<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD with MathML3 v1.2 20190208//EN" "JATS-archivearticle1-mathml3.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article"><?properties manuscript?><front><journal-meta><journal-id journal-id-type="nlm-journal-id">9431219</journal-id><journal-id journal-id-type="pubmed-jr-id">20737</journal-id><journal-id journal-id-type="nlm-ta">Assessment</journal-id><journal-id journal-id-type="iso-abbrev">Assessment</journal-id><journal-title-group><journal-title>Assessment</journal-title></journal-title-group><issn pub-type="ppub">1073-1911</issn><issn pub-type="epub">1552-3489</issn></journal-meta><article-meta><article-id pub-id-type="pmid">30071749</article-id><article-id pub-id-type="pmc">6584058</article-id><article-id pub-id-type="doi">10.1177/1073191118792089</article-id><article-id pub-id-type="manuscript">HHSPA1026850</article-id><article-categories><subj-group subj-group-type="heading"><subject>Article</subject></subj-group></article-categories><title-group><article-title>Assessment of In-Person and Cyber Aggression and Victimization, Substance Use, and Delinquent Behavior During Early Adolescence</article-title></title-group><contrib-group><contrib contrib-type="author"><name><surname>Farrell</surname><given-names>Albert D.</given-names></name><aff id="A1">Virginia Commonwealth University</aff></contrib><contrib contrib-type="author"><name><surname>Thompson</surname><given-names>Erin L.</given-names></name><aff id="A2">Virginia Commonwealth University</aff></contrib><contrib contrib-type="author"><name><surname>Mehari</surname><given-names>Krista</given-names></name><aff id="A3">University of South Alabama</aff></contrib><contrib contrib-type="author"><name><surname>Sullivan</surname><given-names>Terri N.</given-names></name><aff id="A4">Virginia Commonwealth University</aff></contrib><contrib contrib-type="author"><name><surname>Goncy</surname><given-names>Elizabeth A.</given-names></name><aff id="A5">Cleveland State University</aff></contrib></contrib-group><author-notes><corresp id="CR1">Correspondence concerning this article should be addressed to Albert D. Farrell, Department of Psychology, Virginia Commonwealth University, Box 842018, Richmond, VA 23284-2018. <email>afarrell@vcu.edu</email>.</corresp></author-notes><pub-date pub-type="nihms-submitted"><day>3</day><month>5</month><year>2019</year></pub-date><pub-date pub-type="epub"><day>03</day><month>8</month><year>2018</year></pub-date><pub-date pub-type="ppub"><month>9</month><year>2020</year></pub-date><pub-date pub-type="pmc-release"><day>01</day><month>9</month><year>2021</year></pub-date><volume>27</volume><issue>6</issue><fpage>1213</fpage><lpage>1229</lpage><!--elocation-id from pubmed: 10.1177/1073191118792089--><abstract id="ABS1"><p id="P1">This study evaluated the Problem Behavior Frequency Scale &#x02013; Adolescent Report (PBFS- AR), a measure designed to assess adolescents&#x02019; frequency of victimization, aggression, substance use, and delinquent behavior. Participants were 1,263 students (50% female; 78% African American, 18% Latino) from three urban middle schools in the United States. Confirmatory factor analyses of competing models of the structure of the PBFS-AR supported a model that differentiated among three forms of aggression (in-person physical, in-person relational, and cyber), two forms of victimization (in-person and cyber), substance use, and delinquent behavior. This seven-factor model fit the data well and demonstrated strong measurement invariance across groups that differed on sex and grade. Support was found for concurrent validity of the PBFS-AR based on its pattern of relations with school office discipline referrals.</p></abstract><kwd-group><kwd>Aggression</kwd><kwd>Victimization</kwd><kwd>Cyber Aggression and Victimization</kwd><kwd>Problem Behaviors</kwd><kwd>School Office Referrals</kwd><kwd>Adolescence</kwd><kwd>Measurement Invariance</kwd></kwd-group></article-meta></front><body><p id="P2">Researchers have used a variety of approaches to assess adolescents&#x02019; frequency of victimization, aggression, and other problem behaviors. These have included self-report, parent ratings, teacher ratings, archival data such as school office discipline referrals, and direct observations (e.g., <xref rid="R9" ref-type="bibr">Dahlberg, Toal, Swahn, &#x00026; Behrens, 2005</xref>). Studies examining relations across different methods of assessing these constructs have generally found low to moderate agreement (e.g., <xref rid="R50" ref-type="bibr">Youngstrom, Loeber, &#x00026; Stouthamer-Loeber, 2000</xref>). This may reflect the different sources of bias inherent in each approach (e.g., self-report, rater biases, reactivity of observational measures), and differences in the context of observation. For example, whereas adolescent-report measures typically assess behavior and experiences across multiple contexts, ratings by teachers and office discipline referrals are limited to behavior in school settings in situations where teachers and school staff observe students. In light of these differences, it is unlikely that any single approach can provide a complete picture of adolescents&#x02019; behavior. This highlights the need for well-developed measures to capture each of these perspectives (<xref rid="R10" ref-type="bibr">De Los Reyes &#x00026; Kazdin, 2005</xref>). This is particularly true for self-report measures, as they represent the most commonly used method to assess adolescents&#x02019; aggression and victimization experiences (<xref rid="R17" ref-type="bibr">Furlong, Sharkey, Felix, Tanigawa, &#x00026; Green, 2010</xref>). There is also a need for measures that adequately assess multiple forms of problem behavior and victimization. The goal of this study was to evaluate a self-report measure designed to assess middle school students&#x02019; victimization experiences and their frequency of engaging in aggression, substance use, and other forms of delinquent behavior by examining its structure and its relation to school office discipline referrals.</p><p id="P3">A key issue in the study of both aggression and victimization is their underlying structure and their relations to other forms of problem behavior. Early studies viewed aggression as part of a broad constellation of adolescents&#x02019; problem behaviors and developed broad measures of problem behavior or externalizing behavior (cf. <xref rid="R22" ref-type="bibr">Jessor, 2014</xref>). More recently, researchers have viewed aggression as a distinct construct (e.g., <xref rid="R14" ref-type="bibr">Farrell, Kung, White, &#x00026; Valois, 2000</xref>). This has led to the development of measures that assess specific forms of aggression and victimization (<xref rid="R5" ref-type="bibr">Card, Stucky, Sawalani, &#x00026; Little, 2008</xref>). Although there is some consensus that aggression is a multi-dimensional construct, there is less agreement about its underlying structure. For example, some researchers have differentiated between direct forms that encompass physical (e.g., hitting, or attacking with a weapon) and verbal acts (e.g., name-calling) versus indirect forms such as spreading rumors or gossip that do not involve directly confronting the victim (e.g., <xref rid="R5" ref-type="bibr">Card et al., 2008</xref>). Others (e.g., <xref rid="R18" ref-type="bibr">Galen &#x00026; Underwood, 1997</xref>) have drawn a distinction based on the intent of the aggressor. Within this framework physical aggression represents acts or threats that result in physical harm or injury. This differs from social or relational aggression, which represent acts intended to harm the victim&#x02019;s relationships or social status.</p><p id="P4">This raises interesting questions about the relation between specific forms of aggression and externalizing behaviors such as conduct problems, delinquent behavior and substance use. Whereas physical aggression is considered a form of externalizing behavior, non-physical acts such as verbal aggression and relational aggression might be considered more normative and may consequently be less strongly related to externalizing behaviors. This is supported by <xref rid="R15" ref-type="bibr">Farrell et al. (2016)</xref> who found that compared with relational and verbal aggression, adolescent ratings of their frequency of physical aggression were more highly correlated with teacher ratings of conduct problems, and with adolescent reports of their substance use and delinquent behavior. A meta-analysis by <xref rid="R5" ref-type="bibr">Card et al., (2008)</xref> also found stronger relations with both self-report and teacher ratings of delinquency and conduct problems for direct aggression (i.e., physical and verbal) than for relational aggression. This highlights the importance of determining where specific forms of aggression fit within the context of externalizing or problem behavior.</p><p id="P5">Researchers have similarly failed to reach a consensus regarding the structure of victimization. Some studies have found support for differentiating among multiple forms of victimization experienced by adolescents (e.g., <xref rid="R3" ref-type="bibr">Bradshaw, Waasdorp, &#x00026; Johnson, 2015</xref>). Others have found that form may be less important than frequency (<xref rid="R36" ref-type="bibr">Nylund, Bellmore, Nishina, &#x00026; Graham, 2007</xref>). Perhaps the least consistency has been in the treatment of verbal forms of victimization such as teasing and name-calling. Some studies have found support for combining verbal and physical victimization into an Overt Victimization factor (e.g., <xref rid="R15" ref-type="bibr">Farrell, Sullivan, Goncy &#x00026; Le, 2016</xref>; <xref rid="R41" ref-type="bibr">Rosen, Beron, &#x00026; Underwood, 2013</xref>). Others have found support for combining verbal and relational victimization into a Nonphysical Victimization factor (e.g., <xref rid="R21" ref-type="bibr">Hunt, Peters, &#x00026; Rapee, 2012</xref>). Still others have regarded verbal victimization as a distinct construct (<xref rid="R27" ref-type="bibr">Marsh et al., 2011</xref>). Determining the structure of aggression and victimization, establishing their relations to substance use and other forms of delinquent behavior, and developing measures that best reflect this structure is critical to advancing theory and guiding future research.</p><p id="P6">The need for better measures of aggression and victimization that are consistent with current theories is particularly evident in the burgeoning research on cyber aggression and victimization (<xref rid="R31" ref-type="bibr">Mehari, Farrell, &#x00026; Le, 2014</xref>). There are major limitations with current measures of cyber aggression (also called cyberbullying) and cyber victimization. Most research has measured cyber aggression and victimization as constructs distinct from in-person aggression and victimization (for a review and meta-analysis see <xref rid="R24" ref-type="bibr">Kowalski, Giumetti, Schroeder, &#x00026; Lattanner, 2014</xref>). Much of this work is based on the underlying assumption that aggression and victimization experiences via electronic communication technologies are qualitatively different from those that occur in-person (<xref rid="R31" ref-type="bibr">Mehari et al., 2014</xref>; <xref rid="R45" ref-type="bibr">Tokunaga, 2010</xref>). However, few studies have empirically evaluated this assumption by testing competing models of in-person and cyber aggression and victimization (see <xref rid="R25" ref-type="bibr">Landoll, La Greca, Lai, Chan, &#x00026; Herge, 2015</xref>; and <xref rid="R30" ref-type="bibr">Mehari &#x00026; Farrell, 2018</xref> for exceptions). Moreover, much of the prior research has relied on single-item measures or on multi-item measures that ask about the type of media (e.g., text messages or emails, cell phones or computers), but do not address the specific behaviors (e.g., posting embarrassing pictures, excluding another adolescent; <xref rid="R42" ref-type="bibr">Salmivalli, Sainio, &#x00026; Hodges, 2013</xref>; <xref rid="R48" ref-type="bibr">Wang, Iannotti, &#x00026; Nansel, 2009</xref>). These measures do not address the need for measures of cyber aggression and victimization that are as comprehensive as those assessing in-person victimization (<xref rid="R32" ref-type="bibr">Menesini, 2012</xref>).</p><sec disp-level="2" id="S2"><title>The Problem Behavior Frequency Scale &#x02013; Adolescent Report (PBFS-AR)</title><p id="P7">The Problem Behavior Frequency Scale-Adolescent Report form (PBFS-AR; <xref rid="R15" ref-type="bibr">Farrell et al., 2016</xref>) is a self-report measure designed to assess adolescents&#x02019; frequency of victimization, aggression and other problem behaviors. The PBFS-AR has several advantages over other self-report measures of adolescents&#x02019; aggression and victimization. It addresses multiple forms of both in-person and cyber aggression and victimization (i.e., physical, verbal, and relational), substance use, and delinquent behavior. This provides a basis for examining the relations among these constructs and assessing multiple outcomes. It specifies the time frame (i.e., past 30 days) using an operationally-defined 6-point frequency scale (e.g., <italic>Never</italic>, <italic>1&#x02013;2 times</italic>, <italic>3&#x02013;5 times</italic>), which provides a clear basis for assessing change over time. It also focuses on specific behaviors, which may be more clearly interpreted than items that assess intent (e.g., &#x0201c;When someone hurts me, I end up getting into a fight,&#x0201d; &#x0201c;I am deliberately cruel to others, even if they haven&#x02019;t done anything to me&#x0201d;; <xref rid="R26" ref-type="bibr">Marsee et al., 2011</xref>) or general dispositions (e.g., &#x0201c;I am the kind of person who often fights with others&#x0201d;; Little et al., 2003).</p><p id="P8"><xref rid="R15" ref-type="bibr">Farrell et al. (2016)</xref> evaluated an earlier version of the PBFS-AR that did not include items assessing cyber aggression or victimization using data from 5,532 adolescents from 37 schools in four states. Their confirmatory factor analyses of competing models found support for seven factors. These represented three forms of aggression (physical, verbal, and relational), two forms of victimization (overt and relational), substance use, and other delinquent behavior. They also found evidence of strong measurement invariance (i.e., scalar invariance) such that the structure, factor loadings, and thresholds of items did not differ across sex, geographic locations, or grades. Their analyses of correlations among the seven factors provided clearer evidence for representing physical and relational aggression as distinct factors (<italic>r</italic> = .74) than for verbal aggression, which was highly correlated with the Physical Aggression and Relational Aggression factors (<italic>r</italic>s = .89 and .82, respectively).</p><p id="P9"><xref rid="R15" ref-type="bibr">Farrell et al. (2016)</xref> evaluated the concurrent validity of the PBFS-AR based on its correlations with teacher ratings on the Behavioral Assessment System for Children (BASC-2; <xref rid="R40" ref-type="bibr">Reynolds &#x00026; Kamphaus, 2004</xref>) and with adolescent reports on measures of other relevant constructs. The PBFS-AR Physical Aggression, Delinquent Behavior, and Substance Use factors were positively correlated with teachers&#x02019; ratings on the BASC Aggression (<italic>r</italic>s = .20 to .24) and Conduct Problems (<italic>r</italic>s <italic>=</italic> .23 to .26) scales and were negatively correlated with the BASC Adaptive Behavior scale (<italic>r</italic>s <italic>=</italic> &#x02212;.26 to &#x02212;.22). Whereas the PBFS-AR Verbal Aggression factor was also significantly correlated with the BASC Aggression scale (<italic>r</italic> = .24), it was not as strongly related to the BASC Conduct Problems or Adaptive Behavior scales. These correlations were all smaller for the PBFS-AR Relational Aggression factor (<italic>r</italic>s = .14 to .16 in absolute value). As predicted, the PBFS-AR Overt Victimization and Relational Victimization factors had small, but significant correlations with the BASC Depression scale (<italic>r</italic>s <italic>=</italic> .12 and .17, respectively). Scales on the PBFS-AR also showed the expected pattern of correlations with adolescent reports on measures of related constructs. The PBFS-AR Physical Aggression, Delinquent Behavior, and Substance Use factors were positively correlated with delinquent peer associations (<italic>r</italic>s = .48 to .50), and with measures of norms and beliefs supporting aggression (<italic>r</italic>s = .32 to .47). These correlations were generally smaller for the PBFS-AR Relational Aggression (<italic>r</italic>s = .30 to .41) and Verbal Aggression factors (<italic>r</italic>s = .32 to .42). Correlations for the two PBFS-AR victimization factors were considerably lower (<italic>r</italic>s = &#x02212;.05 to .28).