., Shier, E. K., &amp; Mulay, A. L. (2020). Child pornography and online sexual solicitation. <italic>Current Psychiatry Reports</italic>, <italic>22</italic>, e10. https://doi.org/10.1007/s11920-020-1132-y</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Gottfried</surname>
							<given-names>E. D.</given-names>
						</name>
						<name>
							<surname>Shier</surname>
							<given-names>E. K.</given-names>
						</name>
						<name>
							<surname>Mulay</surname>
							<given-names>A. L.</given-names>
						</name>
					</person-group>
					<year>2020</year>
					<article-title>Child pornography and online sexual solicitation</article-title>
					<source>Current Psychiatry Reports</source>
					<volume>22</volume>
					<pub-id pub-id-type="doi">10.1007/s11920-020-1132-y</pub-id>
				</element-citation>
			</ref>
			<ref id="B19">
				<mixed-citation>Green, S. B., &amp; Yang, Y. (2015). Evaluation of dimensionality in the assessment of internal consistency reliability: Coefficient alpha and omega coefficients. <italic>Educational Measurement: Issues and Practice</italic>, <italic>34</italic>(4), 14-20. https://doi.org/10.1111/emip.12100</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Green</surname>
							<given-names>S. B.</given-names>
						</name>
						<name>
							<surname>Yang</surname>
							<given-names>Y.</given-names>
						</name>
					</person-group>
					<year>2015</year>
					<article-title>Evaluation of dimensionality in the assessment of internal consistency reliability: Coefficient alpha and omega coefficients</article-title>
					<source>Educational Measurement: Issues and Practice</source>
					<volume>34</volume>
					<issue>4</issue>
					<fpage>14</fpage>
					<lpage>20</lpage>
					<pub-id pub-id-type="doi">10.1111/emip.12100</pub-id>
				</element-citation>
			</ref>
			<ref id="B20">
				<mixed-citation>Hair, J. F., Black, W. C., Babin, B. J., &amp; Anderson, R. E. (2010). <italic>Multivariate data analysis</italic> (7th ed.). Pearson.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Hair</surname>
							<given-names>J. F.</given-names>
						</name>
						<name>
							<surname>Black</surname>
							<given-names>W. C.</given-names>
						</name>
						<name>
							<surname>Babin</surname>
							<given-names>B. J.</given-names>
						</name>
						<name>
							<surname>Anderson</surname>
							<given-names>R. E.</given-names>
						</name>
					</person-group>
					<year>2010</year>
					<source>Multivariate data analysis</source>
					<edition>7th ed.</edition>
					<publisher-name>Pearson</publisher-name>
				</element-citation>
			</ref>
			<ref id="B21">
				<mixed-citation>Hair, J. F. , Hult, T. M., Ringle, C. M., &amp; Sarstedt, M. (2017). <italic>A primer on partial least squares structural equation modeling</italic> (PLS-SEM) (2th ed.). Sage. </mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Hair</surname>
							<given-names>J. F.</given-names>
						</name>
						<name>
							<surname>Hult</surname>
							<given-names>T. M.</given-names>
						</name>
						<name>
							<surname>Ringle</surname>
							<given-names>C. M.</given-names>
						</name>
						<name>
							<surname>Sarstedt</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<year>2017</year>
					<source>A primer on partial least squares structural equation modeling</source>
					<edition>2th ed.</edition>
					<publisher-name>Sage</publisher-name>
				</element-citation>
			</ref>
			<ref id="B22">
				<mixed-citation>Hamza, A., Kumar, M., Anand, N., Marimuthu, P., Thamilselvan, P., Chakraborty, P., Suma, N., Baglari, H., &amp; Singh, P. (2019). Urban and rural pattern of Internet use among youth and its association with mood state. <italic>Journal of Family Medicine and Primary Care</italic>, 8(8), 2602-2606. https://doi.org/10.4103/jfmpc.jfmpc_428_19</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Hamza</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Kumar</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Anand</surname>
							<given-names>N.</given-names>
						</name>
						<name>
							<surname>Marimuthu</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Thamilselvan</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Chakraborty</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Suma</surname>
							<given-names>N.</given-names>
						</name>
						<name>
							<surname>Baglari</surname>
							<given-names>H.</given-names>
						</name>
						<name>
							<surname>Singh</surname>
							<given-names>P.</given-names>
						</name>
					</person-group>
					<year>2019</year>
					<article-title>Urban and rural pattern of Internet use among youth and its association with mood state</article-title>
					<source>Journal of Family Medicine and Primary Care</source>
					<volume>8</volume>
					<issue>8</issue>
					<fpage>2602</fpage>
					<lpage>2606</lpage>
					<pub-id pub-id-type="doi">10.4103/jfmpc.jfmpc_428_19</pub-id>
				</element-citation>
			</ref>
			<ref id="B23">
				<mixed-citation>Ho, R. (2014). <italic>Handbook of univariate and multivariate data analysis and interpretation with SPSS</italic> (2nd ed.). CRC Press.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Ho</surname>
							<given-names>R.</given-names>
						</name>
					</person-group>
					<year>2014</year>
					<source>Handbook of univariate and multivariate data analysis and interpretation with SPSS</source>
					<edition>2nd ed.</edition>
					<publisher-name>CRC Press</publisher-name>
				</element-citation>
			</ref>
			<ref id="B24">
