1 오인수, "초등학생 온라인 괴롭힘의 실태 및 오프라인 괴롭힘과의 비교분석" 교육연구소 12 (12): 75-98, 2011
2 남상인 ; 권남희, "청소년 사이버 불링 가해에 영향을 미치는 변인 연구" 미래를 여는 청소년학회 10 (10): 23-43, 2013
3 신택수, "종단프로파일분석과 군집분석을 이용한 잠재집단연구: 성장혼합모형과 비교를 통하여" 한국교육평가학회 23 (23): 641-664, 2010
4 김범구 ; 조아미, "잠재계층분석(LCA)을 이용한 학업중단 청소년의 유형과 특성" 한국청소년정책연구원 24 (24): 5-31, 2013
5 조춘범 ; 이현, "잠재계층분석(LCA)을 이용한 청소년 사이버불링 피해자 유형과 특성" (사)한국청소년문화연구소 (61) : 125-148, 2020
6 홍명기, "사회학습이론을 적용한 대학생의 사이버불링에대한 연구: 현실친구와가상친구의 영향력에 대한 비교" 경기대학교 대학원 2018
7 오세연 ; 곽영길, "사이버 불링을 통한 학교폭력의 실태와 대응방안에 관한 연구" 한국치안행정학회 10 (10): 65-88, 2013
8 Kowalski, R. M, "Youth Internet Survey" Clemson University 2006
9 Ybarra, M. L, "Youth Engaging in Online Harassment:Associations with Caregiver-child Relationships, Internet Use, and Personal Characteristics" 27 (27): 319-336, 2004
10 Van Wilsem, J, "Worlds Tied Together? Online and Non-domestic Routine Activities and Their Impact on Digital and Traditional Threat Victimization" 8 (8): 115-127, 2011
1 오인수, "초등학생 온라인 괴롭힘의 실태 및 오프라인 괴롭힘과의 비교분석" 교육연구소 12 (12): 75-98, 2011
2 남상인 ; 권남희, "청소년 사이버 불링 가해에 영향을 미치는 변인 연구" 미래를 여는 청소년학회 10 (10): 23-43, 2013
3 신택수, "종단프로파일분석과 군집분석을 이용한 잠재집단연구: 성장혼합모형과 비교를 통하여" 한국교육평가학회 23 (23): 641-664, 2010
4 김범구 ; 조아미, "잠재계층분석(LCA)을 이용한 학업중단 청소년의 유형과 특성" 한국청소년정책연구원 24 (24): 5-31, 2013
5 조춘범 ; 이현, "잠재계층분석(LCA)을 이용한 청소년 사이버불링 피해자 유형과 특성" (사)한국청소년문화연구소 (61) : 125-148, 2020
6 홍명기, "사회학습이론을 적용한 대학생의 사이버불링에대한 연구: 현실친구와가상친구의 영향력에 대한 비교" 경기대학교 대학원 2018
7 오세연 ; 곽영길, "사이버 불링을 통한 학교폭력의 실태와 대응방안에 관한 연구" 한국치안행정학회 10 (10): 65-88, 2013
8 Kowalski, R. M, "Youth Internet Survey" Clemson University 2006
9 Ybarra, M. L, "Youth Engaging in Online Harassment:Associations with Caregiver-child Relationships, Internet Use, and Personal Characteristics" 27 (27): 319-336, 2004
10 Van Wilsem, J, "Worlds Tied Together? Online and Non-domestic Routine Activities and Their Impact on Digital and Traditional Threat Victimization" 8 (8): 115-127, 2011
11 Hindelang, M. J, "Victims of Personal Crime: An Empirical Foundation for a Theory of Personal Victimization" Ballinger 1978
12 Fisher, B. S, "Unsafe in the Ivory Tower: The Sexual Victimization of College Women" Sage Publications 2009
13 Henson, B, "The Wiley Handbook on the Psychology of Violence" 555-570, 2016
14 Hasking, P. A, "The Three Latent Classes of Adolescent Delinquency and the Risk Factors for Membership in each Class" 37 (37): 19-35, 2011
15 Khoury-Kassabri, M, "The Relationship between StaffMaltreatment of Students and Students’ Violent Behavior" 33 : 914-923, 2009
16 Aizenkot, D, "The Predictability of Routine Activity Theory for Cyberbullying Victimization among Children and Youth:Risk and Protective Factors" 36 (36): NP8498-NP8519, 2021
17 Kaminski, R. J, "The Impacts of the Virginia Tech and Northern Illinois University Shootings on Fear of Crime on Campus" 38 (38): 88-98, 2010
18 Cohen, L. E, "Social Change and Crime Rate Trends: A Routine Activity Approach" 588-608, 1979
19 Mishna, F, "Risk Factors for Involvement in Cyber Bullying: Victims, Bullies and Bully-victims" 34 : 63-70, 2012
20 Tseloni, A, "Repeat Personal Victimization. “Boosts” or “flags”?" 43 (43): 196-212, 2003
21 Long, J. S, "Regression Models for Categorical Dependent Variables Using Stata (Vol. 7)" Stata Press 2006
22 Bossler, A. M, "Predicting Online Harassment Victimization among a Juvenile Population" 44 (44): 500-523, 2012
23 Reyns, B. W, "Online Routines and Identity Theft Victimization: Further Expanding Routine Activity Theory Beyond Direct-contact Offenses" 50 (50): 216-238, 2013
24 Mishna, F, "Ongoing and Online: Children and Youth’s Perceptions of Cyber Bullying" 31 (31): 1222-1228, 2009
25 "National Crime Prevention Council"