</p></sec><sec disp-level="2" id="S3"><title>The Present Study</title><p id="P10">The present study evaluated a revised version of the PBFS-AR (Version 2) administered to a large, predominantly African American sample of middle school students. Revisions included adding some additional items to assess in-person verbal aggression, in-person physical victimization, and in-person verbal victimization, and substance use. A major revision was expanding the measure to include items representing cyber forms of both aggression and victimization. This study had several objectives. The first was to compare competing models of the structure of victimization, aggression, and other problem behaviors based on this expanded pool of items. We hypothesized that support would be found for factors representing specific forms of aggression and victimization, and factors representing substance use and delinquent behavior. Based on the <xref rid="R15" ref-type="bibr">Farrell et al. (2016)</xref> study we expected to find support for factors representing physical, verbal, and relational forms of in-person aggression. Although Farrell et al. found support for two victimization factors (overt and relational), their study included only one item representing verbal victimization. We anticipated that our inclusion of additional verbal victimization items would result in three distinct in-person victimization factors (physical, verbal, and relational). We further hypothesized that cyber and in-person forms of both aggression and victimization would represent distinct factors based on previous studies and on the qualitative differences between interactions via electronic communication technologies and in person interactions (<xref rid="R25" ref-type="bibr">Landoll et al., 2015</xref>; <xref rid="R31" ref-type="bibr">Mehari et al., 2014</xref>; <xref rid="R30" ref-type="bibr">Mehari &#x00026; Farrell, 2018</xref>). However, we were less certain whether cyber aggression and victimization items would be best represented by single aggression and victimization factors, or by factors that paralleled their in-person counterparts (i.e., physical, verbal and relational forms of cyber aggression and victimization).</p><p id="P11">A second objective was to test for measurement invariance. There has been increasing recognition of the need to establish measurement invariance, or the degree to which measurement properties are consistent across individuals, contexts, and over time (<xref rid="R41" ref-type="bibr">Rosen et al., 2013</xref>). Despite its importance, few attempts have been made to evaluate the measurement invariance of measures assessing constructs such as aggression, victimization and problem behaviors (e.g., <xref rid="R15" ref-type="bibr">Farrell et al., 2016</xref>; <xref rid="R26" ref-type="bibr">Marsee et al., 2011</xref>; <xref rid="R39" ref-type="bibr">Queir&#x000f3;s &#x00026; Vagos, 2016</xref>; <xref rid="R41" ref-type="bibr">Rosen et al., 2013</xref>). Based on analyses of the earlier version of the PBFS-AR by <xref rid="R15" ref-type="bibr">Farrell et al. (2016)</xref>, we hypothesized that there would be strong measurement invariance across sex and grade.</p><p id="P12">Finally, we evaluated the concurrent validity of the PBFS-AR by examining its relation to school office discipline referrals. Prior work has supported the use of school office discipline referrals to validate teacher and parent report measures of student behavior (for a review, see <xref rid="R28" ref-type="bibr">McIntosh, Fisher, Kennedy, Craft, &#x00026; Morrison, 2012</xref>). We hypothesized that students who had office discipline referrals for physical aggression would have higher scores on the PBFS-AR Physical Aggression factor than those without such referrals, and that students with office discipline referrals for disruptive behavior and those with out-of-school suspensions would have higher scores on each of the problem behavior factors compared with those that did not. We did not expect to find relations between office discipline referrals and suspensions and victimization factors.</p></sec><sec id="S4"><title>Method</title><sec id="S5"><title>Participants and Setting</title><p id="P13">We conducted secondary analysis of data from students at three middle schools in the southeastern United States who participated in a project (<xref rid="R16" ref-type="bibr">Farrell, Sullivan, Sutherland, Corona, &#x00026; Masho, 2018</xref>) that evaluated the Olweus Bullying Prevention Program (e.g., <xref rid="R37" ref-type="bibr">Olweus &#x00026; Limber, 2010</xref>). The majority of students in these schools (i.e., 74% to 85%) were eligible for the federal free lunch program. Participants were recruited from a random sample of students from each school&#x02019;s roster. Parental consent and student assent were obtained from 80% of those eligible. Participants continued in the study until they left the school or chose to discontinue participation. Each year a new sample of entering sixth graders was recruited, and seventh and eighth graders were recruited to replace students who left the study. The project collected data every 3 months using a planned missing-data design (<xref rid="R19" ref-type="bibr">Graham, Taylor, &#x00026; Cumsille, 2001</xref>) such that each student was randomly assigned to complete measures at two waves each year to reduce participant fatigue and testing effects. The study was approved by the IRB of the authors&#x02019; university.</p><p id="P14">We conducted our analyses on 3,261 observations collected from the 1,263 students who completed measures at one or more waves during three years of the project (i.e., 2014 to 2017), during which this revised version of the PBFS-AR was administered. The Olweus intervention was implemented in two of the schools during the 2014&#x02013;2015 school year and in all three schools during the following two school years. The sample was 50% female. Eighteen percent of participants identified themselves as Hispanic or Latino. The majority (78%) reported their race as African American or Black, including 9% who endorsed more than one race. Five percent described themselves as White. Thirteen percent described their race as <italic>Other</italic>, the majority of whom (90%) identified themselves as Hispanic or Latino. Regarding family structure, 38% lived with a single mother, 28% with both biological parents, and 20% with a parent and stepparent. Participants&#x02019; ages ranged from 10 to 16, with 96% of observations collected from students between 11 and 14 years old.</p><p id="P15">We obtained school records on office discipline referrals for the 2014&#x02013;2015 and 2015&#x02013;2016 school years for each participant. Because office referrals reflected behavior during the school year, we generated a separate dataset for analyses of office discipline referrals that included one wave of data for each participant randomly selected from the three waves collected during the school year. This provided a subsample of 957 students for analyses of relations with disciplinary data.</p></sec><sec id="S6"><title>Measures</title><sec id="S7"><title>Problem Behavior Frequency Scale &#x02013; Adolescent Report (PBFS-AR), Version 2.</title><p id="P16">We used a revised version of the PBFS-AR that expanded the content of the previous version of the scale (<xref rid="R15" ref-type="bibr">Farrell et al., 2016</xref>). Items on the previous version were based on prior research (e.g., <xref rid="R8" ref-type="bibr">Crick &#x00026; Grotpeter, 1995</xref>), the Center for Disease Control&#x02019;s Youth Risk Survey (<xref rid="R23" ref-type="bibr">Kolbe, Kann, &#x00026; Collins, 1993</xref>), school observations, and focus groups on interpersonal problem situations. It included 14 items to assess in-person aggression (physical, verbal, and relational), 10 items to assess in-person victimization (overt and relational), 5 items to assess nonviolent delinquent behavior (i.e., illegal behaviors such as theft, shoplifting, vandalism), and 6 items to assess substance use (e.g., beer, wine, cigarettes, liquor, marijuana). Version 2 of the PBFS-AR includes 11 new items to assess cyber aggression and 11 new items to assess cyber victimization. These were based on a systematic review of existing measures of cyberbullying (<xref rid="R31" ref-type="bibr">Mehari et al., 2014</xref>) and qualitative studies investigating cyber aggression (e.g., <xref rid="R34" ref-type="bibr">Mishna, Saini, &#x00026; Solomon, 2009</xref>). Our goal was to include items representing physical (e.g., &#x0201c;Used text messaging to threaten someone physically&#x0201d;), verbal (e.g., &#x0201c;Called someone you know mean names online like on Facebook or SnapChat, or through testing&#x0201d;), and relational (e.g., &#x0201c;posted rude comments about someone you know online&#x0201d;) acts of aggression that could be perpetrated or experienced using electronic communication technologies. In addition, we added items to expand the pool assessing in-person aggression, in-person victimization, nonviolent delinquent behavior, and substance use. We also revised the wording to make items represent behavior across multiple contexts (i.e., &#x0201c;stolen something from another student&#x0201d; was changed to &#x0201c;stolen something&#x0201d;). For a listing of all 73 items on the PBFS-AR and their prevalence rates (i.e., percentage endorsing more than <italic>Never</italic>) see <xref rid="SD2" ref-type="supplementary-material">Table S1</xref>.</p><p id="P17">Items assessing behavior were preceded by the stem: &#x0201c;In the last 30 days, how many times have you?&#x0201d; Victimization items were preceded by the stem: &#x0201c;In the last 30 days, how many times has this happened to you?&#x0201d; All items were rated on a 6-point frequency scale, 1 = <italic>Never</italic>, 2 = <italic>1&#x02013;2 times</italic>, 3 = <italic>3&#x02013;5 times</italic>, 4 = <italic>6&#x02013;9 times</italic>, 5 = <italic>10&#x02013;19 times</italic>, and 6 = <italic>20 or more times</italic>. Participants completed the measure either in small groups at school during the school year or individually at home during the summer, using a computer-assisted interview.</p></sec><sec id="S8"><title>School office discipline referrals.</title><p id="P18">We created two composites based on office discipline referrals obtained from school records (see <xref rid="T1" ref-type="table">Table 1</xref>). The physical aggression composite included physical fights, and assaults on students or staff. The disruptive behavior composite included disruptive behavior, defiance or insubordination, disrespect, and obscene or inappropriate language or literature. We created composites for each student based on office referrals during the school year they completed the PBFS-AR. Because the distribution of these variables was restricted (i.e., only a small percentage of participants had more than 1 or 2 incidents), we conducted analyses on binary variables reflecting the presence or absence of one or more office referrals within each of the categories. We also constructed a binary variable indicating the presence or absence of one or more out-of-school suspension during the school year.</p></sec></sec><sec id="S9"><title>Analysis</title><p id="P19">We used Mplus 8 to conduct confirmatory factor analysis of the structure of the PBFS-AR. Items were treated as ordered categorical variables using weighted least squares mean- and variance-adjusted estimators (WLSMV). This analysis is comparable to a graded response item-response theory model. Analyses were conducted on all 3,261 observations using sandwich estimators (i.e., Mplus type=complex option) to address non-independence resulting from multiple observations of each student (<xref rid="R35" ref-type="bibr">Muth&#x000e9;n &#x00026; Satorra, 1995</xref>). Although items were rated on a 6-point scale, very few participants (i.e., 1.2% or less) endorsed higher frequency categories. Such low frequencies create problems for the WLSMV estimator. Inspection of item characteristic curves based on an initial model suggested very little differentiation among the highest frequency categories. We therefore re-coded all items into four categories by combining the three highest categories.</p><p id="P20">We first conducted separate analyses of aggression and victimization items within each media (in-person and cyber). In separate analyses of in-person and cyber aggression, we compared: (a) three-factor models that differentiated among the three forms of aggression (physical, verbal, and relational); (b) two-factor models that differentiated between overt (i.e., physical and verbal) and relational aggression; (c) two-factor models that differentiated between physical and non-physical (i.e., verbal and relational) aggression; and (d) models specifying a single in-person or cyber aggression factor. These models formed the basis for further analyses to compare models that evaluated the extent to which in-person and cyber aggression items could be best represented by: (a) factors that emerged from the separate analyses of each type of media, (b) two-factor models defined by media (i.e., in-person versus cyber aggression), and a single overall aggression factor. We tested a similar series of models to evaluate the structure of the in-person and cyber victimization items. Finally, we incorporated the resulting in-person and cyber aggression and victimization factors into a full model that also included the substance use and delinquent behavior items.</p><p id="P21">We compared the fit of competing models based on the difference test provided by Mplus (see <xref rid="R1" ref-type="bibr">Asparouhov &#x00026; Muth&#x000e9;n, 2006</xref>), and evaluated overall model fit using <xref rid="R20" ref-type="bibr">Hu and Bentler&#x02019;s (1999)</xref> recommendations as general guidelines. We considered models to have a good fit based on cutoffs of close to .95 or higher on the comparative fit index (CFI) and Tucker-Lewis fit index (TLI), and close to .06 or lower for the root mean square error of approximation (RMSEA). We conducted tests of measurement invariance on the final model across sex and grade. Because the large sample size provided power to detect minor differences in fit, we followed <xref rid="R6" ref-type="bibr">Cheung and Rensvold&#x02019;s (2002)</xref> recommendations and did not favor more complex models unless they improved the CFI by more than .01.</p><p id="P22">Finally, we conducted analyses of covariance to examine the relation between scores on the PBFS-AR and office discipline referrals. Within these models, latent variables representing the PBFS-AR factors were regressed on dummy-coded variables representing the presence or absence of office discipline referrals for physical aggression, referrals for disruptive behavior, and in-school and out-of-school suspensions. Analyses controlled for sex, grade (dummy coded), and intervention condition, which we included as covariates.</p></sec></sec><sec id="S10"><title>Results</title><sec id="S11"><title>Structure of Aggression</title><sec id="S12"><title>In-person aggression.</title><p id="P23">A three-factor model with separate factors for physical, verbal and relational forms of in-person aggression fit the data very well. It also fit significantly better than the other three models (all <italic>p</italic>s &#x0003c; .001), and improved the fit based on the CFI by more than .01 for each of the models (see models 1&#x02013;4 in <xref rid="T2" ref-type="table">Table 2</xref>), except for the two-factor model that combined physical and verbal aggression items into an Overt Aggression factor (&#x00394;CFI = .004). Within the three-factor model, the Verbal Aggression factor was highly correlated with the Physical and Relational Aggression factors (<italic>r</italic>s = .97 and .88, respectively). Based on this finding we conducted an exploratory factor analysis (EFA) to provide additional information regarding the structure of in-person aggression, in particular where items representing verbal aggression best fit. The EFA suggested no more than two factors based on the eigenvalues (9.49, 1.37, 0.739, . . .), and the marginal improvement in fit for the three-factor EFA model over the two-factor EFA model (&#x00394;CFI = .007). Review of a two-factor solution specifying an oblique rotation (i.e., geomin) indicated that all four physical aggression items had their highest loadings on Factor 1 (&#x003bb;s = .37 to 1.04), with only one cross-loading (i.e., &#x003bb; &#x0003e; .30) on Factor 2 (see <xref rid="SD3" ref-type="supplementary-material">Table S2</xref>). All five relational aggression items had their highest loadings on Factor 2 (&#x003bb;s = .63 to .90), with no cross-loadings on Factor 1. In contrast, the six verbal aggression items did not consistently fit within this structure. Two items (i.e., &#x0201c;Yelled at someone or called them mean names&#x0201d; and &#x0201c;Put someone down to their face&#x0201d;) had high loadings on Factor 1 (i.e., &#x003bb;s = .70 to .80) with no cross-loadings on Factor 2. We considered incorporating these items into the Physical Aggression factor, but concluded that they did not represent the construct of physical aggression as captured by the other items in this factor, all of which represented clearly defined acts or threats of physical aggression. The other four verbal aggression items had cross-loadings on both factors (i.e., &#x003bb;s = .32 to .55). Although both the confirmatory and exploratory factor analyses supported separate factors for physical and relational aggression, items representing verbal forms of aggression did not clearly fit into this structure. Based on these findings, we removed the verbal in-person aggression items from all subsequent analyses. Analyses of the remaining items provided strong support for a two-factor model with separate factors representing physical and relational aggression (see Model 5 in <xref rid="T2" ref-type="table">Table 2</xref>). This two-factor model fit the data significantly better than a model specifying a single overall In-Person Aggression factor (see Model 6 in <xref rid="T2" ref-type="table">Table 2</xref>).