				<mixed-citation>Hurwitz, L. B., &amp; Schmitt, K. L. (2020). Can children benefit from early internet exposure? Short- and long-term links between internet use, digital skill, and academic performance. <italic>Computers &amp; Education</italic>, <italic>146</italic>, e103750. https://doi.org/10.1016/j.compedu.2019.103750</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Hurwitz</surname>
							<given-names>L. B.</given-names>
						</name>
						<name>
							<surname>Schmitt</surname>
							<given-names>K. L.</given-names>
						</name>
					</person-group>
					<year>2020</year>
					<article-title>Can children benefit from early internet exposure? Short- and long-term links between internet use, digital skill, and academic performance</article-title>
					<source>Computers &amp; Education</source>
					<volume>146</volume>
					<pub-id pub-id-type="doi">10.1016/j.compedu.2019.103750</pub-id>
				</element-citation>
			</ref>
			<ref id="B25">
				<mixed-citation>INEE. (2019). <italic>Panorama educativo de México 2018. Indicadores del sistema educativo nacional. Educación básica y media superior</italic> [Overview of education in Mexico 2018. National education system indicators. Basic and upper secondary education]. <ext-link ext-link-type="uri" xlink:href="https://www.inee.edu.mx/wp-content/uploads/2019/08/P1B117.pdf">https://www.inee.edu.mx/wp-content/uploads/2019/08/P1B117.pdf</ext-link>
				</mixed-citation>
				<element-citation publication-type="report">
					<person-group person-group-type="author">
						<collab>INEE</collab>
					</person-group>
					<year>2019</year>
					<source><italic>Panorama educativo de México 2018. Indicadores del sistema educativo nacional. Educación básica y media superior</italic> [Overview of education in Mexico 2018. National education system indicators. Basic and upper secondary education]</source>
					<ext-link ext-link-type="uri" xlink:href="https://www.inee.edu.mx/wp-content/uploads/2019/08/P1B117.pdf">https://www.inee.edu.mx/wp-content/uploads/2019/08/P1B117.pdf</ext-link>
				</element-citation>
			</ref>
			<ref id="B26">
				<mixed-citation>INEGI. (2022). <italic>Encuesta Nacional sobre Disponibilidad y Uso de Tecnologías de la Información en los Hogares 2021.</italic> [2021 National Survey on Availability and Use of Information Technologies in Households]. <ext-link ext-link-type="uri" xlink:href="https://www.inegi.org.mx/programas/dutih/2021/">https://www.inegi.org.mx/programas/dutih/2021/</ext-link>
				</mixed-citation>
				<element-citation publication-type="report">
					<person-group person-group-type="author">
						<collab>INEGI</collab>
					</person-group>
					<year>2022</year>
					<source><italic>Encuesta Nacional sobre Disponibilidad y Uso de Tecnologías de la Información en los Hogares 2021.</italic> [2021 National Survey on Availability and Use of Information Technologies in Households]</source>
					<ext-link ext-link-type="uri" xlink:href="https://www.inegi.org.mx/programas/dutih/2021/">https://www.inegi.org.mx/programas/dutih/2021/</ext-link>
				</element-citation>
			</ref>
			<ref id="B27">
				<mixed-citation>Jiang, L. C., Yang, I. M., &amp; Wang, C. (2017). Self-disclosure to parents in emerging adulthood: Examining the roles of perceived parental responsiveness and separation-individuation. <italic>Journal of Social and Personal Relationships</italic>, <italic>34</italic>(4), 425-445. https://doi.org/10.1177/0265407516640603</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Jiang</surname>
							<given-names>L. C.</given-names>
						</name>
						<name>
							<surname>Yang</surname>
							<given-names>I. M.</given-names>
						</name>
						<name>
							<surname>Wang</surname>
							<given-names>C.</given-names>
						</name>
					</person-group>
					<year>2017</year>
					<article-title>Self-disclosure to parents in emerging adulthood: Examining the roles of perceived parental responsiveness and separation-individuation</article-title>
					<source>Journal of Social and Personal Relationships</source>
					<volume>34</volume>
					<issue>4</issue>
					<fpage>425</fpage>
					<lpage>445</lpage>
					<pub-id pub-id-type="doi">10.1177/0265407516640603</pub-id>
				</element-citation>
			</ref>
			<ref id="B28">
				<mixed-citation>Jones, L. M., &amp; Mitchell, K. J. (2016). Defining and measuring youth digital citizenship. <italic>New Media and Society</italic>, <italic>18</italic>(9), 2063-2079. https://doi.org/10.1177/1461444815577797</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Jones</surname>
							<given-names>L. M.</given-names>
						</name>
						<name>
							<surname>Mitchell</surname>
							<given-names>K. J.</given-names>
						</name>
					</person-group>
					<year>2016</year>
					<article-title>Defining and measuring youth digital citizenship</article-title>
					<source>New Media and Society</source>
					<volume>18</volume>
					<issue>9</issue>
					<fpage>2063</fpage>
					<lpage>2079</lpage>
					<pub-id pub-id-type="doi">10.1177/1461444815577797</pub-id>
				</element-citation>
			</ref>
			<ref id="B29">
				<mixed-citation>Kapetanovic, S., Bohlin, M., Skoog, T., &amp; Gerdner A. (2017). Structural relations between sources of parental knowledge, feelings of being overly controlled and risk behaviors in early adolescence. <italic>Journal of Family Studies</italic>, <italic>26</italic>(2), 226-242. https://doi.org/10.1080/13229400.2017.1367713</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Kapetanovic</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Bohlin</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Skoog</surname>
