{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T11:21:42Z","timestamp":1771327302158,"version":"3.50.1"},"reference-count":69,"publisher":"Informa UK Limited","issue":"5","funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Foundation for Science and Technology","doi-asserted-by":"publisher","award":["SFRH\/BPD\/110695\/2015"],"award-info":[{"award-number":["SFRH\/BPD\/110695\/2015"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Foundation for Science and Technology","doi-asserted-by":"publisher","award":["PTDC\/MHC-PED\/3297\/20\u200b14"],"award-info":[{"award-number":["PTDC\/MHC-PED\/3297\/20\u200b14"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2020,5,3]]},"DOI":"10.1080\/0144929x.2019.1602671","type":"journal-article","created":{"date-parts":[[2019,4,5]],"date-time":"2019-04-05T07:00:46Z","timestamp":1554447646000},"page":"511-524","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":37,"title":["Responsive bystander behaviour in cyberbullying: a path through self-efficacy"],"prefix":"10.1080","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8679-4566","authenticated-orcid":false,"given":"P. C.","family":"Ferreira","sequence":"first","affiliation":[{"name":"Faculty of Psychology, University of Lisbon, Lisbon, Portugal"},{"name":"CICPSI \u2013 Faculty of Psychology, University of Lisbon, Lisbon, Portugal"},{"name":"Portuguese Foundation for Science and Technology, Lisbon, Portugal"},{"name":"Instituto Superior T\u00e9cnico, INESC-ID, GAIPS, Porto Salvo, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3652-5573","authenticated-orcid":false,"given":"A. M. Veiga","family":"Sim\u00e3o","sequence":"additional","affiliation":[{"name":"Faculty of Psychology, University of Lisbon, Lisbon, Portugal"},{"name":"CICPSI \u2013 Faculty of Psychology, University of Lisbon, Lisbon, Portugal"}]},{"given":"A.","family":"Paiva","sequence":"additional","affiliation":[{"name":"Instituto Superior T\u00e9cnico, INESC-ID, GAIPS, Porto Salvo, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8280-1623","authenticated-orcid":false,"given":"A.","family":"Ferreira","sequence":"additional","affiliation":[{"name":"Department of Human Resources and Organizational Behavior, ISCTE-Instituto Universit\u00e1rio de Lisboa, Lisbon, Portugal"}]}],"member":"301","published-online":{"date-parts":[[2019,4,5]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.2307\/1166156"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2016.03.026"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1080\/10410236.2011.527618"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.2.191"},{"key":"CIT0005","volume-title":"Social Foundations of Thought and Action: A Social Cognitive Theory","author":"Bandura A.","year":"1986"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1177\/031289628801300210"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1111\/sode.12134"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2014.983979"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2012.11.022"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1093\/scan\/nsr099"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1177\/1948550616639650"},{"key":"CIT0012","volume-title":"Applying the Rasch Model","author":"Bond T. G.","year":"2007"},{"key":"CIT0013","volume-title":"It\u2019s Complicated: The Social Lives of Networked Teens","author":"Boyd D.","year":"2014"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1207\/s15327906mbr2404_4"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1007\/7854_2013_261"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1007\/s11199-008-9581-5"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1177\/0272431602239132"},{"key":"CIT0018","first-page":"151","volume-title":"Advances in Psychology Research, Volume II","author":"Carlo G.","year":"2001"},{"key":"CIT0019","first-page":"3","volume-title":"Caring Classrooms\/Intelligent Schools: The Social Emotional Education of Young Children","author":"Cohen J.","year":"2001"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.2307\/1131875"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1037\/h0025589"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.051"},{"key":"CIT0023","first-page":"58","volume":"181","author":"DeSmet A.","year":"2012","journal-title":"Studies in Health Technology and Informatics"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2013.0027"},{"key":"CIT0025","volume-title":"Poster session presented at the 2014 Annual National Communication Association Conference","author":"Dillon K.","year":"2014"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.12.009"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1037\/0021-843X.106.1.37"},{"key":"CIT0028","first-page":"701","volume-title":"Handbook of Child Psychology \u2013 Social, Emotional, and Personality Development","author":"Eisenberg N.","year":"1998"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1016\/j.lindif.2016.03.003"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1177\/0272431699019001001"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1080\/20445911.2011.584692"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.2466\/03.04.PR0.111.5.585-609"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.02.059"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1037\/a0023304"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0167.45.1.30"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.10.045"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198718765.003.0005"},{"issue":"2","key":"CIT0038","volume":"4","author":"Gradinger P.","year":"2010","journal-title":"Cyberpsychology: Journal of Psychosocial Research on Cyberspace"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1027\/1016-9040.11.2.90"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"CIT0041","first-page":"275","volume-title":"Handbook of Moral Behaviour and Development","author":"Hoffman M. L.","year":"1991"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6494.2009.00610.x"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1111\/cdev.12757"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1177\/0013164411422903"},{"key":"CIT0045","volume-title":"The Unresponsive Bystander: Why Doesn\u2019t he Help?","author":"Latan\u00e9 B.","year":"1970"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.4135\/9781452243740.n2"},{"issue":"1","key":"CIT0047","doi-asserted-by":"crossref","first-page":"81","DOI":"10.57087\/edupsykhe.v7i1.3806","volume":"7","author":"L\u00f3pez del Pino C.","year":"2008","journal-title":"EduPsykh\u00e9. Revista de Psicolog\u00eda y Educaci\u00f3n"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1002\/casp.2135"},{"key":"CIT0049","unstructured":"Mar\u00f4co, J. 2010.Structural Equation Analyses: Theoretical foundations, Software and Applications [An\u00e1lise de Equa\u00e7\u00f5es Estruturais: Fundamentos te\u00f3ricos, Software and Aplica\u00e7\u00f5es].Report Number Lda.: P\u00earo Pinheiro. ISBN: 978-989-96763-1-2."},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1037\/a0037521"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8624.00086"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2014.03.003"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1177\/0886260515585531"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1007\/s10979-005-4930-1"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1027\/\/1015-5759.17.2.87"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1016\/j.avb.2015.05.013"},{"key":"CIT0057","author":"Patterson L.","year":"2016","journal-title":"Journal of School Violence"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.3758\/BRM.40.3.879"},{"key":"CIT0059","volume-title":"Probabilistic Models for Some Intelligence and Attainment Tests","author":"Rasch G.","year":"1980"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1080\/10705519909540135"},{"key":"CIT0061","volume-title":"The Growth of Interpersonal Understanding: Developmental and Clinical Analyses","author":"Selman R. L.","year":"1980"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9507.2009.00566.x"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1016\/j.adolescence.2017.04.009"},{"issue":"3","key":"CIT0064","first-page":"281","volume":"2","author":"Smith E. V.","year":"2001","journal-title":"Journal of Applied Measurement"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyt.2010.00021"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1007\/s10802-006-9084-1"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.014"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.2307\/1127947"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.1016\/j.jadohealth.2011.12.031"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2019.1602671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T12:06:32Z","timestamp":1694779592000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2019.1602671"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,5]]},"references-count":69,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,5,3]]}},"alternative-id":["10.1080\/0144929X.2019.1602671"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2019.1602671","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,5]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2017-11-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-03-26","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-04-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}