</p></sec><sec id="S13"><title>Cyber aggression.</title><p id="P24">All four competing models of cyber aggression fit the data well (see Models 7&#x02013;10 in <xref rid="T2" ref-type="table">Table 2</xref>). Although the three-factor model fit significantly better than the other three models (all <italic>p</italic>s &#x0003c; .001), it did not improve the fit based on the CFI by more than .01 compared with any of the other models, including the one-factor model. Loadings for the one-factor model were consistently high ranging from .88 to .92 for physical aggression items, .81 to .90 for verbal aggression items, and .70 to .90 for relational aggression items. This suggested that a single overall factor could adequately represent the 11 items encompassing different forms of cyber aggression.</p></sec><sec id="S14"><title>Combined in-person and cyber aggression models.</title><p id="P25">Comparison of competing models of the structure of items representing both in-person and cyber forms of aggression favored a three-factor model that included the two in-person aggression factors (Physical Aggression and Relational Aggression) and the Cyber Aggression factor (see models 11&#x02013;13 in <xref rid="T2" ref-type="table">Table 2</xref>). This model fit the data significantly better than a two-factor model defined by media (In-Person and Cyber Aggression) and a model specifying a single overall Aggression factor, and resulted in an improvement in model fit (&#x00394;CFI = .011 and .017, respectively).</p></sec></sec><sec id="S15"><title>Structure of Victimization</title><p id="P26">All four models of victimization items fit the data well in separate analyses of in-person (see models 1 to 4 in <xref rid="T3" ref-type="table">Table 3</xref>) and cyber victimization (see models 5 to 8 in <xref rid="T3" ref-type="table">Table 3</xref>). For both in-person and cyber victimization, the three-factor model with separate factors for physical, verbal, and relational victimization fit significantly better than the other three models, but the improvement was modest even compared with the single-factor model (&#x00394;CFI = .008 and .000 for in-person and cyber victimization models, respectively). Moreover, correlations among the three form factors were highly correlated within the in-person (<italic>r</italic>s = .91 to .95) and cyber victimization (<italic>r</italic>s = .97 to .99) models. This suggested that little was gained by differentiating among the three forms of victimization within each media.</p><p id="P27">We next conducted analyses of the full set of victimization items (i.e., both in-person and cyber) to compare a three-factor model defined by form of victimization (physical, verbal, and relational victimization), a two-factor model defined by media (in-person and cyber victimization), and a single-factor model (see models 9&#x02013;11 in <xref rid="T3" ref-type="table">Table 3</xref>). Of these, the two-factor model defined by media had the best fit, increasing the CFI by .017 over the three-factor model, and .020 over the one-factor model. In other words, there was support for differentiation among victimization items based on the media (i.e., in-person and cyber), but not based on their form (i.e., physical, verbal, and relational).</p></sec><sec id="S16"><title>Overall Structure of the PBFS-AR</title><p id="P28">We next examined the structure of the full set of PBFS-AR items. Based on the separate analyses of the aggression and victimization items, we excluded the verbal aggression items and tested a seven-factor model with factors representing in-person physical aggression, in-person relational aggression, cyber aggression, in-person victimization, cyber victimization, substance use, and nonviolent delinquent behavior. This seven-factor model fit the data very well in the overall sample (see Model 1 in <xref rid="T4" ref-type="table">Table 4</xref>). It also fit the data well in separate analyses by sex (RMSEAs = .017 and .018, CFIs = .95 and .98, TLIs = .95 and .97 for boys and girls, respectively), and by grade (RMSEAs = .014 to .020, CFIs = .96 to .98, TLIs = .96 to .98). All correlations among the seven factors in the analysis of the full sample were positive and significant (see <xref rid="T5" ref-type="table">Table 5</xref>). The three forms of aggression (in-person physical, in-person relational, and cyber) were highly correlated with each other (<italic>r</italic>s = .78 to .89) and with the Delinquent Behavior factor (<italic>r</italic>s = .77 to .83), and had lower correlations with the Substance Use factor (<italic>r</italic>s = .55 to .66). The In-Person and Cyber Victimization factors were also highly correlated with each other (r = .85), and with the In-Person Physical, In-Person Relational, and Cyber Aggression factors (<italic>r</italic>s = .58 to .80), Delinquent Behavior factor (<italic>r</italic>s = .58 and .66, respectively) and Substance Use factor (<italic>r</italic>s = .42 and .52, respectively). Standardized factor loadings for the seven-factor model based on the full sample ranged from .74 to .93 (see <xref rid="T6" ref-type="table">Table 6</xref>).</p><p id="P29">Multiple group analyses indicated that the model specifying configural invariance (i.e., same structure) across sex fit the data very well (see Model 2 in <xref rid="T4" ref-type="table">Table 4</xref>). We found support for strong measurement invariance based on a slight improvement in fit indices when loadings and thresholds were constrained across sex (see Model 3). Imposing strong measurement invariance made it possible to examine mean differences for boys and girls. These analyses did not reveal significant sex differences in reported frequencies of in-person physical or relational aggression, delinquent behavior, or substance use. However, compared with girls, boys reported lower frequencies of cyber aggression, and in-person and cyber victimization (see <xref rid="T5" ref-type="table">Table 5</xref>). These reflected small differences for cyber aggression and in-person victimization (<italic>d</italic>s = &#x02212;.22 and &#x02212;.21, <italic>p</italic>s <italic>=</italic> .05, respectively), and a medium-sized difference for cyber victimization (<italic>d</italic> = &#x02212;0.44, <italic>p</italic> &#x0003c; .05).</p><p id="P30">The model specifying configural invariance across the sixth, seventh and eighth grades (see Model 4 in <xref rid="T4" ref-type="table">Table 4</xref>) also fit very well, and there were again slight improvements in fit when strong measurement invariance was specified (see Model 5). Comparison of means across grades revealed significantly lower frequencies of both in-person relational aggression and in-person victimization in the seventh grade compared with the sixth grade (<italic>d</italic>s = &#x02212;0.35 to &#x02212;0.31). There were also significantly lower frequencies of both forms of in-person aggression, delinquent behavior, and in-person victimization in the eighth grade compared with the sixth grade (<italic>d</italic>s = &#x02212;.53 to &#x02212;.42). In contrast, there were no differences across grades in the reported frequency of engaging in or experiencing cyber aggression.</p><p id="P31">We also examined the reliability of the seven factors. In contrast to classical test theory, which provides a single index of reliability (typically alpha), item-response theory does not assume that measurement precision is consistent across the full range of scores on a measure. In contrast, it provides estimates of reliability at different levels of the underlying construct. As would be expected for our general school-based sample, scores on our measures of victimization, aggression, delinquent behavior, and substance use were positively skewed such that most were close to the mean. Our analysis of the In-Person Physical Aggression and In-Person Victimization factors revealed reliabilities of .70 or higher and in most cases .80 or higher for scores at or slightly above the mean up to values over 3.2 standard deviations above the mean. For the other five factors, reliabilities were .70 or higher and generally .80 or higher for scores between 0.8 to 4.0 standard deviations above the mean. This indicates that the PBFS-AR had high reliability for differentiating among individuals with scores above the mean, but poorer reliability for differentiating among individuals with scores at the lower end of the scale. The failure to find support for distinct forms of Cyber Aggression, Cyber Victimization, and In-Person Victimization factors resulted in overall factors with 11 to 15 items. Examination of the item-information curves for these factors indicated that these scales could be shortened by two, three, and five items, respectively, with only a negligible decrease in reliability These items are identified in <xref rid="T6" ref-type="table">Table 6</xref> and may be used to create a shorter version of the PBFS-AR.</p></sec><sec id="S17"><title>Relations with Disciplinary Data</title><p id="P32">Standardized regression weights representing the relations between the PBFS-AR factors and the office discipline referrals are reported in <xref rid="F1" ref-type="fig">Figure 1</xref>. Because factor variances were constrained to 1.00, these coefficients are comparable to Cohen&#x02019;s <italic>d</italic>. Students with office referrals for physical aggression reported significantly higher frequencies on the PBFS-AR for all three forms of aggression, as well as for delinquent behavior and substance use. These were small-to-medium differences based on <xref rid="R7" ref-type="bibr">Cohen&#x02019;s (1992)</xref> criteria for small, medium, and large effect sizes (<italic>d</italic>s = .26 to .48, <italic>p</italic> &#x0003c; .05), except for In-Person Physical Aggression, for which a larger difference was found (<italic>d</italic> = .67, <italic>p</italic> &#x0003c; .001). Students with office referrals for physical aggression also reported higher rates of in-person (<italic>d</italic> = .26, <italic>p</italic> = .018), but not cyber victimization (<italic>d</italic> = .16, <italic>p</italic> = .279). Students with office referrals for disruptive behavior reported significantly higher frequencies of aggression, delinquent behavior, and substance use, with small-to-medium differences (<italic>d</italic>s = .34 to .54, <italic>p</italic> &#x0003c; .001), as well as higher frequencies of both in-person (<italic>d</italic> = .25, <italic>p</italic> &#x0003c; .01) and cyber (<italic>d</italic> = .49, <italic>p</italic> &#x0003c; .001) victimization.</p><p id="P33">Students with out-of-school suspensions also reported significantly higher frequencies of engaging in problem behaviors, and experiencing victimization (all <italic>p</italic>s &#x0003c; .001). Larger differences were found for both physical and cyber aggression (<italic>d</italic> = .62 and .65, respectively) than for relational aggression (<italic>d</italic> = .39). Those with one or more out-of-school suspensions also reported higher frequencies representing medium-sized effects for delinquent behavior, substance use, and cyber victimization (<italic>d</italic>s = .47 to .59), and a higher frequency of in-person victimization representing a small-to-medium size difference (<italic>d</italic> = .35).</p></sec></sec><sec id="S18"><title>Discussion</title><p id="P34">The primary objectives of this study were to compare competing models of the structure of victimization and adolescent problem behaviors, including aggression, substance use, and other delinquent behavior, and to evaluate the validity of the PBFS-AR based on its relations to school office discipline referrals. A key question was the extent to which there are separate factors representing physical, verbal, and relational forms of aggression and victimization, and whether these distinctions are evident in both in-person and cyber forms of aggression and victimization. The results of this study were generally consistent with both theory and the findings of other studies that have made a case for differentiating between physical and relational aggression (for a review see <xref rid="R46" ref-type="bibr">Voulgaridou &#x00026; Kokkinos, 2015</xref>). Specifically, we found support for in-person physical and relational acts as distinct forms of aggression. However, the evidence was less clear for verbal aggression. This lack of clarity is consistent with the results of <xref rid="R15" ref-type="bibr">Farrell et al.&#x02019;s (2016)</xref> analyses of the structure of in-person aggression. They found that correlations between verbal aggression and some constructs (e.g., teacher ratings of aggression, norms for aggression) were similar to those found for physical aggression. However, correlations between verbal aggression and other constructs (e.g., teacher ratings of adaptive behavior, delinquent peer associations) were more similar to those found for relational aggression.</p><p id="P35">Whereas the literature has been clear in differentiating between physical and relational aggression, it is less clear where verbal aggression fits within this framework. This lack of differentiation may reflect a lack of conceptual clarity regarding the definition of verbal aggression. Physical and relational aggression are defined based on intent. Physical aggression involves the intent to cause physical harm, whereas relational aggression involves the intent to damage social relationships (<xref rid="R46" ref-type="bibr">Voulgaridou &#x00026; Kokkinos, 2015</xref>). Items are defined as verbal aggression based solely on the mode of delivery, which may not reflect the intent or context. For example, insulting someone or calling them names may represent a direct attack on the individual&#x02019;s sense of self or worth, a precursor to a physical confrontation, or an attempt to damage the individual&#x02019;s social standing in a public setting. Verbal aggression may encompass a range of behaviors, some of which are more closely related to physical aggression, some of which are more closely related to relational aggression, and some of which sit squarely in the middle. For example, in this study, the items &#x0201c;Yelled at someone or called them mean names&#x0201d; and &#x0201c;Put someone down to their face,&#x0201d; both of which could be construed as an attack designed to provoke, loaded solely on the In-Person Physical Aggression factor. In contrast, the items related to making fun of someone to make others laugh and saying something disrespectful about someone&#x02019;s family, behaviors which are likely intended to damage an individual&#x02019;s image or reputation, loaded more strongly onto the Relational Aggression factor. It is possible that previous studies that found an overt (or direct) aggression factor included items assessing verbal attacks that may have been precursors to physical aggression. Future studies may need to parse out verbal aggression items based on whether the intent is to provoke, harass, or taunt an individual, or to damage the individual&#x02019;s image, reputation, or relationships.