							<given-names>T.</given-names>
						</name>
						<name>
							<surname>Gerdner</surname>
							<given-names>A.</given-names>
						</name>
					</person-group>
					<year>2017</year>
					<article-title>Structural relations between sources of parental knowledge, feelings of being overly controlled and risk behaviors in early adolescence</article-title>
					<source>Journal of Family Studies</source>
					<volume>26</volume>
					<issue>2</issue>
					<fpage>226</fpage>
					<lpage>242</lpage>
					<pub-id pub-id-type="doi">10.1080/13229400.2017.1367713</pub-id>
				</element-citation>
			</ref>
			<ref id="B30">
				<mixed-citation>Koutamanis, M., Vossen, H. G. M., &amp; Valkenburg, P. M. (2015). Adolescents’ comments in social media: Why do adolescents receive negative feedback and who is most at risk? <italic>Computers in Human Behavior</italic>, <italic>53</italic>, 486-494. https://doi.org/10.1016/j.chb.2015.07.016</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Koutamanis</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Vossen</surname>
							<given-names>H. G. M.</given-names>
						</name>
						<name>
							<surname>Valkenburg</surname>
							<given-names>P. M.</given-names>
						</name>
					</person-group>
					<year>2015</year>
					<article-title>Adolescents’ comments in social media: Why do adolescents receive negative feedback and who is most at risk?</article-title>
					<source>Computers in Human Behavior</source>
					<volume>53</volume>
					<fpage>486</fpage>
					<lpage>494</lpage>
					<pub-id pub-id-type="doi">10.1016/j.chb.2015.07.016</pub-id>
				</element-citation>
			</ref>
			<ref id="B31">
				<mixed-citation>Lauricella, A. R., Herdzina, J., &amp; Robb, M. (2020). Early childhood educators’ teaching of digital citizenship competencies. <italic>Computers &amp; Education</italic>, <italic>158</italic>, e103989. https://doi.org/10.1016/j.compedu.2020.103989</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Lauricella</surname>
							<given-names>A. R.</given-names>
						</name>
						<name>
							<surname>Herdzina</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Robb</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<year>2020</year>
					<article-title>Early childhood educators’ teaching of digital citizenship competencies</article-title>
					<source>Computers &amp; Education</source>
					<volume>158</volume>
					<pub-id pub-id-type="doi">10.1016/j.compedu.2020.103989</pub-id>
				</element-citation>
			</ref>
			<ref id="B32">
				<mixed-citation>Lee, S. J. (2013). Parental restrictive mediation of children’s internet use: Effective for what and for whom? <italic>New Media &amp; Society</italic>,<italic>15</italic>(4), 466-481. https://doi.org/10.1177/1461444812452412</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Lee</surname>
							<given-names>S. J.</given-names>
						</name>
					</person-group>
					<year>2013</year>
					<article-title>Parental restrictive mediation of children’s internet use: Effective for what and for whom?</article-title>
					<source>New Media &amp; Society</source>
					<volume>15</volume>
					<issue>4</issue>
					<fpage>466</fpage>
					<lpage>481</lpage>
					<pub-id pub-id-type="doi">10.1177/1461444812452412</pub-id>
				</element-citation>
			</ref>
			<ref id="B33">
				<mixed-citation>Lionetti, F., Keijsers, L., Dellagiulia, A., &amp; Pastore, M. (2016). Evidence of factorial validity of parental knowledge, control and solicitation, and adolescent disclosure scales: When the ordered nature of Likert scales matters. <italic>Frontiers in Psychology</italic>, 7, e941. https://doi.org/10.3389/fpsyg.2016.00941</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Lionetti</surname>
							<given-names>F.</given-names>
						</name>
						<name>
							<surname>Keijsers</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Dellagiulia</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Pastore</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<year>2016</year>
					<article-title>Evidence of factorial validity of parental knowledge, control and solicitation, and adolescent disclosure scales: When the ordered nature of Likert scales matters</article-title>
					<source>Frontiers in Psychology</source>
					<volume>7</volume>
					<pub-id pub-id-type="doi">10.3389/fpsyg.2016.00941</pub-id>
				</element-citation>
			</ref>
			<ref id="B34">
				<mixed-citation>Liu, C., Ang, R. P., &amp; Lwin, M. O. (2013). Cognitive, personality, and social factors associated with adolescents’ online personal information disclosure. <italic>Journal of Adolescence</italic>, <italic>36</italic>(4), 629-638. http://doi.org/10.1016/j.adolescence.2013.03.016</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Liu</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Ang</surname>
							<given-names>R. P.</given-names>
						</name>
						<name>
							<surname>Lwin</surname>
							<given-names>M. O.</given-names>
						</name>
					</person-group>
					<year>2013</year>
					<article-title>Cognitive, personality, and social factors associated with adolescents’ online personal information disclosure</article-title>
					<source>Journal of Adolescence</source>
					<volume>36</volume>
					<issue>4</issue>
					<fpage>629</fpage>
					<lpage>638</lpage>
					<pub-id pub-id-type="doi">10.1016/j.adolescence.2013.03.016</pub-id>
				</element-citation>
			</ref>
			<ref id="B35">