26 Higgins, G. E, "Low Self-control and Social Learning in Understanding Students'Intentions to Pirate Movies in the United States" 25 (25): 339-357, 2007
27 Garrett, E. S, "Latent Class Model Diagnosis" 56 (56): 1055-1067, 2000
28 Marcum, C. D, "Juveniles and Cyber Stalking in the United States: An Analysis of Theoretical Predictors of Patterns of Online Perpetration" 8 (8): 2014
29 Raskauskas, J, "Involvement in Traditional and Electronic Bullying among Adolescents" 43 (43): 564-575, 2007
30 Navarro, J. N, "Going Cyber: Using Routine Activities Theory to Predict Cyberbullying Experiences" 32 (32): 81-94, 2012
31 Juvonen, J, "Extending the School Grounds?: Bullying Experiences in Cyberspace" 78 (78): 496-506, 2008
32 Akdemir, N, "Exploring the Human Factor in Cyberenabled and Cyber-dependent Crime Victimisation: A Lifestyle Routine Activities approach" Internet Research 2020
33 Li, C. K, "Examining the Mediating Effects of Social Learning on the Low Self-control—Cyberbullying Relationship in a Youth Sample" 37 (37): 126-138, 2016
34 Holt, T. J, "Examining the Applicability of Lifestyleroutine Activities Theory for Cybercrime Victimization" 30 (30): 1-25, 2008
35 Kowalski, R. M, "Electronic Bullying among Middle School Students" 41 (41): S22-S30, 2007
36 Jang, H, "Does the Offline Bully-victimization Influence Cyberbullying Behavior among Youths? Application of General Strain Theory" 31 : 85-93, 2014
37 Wolak, J, "Does Online Harassment Constitute Bullying? An Exploration of Online Harassment by Known Peers and Online-only Contacts" 41 : 51-58, 2007
38 Zhang, L, "Deviant Lifestyle and Crime Victimization" 29 (29): 133-143, 2001
39 Li, X, "Cybersecurity as a Relative Concept" 18 : 11-24, 2006
40 Ngo, F. T, "Cybercrime Victimization: An Examination of Individual and Situational Level Factors" 5 (5): 773-, 2011
41 Smith, P. K, "Cyberbullying: Its Nature and Impact in Secondary School Pupils" 49 (49): 376-385, 2008
42 Kowalski, R. M, "Cyberbullying: Bullying in the Digital Age" John Wiley & Sons 2012
43 Hinduja, S, "Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization" 29 (29): 129-156, 2008
44 Routledge. Faucher, C, "Cyberbullying among University Students: Gendered Experiences, Impacts, and Perspectives" 2014
45 Whittaker, E, "Cyberbullying Via Social Media" 14 (14): 11-29, 2015
46 Wang, J, "Cyber and Traditional Bullying:Differential Association with Depression" 48 (48): 415-417, 2011
47 National Information Society Agency, "Cyber Violence Survey" 2020
48 Akers, R. L, "Criminological Theories:Introduction, Evaluation and Application" Oxford University Press 2017
49 Cornish, D. B, "Crime Opportunity Theories" 197-211, 2017
50 Pellegrini, A. D, "Bullies and Victims in School: A Review and Call for Research" 19 : 165-176, 1998
51 Reyns, B. W, "Being Pursued Online: Applying Cyberlifestyle‐Routine Activities Theory to Cyberstalking Victimization" 38 : 1149-1169, 2011
52 Kritsotakis, G, "Associations of Bullying and Cyberbullying with Substance Use and Sexual Risk Taking in Young Adults" 49 (49): 360-370, 2017
53 Bauman, S, "Associations among Bullying, Cyberbullying, and Suicide in High School Students" 36 (36): 341-350, 2013
54 Sengupta, A, "Are Social Networking Sites a Source of Online Harassment for Teens? Evidence from Survey Data" 33 : 284-290, 2011
55 Singer, J, "Applied Longitudinal Data Analysis" Oxford University Press 2003
56 Akaike, H, "A New Look at the Statistical Model Identification" 19 (19): 716-723, 1974
57 Kokkinos, C. M, "A Lifestyle Exposure Perspective of Victimization through Facebook among University Students. Do Individual Differences Matter?" 74 : 235-245, 2017
58 Dayhoff, M, "22 a Model of Evolutionary Change in Proteins" 5 : 345-352, 1978