</p><p id="P36">In contrast to in-person aggression, we did not find support for distinct physical or relational forms of cyber aggression, which is consistent with previous work (<xref rid="R30" ref-type="bibr">Mehari &#x00026; Farrell, 2018</xref>). This may be because items representing cyber forms of physical aggression involve threats of physical aggression rather than actual physical aggression. Although we were not able to differentiate among different forms within cyber aggression, we did find support for cyber aggression as distinct from in-person aggression. This supports the notion that perpetrating aggression via electronic communication technologies has unique aspects that may influence which adolescents are more likely to engage in this form of aggression. Interestingly, its patterns of relations with office disciplinary referrals was more similar to the pattern for physical aggression than to the pattern found for relational aggression. That is, perpetrating cyber aggression was associated with a higher likelihood of office referrals for disruptive behavior and suspensions than was perpetrating relational aggression. It is possible that perpetrating cyber aggression is indicative of more nonconforming or deviant behaviors, which is supported in part by the lower prevalence of cyber aggression compared to in-person aggression (e.g., <xref rid="R48" ref-type="bibr">Wang et al., 2009</xref>).</p><p id="P37">Our evaluation of the PBFS-AR found support for strong measurement invariance across sex and grade. Although measurement invariance is a prerequisite to making meaningful comparisons across groups (<xref rid="R49" ref-type="bibr">Widaman &#x00026; Reise, 1997</xref>), few prior studies have evaluated the measurement invariance of aggression and victimization (e.g., <xref rid="R26" ref-type="bibr">Marsee et al., 2011</xref>; <xref rid="R27" ref-type="bibr">Marsh et al., 2011</xref>; <xref rid="R41" ref-type="bibr">Rosen et al., 2013</xref>). The finding of measurement invariance across sex and grade supports the use of the PBFS-AR for examining differences across these groups. We also found mean differences across both grade and sex. Cyber aggression had similar rates of prevalence across sixth, seventh, and eighth grade, whereas in-person aggression was highest in sixth grade, consistent with other trends suggesting that in-person aggression declines throughout middle school (<xref rid="R13" ref-type="bibr">Farrell, Goncy, Sullivan, &#x00026; Thompson, 2017</xref>). The stability of cyber aggression throughout the course of middle school suggests that it continues to be reinforced, or at least not effectively addressed through informal social control, as adolescents grow. Interestingly, trends over the past ten years suggest that in-person aggression is decreasing (<xref rid="R47" ref-type="bibr">Waasdorp, Pas, Zablotsky, &#x00026; Bradshaw, 2017</xref>), whereas cyber aggression appears to remain stable (<xref rid="R44" ref-type="bibr">Smith, 2012</xref>). Taken together, these findings suggest a need to incorporate and evaluate elements of cyber aggression prevention into violence prevention programming, and to target online norms to increase effective bystander intervention in cyber aggression situations.</p><p id="P38">Although we did not find sex differences in the mean frequency of physical or relational aggression, we found that boys reported lower frequencies of cyber aggression and victimization, and in-person victimization. Differences were small for cyber aggression and in-person victimization, with medium sized effects for cyber victimization. Most prior studies have found a higher frequency of direct aggression (i.e., physical and verbal) among boys compared with girls, and negligible sex differences in relational aggression (<xref rid="R5" ref-type="bibr">Card et al. 2008</xref>). Our study&#x02019;s lack of significant sex differences in physical aggression may reflect our focus on a predominantly African American sample. This is consistent with <xref rid="R5" ref-type="bibr">Card et al.&#x02019;s (2008</xref>) meta-analysis, which revealed smaller sex differences in the frequency of direct aggression in samples with higher percentages of minority youth, and smaller sex differences for self-report measures. Our finding of higher frequencies of cyber aggression and victimization among girls than among boys underscores the need for further research to replicate these findings and identify factors that are responsible for these differences, particularly the larger differences for cyber victimization.</p><p id="P39">Within both in-person and cyber media, we found little support for differentiating among the forms of victimization experienced by adolescents. Our findings differed from the findings of <xref rid="R15" ref-type="bibr">Farrell et al.&#x02019;s (2016)</xref> study of the previous version of the PBFS-AR, which found support for distinct in-person relational and physical victimization factors. However, their study included a limited pool of victimization items (e.g., only one verbal victimization item). Our conclusions also differ from those of several studies of the Revised Peer Experiences Questionnaire (RPEQ), which was designed to assess multiple forms of both aggression and victimization. <xref rid="R38" ref-type="bibr">Prinstein, Boergers, and Vernbert (2001)</xref> found support for distinct factors representing overt and relational victimization. In a subsequent study of an expanded pool of items, <xref rid="R11" ref-type="bibr">De Los Reyes and Prinstein (2004)</xref> found support for separate factors representing overt, relational, and reputational victimization. In both studies, the factor structure was determined by exploratory rather than confirmatory analyses. <xref rid="R39" ref-type="bibr">Queir&#x000f3;s and Vagos (2016)</xref> found support for the same three victimization factors as De Los Reyes and Prinstein in their analysis of a Portuguese translation of the RPEQ using a confirmatory factor analysis. Although the factors identified in these three studies of the RPEQ fit the data well, none of these studies evaluated competing models of its structure. It is therefore not clear how well the models they identified would improve upon the fit of models specifying a smaller number of factors. <xref rid="R29" ref-type="bibr">McLaughlin, Hatzenbuehler, and Hilt (2009)</xref>, for example, found support for a measurement model of the RPEQ that included a single victimization factor that was based on parcels, where each parcel included items representing overt, relational, and reputational victimization items.</p><p id="P40">The current study suggests that whereas individual adolescents may differ in their propensity to engage in physical versus relational aggression, those who are victimized are likely to report multiple forms of victimization, though they may experience different forms from different people. There may be underlying commonalities of victimization experiences (e.g., threats to security, belongingness, and acceptance at the peer and/or school level) that supersede form and intended method of hurt or harm (i.e., physical versus relational). This is consistent with research that suggests victimization during adolescence can serve as a mechanism to marginalize or exclude youth from peer groups (<xref rid="R4" ref-type="bibr">Brown, 2004</xref>). This does not imply that different forms of victimization all have the same impact on adjustment. By definition, physical victimization causes physical harm, and all forms of victimization carry a risk for psychosocial adjustment difficulties. <xref rid="R38" ref-type="bibr">Prinstein et al (2001)</xref>, for example, found that relational victimization was related to high school students&#x02019; concurrent levels of loneliness and low self-esteem even after controlling for overt forms of victimization and both overt and relational forms of aggression. Further work is needed to evaluate the value added by differentiating among specific forms of victimization, in particular the extent to which they differ in their impact on adjustment.</p><p id="P41">Although we did not find support for differentiating among forms of victimization within media, we did find that in-person and cyber forms of victimization appear somewhat distinct (but highly correlated, at <italic>r</italic> = .85). With few exceptions (e.g., <xref rid="R25" ref-type="bibr">Landoll et al., 2015</xref>), most prior research has not tested whether in-person and cyber victimization are separate constructs. Instead, researchers have generally based research questions, study design, and empirical analyses on the untested assumption that they are distinct phenomena. This study supports that commonly held assumption. Many researchers posit that cyber victimization may cause greater harm due to circumstances surrounding the perpetration of cyber aggression that may magnify its effect, including the possibility of an unlimited audience and revictimization through views and shares (or the victim choosing to review the aggressive behavior; e.g., <xref rid="R45" ref-type="bibr">Tokunaga, 2010</xref>). This underscores the need for longitudinal research to explore whether there are differences in severity or types of outcomes, or interaction effects (<xref rid="R42" ref-type="bibr">Salmivalli et al., 2013</xref>).</p><p id="P42">Our analysis of the relations between scores on the PBFS-AR and office discipline referrals and outcomes provided support for its criterion validity. Of particular note was the finding that students with office referrals for physical aggression differed more on the PBFS-AR Physical Aggression factor than on the other measures of aggression and problem behavior. This is despite the fact that these factors, particularly those representing different forms of aggression, were highly correlated. This provides some evidence of discriminant validity for this measure. Students with office referrals for disruptive behavior and those receiving out-of-school suspensions showed more consistent differences in their frequency of the three forms of aggression, delinquent behavior, and substance use. This is consistent with the notion that students who engage in each of these types of problem behaviors are also likely to engage in other behaviors viewed as disruptive and be subject to suspensions. Office referrals were also related to victimization. Adolescents who are victimized may behave in disruptive or deviant ways, which elicits discipline from their teachers and aggression from their peers. This is consistent with research that has identified a subset of adolescents described as aggressive-victims (<xref rid="R2" ref-type="bibr">Bettencourt &#x00026; Farrell. 2013</xref>). Such youth are more likely to have poor emotion regulation, which may increase their likelihood of engaging in disruptive classroom behavior. It is also possible that adolescents who are victimized become more disruptive, perhaps due to feeling rejected, isolated, or unsafe.</p><sec id="S19"><title>Limitations</title><p id="P43">This study had several limitations that merit discussion. A key concern is the extent to which the findings might generalize to other sets of items, methods of assessment, and populations of students. Items on the PBFS-AR were derived from multiple sources including other similar measures and qualitative research with adolescents. Nonetheless, they represented a limited sample of the domain of interest. The lack of support for a separate factor representing verbal aggression may have been specific to the particular items used to represent this construct. As previously noted, this may reflect a lack of conceptual clarity regarding the construct and its operationalization (<xref rid="R46" ref-type="bibr">Voulgaridou &#x00026; Kokkinos, 2015</xref>). A further limitation concerns the wording of the items used to assess in-person aggression and victimization. They do not explicitly state that it must occur in person. In some cases, particularly for physical aggression, this can reasonably be assumed. Other items (e.g., rumor-spreading, calling someone mean names, threatening to hurt someone) could occur through in-person interactions or through electronic communication technologies (<xref rid="R31" ref-type="bibr">Mehari et al., 2014</xref>). This may have artificially inflated the correlation between factors meant to represent in-person and cyber aggression and victimization. Despite this limitation, we found support for distinct factors representing each media. Another limitation is that the PBFS-AR did not assess sexual aggression either in-person or cyber (e.g., unwanted solicitation or sharing of sexual photos and sexually explicit comments or requests). This, in part, reflects the difficulty of getting schools to approve of including questions they consider particularly sensitive. Future research is needed to assess whether sexual aggression and victimization emerge as distinct constructs. Finally, the rapid development of new forms of technology and rapid changes in the popularity of social media sites such as Facebook and SnapChat favored by adolescents poses a particular challenge for measures designed to assess adolescents&#x02019; cyber behavior. Measures of cyber aggression and victimization may thus require frequent updating. </p><p id="P44">The fact that the PBFS-AR is based on adolescents&#x02019; self-report is also a limitation. Self-report is the most commonly used method to assess adolescents&#x02019; aggression and victimization (<xref rid="R17" ref-type="bibr">Furlong et al., 2010</xref>). Given its unique perspective, it provides an important source of data for understanding students&#x02019; engagement in problem behavior and victimization experiences. Nonetheless, further work is needed to explore the extent to which other approaches to measuring aggression, problem behaviors, and victimization would lead to similar findings regarding their structure. Our sample consisted of a predominantly African American sample of students from three middle schools, many of whom came from single-parent families in urban communities with high rates of poverty and crime. In addition, the majority of the data were collected while a school-level violence prevention program was being implemented. Further work is needed to determine the extent to which these results would generalize to other populations of students and other circumstances.</p><p id="P45">A further concern was the use of school disciplinary data as a criterion for evaluating the validity of students&#x02019; report. School office discipline referrals are based on teachers&#x02019; observations of students&#x02019; behaviors at school, their interpretation of these observations, and their decisions regarding whether or not to make an office referral (<xref rid="R28" ref-type="bibr">McIntosh et al., 2012</xref>). They are also limited to student behavior in the presence of teachers. Because the PBFS-AR items do not specify the context, student reports on these measures presumably reflect their behavior both at school and outside of school. School discipline referrals thus represent, at best, a subset of the behaviors assessed by the student-report measure. Teachers may also not be consistent in their decisions about when to make an office discipline referral and there is evidence to suggest bias in making these decisions (e.g., <xref rid="R43" ref-type="bibr">Skiba et al., 2011</xref>). Our finding of small-to-medium effects in our analysis of the relations between PBFS-AR factors and school discipline data is therefore in line with what might be expected. Unfortunately, each method of assessing student behavior has its own inherent limitations and there is no perfect criterion against which to validate student report.</p></sec><sec id="S20"><title>Conclusion</title><p id="P46">Overall, this study supported the PBFS-AR as a promising self-report measure of adolescents&#x02019; frequency of victimization, aggression and other problem behaviors (see PBFS-AR Version 2 in <xref rid="SD1" ref-type="supplementary-material">Supplemental materials</xref> for the final version of the measure). Analyses of its structure demonstrated its ability to differentiate between in-person physical, in-person relational and cyber aggression and other problem behaviors (substance use and other delinquent behavior), and between in-person and cyber victimization. We also found support for strong measurement invariance across sex and grade. Finally, support for the criterion validity of the PBFS-AR was found based on its pattern of relations with school disciplinary data. Our analysis of the structure of the PBFS-AR also contributed to the literature on the nature of adolescents&#x02019; victimization and aggression. It supported the notion that in-person physical, in-person relational and cyber aggression represent highly correlated but distinct constructs. This was supported both by comparison of competing models of the factor structure of the PBFS-AR and the differential pattern of findings between In-Person Physical and In-Person Relational Aggression factors and office referrals for physical aggression. Our findings also highlighted the need for further research to clarify the construct of verbal aggression. Finally, it suggested that the distinction between forms of aggression found for measures of perpetration are less evident in measures of both in-person and cyber victimization.