				<mixed-citation>Livingstone, S., Haddon, L., Görzig, A., &amp; Ólafsson, K. (2011). <italic>Risks and safety on the internet: The perspective of European children: Full findings and policy implications from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries</italic>. EU Kids Online Network. http://eprints.lse.ac.uk/33731/</mixed-citation>
				<element-citation publication-type="report">
					<person-group person-group-type="author">
						<name>
							<surname>Livingstone</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Haddon</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Görzig</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>Ólafsson</surname>
							<given-names>K.</given-names>
						</name>
					</person-group>
					<year>2011</year>
					<source>Risks and safety on the internet: The perspective of European children: Full findings and policy implications from the EU Kids Online survey of 9-16 year olds and their parents in 25 countries</source>
					<publisher-name>EU Kids Online Network</publisher-name>
					<pub-id pub-id-type="doi">http://eprints.lse.ac.uk/33731/</pub-id>
				</element-citation>
			</ref>
			<ref id="B36">
				<mixed-citation>Lukavská, K., Hrabec, O., Lukavský, J., Demetrovics, Z., &amp; Király, O. (2022). The associations of adolescent problematic internet use with parenting: A meta-analysis. <italic>Addictive Behaviors</italic>, <italic>135</italic>, e107423. https://doi.org/10.1016/j.addbeh.2022.107423</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Lukavská</surname>
							<given-names>K.</given-names>
						</name>
						<name>
							<surname>Hrabec</surname>
							<given-names>O.</given-names>
						</name>
						<name>
							<surname>Lukavský</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Demetrovics</surname>
							<given-names>Z.</given-names>
						</name>
						<name>
							<surname>Király</surname>
							<given-names>O.</given-names>
						</name>
					</person-group>
					<year>2022</year>
					<article-title>The associations of adolescent problematic internet use with parenting: A meta-analysis</article-title>
					<source>Addictive Behaviors</source>
					<volume>135</volume>
					<pub-id pub-id-type="doi">10.1016/j.addbeh.2022.107423</pub-id>
				</element-citation>
			</ref>
			<ref id="B37">
				<mixed-citation>Madrid, E. J., Valdés, A. A., Urías, M., Torres, G. M., &amp; Parra-Pérez, L. G. (2020). Factores asociados al ciberacoso en adolescentes: Una perspectiva ecológico-social [Factors associated with cyberbullying in adolescents: An ecological social perspective]. <italic>Perfiles Educativos</italic>, <italic>42</italic>(167), 68-83. https://doi.org/10.22201/iisue.24486167e.2019.167.59128</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Madrid</surname>
							<given-names>E. J.</given-names>
						</name>
						<name>
							<surname>Valdés</surname>
							<given-names>A. A.</given-names>
						</name>
						<name>
							<surname>Urías</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Torres</surname>
							<given-names>G. M.</given-names>
						</name>
						<name>
							<surname>Parra-Pérez</surname>
							<given-names>L. G.</given-names>
						</name>
					</person-group>
					<year>2020</year>
					<article-title>Factores asociados al ciberacoso en adolescentes: Una perspectiva ecológico-social [Factors associated with cyberbullying in adolescents: An ecological social perspective]</article-title>
					<source>Perfiles Educativos</source>
					<volume>42</volume>
					<issue>167</issue>
					<fpage>68</fpage>
					<lpage>83</lpage>
					<pub-id pub-id-type="doi">10.22201/iisue.24486167e.2019.167.59128</pub-id>
				</element-citation>
			</ref>
			<ref id="B38">
				<mixed-citation>Martin, F., Hunt, B., Wang, C. , &amp; Brooks, E. (2020). Middle school student perception of technology use and digital citizenship practices. <italic>Computers in the Schools</italic>, <italic>37</italic>(3), 196-215. https://doi.org/10.1080/07380569.2020.1795500</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Martin</surname>
							<given-names>F.</given-names>
						</name>
						<name>
							<surname>Hunt</surname>
							<given-names>B.</given-names>
						</name>
						<name>
							<surname>Wang</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Brooks</surname>
							<given-names>E.</given-names>
						</name>
					</person-group>
					<year>2020</year>
					<article-title>Middle school student perception of technology use and digital citizenship practices</article-title>
					<source>Computers in the Schools</source>
					<volume>37</volume>
					<issue>3</issue>
					<fpage>196</fpage>
					<lpage>215</lpage>
					<pub-id pub-id-type="doi">10.1080/07380569.2020.1795500</pub-id>
				</element-citation>
			</ref>
			<ref id="B39">
				<mixed-citation>Mesch, G. S. (2018). Parent-child connections on social networking sites and cyberbullying. <italic>Youth and Society</italic>, <italic>50</italic>(8), 1145-1162. https://doi.org/10.1177/0044118X16659685</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Mesch</surname>
							<given-names>G. S.</given-names>
						</name>
					</person-group>
					<year>2018</year>
					<article-title>Parent-child connections on social networking sites and cyberbullying</article-title>
					<source>Youth and Society</source>
					<volume>50</volume>
					<issue>8</issue>
					<fpage>1145</fpage>
					<lpage>1162</lpage>
					<pub-id pub-id-type="doi">10.1177/0044118X16659685</pub-id>
				</element-citation>
			</ref>
			<ref id="B40">
				<mixed-citation>Mueller, R. O., &amp; Hancock, G. R. (2019). Structural equation modeling. In G. R. Hancock, L. M. Stapleton, &amp; R. O. Mueller (Eds.), <italic>The reviewer’s guide to quantitative methods in the social sciences</italic> (2nd ed., pp. 445-456). Routledge. </mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Mueller</surname>
							<given-names>R. O.</given-names>
						</name>
						<name>
							<surname>Hancock</surname>
							<given-names>G. R.</given-names>
						</name>
					</person-group>
					<year>2019</year>
					<chapter-title>Structural equation modeling</chapter-title>
					<person-group person-group-type="editor">
						<name>
							<surname>Hancock</surname>
							<given-names>G. R.</given-names>
						</name>
						<name>
							<surname>Stapleton</surname>
							<given-names>L. M.</given-names>
						</name>
						<name>
							<surname>Mueller</surname>
							<given-names>R. O.</given-names>
						</name>
					</person-group>
					<source>The reviewer’s guide to quantitative methods in the social sciences</source>
					<edition>2nd ed.</edition>
					<fpage>445</fpage>
					<lpage>456</lpage>
					<publisher-name>Routledge</publisher-name>
				</element-citation>
			</ref>
			<ref id="B41">
				<mixed-citation>Muthén, L. K., &amp; Muthén, B. O. (2017). <italic>Mplus user’s guide</italic> (8th ed.). Muthén &amp; Muthén.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="editor">
						<name>
							<surname>Muthén</surname>
							<given-names>L. K.</given-names>
						</name>
						<name>
							<surname>Muthén</surname>
							<given-names>B. O.</given-names>
						</name>
					</person-group>
					<year>2017</year>
					<source>Mplus user’s guide</source>
					<edition>8th ed.</edition>
					<publisher-name>Muthén &amp; Muthén</publisher-name>
				</element-citation>
			</ref>
			<ref id="B42">
				<mixed-citation>Nikken, P., &amp; Jansz, J. (2014). Developing scales to measure parental mediation of young children’s internet use. <italic>Learning, Media and Technology</italic>, <italic>39</italic>(2), 250-266. https://doi.org/10.1080/17439884.2013.782038</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Nikken</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Jansz</surname>
							<given-names>J.</given-names>
						</name>
					</person-group>
					<year>2014</year>
					<article-title>Developing scales to measure parental mediation of young children’s internet use</article-title>
					<source>Learning, Media and Technology</source>
					<volume>39</volume>
					<issue>2</issue>
					<fpage>250</fpage>
					<lpage>266</lpage>
					<pub-id pub-id-type="doi">10.1080/17439884.2013.782038</pub-id>
				</element-citation>
			</ref>
			<ref id="B43">
				<mixed-citation>Nowell, C., Pfeifer, J., Enticott, P., Silk, T., &amp; Vijayakumar, N. (2022). Value of self-disclosure to parents and peers during adolescence. <italic>Journal of Research on Adolescence</italic>, <italic>33</italic>(1), 289-301. https://doi.org/10.1111/jora.12803</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Nowell</surname>
							<given-names>C.</given-names>
						</name>
						<name>
							<surname>Pfeifer</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Enticott</surname>
							<given-names>P.</given-names>
						</name>
						<name>
							<surname>Silk</surname>
							<given-names>T.</given-names>
						</name>
						<name>
							<surname>Vijayakumar</surname>
							<given-names>N.</given-names>
						</name>
					</person-group>
					<year>2022</year>
					<article-title>Value of self-disclosure to parents and peers during adolescence</article-title>
					<source>Journal of Research on Adolescence</source>
					<volume>33</volume>
					<issue>1</issue>
					<fpage>289</fpage>
					<lpage>301</lpage>
					<pub-id pub-id-type="doi">10.1111/jora.12803</pub-id>
				</element-citation>
			</ref>
			<ref id="B44">
				<mixed-citation>Organization for Economic Cooperation and Development (2022). <italic>Internet access (indicator)</italic>. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.24320/redie.2024.26.e06.5992">https://doi.org/10.1787/69c2b997-en</ext-link>
				</mixed-citation>
				<element-citation publication-type="webpage">
					<person-group person-group-type="author">
						<collab>Organization for Economic Cooperation and Development</collab>
					</person-group>
					<year>2022</year>
					<source>Internet access (indicator)</source>
					<ext-link ext-link-type="uri" xlink:href="https://doi.org/10.24320/redie.2024.26.e06.5992">https://doi.org/10.1787/69c2b997-en</ext-link>
				</element-citation>
			</ref>
			<ref id="B45">
				<mixed-citation>Orosco, J. R., &amp; Pomasunco, R. (2020). Adolescentes frente a los riesgos en el uso de las TIC [Adolescents and risks of ICT]. <italic>Revista Electrónica de Investigación Educativa</italic>, <italic>22</italic>, e17, 1-13. https://doi.org/10.24320/redie.2020.22.e17.2298</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Orosco</surname>
							<given-names>J. R.</given-names>
						</name>
						<name>
							<surname>Pomasunco</surname>
							<given-names>R.</given-names>
						</name>
					</person-group>
					<year>2020</year>
					<article-title>Adolescentes frente a los riesgos en el uso de las TIC [Adolescents and risks of ICT]</article-title>
					<source>Revista Electrónica de Investigación Educativa</source>
					<volume>22</volume>
					<fpage>1</fpage>
					<lpage>13</lpage>
					<pub-id pub-id-type="doi">10.24320/redie.2020.22.e17.2298</pub-id>
				</element-citation>
			</ref>
			<ref id="B46">