</p></sec></sec><sec sec-type="supplementary-material" id="SM1"><title>Supplementary Material</title><supplementary-material content-type="local-data" id="SD1"><label>Measure</label><media xlink:href="NIHMS1026850-supplement-Measure.pdf" orientation="portrait" xlink:type="simple" id="d39e802" position="anchor"/></supplementary-material><supplementary-material content-type="local-data" id="SD2"><label>Table S1</label><media xlink:href="NIHMS1026850-supplement-Table_S1.docx" orientation="portrait" xlink:type="simple" id="d39e806" position="anchor"/></supplementary-material><supplementary-material content-type="local-data" id="SD3"><label>Table S2</label><media xlink:href="NIHMS1026850-supplement-Table_S2.docx" orientation="portrait" xlink:type="simple" id="d39e810" position="anchor"/></supplementary-material></sec></body><back><ack id="S21"><p id="P47">Research reported in this publication was supported by the Eunice Kennedy Shriver National Institute of Child Health and Human Development of the National Institutes of Health under award number R01HD08994, by the National Center for Injury Prevention and Control, Centers for Disease Control and Prevention, CDC Cooperative Agreement 5U01CE001956, and by the National Institute of Justice, grant number 2014-CK-BX-0009. The findings and conclusions in this report are those of the authors and do not necessarily represent the official position of the National Institutes of Health, the Centers for Disease Control and Prevention, or the National Institute of Justice.</p></ack><fn-group><fn fn-type="COI-statement" id="FN1"><p id="P48">Conflicts of interest: None</p></fn></fn-group><ref-list><title>References</title><ref id="R1"><mixed-citation publication-type="journal"><name><surname>Asparouhov</surname><given-names>T</given-names></name> &#x00026; <name><surname>Muth&#x000e9;n</surname><given-names>B</given-names></name> (<year>2006</year>). <article-title>Robust chi square difference testing with mean and variance adjusted test statistics</article-title>. <source>Mplus Web Notes: No. 10. May 26, 2006</source>.</mixed-citation></ref><ref id="R2"><mixed-citation publication-type="journal"><name><surname>Bettencourt</surname><given-names>AF</given-names></name>, &#x00026; <name><surname>Farrell</surname><given-names>AD</given-names></name> (<year>2013</year>). <article-title>Individual and contextual factors associated with patterns of aggression and peer victimization during middle school</article-title>. <source>Journal of Youth and Adolescence</source>, <volume>42</volume>, <fpage>285</fpage>&#x02013;<lpage>302</lpage>. <pub-id pub-id-type="doi">10.1007/s10964-012-9854-8</pub-id><pub-id pub-id-type="pmid">23160659</pub-id></mixed-citation></ref><ref id="R3"><mixed-citation publication-type="journal"><name><surname>Bradshaw</surname><given-names>CP</given-names></name>, <name><surname>Waasdorp</surname><given-names>TE</given-names></name>, &#x00026; <name><surname>Johnson</surname><given-names>SL</given-names></name> (<year>2015</year>). <article-title>Overlapping verbal, relational, physical, and electronic forms of bullying in adolescence: Influence of school context</article-title>. <source>Journal of Clinical Child and Adolescent Psychology</source>, <volume>44</volume>, <fpage>494</fpage>&#x02013;<lpage>508</lpage>. <pub-id pub-id-type="doi">10.1080/15374416.2014.893516</pub-id><pub-id pub-id-type="pmid">24738548</pub-id></mixed-citation></ref><ref id="R4"><mixed-citation publication-type="book"><name><surname>Brown</surname><given-names>BB</given-names></name> (<year>2004</year>). <chapter-title>Adolescents&#x02019; relationships with peers</chapter-title> In <name><surname>Lerner</surname><given-names>R</given-names></name> and <name><surname>Steinberg</surname><given-names>L</given-names></name> (Eds.), <source>Handbook of Adolescent Psychology</source>, (pp. <fpage>363</fpage>&#x02013;<lpage>394</lpage>). <publisher-loc>Hoboken</publisher-loc>: <publisher-name>John Wiley and Sons</publisher-name>
<pub-id pub-id-type="doi">10.1002/9780471726746.ch12</pub-id></mixed-citation></ref><ref id="R5"><mixed-citation publication-type="journal"><name><surname>Card</surname><given-names>NA</given-names></name>, <name><surname>Stucky</surname><given-names>BD</given-names></name>, <name><surname>Sawalani</surname><given-names>GM</given-names></name>, &#x00026; <name><surname>Little</surname><given-names>TD</given-names></name> (<year>2008</year>). <article-title>Direct and indirect aggression during childhood and adolescence: A meta-analytic review of gender differences, intercorrelations, and relations to maladjustment</article-title>. <source>Child Development</source>, <volume>79</volume>, <fpage>1185</fpage>&#x02013;<lpage>1229</lpage>. <pub-id pub-id-type="doi">10.1111/j.1467-8624.2008.01184.x</pub-id><pub-id pub-id-type="pmid">18826521</pub-id></mixed-citation></ref><ref id="R6"><mixed-citation publication-type="journal"><name><surname>Cheung</surname><given-names>GW</given-names></name>, &#x00026; <name><surname>Rensvold</surname><given-names>RB</given-names></name> (<year>2002</year>). <article-title>Evaluating goodness-of-fit indexes for testing measurement invariance</article-title>. <source>Structural Equation Modeling</source>, <volume>9</volume>(<issue>2</issue>), <fpage>233</fpage>&#x02013;<lpage>255</lpage>. <pub-id pub-id-type="doi">10.1207/S15328007SEM0902_5</pub-id></mixed-citation></ref><ref id="R7"><mixed-citation publication-type="journal"><name><surname>Cohen</surname><given-names>J</given-names></name> (<year>1992</year>). <article-title>A power primer</article-title>. <source>Psychological Bulletin</source>, <volume>112</volume> (<issue>1</issue>), <fpage>155</fpage>&#x02013;<lpage>159</lpage>. <pub-id pub-id-type="doi">10.1037/0033-2909.112.1.155</pub-id><pub-id pub-id-type="pmid">19565683</pub-id></mixed-citation></ref><ref id="R8"><mixed-citation publication-type="journal"><name><surname>Crick</surname><given-names>NR</given-names></name>, &#x00026; <name><surname>Grotpeter</surname><given-names>JK</given-names></name> (<year>1995</year>). <article-title>Relational aggression, gender, and social-psychological adjustment</article-title>. <source>Child Development</source>, <volume>66</volume>(<issue>3</issue>), <fpage>710</fpage>&#x02013;<lpage>22</lpage>. <pub-id pub-id-type="doi">10.2307/1131945</pub-id><pub-id pub-id-type="pmid">7789197</pub-id></mixed-citation></ref><ref id="R9"><mixed-citation publication-type="book"><name><surname>Dahlberg</surname><given-names>L</given-names></name>, <name><surname>Toal</surname><given-names>S</given-names></name>,. <name><surname>Swahn</surname><given-names>M</given-names></name>, &#x00026; <name><surname>Behrens</surname><given-names>C</given-names></name> (<year>2005</year>) <source>Measuring violence-related attitudes, behaviors, and influences among youths: A compendium of assessment tools</source>, <edition>2nd ed</edition>
<publisher-loc>Atlanta, GA</publisher-loc>: <publisher-name>Centers for Disease Control and Prevention, National Center for Injury Prevention and Control</publisher-name>.</mixed-citation></ref><ref id="R10"><mixed-citation publication-type="journal"><name><surname>De Los Reyes</surname><given-names>A</given-names></name>, &#x00026; <name><surname>Kazdin</surname><given-names>AE</given-names></name> (<year>2005</year>). <article-title>Informant discrepancies in the assessment of childhood psychopathology: A critical review, theoretical framework, and recommendations for further study</article-title>. <source>Psychological Bulletin</source>, <volume>131</volume>(<issue>4</issue>), <fpage>483</fpage>&#x02013;<lpage>509</lpage>. <pub-id pub-id-type="doi">10.1037/0033-2909.131.4.483</pub-id><pub-id pub-id-type="pmid">16060799</pub-id></mixed-citation></ref><ref id="R11"><mixed-citation publication-type="journal"><name><surname>De Los Reyes</surname><given-names>A</given-names></name>, &#x00026; <name><surname>Prinstein</surname><given-names>MJ</given-names></name> (<year>2004</year>). <article-title>Applying depression-distortion hypotheses to the assessment of peer victimization in adolescents</article-title>. <source>Journal of Clinical Child and Adolescent Psychology</source>, <volume>33</volume>, <fpage>325</fpage>&#x02013;<lpage>335</lpage>. <pub-id pub-id-type="doi">10.1207/s15374424jccp3302_14</pub-id><pub-id pub-id-type="pmid">15136197</pub-id></mixed-citation></ref><ref id="R12"><mixed-citation publication-type="journal"><name><surname>Farrell</surname><given-names>AD</given-names></name>, <name><surname>Ampy</surname><given-names>LA</given-names></name>, &#x00026; <name><surname>Meyer</surname><given-names>AL</given-names></name> (<year>1998</year>). <article-title>Identification and assessment of problematic interpersonal situations for urban adolescents</article-title>. <source>Journal of Clinical Child Psychology</source>, <volume>27</volume>(<issue>3</issue>), <fpage>293</fpage>&#x02013;<lpage>305</lpage>. <pub-id pub-id-type="doi">10.1207/s15374424jccp2703_6</pub-id><pub-id pub-id-type="pmid">9789189</pub-id></mixed-citation></ref><ref id="R13"><mixed-citation publication-type="journal"><name><surname>Farrell</surname><given-names>AD</given-names></name>, <name><surname>Goncy</surname><given-names>EA</given-names></name>, <name><surname>Sullivan</surname><given-names>TN</given-names></name>, &#x00026; <name><surname>Thompson</surname><given-names>E</given-names></name> (<year>2017</year>). <article-title>Victimization, aggression, and other problem behaviors: Trajectories of change within and across middle school grades</article-title>. <source>Journal Research on Adolescence. Advance online publication</source>. <pub-id pub-id-type="doi">10.1111/jora.12346</pub-id></mixed-citation></ref><ref id="R14"><mixed-citation publication-type="journal"><name><surname>Farrell</surname><given-names>AD</given-names></name>, <name><surname>Kung</surname><given-names>EM</given-names></name>, <name><surname>White</surname><given-names>KS</given-names></name>, &#x00026; <name><surname>Valois</surname><given-names>R</given-names></name> (<year>2000</year>). <article-title>The structure of self-reported aggression, drug use, and delinquent behaviors during early adolescence</article-title>. <source>Journal of Clinical Child Psychology</source>, <volume>29</volume>, <fpage>282</fpage>&#x02013;<lpage>292</lpage>. <pub-id pub-id-type="doi">10.1207/S15374424jccp2902_13</pub-id><pub-id pub-id-type="pmid">10802836</pub-id></mixed-citation></ref><ref id="R15"><mixed-citation publication-type="journal"><name><surname>Farrell</surname><given-names>AD</given-names></name>, <name><surname>Sullivan</surname><given-names>TN</given-names></name>, <name><surname>Goncy</surname><given-names>EA</given-names></name>, &#x00026; <name><surname>Le</surname><given-names>AH</given-names></name> (<year>2016</year>). <article-title>Assessment of adolescents&#x02019; victimization, aggression, and problem behaviors: Evaluation of the Problem Behavior Frequency Scale</article-title>. <source>Psychological Assessment</source>, <volume>28</volume>(<issue>6</issue>), <fpage>702</fpage>&#x02013;<lpage>714</lpage>. <pub-id pub-id-type="doi">10.1037/pas0000225</pub-id><pub-id pub-id-type="pmid">26372261</pub-id></mixed-citation></ref><ref id="R16"><mixed-citation publication-type="journal"><name><surname>Farrell</surname><given-names>AD</given-names></name>, <name><surname>Sullivan</surname><given-names>TN</given-names></name>, <name><surname>Sutherland</surname><given-names>KS</given-names></name>, <name><surname>Corona</surname><given-names>R</given-names></name>, &#x00026; <name><surname>Masho</surname><given-names>S</given-names></name> (<year>2018</year>). <article-title>Evaluation of the Olweus Bully Prevention Program in an urban school system in the USA</article-title>. <source>Prevention Science. Advance online publication</source>. <pub-id pub-id-type="doi">10.1007/s11121-018-0923-4</pub-id></mixed-citation></ref><ref id="R17"><mixed-citation publication-type="book"><name><surname>Furlong</surname><given-names>MJ</given-names></name>, <name><surname>Sharkey</surname><given-names>JD</given-names></name>, <name><surname>Felix</surname><given-names>ED</given-names></name>, <name><surname>Tanigawa</surname><given-names>D</given-names></name>, &#x00026; <name><surname>Green</surname><given-names>JG</given-names></name> (<year>2010</year>). <chapter-title>Bullying assessment: A call for increased precision of self-reporting procedures</chapter-title> In <name><surname>Simerson</surname><given-names>JR</given-names></name>, <name><surname>Swearer</surname><given-names>SM</given-names></name>, &#x00026; <name><surname>Espelage</surname><given-names>DL</given-names></name> (Eds.), <source>Handbook of bullying in schools: An international perspective</source> (pp. <fpage>329</fpage>&#x02013;<lpage>346</lpage>). <publisher-loc>New York</publisher-loc>: <publisher-name>Routledge</publisher-name>.</mixed-citation></ref><ref id="R18"><mixed-citation publication-type="journal"><name><surname>Galen</surname><given-names>BR</given-names></name>, &#x00026; <name><surname>Underwood</surname><given-names>MK</given-names></name> (<year>1997</year>). <article-title>A developmental investigation of social aggression among children</article-title>. <source>Developmental Psychology</source>, <volume>33</volume>, <fpage>589</fpage>&#x02013;<lpage>600</lpage>. <pub-id pub-id-type="doi">10.1037/0012-1649.33.4.589</pub-id><pub-id pub-id-type="pmid">9232374</pub-id></mixed-citation></ref><ref id="R19"><mixed-citation publication-type="book"><name><surname>Graham</surname><given-names>JW</given-names></name>, <name><surname>Taylor</surname><given-names>BJ</given-names></name>, &#x00026; <name><surname>Cumsille</surname><given-names>PE</given-names></name> (<year>2001</year>) <chapter-title>Planned missing data designs in the analysis of change</chapter-title> In <name><surname>Collins</surname><given-names>LM</given-names></name> &#x00026; <name><surname>Sayer</surname><given-names>AG</given-names></name> (Eds.). <source>New methods for the analysis of change</source> (pp. <fpage>335</fpage>&#x02013;<lpage>353</lpage>). <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>American Psychological Association</publisher-name>
<pub-id pub-id-type="doi">10.1037/10409-011</pub-id></mixed-citation></ref><ref id="R20"><mixed-citation publication-type="journal"><name><surname>Hu</surname><given-names>L</given-names></name>, &#x00026; <name><surname>Bentler</surname><given-names>PM</given-names></name> (<year>1999</year>). <article-title>Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives</article-title>. <source>Structural Equation Modeling</source>, <volume>6</volume>, <fpage>1</fpage>&#x02013;<lpage>55</lpage>. <pub-id pub-id-type="doi">10.1080/10705519909540118</pub-id></mixed-citation></ref><ref id="R21"><mixed-citation publication-type="journal"><name><surname>Hunt</surname><given-names>C</given-names></name>, <name><surname>Peters</surname><given-names>L</given-names></name>, &#x00026; <name><surname>Rapee</surname><given-names>RM</given-names></name> (<year>2012</year>). <article-title>Development of a measure of the experience of being bullied in youth</article-title>. <source>Psychological Assessment</source>, <volume>24</volume>, <fpage>156</fpage>&#x02013;<lpage>165</lpage>