				<mixed-citation>Padilla-Walker, L. M., Coyne, S. M., &amp; Fraser, A. M. (2012). Getting a high-speed family connection: Associations between family media use and family connection. <italic>Family Relations</italic>, <italic>61</italic>(3), 426-440. https://doi.org/10.1111/j.1741-3729.2012.00710.x</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Padilla-Walker</surname>
							<given-names>L. M.</given-names>
						</name>
						<name>
							<surname>Coyne</surname>
							<given-names>S. M.</given-names>
						</name>
						<name>
							<surname>Fraser</surname>
							<given-names>A. M.</given-names>
						</name>
					</person-group>
					<year>2012</year>
					<article-title>Getting a high-speed family connection: Associations between family media use and family connection</article-title>
					<source>Family Relations</source>
					<volume>61</volume>
					<issue>3</issue>
					<fpage>426</fpage>
					<lpage>440</lpage>
					<pub-id pub-id-type="doi">10.1111/j.1741-3729.2012.00710.x</pub-id>
				</element-citation>
			</ref>
			<ref id="B47">
				<mixed-citation>Pastor, Y., García-Jiménez, A., &amp; López-de-Ayala, M.-C. (2022). Estrategias de regulación de uso del smartphone y uso problemático de internet en la adolescencia [Regulatory strategies for smartphone use and problematic internet use in adolescence]. <italic>Anales de Psicología</italic>, <italic>38</italic>(2), 269-277. https://doi.org/10.6018/analesps.461771</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Pastor</surname>
							<given-names>Y.</given-names>
						</name>
						<name>
							<surname>García-Jiménez</surname>
							<given-names>A.</given-names>
						</name>
						<name>
							<surname>López-de-Ayala</surname>
							<given-names>M.-C.</given-names>
						</name>
					</person-group>
					<year>2022</year>
					<article-title>Estrategias de regulación de uso del smartphone y uso problemático de internet en la adolescencia [Regulatory strategies for smartphone use and problematic internet use in adolescence]</article-title>
					<source>Anales de Psicología</source>
					<volume>38</volume>
					<issue>2</issue>
					<fpage>269</fpage>
					<lpage>277</lpage>
					<pub-id pub-id-type="doi">10.6018/analesps.461771</pub-id>
				</element-citation>
			</ref>
			<ref id="B48">
				<mixed-citation>Pereira, S., Fillol, J., &amp; Moura, P. (2019). El aprendizaje de los jóvenes con medios digitales fuera de la escuela: De lo informal a lo formal [Young people learning from digital media outside of school: The informal meets the formal]. <italic>Comunicar</italic>, <italic>27</italic>(58), 41-50. https://doi.org/10.3916/C58-2019-04</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Pereira</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Fillol</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Moura</surname>
							<given-names>P.</given-names>
						</name>
					</person-group>
					<year>2019</year>
					<article-title>El aprendizaje de los jóvenes con medios digitales fuera de la escuela: De lo informal a lo formal [Young people learning from digital media outside of school: The informal meets the formal]</article-title>
					<source>Comunicar</source>
					<volume>27</volume>
					<issue>58</issue>
					<fpage>41</fpage>
					<lpage>50</lpage>
					<pub-id pub-id-type="doi">10.3916/C58-2019-04</pub-id>
				</element-citation>
			</ref>
			<ref id="B49">
				<mixed-citation>Reise, S., Mansolf, M., &amp; Haviland, M. (2023). Bifactor measurement models. In R. H. Hoyle (Eds.), <italic>Handbook of structural equation modeling</italic> (2nd ed., pp. 329-348). Guilford Press. </mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Reise</surname>
							<given-names>S.</given-names>
						</name>
						<name>
							<surname>Mansolf</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Haviland</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<year>2023</year>
					<chapter-title>Bifactor measurement models</chapter-title>
					<person-group person-group-type="editor">
						<name>
							<surname>Hoyle</surname>
							<given-names>R. H.</given-names>
						</name>
					</person-group>
					<source>Handbook of structural equation modeling</source>
					<edition>2nd ed</edition>
					<fpage>329</fpage>
					<lpage>348</lpage>
					<publisher-name>Guilford Press</publisher-name>
				</element-citation>
			</ref>
			<ref id="B50">
				<mixed-citation>Ribble, M. (2015). <italic>Digital citizenship in schools: Nine elements all students should know</italic> (3rd ed.). International Society for Technology in Education.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Ribble</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<year>2015</year>
					<source>Digital citizenship in schools: Nine elements all students should know</source>
					<edition>3rd ed.</edition>
					<publisher-name>International Society for Technology in Education</publisher-name>
				</element-citation>
			</ref>
			<ref id="B51">
				<mixed-citation>Ribble, M., &amp; Bailey, G. (2011). <italic>Digital citizenship in schools</italic>. International Society for Technology in Education.</mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Ribble</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Bailey</surname>
							<given-names>G.</given-names>
						</name>
					</person-group>
					<year>2011</year>
					<source>Digital citizenship in schools</source>
					<publisher-name>International Society for Technology in Education</publisher-name>
				</element-citation>
			</ref>
			<ref id="B52">
				<mixed-citation>Secretaría de Educación Pública (2022). <italic>Plan de estudios 2022</italic>. <italic>Educación básica</italic>. [2022 curriculum. Basic education]. <ext-link ext-link-type="uri" xlink:href="https://www.gob.mx/cms/uploads/attachment/file/792397/plan_de_estudio_para_la_educacion_preescolar_primaria_secundaria_2022.pdf">https://www.gob.mx/cms/uploads/attachment/file/792397/plan_de_estudio_para_la_educacion_preescolar_primaria_secundaria_2022.pdf</ext-link>
				</mixed-citation>
				<element-citation publication-type="report">
					<person-group person-group-type="author">
						<collab>Secretaría de Educación Pública</collab>
					</person-group>
					<year>2022</year>
					<source><italic>Plan de estudios 2022</italic>. <italic>Educación básica</italic>. [2022 curriculum. Basic education]</source>
					<ext-link ext-link-type="uri" xlink:href="https://www.gob.mx/cms/uploads/attachment/file/792397/plan_de_estudio_para_la_educacion_preescolar_primaria_secundaria_2022.pdf">https://www.gob.mx/cms/uploads/attachment/file/792397/plan_de_estudio_para_la_educacion_preescolar_primaria_secundaria_2022.pdf</ext-link>
				</element-citation>
			</ref>
			<ref id="B53">
				<mixed-citation>Shin, W., &amp; Kang, H. (2016). Adolescents’ privacy concerns and information disclosure online: The role of parents and the Internet. <italic>Computers in Human Behavior</italic>, <italic>54</italic>, 114-123. https://doi.org/10.1016/j.chb.2015.07.062</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Shin</surname>
							<given-names>W.</given-names>
						</name>
						<name>
							<surname>Kang</surname>
							<given-names>H.</given-names>
						</name>
					</person-group>
					<year>2016</year>
					<article-title>Adolescents’ privacy concerns and information disclosure online: The role of parents and the Internet</article-title>
					<source>Computers in Human Behavior</source>
					<volume>54</volume>
					<fpage>114</fpage>
					<lpage>123</lpage>
					<pub-id pub-id-type="doi">10.1016/j.chb.2015.07.062</pub-id>
				</element-citation>
			</ref>
			<ref id="B54">
				<mixed-citation>Skryabin, M., Zhang, J., Liu, L., &amp; Zhang, D. (2015). How the ICT development level and usage influence student achievement in reading, mathematics, and science. <italic>Computers &amp; Education</italic>, <italic>85</italic>, 49-58. https://doi.org/10.1016/j.compedu.2015.02.004 </mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Skryabin</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Zhang</surname>
							<given-names>J.</given-names>
						</name>
						<name>
							<surname>Liu</surname>
							<given-names>L.</given-names>
						</name>
						<name>
							<surname>Zhang</surname>
							<given-names>D.</given-names>
						</name>
					</person-group>
					<year>2015</year>
					<article-title>How the ICT development level and usage influence student achievement in reading, mathematics, and science</article-title>
					<source>Computers &amp; Education</source>
					<volume>85</volume>
					<fpage>49</fpage>
					<lpage>58</lpage>
					<pub-id pub-id-type="doi">10.1016/j.compedu.2015.02.004</pub-id>
				</element-citation>
			</ref>
			<ref id="B55">
				<mixed-citation>Smetana, J. G., Villalobos, M., Tasopoulus-Chan, M., Gettman, D. C., &amp; Campione-Barr, N. (2009). Early and middle adolescents' disclosure to parents about activities in different domains. <italic>Journal of Adolescence</italic>, <italic>32</italic>(3), 693-713. https://doi.org/10.1016/j.adolescence.2008.06.010</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Smetana</surname>
							<given-names>J. G.</given-names>
						</name>
						<name>
							<surname>Villalobos</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Tasopoulus-Chan</surname>
							<given-names>M.</given-names>
						</name>
						<name>
							<surname>Gettman</surname>
							<given-names>D. C.</given-names>
						</name>
						<name>
							<surname>Campione-Barr</surname>
							<given-names>N.</given-names>
						</name>
					</person-group>
					<year>2009</year>
					<article-title>Early and middle adolescents' disclosure to parents about activities in different domains</article-title>
					<source>Journal of Adolescence</source>
					<volume>32</volume>
					<issue>3</issue>
					<fpage>693</fpage>
					<lpage>713</lpage>
					<pub-id pub-id-type="doi">10.1016/j.adolescence.2008.06.010</pub-id>
				</element-citation>
			</ref>
			<ref id="B56">
				<mixed-citation>Son, D., &amp; Padilla-Walker, L. M. (2019). Whereabouts and secrets: A person-centered approach to emerging adults’ routine and self-disclosure to parents. <italic>Emerging Adulthood</italic>, 9(2), 145-157. https://doi.org/10.1177/2167696819842718</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Son</surname>
							<given-names>D.</given-names>
						</name>
						<name>
							<surname>Padilla-Walker</surname>
							<given-names>L. M.</given-names>
						</name>
					</person-group>
					<year>2019</year>
					<article-title>Whereabouts and secrets: A person-centered approach to emerging adults’ routine and self-disclosure to parents</article-title>
					<source>Emerging Adulthood</source>
					<volume>9</volume>
					<issue>2</issue>
					<fpage>145</fpage>
					<lpage>157</lpage>
					<pub-id pub-id-type="doi">10.1177/2167696819842718</pub-id>
				</element-citation>
			</ref>
			<ref id="B57">