<pub-id pub-id-type="doi">10.1037/a0025178</pub-id><pub-id pub-id-type="pmid">22250594</pub-id></mixed-citation></ref><ref id="R22"><mixed-citation publication-type="book"><name><surname>Jessor</surname><given-names>R</given-names></name> (<year>2014</year>). <chapter-title>Problem behavior theory: A half-century of research on adolescent behavior and development</chapter-title> In <name><surname>Lerner</surname><given-names>RM</given-names></name>, <name><surname>Petersen</surname><given-names>AC</given-names></name>, <name><surname>Silbereisen</surname><given-names>RK</given-names></name>, &#x00026; <name><surname>Brooks-Gunn</surname><given-names>J</given-names></name> (Eds.), <source>The developmental science of adolescence: History through autobiography</source>. (pp. <fpage>239</fpage>&#x02013;<lpage>256</lpage>). <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Psychology Press</publisher-name>.</mixed-citation></ref><ref id="R23"><mixed-citation publication-type="journal"><name><surname>Kolbe</surname><given-names>LJ</given-names></name>, <name><surname>Kann</surname><given-names>L</given-names></name>, &#x00026; <name><surname>Collins</surname><given-names>JL</given-names></name> (<year>1993</year>). <article-title>Overview of the youth risk behavior surveillance system</article-title>. <source>Public Health Reports (Washington, D.C.: 1974)</source>,<volume>108</volume>, <fpage>2</fpage>.</mixed-citation></ref><ref id="R24"><mixed-citation publication-type="journal"><name><surname>Kowalski</surname><given-names>RM</given-names></name>, <name><surname>Giumetti</surname><given-names>GW</given-names></name>, <name><surname>Schroeder</surname><given-names>AN</given-names></name>, &#x00026; <name><surname>Lattanner</surname><given-names>MR</given-names></name> (<year>2014</year>). <article-title>Bullying in the digital age: A critical review and meta-analysis of cyberbullying research among youth</article-title>. <source>Psychological Bulletin</source>, <volume>140</volume>, <fpage>1073</fpage>&#x02013;<lpage>1137</lpage>. <pub-id pub-id-type="doi">10.1037/a0035618</pub-id><pub-id pub-id-type="pmid">24512111</pub-id></mixed-citation></ref><ref id="R25"><mixed-citation publication-type="journal"><name><surname>Landoll</surname><given-names>RR</given-names></name>, <name><surname>La Greca</surname><given-names>AM</given-names></name>, <name><surname>Lai</surname><given-names>BS</given-names></name>, <name><surname>Chan</surname><given-names>SF</given-names></name>, &#x00026; <name><surname>Herge</surname><given-names>WM</given-names></name> (<year>2015</year>). <article-title>Cyber victimization by peers: Prospective associations with adolescent social anxiety and depressive symptoms</article-title>. <source>Journal of Adolescence</source>, <volume>42</volume>, <fpage>77</fpage>&#x02013;<lpage>86</lpage>. <pub-id pub-id-type="doi">10.1016/j.adolescence.2015.04.002</pub-id><pub-id pub-id-type="pmid">25938204</pub-id></mixed-citation></ref><ref id="R26"><mixed-citation publication-type="journal"><name><surname>Marsee</surname><given-names>MA</given-names></name>, <name><surname>Barry</surname><given-names>CT</given-names></name>, <name><surname>Childs</surname><given-names>KK</given-names></name>, <name><surname>Frick</surname><given-names>PJ</given-names></name>, <name><surname>Kimonis</surname><given-names>ER</given-names></name>, <name><surname>Mu&#x000f1;oz</surname><given-names>LC</given-names></name>, . . . <name><surname>Lau</surname><given-names>KSL</given-names></name> (<year>2011</year>). <article-title>Assessing the forms and functions of aggression using self-report: Factor structure and invariance of the Peer Conflict Scale in youths</article-title>. <source>Psychological Assessment</source>, <volume>23</volume>, <fpage>792</fpage>&#x02013;<lpage>804</lpage>. <pub-id pub-id-type="doi">10.1037/a0023369</pub-id><pub-id pub-id-type="pmid">21500922</pub-id></mixed-citation></ref><ref id="R27"><mixed-citation publication-type="journal"><name><surname>Marsh</surname><given-names>HW</given-names></name>, <name><surname>Nagengast</surname><given-names>B</given-names></name>, <name><surname>Morin</surname><given-names>AJS</given-names></name>, <name><surname>Parada</surname><given-names>RH</given-names></name>, <name><surname>Craven</surname><given-names>RG</given-names></name>, &#x00026; <name><surname>Hamilton</surname><given-names>LR</given-names></name> (<year>2011</year>). <article-title>Construct validity of the multidimensional structure of bullying and victimization: An application of exploratory structural equation modeling</article-title>. <source>Journal of Educational Psychology</source>, <volume>103</volume>, <fpage>701</fpage>&#x02013;<lpage>732</lpage>. <pub-id pub-id-type="doi">10.1037/a0024122</pub-id></mixed-citation></ref><ref id="R28"><mixed-citation publication-type="book"><name><surname>McIntosh</surname><given-names>K</given-names></name>, <name><surname>Fisher</surname><given-names>ES</given-names></name>, <name><surname>Kennedy</surname><given-names>KS</given-names></name>, <name><surname>Craft</surname><given-names>CB</given-names></name>, &#x00026; <name><surname>Morrison</surname><given-names>GM</given-names></name> (<year>2012</year>). <chapter-title>Using office discipline referrals and school exclusion data to assess school discipline</chapter-title> In <name><surname>Jimerson</surname><given-names>SR</given-names></name>, <name><surname>Nickerson</surname><given-names>AB</given-names></name>, <name><surname>Mayer</surname><given-names>MJ</given-names></name>, &#x00026; <name><surname>Furlong</surname><given-names>MJ</given-names></name> (eds.), <source>Handbook of school violence and school safety</source> (pp. <fpage>305</fpage>&#x02013;<lpage>315</lpage>). <publisher-loc>New York, NY</publisher-loc>, <publisher-name>US: Routledge/Taylor &#x00026; Francis Group</publisher-name>.</mixed-citation></ref><ref id="R29"><mixed-citation publication-type="journal"><name><surname>McLaughlin</surname><given-names>KA</given-names></name>, <name><surname>Hatzenbuehler</surname><given-names>ML</given-names></name>, &#x00026; <name><surname>Hilt</surname><given-names>LM</given-names></name> (<year>2009</year>). <article-title>Emotion dysregulation as a mechanism linking peer victimization to internalizing symptoms in adolescents</article-title>. <source>Journal of Consulting and Clinical Psychology</source>, <volume>77</volume>(<issue>5</issue>), <fpage>894</fpage>&#x02013;<lpage>904</lpage>. <pub-id pub-id-type="doi">10.1037/a0015760</pub-id><pub-id pub-id-type="pmid">19803569</pub-id></mixed-citation></ref><ref id="R30"><mixed-citation publication-type="journal"><name><surname>Mehari</surname><given-names>KR</given-names></name>, &#x00026; <name><surname>Farrell</surname><given-names>AD</given-names></name> (<year>2018</year>). <article-title>Where does cyberbullying fit?: A comparison of competing models of adolescent aggression</article-title>. <source>Psychology of Violence</source>, <volume>8</volume>, <fpage>31</fpage>&#x02013;<lpage>42</lpage>. <pub-id pub-id-type="doi">10.1037/vio0000081</pub-id></mixed-citation></ref><ref id="R31"><mixed-citation publication-type="journal"><name><surname>Mehari</surname><given-names>KR</given-names></name>, <name><surname>Farrell</surname><given-names>AD</given-names></name>, &#x00026; <name><surname>Le</surname><given-names>A</given-names></name> (<year>2014</year>). <article-title>Cyberbullying: Measures in search of a construct</article-title>. <source>Psychology of Violence</source>, <volume>4</volume>(<issue>4</issue>), <fpage>399</fpage>&#x02013;<lpage>415</lpage>. <pub-id pub-id-type="doi">10.1037/a0037521</pub-id></mixed-citation></ref><ref id="R32"><mixed-citation publication-type="journal"><name><surname>Menesini</surname><given-names>E</given-names></name> (<year>2012</year>). <article-title>Cyberbullying: The right value of the phenomenon. Comments on the paper &#x0201c;Cyberbullying: An overrated phenomenon?&#x0201d;</article-title>. <source>European Journal of Developmental Psychology</source>, <volume>9</volume>(<issue>5</issue>), <fpage>544</fpage>&#x02013;<lpage>552</lpage>. <pub-id pub-id-type="doi">10.1080/17405629.2012.706449</pub-id></mixed-citation></ref><ref id="R33"><mixed-citation publication-type="journal"><name><surname>Miller-Johnson</surname><given-names>S</given-names></name>, <name><surname>Sullivan</surname><given-names>TN</given-names></name>, <name><surname>Simon</surname><given-names>TR</given-names></name>, &#x00026; <collab>The Multi-Site Violence Prevention Project</collab> (<year>2004</year>). <article-title>Evaluating the impact of interventions in the Multi-Site Violence Prevention Project: Samples procedures, and measures</article-title>. <source>American Journal of Preventive Medicine</source>, <volume>26</volume> (<issue>1S</issue>), <fpage>48</fpage>&#x02013;<lpage>61</lpage>. <pub-id pub-id-type="doi">10.1016/j.amepre.2003.09.015</pub-id><pub-id pub-id-type="pmid">14732187</pub-id></mixed-citation></ref><ref id="R34"><mixed-citation publication-type="journal"><name><surname>Mishna</surname><given-names>F</given-names></name>, <name><surname>Saini</surname><given-names>M</given-names></name>, &#x00026; <name><surname>Solomon</surname><given-names>S</given-names></name> (<year>2009</year>). <article-title>Ongoing and online: Children and youth&#x02019;s perceptions of cyber bullying</article-title>. <source>Children and Youth Services Review</source>, <volume>32</volume>, <fpage>1222</fpage>&#x02013;<lpage>1228</lpage>. <pub-id pub-id-type="doi">10.1016/j.childyouth.2009.05.004</pub-id></mixed-citation></ref><ref id="R35"><mixed-citation publication-type="book"><name><surname>Muth&#x000e9;n</surname><given-names>B</given-names></name>, &#x00026; <name><surname>Satorra</surname><given-names>A</given-names></name> (<year>1995</year>). <chapter-title>Complex sample data in structural equation modeling</chapter-title> In <name><surname>Marsden</surname><given-names>PV</given-names></name> (Ed.), <source>Sociological Methodology</source> (pp. <fpage>267</fpage>&#x02013;<lpage>316</lpage>). <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>American Sociological Association</publisher-name>
<pub-id pub-id-type="doi">10.2307/271070</pub-id></mixed-citation></ref><ref id="R36"><mixed-citation publication-type="journal"><name><surname>Nylund</surname><given-names>K</given-names></name>, <name><surname>Bellmore</surname><given-names>A</given-names></name>, <name><surname>Nishina</surname><given-names>A</given-names></name>, &#x00026; <name><surname>Graham</surname><given-names>S</given-names></name> (<year>2007</year>). <article-title>Subtypes, severity, and structural stability of peer victimization: What does latent class analysis say?</article-title>
<source>Child Development</source>, <volume>78</volume>, <fpage>1706</fpage>&#x02013;<lpage>1722</lpage>. <pub-id pub-id-type="doi">10.1111/j.1467-8624.2007.01097.x</pub-id><pub-id pub-id-type="pmid">17988316</pub-id></mixed-citation></ref><ref id="R37"><mixed-citation publication-type="journal"><name><surname>Olweus</surname><given-names>D</given-names></name>, &#x00026; <name><surname>Limber</surname><given-names>SP</given-names></name> (<year>2010</year>). <article-title>Bullying in school: Evaluation and dissemination of the Olweus Bullying Prevention Program</article-title>. <source>American Journal of Orthopsychiatry</source>, <volume>80</volume>, <fpage>124</fpage>&#x02013;<lpage>134</lpage>. <pub-id pub-id-type="doi">10.1111/j.1939-0025.2010.01015.x</pub-id><pub-id pub-id-type="pmid">20397997</pub-id></mixed-citation></ref><ref id="R38"><mixed-citation publication-type="journal"><name><surname>Prinstein</surname><given-names>MJ</given-names></name>, <name><surname>Boergers</surname><given-names>J</given-names></name>, &#x00026; <name><surname>Vernberg</surname><given-names>EM</given-names></name> (<year>2001</year>). <article-title>Overt and relational aggression in adolescents: Social-psychological adjustment of aggressors and victims</article-title>. <source>Journal of Clinical Child Psychology</source>, <volume>30</volume>, <fpage>479</fpage>&#x02013;<lpage>491</lpage>. <pub-id pub-id-type="doi">10.1207/S15374424JCCP3004_05</pub-id><pub-id pub-id-type="pmid">11708236</pub-id></mixed-citation></ref><ref id="R39"><mixed-citation publication-type="journal"><name><surname>Queir&#x000f3;s</surname><given-names>AN</given-names></name>, &#x00026; <name><surname>Vagos</surname><given-names>P</given-names></name> (<year>2016</year>). <article-title>Measures of aggression and victimization in portuguese adolescents: Cross-cultural validation of the Revised Peer Experience Questionnaire</article-title>. <source>Psychological Assessment</source>, <volume>28</volume>(<issue>10</issue>), <fpage>e141</fpage>&#x02013;<lpage>e151</lpage>. <pub-id pub-id-type="doi">10.1037/pas0000363</pub-id><pub-id pub-id-type="pmid">27427943</pub-id></mixed-citation></ref><ref id="R40"><mixed-citation publication-type="book"><name><surname>Reynolds</surname><given-names>CR</given-names></name>, &#x00026; <name><surname>Kamphaus</surname><given-names>RW</given-names></name> (<year>2004</year>). <source>Behavioral Assessment System for Children-Second Edition</source>. <publisher-loc>Minneapolis, MN</publisher-loc>: <publisher-name>Pearson Assessments</publisher-name>
<comment>Retrieved from <ext-link ext-link-type="uri" xlink:href="http://www.pearsonclinical.com/education/products/100000658/behavior-assessment-system-for-children-second-edition-basc-2.html">http://www.pearsonclinical.com/education/products/100000658/behavior-assessment-system-for-children-second-edition-basc-2.html</ext-link></comment></mixed-citation></ref><ref id="R41"><mixed-citation publication-type="journal"><name><surname>Rosen</surname><given-names>LH</given-names></name>, <name><surname>Beron</surname><given-names>KJ</given-names></name>, &#x00026; <name><surname>Underwood</surname><given-names>MK</given-names></name> (<year>2013</year>). <article-title>Assessing peer victimization across adolescence: Measurement invariance and developmental change</article-title>. <source>Psychological Assessment</source>, <volume>25</volume>, <fpage>1</fpage>&#x02013;<lpage>11</lpage>. <pub-id pub-id-type="doi">10.1037/a0028985</pub-id><pub-id pub-id-type="pmid">22708574</pub-id></mixed-citation></ref><ref id="R42"><mixed-citation publication-type="journal"><name><surname>Salmivalli</surname><given-names>C</given-names></name>, <name><surname>Sainio</surname><given-names>M</given-names></name>, &#x00026; <name><surname>Hodges</surname><given-names>EVE</given-names></name> (<year>2013</year>). <article-title>Electronic victimization: Correlates, antecedents, and consequences among elementary and middle school students</article-title>. <source>Journal of Clinical Child and Adolescent Psychology</source>, <volume>42</volume>, <fpage>442</fpage>&#x02013;<lpage>453</lpage>. <pub-id pub-id-type="doi">10.1080/15374416.2012.759228</pub-id><pub-id pub-id-type="pmid">23384048</pub-id></mixed-citation></ref><ref id="R43"><mixed-citation publication-type="journal"><name><surname>Skiba</surname><given-names>RJ</given-names></name>, <name><surname>Horner</surname><given-names>RH</given-names></name>, <name><surname>Chung</surname><given-names>C</given-names></name>, <name><surname>Rausch</surname><given-names>MK</given-names></name>, <name><surname>May</surname><given-names>SL</given-names></name>, &#x00026; <name><surname>Tobin</surname><given-names>T</given-names></name> (<year>2011</year>). <article-title>Race is not neutral: A national investigation of African American and Latino disproportionality in school discipline</article-title>. <source>School Psychology Review</source>, <volume>40</volume>(<issue>1</issue>), <fpage>85</fpage>&#x02013;<lpage>107</lpage>.</mixed-citation></ref><ref id="R44"><mixed-citation publication-type="journal"><name><surname>Smith</surname><given-names>PK</given-names></name> (<year>2012</year>). <article-title>Cyberbullying: Challenges and opportunities for a research program&#x02014;A response to Olweus (2012)</article-title>. <source>European Journal of Developmental Psychology</source>, <volume>9</volume>(<issue>5</issue>), <fpage>553</fpage>&#x02013;<lpage>558</lpage>. <pub-id pub-id-type="doi">10.1080/17405629.2012.689821</pub-id></mixed-citation></ref><ref id="R45"><mixed-citation publication-type="journal"><name><surname>Tokunaga</surname><given-names>RS</given-names></name> (<year>2010</year>). <article-title>Following you home from school: A critical review and synthesis of research on cyberbullying victimization</article-title>. <source>Computers in Human Behavior</source>, <volume>26</volume>(<issue>3</issue>), <fpage>277</fpage>&#x02013;<lpage>287</lpage>. <pub-id pub-id-type="doi">10.1016/j.chb.2009.11.014</pub-id></mixed-citation></ref><ref id="R46"><mixed-citation publication-type="journal"><name><surname>Voulgaridou</surname><given-names>I</given-names></name>, &#x00026; <name><surname>Kokkinos</surname><given-names>CM</given-names></name> (<year>2015</year>). <article-title>Relational aggression in adolescents: A review of theoretical and empirical research</article-title>. <source>Aggression and Violent Behavior</source>, <volume>23</volume>, <fpage>87</fpage>&#x02013;<lpage>97</lpage>. <pub-id pub-id-type="doi">10.1016/j.avb.2015.05.006</pub-id></mixed-citation></ref><ref id="R47"><mixed-citation publication-type="journal"><name><surname>Waasdorp</surname><given-names>TE</given-names></name>, <name><surname>Pas</surname><given-names>ET</given-names></name>, <name><surname>Zablotsky</surname><given-names>B</given-names></name>, &#x00026; <name><surname>Bradshaw</surname><given-names>CP</given-names></name> (<year>2017</year>). <article-title>Ten-year trends in bullying and related attitudes among 4th-to 12th-graders</article-title>. <source>Pediatrics</source>, <volume>139</volume>(<issue>6</issue>), <fpage>1</fpage>&#x02013;<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1542/peds.2016-2615</pub-id></mixed-citation></ref><ref id="R48"><mixed-citation publication-type="journal"><name><surname>Wang</surname><given-names>J</given-names></name>, <name><surname>Iannotti</surname><given-names>RJ</given-names></name>, &#x00026; <name><surname>Nansel</surname><given-names>TR</given-names></name> (<year>2009</year>). <article-title>School bullying among adolescents in the United States: Physical, verbal, relational, and cyber</article-title>. <source>Journal of Adolescent Health</source>, <volume>45</volume>, <fpage>368</fpage>&#x02013;<lpage>375</lpage>. <pub-id pub-id-type="doi">10.1016/j.jadohealth.2009.03.021</pub-id><pub-id pub-id-type="pmid">19766941</pub-id></mixed-citation></ref><ref id="R49"><mixed-citation publication-type="book"><name><surname>Widaman</surname><given-names>KF</given-names></name>, &#x00026; <name><surname>Reise</surname><given-names>SP</given-names></name> (<year>1997</year>). <chapter-title>Exploring the measurement invariance of psychological instruments: Applications in the substance use domain</chapter-title> In <name><surname>Bryant</surname><given-names>KJ</given-names></name> &#x00026; <name><surname>Windle</surname><given-names>M</given-names></name> (Eds.), <source>The science of prevention: Methodological advances from alcohol and substance abuse research</source> (pp. <fpage>281</fpage>&#x02013;<lpage>324</lpage>). <publisher-loc>Washington, DC, US</publisher-loc>: <publisher-name>American Psychological Association</publisher-name>