				<mixed-citation>Steinfeld, N. (2021). Parental mediation of adolescent Internet use: Combining strategies to promote awareness, autonomy and self-regulation in preparing youth for life on the web. <italic>Education and Information Technologies</italic>, <italic>26</italic>, 1897-1920. https://doi.org/10.1007/s10639-020-10342-w</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Steinfeld</surname>
							<given-names>N.</given-names>
						</name>
					</person-group>
					<year>2021</year>
					<article-title>Parental mediation of adolescent Internet use: Combining strategies to promote awareness, autonomy and self-regulation in preparing youth for life on the web</article-title>
					<source>Education and Information Technologies</source>
					<volume>26</volume>
					<fpage>1897</fpage>
					<lpage>1920</lpage>
					<pub-id pub-id-type="doi">10.1007/s10639-020-10342-w</pub-id>
				</element-citation>
			</ref>
			<ref id="B58">
				<mixed-citation>Tifferet, S. (2019). Gender differences in privacy tendencies on social network sites: A meta-analysis. <italic>Computers in Human Behavior</italic>, <italic>93</italic>, 1-12. https://doi.org/10.1016/j.chb.2018.11.046</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Tifferet</surname>
							<given-names>S.</given-names>
						</name>
					</person-group>
					<year>2019</year>
					<article-title>Gender differences in privacy tendencies on social network sites: A meta-analysis</article-title>
					<source>Computers in Human Behavior</source>
					<volume>93</volume>
					<fpage>1</fpage>
					<lpage>12</lpage>
					<pub-id pub-id-type="doi">10.1016/j.chb.2018.11.046</pub-id>
				</element-citation>
			</ref>
			<ref id="B59">
				<mixed-citation>Vrieze, S. I. (2012). Model selection and psychological theory: A discussion of the differences between the Akaike information criterion (AIC) and the Bayesian information criterion (BIC). <italic>Psychological Methods</italic>, <italic>17</italic>(2), 228-243. https://doi.org/10.1037/a0027127</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Vrieze</surname>
							<given-names>S. I.</given-names>
						</name>
					</person-group>
					<year>2012</year>
					<article-title>Model selection and psychological theory: A discussion of the differences between the Akaike information criterion (AIC) and the Bayesian information criterion (BIC)</article-title>
					<source>Psychological Methods</source>
					<volume>17</volume>
					<issue>2</issue>
					<fpage>228</fpage>
					<lpage>243</lpage>
					<pub-id pub-id-type="doi">10.1037/a0027127</pub-id>
				</element-citation>
			</ref>
			<ref id="B60">
				<mixed-citation>Wang, X., &amp; Xing, W. (2018). Exploring the influence of parental involvement and socioeconomic status on teen digital citizenship: A path modeling approach. <italic>Educational Technology &amp; Society</italic>, <italic>21</italic>(1), 186-199. <ext-link ext-link-type="uri" xlink:href="https://www.jstor.org/stable/26273879">https://www.jstor.org/stable/26273879</ext-link>
				</mixed-citation>
				<element-citation publication-type="journal">
					<person-group person-group-type="author">
						<name>
							<surname>Wang</surname>
							<given-names>X.</given-names>
						</name>
						<name>
							<surname>Xing</surname>
							<given-names>W.</given-names>
						</name>
					</person-group>
					<year>2018</year>
					<article-title>Exploring the influence of parental involvement and socioeconomic status on teen digital citizenship: A path modeling approach</article-title>
					<source>Educational Technology &amp; Society</source>
					<volume>21</volume>
					<issue>1</issue>
					<fpage>186</fpage>
					<lpage>199</lpage>
					<ext-link ext-link-type="uri" xlink:href="https://www.jstor.org/stable/26273879">https://www.jstor.org/stable/26273879</ext-link>
				</element-citation>
			</ref>
			<ref id="B61">
				<mixed-citation>Widaman, K. F., &amp; Olivera-Aguilar, M. (2023). Investigating measurement invariance using confirmatory factorial analysis. In R. Hoyle (Ed.), <italic>Structural equation modeling</italic> (2nd ed., pp. 367-384). Guilford Press. </mixed-citation>
				<element-citation publication-type="book">
					<person-group person-group-type="author">
						<name>
							<surname>Widaman</surname>
							<given-names>K. F.</given-names>
						</name>
						<name>
							<surname>Olivera-Aguilar</surname>
							<given-names>M.</given-names>
						</name>
					</person-group>
					<year>2023</year>
					<chapter-title>Investigating measurement invariance using confirmatory factorial analysis</chapter-title>
					<person-group person-group-type="editor">
						<name>
							<surname>Hoyle</surname>
							<given-names>R.</given-names>
						</name>
					</person-group>
					<source>Structural equation modeling</source>
					<edition>2nd ed.</edition>
					<fpage>367</fpage>
					<lpage>384</lpage>
					<publisher-name>Guilford Press</publisher-name>
				</element-citation>
			</ref>
		</ref-list>
		<fn-group>
			<fn fn-type="other" id="fn1">
				<label>How to cite</label>
				<p><bold>:</bold> Peraza-Balderrama, J. N., Valdés-Cuervo, A. A., Parra-Pérez, L. G. y Urías-Murrieta, M. (2024). Multidimensional scale to assess digital security in adolescentes. <italic>Revista Electrónica de Investigación Educativa, 26,</italic> e06, 1-19. <ext-link ext-link-type="uri" xlink:href="https://doi.org/10.24320/redie.2024.26.e06.5992">https://doi.org/10.24320/redie.2024.26.e06.5992</ext-link>
				</p>
			</fn>
			<fn fn-type="supported-by" id="fn4">
				<label>Source of funding:</label>
				<p> Programa de Fortalecimiento a la Investigación (Profapi) del Instituto Tecnológico de Sonora.</p>
			</fn>
		</fn-group>
	</back>
</article>