<pub-id pub-id-type="doi">10.1037/10222-009</pub-id></mixed-citation></ref><ref id="R50"><mixed-citation publication-type="journal"><name><surname>Youngstrom</surname><given-names>E</given-names></name>, <name><surname>Loeber</surname><given-names>R</given-names></name>, &#x00026; <name><surname>Stouthamer-Loeber</surname><given-names>M</given-names></name> (<year>2000</year>). <article-title>Patterns and correlates of agreement between parent, teacher, and male adolescent ratings of externalizing and internalizing problems</article-title>. <source>Journal of Consulting and Clinical Psychology</source>, <volume>68</volume>, <fpage>1038</fpage>&#x02013;<lpage>1050</lpage>. <pub-id pub-id-type="doi">10.1037/0022-006X.68.6.1038</pub-id><pub-id pub-id-type="pmid">11142538</pub-id></mixed-citation></ref></ref-list></back><floats-group><fig id="F1" orientation="portrait" position="float"><label>Figure 1:</label><caption><p id="P49">Regression coefficients and 95% confidence intervals representing differences on PBFS-AR factors for students with one or more office discipline referrals for physical aggression, one or more referrals for disruptive behavior, and one or more out-of-school suspension versus those with none. Models controlled for sex, grade, and intervention status. Dependent variables have a variance of 1.00, such that coefficients are equivalent to d-coefficients.</p></caption><graphic xlink:href="nihms-1026850-f0001"/></fig><table-wrap id="T1" position="float" orientation="portrait"><label>Table 1</label><caption><p id="P50">Number and Percentage of Students With One or More Office Discipline Referral or Out-Of-School Suspension</p></caption><table frame="hsides" rules="groups"><colgroup span="1"><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/></colgroup><thead><tr><th align="left" valign="bottom" rowspan="1" colspan="1">Referral Code</th><th align="center" valign="bottom" rowspan="1" colspan="1">Number</th><th align="center" valign="bottom" rowspan="1" colspan="1">%</th></tr></thead><tbody><tr><td colspan="3" align="center" valign="middle" rowspan="1">Office referrals for physical aggression</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">Minor fighting altercation</td><td align="right" valign="middle" rowspan="1" colspan="1">78</td><td align="right" valign="middle" rowspan="1" colspan="1">8.1%</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">Fighting with no injury or a minor injury</td><td align="right" valign="middle" rowspan="1" colspan="1">41</td><td align="right" valign="middle" rowspan="1" colspan="1">4.2%</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">Assault and battery without a weapon on students</td><td align="right" valign="middle" rowspan="1" colspan="1">18</td><td align="right" valign="middle" rowspan="1" colspan="1">1.9%</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">Assault and battery without a weapon on staff</td><td align="right" valign="middle" rowspan="1" colspan="1">7</td><td align="right" valign="middle" rowspan="1" colspan="1">0.7%</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">Sexual offense involving touching against another student</td><td align="right" valign="middle" rowspan="1" colspan="1">3</td><td align="right" valign="middle" rowspan="1" colspan="1">0.3%</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">Physical aggression composite</td><td align="right" valign="middle" rowspan="1" colspan="1">133</td><td align="right" valign="middle" rowspan="1" colspan="1">13.8%</td></tr><tr><td colspan="3" align="center" valign="middle" style="border-top: solid 1px" rowspan="1">Office referrals for disruptive behavior</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">Disruptive demonstrations</td><td align="right" valign="middle" rowspan="1" colspan="1">217</td><td align="right" valign="middle" rowspan="1" colspan="1">22.5%</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">Defiance/insubordination</td><td align="right" valign="middle" rowspan="1" colspan="1">133</td><td align="right" valign="middle" rowspan="1" colspan="1">13.8%</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">Classroom or campus disruption</td><td align="right" valign="middle" rowspan="1" colspan="1">87</td><td align="right" valign="middle" rowspan="1" colspan="1">9.0%</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">Disrespect</td><td align="right" valign="middle" rowspan="1" colspan="1">46</td><td align="right" valign="middle" rowspan="1" colspan="1">4.8%</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">Obscene/inappropriate language</td><td align="right" valign="middle" rowspan="1" colspan="1">45</td><td align="right" valign="middle" rowspan="1" colspan="1">4.7%</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">Minor insubordination</td><td align="right" valign="middle" rowspan="1" colspan="1">10</td><td align="right" valign="middle" rowspan="1" colspan="1">1.0%</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">Obscene/disruptive literature</td><td align="right" valign="middle" rowspan="1" colspan="1">3</td><td align="right" valign="middle" rowspan="1" colspan="1">0.3%</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">Disruptive behavior composite</td><td align="right" valign="middle" rowspan="1" colspan="1">307</td><td align="right" valign="middle" rowspan="1" colspan="1">31.8%</td></tr><tr><td colspan="3" align="center" valign="middle" style="border-top: solid 1px" rowspan="1">Suspensions</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">Out-of-school suspension</td><td align="right" valign="middle" rowspan="1" colspan="1">280</td><td align="right" valign="middle" rowspan="1" colspan="1">29.0%</td></tr></tbody></table><table-wrap-foot><fn id="TFN1"><p id="P51"><italic>Note. N</italic> = 965. Includes only those codes for which at least one incident was reported during the school year.</p></fn></table-wrap-foot></table-wrap><table-wrap id="T2" position="float" orientation="landscape"><label>Table 2</label><caption><p id="P52">Fit Indices for Competing Models of the Factor Structure of the Problem Behavior Frequency Scale-Adolescent Report Aggression Items</p></caption><table frame="hsides" rules="groups"><colgroup span="1"><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/></colgroup><thead><tr><th align="left" valign="middle" rowspan="1" colspan="1">Model</th><th align="center" valign="middle" rowspan="1" colspan="1">&#x003c7;<sup>2<xref rid="TFN3" ref-type="table-fn">a</xref></sup></th><th align="center" valign="middle" rowspan="1" colspan="1">df</th><th align="center" valign="middle" rowspan="1" colspan="1">&#x003c7;<sub>&#x00394;</sub><sup>2<xref rid="TFN4" ref-type="table-fn">b</xref></sup></th><th align="center" valign="middle" rowspan="1" colspan="1">df<sub>&#x00394;</sub><sup><xref rid="TFN4" ref-type="table-fn">b</xref></sup></th><th align="center" valign="middle" rowspan="1" colspan="1">RMSEA</th><th align="center" valign="middle" rowspan="1" colspan="1">CFI</th><th align="left" valign="top" rowspan="1" colspan="1">TLI</th></tr></thead><tbody><tr><td colspan="8" align="center" valign="middle" rowspan="1">In-person aggression models</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">1. 3-factor (physical, verbal, and relational)</td><td align="right" valign="middle" rowspan="1" colspan="1">617.47<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">101</td><td align="center" valign="middle" rowspan="1" colspan="1"/><td align="center" valign="bottom" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1">.047</td><td align="left" valign="middle" rowspan="1" colspan="1">.975</td><td align="left" valign="middle" rowspan="1" colspan="1">.970</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">2. 2-factor combining verbal and physical</td><td align="right" valign="middle" rowspan="1" colspan="1">701.07<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">103</td><td align="center" valign="middle" rowspan="1" colspan="1">71.68<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">2</td><td align="left" valign="middle" rowspan="1" colspan="1">.042</td><td align="left" valign="middle" rowspan="1" colspan="1">.971</td><td align="left" valign="middle" rowspan="1" colspan="1">.966</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">3. 2-factor combining verbal and relational</td><td align="right" valign="middle" rowspan="1" colspan="1">914.78<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">103</td><td align="center" valign="middle" rowspan="1" colspan="1">159.62<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">2</td><td align="left" valign="middle" rowspan="1" colspan="1">.049</td><td align="left" valign="middle" rowspan="1" colspan="1">.961</td><td align="left" valign="middle" rowspan="1" colspan="1">.954</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">4. 1-factor</td><td align="right" valign="middle" rowspan="1" colspan="1">997.88<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">104</td><td align="center" valign="middle" rowspan="1" colspan="1">218.86<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">3</td><td align="left" valign="middle" rowspan="1" colspan="1">.051</td><td align="left" valign="middle" rowspan="1" colspan="1">.957</td><td align="left" valign="middle" rowspan="1" colspan="1">.950</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">5. 2-factor (physical and relational) excluding verbal items</td><td align="right" valign="middle" rowspan="1" colspan="1">184.83<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">34</td><td align="center" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1">.037</td><td align="left" valign="middle" rowspan="1" colspan="1">.984</td><td align="left" valign="middle" rowspan="1" colspan="1">.978</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">6. 1-factor excluding verbal items</td><td align="right" valign="middle" rowspan="1" colspan="1">546.03<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">35</td><td align="center" valign="middle" rowspan="1" colspan="1">140.78<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">1</td><td align="left" valign="middle" rowspan="1" colspan="1">.067</td><td align="left" valign="middle" rowspan="1" colspan="1">.944</td><td align="left" valign="middle" rowspan="1" colspan="1">.928</td></tr><tr><td colspan="8" align="center" valign="middle" style="border-top: solid 1px" rowspan="1">Cyber aggression models</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">7. 3-factor (physical, verbal, and relational)</td><td align="right" valign="middle" rowspan="1" colspan="1">110.39<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">41</td><td align="center" valign="middle" rowspan="1" colspan="1"/><td align="center" valign="bottom" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1">.023</td><td align="left" valign="middle" rowspan="1" colspan="1">.995</td><td align="left" valign="middle" rowspan="1" colspan="1">.993</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">6. 2-factor combining verbal and physical</td><td align="right" valign="middle" rowspan="1" colspan="1">125.78<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">43</td><td align="center" valign="middle" rowspan="1" colspan="1">14.51<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">2</td><td align="left" valign="middle" rowspan="1" colspan="1">.024</td><td align="left" valign="middle" rowspan="1" colspan="1">.994</td><td align="left" valign="middle" rowspan="1" colspan="1">.992</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">9. 2-factor combining verbal and relational</td><td align="right" valign="middle" rowspan="1" colspan="1">114.89<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">43</td><td align="center" valign="middle" rowspan="1" colspan="1">6.04<xref rid="TFN5" ref-type="table-fn">*</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">2</td><td align="left" valign="middle" rowspan="1" colspan="1">.023</td><td align="left" valign="middle" rowspan="1" colspan="1">.994</td><td align="left" valign="middle" rowspan="1" colspan="1">.993</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">10. 1-factor</td><td align="right" valign="middle" rowspan="1" colspan="1">126.49<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">44</td><td align="center" valign="middle" rowspan="1" colspan="1">16.97<xref rid="TFN6" ref-type="table-fn">**</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">3</td><td align="left" valign="middle" rowspan="1" colspan="1">.024</td><td align="left" valign="middle" rowspan="1" colspan="1">.994</td><td align="left" valign="middle" rowspan="1" colspan="1">.992</td></tr><tr><td colspan="6" align="center" valign="middle" style="border-top: solid 1px" rowspan="1">In-person and cyber aggression models (without verbal aggression items)</td><td align="left" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1"/></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">11. 3-factor (in-person physical and relational, cyber aggression)</td><td align="right" valign="middle" rowspan="1" colspan="1">606.55<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">186</td><td align="center" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1">.026</td><td align="left" valign="middle" rowspan="1" colspan="1">.980</td><td align="left" valign="middle" rowspan="1" colspan="1">.977</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">12. 2-factor defined by media (in-person, cyber)</td><td align="right" valign="middle" rowspan="1" colspan="1">1032.92<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">188</td><td align="center" valign="middle" rowspan="1" colspan="1">170.36<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">2</td><td align="left" valign="middle" rowspan="1" colspan="1">.037</td><td align="left" valign="middle" rowspan="1" colspan="1">.959</td><td align="left" valign="middle" rowspan="1" colspan="1">.954</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">13. 1-factor</td><td align="right" valign="middle" rowspan="1" colspan="1">1332.30<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">189</td><td align="center" valign="middle" rowspan="1" colspan="1">274.00<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">3</td><td align="left" valign="middle" rowspan="1" colspan="1">.043</td><td align="left" valign="middle" rowspan="1" colspan="1">.945</td><td align="left" valign="middle" rowspan="1" colspan="1">.938</td></tr></tbody></table><table-wrap-foot><fn id="TFN2"><p id="P53"><italic>Note. N</italic> = 3,216 observations from 1,263 participants. RMSEA= root mean-square error of approximation. CFI = comparative fit index. TLI = Tucker-Lewis fit index.</p></fn><fn id="TFN3"><label>a</label><p id="P54">Chi-square test of model fit.</p></fn><fn id="TFN4"><label>b</label><p id="P55">Chi-square difference test comparing fit of each model to the first model listed within each set (i.e., Models 1, 5, 7, and 11). Significant chi-square values indicate that the first model resulted in a significant improvement in fit.</p></fn><fn id="TFN5"><label>*</label><p id="P56"><italic>p</italic> &#x0003c; .05.</p></fn><fn id="TFN6"><label>**</label><p id="P57"><italic>p</italic> &#x0003c; .01.</p></fn><fn id="TFN7"><label>***</label><p id="P58"><italic>p</italic> &#x0003c; .001.</p></fn></table-wrap-foot></table-wrap><table-wrap id="T3" position="float" orientation="landscape"><label>Table 3</label><caption><p id="P59">Fit Indices for Competing Models of the Factor Structure of the Problem Behavior Frequency Scale-Adolescent Report Victimization Items</p></caption><table frame="hsides" rules="groups"><colgroup span="1"><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/></colgroup><thead><tr><th align="left" valign="middle" rowspan="1" colspan="1">Model</th><th align="center" valign="middle" rowspan="1" colspan="1">&#x003c7;<sup>2<xref rid="TFN9" ref-type="table-fn">a</xref></sup></th><th align="center" valign="middle" rowspan="1" colspan="1">df</th><th align="center" valign="middle" rowspan="1" colspan="1">&#x003c7;<sub>&#x00394;</sub>
<sup>2<xref rid="TFN10" ref-type="table-fn">b</xref></sup></th><th align="center" valign="middle" rowspan="1" colspan="1">df<sub>&#x00394;</sub><sup><xref rid="TFN10" ref-type="table-fn">b</xref></sup></th><th align="center" valign="middle" rowspan="1" colspan="1">RMSEA</th><th align="center" valign="middle" rowspan="1" colspan="1">CFI</th><th align="center" valign="middle" rowspan="1" colspan="1">TLI</th></tr></thead><tbody><tr><td colspan="8" align="center" valign="middle" rowspan="1">In-person victimization models</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">1. 3-factor (physical, verbal, and relational)</td><td align="right" valign="middle" rowspan="1" colspan="1">583.17<xref rid="TFN13" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">87</td><td align="center" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1">.042</td><td align="left" valign="middle" rowspan="1" colspan="1">.980</td><td align="left" valign="middle" rowspan="1" colspan="1">.976</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">2. 2-factor combining verbal and physical</td><td align="right" valign="middle" rowspan="1" colspan="1">612.47<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">89</td><td align="center" valign="middle" rowspan="1" colspan="1">29.13<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">2</td><td align="left" valign="middle" rowspan="1" colspan="1">.043</td><td align="left" valign="middle" rowspan="1" colspan="1">.979</td><td align="left" valign="middle" rowspan="1" colspan="1">.975</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">3. 2-factor combining verbal and relational</td><td align="right" valign="middle" rowspan="1" colspan="1">732.23<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">89</td><td align="center" valign="middle" rowspan="1" colspan="1">92.71<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">2</td><td align="left" valign="middle" rowspan="1" colspan="1">.047</td><td align="left" valign="middle" rowspan="1" colspan="1">.974</td><td align="left" valign="middle" rowspan="1" colspan="1">.970</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">4. 1-factor</td><td align="right" valign="middle" rowspan="1" colspan="1">768.14<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">90</td><td align="center" valign="middle" rowspan="1" colspan="1">128.06<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">3</td><td align="left" valign="middle" rowspan="1" colspan="1">.048</td><td align="left" valign="middle" rowspan="1" colspan="1">.972</td><td align="left" valign="middle" rowspan="1" colspan="1">.968</td></tr><tr><td colspan="8" align="center" valign="middle" style="border-top: solid 1px" rowspan="1">Cyber victimization models</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">5. 3-factor (physical, verbal, and relational)</td><td align="right" valign="middle" rowspan="1" colspan="1">313.62<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">41</td><td align="center" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1">.045</td><td align="left" valign="middle" rowspan="1" colspan="1">.978</td><td align="left" valign="middle" rowspan="1" colspan="1">.970</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">6. 2-factor combining verbal and physical</td><td align="right" valign="middle" rowspan="1" colspan="1">307.49<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">43</td><td align="center" valign="middle" rowspan="1" colspan="1">0.64</td><td align="left" valign="middle" rowspan="1" colspan="1">2</td><td align="left" valign="middle" rowspan="1" colspan="1">.044</td><td align="left" valign="middle" rowspan="1" colspan="1">.978</td><td align="left" valign="middle" rowspan="1" colspan="1">.972</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">7. 2-factor combining verbal and relational</td><td align="right" valign="middle" rowspan="1" colspan="1">314.68<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">43</td><td align="center" valign="middle" rowspan="1" colspan="1">4.34</td><td align="left" valign="middle" rowspan="1" colspan="1">2</td><td align="left" valign="middle" rowspan="1" colspan="1">.044</td><td align="left" valign="middle" rowspan="1" colspan="1">.978</td><td align="left" valign="middle" rowspan="1" colspan="1">.972</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">8. 1-factor</td><td align="right" valign="middle" rowspan="1" colspan="1">310.89<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">44</td><td align="center" valign="middle" rowspan="1" colspan="1">4.83</td><td align="left" valign="middle" rowspan="1" colspan="1">3</td><td align="left" valign="middle" rowspan="1" colspan="1">.043</td><td align="left" valign="middle" rowspan="1" colspan="1">.978</td><td align="left" valign="middle" rowspan="1" colspan="1">.973</td></tr><tr><td colspan="8" align="center" valign="middle" style="border-top: solid 1px" rowspan="1">In-person and cyber victimization models</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">9. 3-factor by form (physical, verbal, and relational)</td><td align="right" valign="middle" rowspan="1" colspan="1">2068.74<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">296</td><td align="center" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1">.043</td><td align="left" valign="middle" rowspan="1" colspan="1">.945</td><td align="left" valign="middle" rowspan="1" colspan="1">.939</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">10. 2-factor defined by media (in-person, cyber)</td><td align="right" valign="middle" rowspan="1" colspan="1">1506.30<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">298</td><td align="center" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1">.035</td><td align="left" valign="middle" rowspan="1" colspan="1">.962</td><td align="left" valign="middle" rowspan="1" colspan="1">.959</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">11. 1-factor</td><td align="right" valign="middle" rowspan="1" colspan="1">2170.85<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">299</td><td align="center" valign="middle" rowspan="1" colspan="1">124.80<xref rid="TFN7" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">3</td><td align="left" valign="middle" rowspan="1" colspan="1">.044</td><td align="left" valign="middle" rowspan="1" colspan="1">.942</td><td align="left" valign="middle" rowspan="1" colspan="1">.937</td></tr></tbody></table><table-wrap-foot><fn id="TFN8"><p id="P60"><italic>Note. N</italic> = 3,216 observations from 1,263 participants. RMSEA= root mean-square error of approximation. CFI = comparative fit index. TLI = Tucker-Lewis fit index.</p></fn><fn id="TFN9"><label>a</label><p id="P61">Chi-square test of model fit.</p></fn><fn id="TFN10"><label>b</label><p id="P62">Chi-square difference test comparing fit of each model to the first model listed within each set (i.e., Models 1, 5, and 9). Significant chi-square values indicate that the first model resulted in a significant improvement in fit.</p></fn><fn id="TFN11"><label>*</label><p id="P63"><italic>p</italic> &#x0003c; .05.</p></fn><fn id="TFN12"><label>**</label><p id="P64"><italic>p</italic> &#x0003c; .01.</p></fn><fn id="TFN13"><label>***</label><p id="P65"><italic>p</italic> &#x0003c; .001.</p></fn></table-wrap-foot></table-wrap><table-wrap id="T4" position="float" orientation="landscape"><label>Table 4</label><caption><p id="P66">Fit Indices for Seven Factor Models of the Factor Structure of the Problem Behavior Frequency Scale-Adolescent Report</p></caption><table frame="hsides" rules="groups"><colgroup span="1"><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/></colgroup><thead><tr><th align="left" valign="middle" rowspan="1" colspan="1">Model</th><th align="center" valign="middle" rowspan="1" colspan="1">&#x003c7;<sup>2<xref rid="TFN15" ref-type="table-fn">a</xref></sup></th><th align="center" valign="middle" rowspan="1" colspan="1">df</th><th align="center" valign="middle" rowspan="1" colspan="1">&#x003c7;<sub>&#x00394;</sub><sup>2<xref rid="TFN16" ref-type="table-fn">b</xref></sup></th><th align="center" valign="middle" rowspan="1" colspan="1">df<sub>&#x00394;</sub><sup><xref rid="TFN16" ref-type="table-fn">b</xref></sup></th><th align="center" valign="middle" rowspan="1" colspan="1">RMSEA</th><th align="center" valign="middle" rowspan="1" colspan="1">CFI</th><th align="center" valign="middle" rowspan="1" colspan="1">TLI</th></tr></thead><tbody><tr><td colspan="8" align="center" valign="middle" rowspan="1">Full sample</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">1. Overall model</td><td align="left" valign="top" rowspan="1" colspan="1">3888.99</td><td align="right" valign="middle" rowspan="1" colspan="1">1808</td><td align="center" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1">.019</td><td align="left" valign="middle" rowspan="1" colspan="1">.954</td><td align="left" valign="middle" rowspan="1" colspan="1">.952</td></tr><tr><td colspan="8" align="center" valign="middle" style="border-top: solid 1px" rowspan="1">Multiple group by sex</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">2. Configural invariance</td><td align="left" valign="top" rowspan="1" colspan="1">5389.47<xref rid="TFN19" ref-type="table-fn">***</xref></td><td align="right" valign="middle" rowspan="1" colspan="1">3616</td><td align="center" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1">.017</td><td align="left" valign="middle" rowspan="1" colspan="1">.964</td><td align="left" valign="middle" rowspan="1" colspan="1">.963</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">3. Scalar invariance</td><td align="left" valign="top" rowspan="1" colspan="1">5441.09<xref rid="TFN19" ref-type="table-fn">***</xref></td><td align="right" valign="middle" rowspan="1" colspan="1">3788</td><td align="center" valign="middle" rowspan="1" colspan="1">206.89<xref rid="TFN17" ref-type="table-fn">*</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">172</td><td align="left" valign="middle" rowspan="1" colspan="1">.016</td><td align="left" valign="middle" rowspan="1" colspan="1">.967</td><td align="left" valign="middle" rowspan="1" colspan="1">.967</td></tr><tr><td colspan="8" align="center" valign="middle" style="border-top: solid 1px" rowspan="1">Multiple group by grade</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">4. Configural invariance</td><td align="left" valign="top" rowspan="1" colspan="1">7142.71<xref rid="TFN19" ref-type="table-fn">***</xref></td><td align="right" valign="middle" rowspan="1" colspan="1">5424</td><td align="center" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1"/><td align="left" valign="middle" rowspan="1" colspan="1">.017</td><td align="left" valign="middle" rowspan="1" colspan="1">.969</td><td align="left" valign="middle" rowspan="1" colspan="1">.968</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">5. Scalar invariance</td><td align="left" valign="top" rowspan="1" colspan="1">7381.67<xref rid="TFN19" ref-type="table-fn">***</xref></td><td align="right" valign="middle" rowspan="1" colspan="1">5768</td><td align="center" valign="middle" rowspan="1" colspan="1">431.79<xref rid="TFN19" ref-type="table-fn">***</xref></td><td align="left" valign="middle" rowspan="1" colspan="1">344</td><td align="left" valign="middle" rowspan="1" colspan="1">.016</td><td align="left" valign="middle" rowspan="1" colspan="1">.971</td><td align="left" valign="middle" rowspan="1" colspan="1">.972</td></tr></tbody></table><table-wrap-foot><fn id="TFN14"><p id="P67"><italic>Note. N</italic> = 3,216 observations from 1,263 participants. RMSEA= root mean-square error of approximation. CFI = comparative fit index. TLI = Tucker-Lewis fit index.</p></fn><fn id="TFN15"><label>a</label><p id="P68">Chi-square test of model fit.</p></fn><fn id="TFN16"><label>b</label><p id="P69">Chi-square difference test comparing fit of configural invariance and scalar invariance models.</p></fn><fn id="TFN17"><label>*</label><p id="P70"><italic>p</italic> &#x0003c; .05.</p></fn><fn id="TFN18"><label>**</label><p id="P71"><italic>p</italic> &#x0003c; .01.</p></fn><fn id="TFN19"><label>***</label><p id="P72"><italic>p</italic> &#x0003c; .001.</p></fn></table-wrap-foot></table-wrap><table-wrap id="T5" position="float" orientation="landscape"><label>Table 5</label><caption><p id="P73">Correlations and mean differences among factors in final seven-factor model for the Problem Behavior Frequency Scale &#x02013; Adolescent Report</p></caption><table frame="hsides" rules="groups"><colgroup span="1"><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/></colgroup><thead><tr><th align="center" valign="middle" rowspan="1" colspan="1"/><th align="center" valign="middle" rowspan="1" colspan="1">1</th><th align="center" valign="middle" rowspan="1" colspan="1">2</th><th align="center" valign="middle" rowspan="1" colspan="1">3</th><th align="center" valign="middle" rowspan="1" colspan="1">4</th><th align="center" valign="middle" rowspan="1" colspan="1">5</th><th align="center" valign="middle" rowspan="1" colspan="1">6</th><th align="center" valign="middle" rowspan="1" colspan="1">7</th></tr></thead><tbody><tr><td align="left" valign="middle" rowspan="1" colspan="1">1. In-Person Physical Aggression</td><td align="center" valign="top" rowspan="1" colspan="1">-</td><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">2. In-Person Relational Aggression</td><td align="center" valign="top" rowspan="1" colspan="1">.78<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">-</td><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">3. Cyber Aggression</td><td align="center" valign="top" rowspan="1" colspan="1">.80<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">.89<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">-</td><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">4. Delinquent Behavior</td><td align="center" valign="top" rowspan="1" colspan="1">.77<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">.80<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">.83<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">-</td><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">5. Substance Use</td><td align="center" valign="top" rowspan="1" colspan="1">.66<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">.55<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">.65<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">.80<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">-</td><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">6. In-Person Victimization</td><td align="center" valign="top" rowspan="1" colspan="1">.62<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">.72<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">.60<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">.58<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">.42<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">-</td><td align="center" valign="top" rowspan="1" colspan="1"/></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">7. Cyber Victimization</td><td align="center" valign="top" rowspan="1" colspan="1">.58<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">.71<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">.80<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">.66<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">.52<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">.85<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">-</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">d-coefficients</td><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/><td align="center" valign="top" rowspan="1" colspan="1"/></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">Boys v Girls</td><td align="center" valign="top" rowspan="1" colspan="1">&#x02212;0.16</td><td align="center" valign="top" rowspan="1" colspan="1">&#x02212;0.21</td><td align="center" valign="top" rowspan="1" colspan="1">&#x02212;0.22<xref rid="TFN21" ref-type="table-fn">*</xref></td><td align="center" valign="top" rowspan="1" colspan="1">&#x02212;0.19</td><td align="center" valign="top" rowspan="1" colspan="1">&#x02212;0.07</td><td align="center" valign="top" rowspan="1" colspan="1">&#x02212;0.21<xref rid="TFN21" ref-type="table-fn">*</xref></td><td align="center" valign="top" rowspan="1" colspan="1">&#x02212;0.44<xref rid="TFN21" ref-type="table-fn">*</xref></td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">7th grade v 6th grade</td><td align="center" valign="top" rowspan="1" colspan="1">&#x02212;0.17</td><td align="center" valign="top" rowspan="1" colspan="1">&#x02212;0.31<xref rid="TFN21" ref-type="table-fn">*</xref></td><td align="center" valign="top" rowspan="1" colspan="1">0.00</td><td align="center" valign="top" rowspan="1" colspan="1">&#x02212;0.35</td><td align="center" valign="top" rowspan="1" colspan="1">0.17</td><td align="center" valign="top" rowspan="1" colspan="1">&#x02212;0.35<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">0.26</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">8th grade v 6th grade</td><td align="center" valign="top" rowspan="1" colspan="1">&#x02212;0.22<xref rid="TFN21" ref-type="table-fn">*</xref></td><td align="center" valign="top" rowspan="1" colspan="1">&#x02212;0.53<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">0.00</td><td align="center" valign="top" rowspan="1" colspan="1">&#x02212;0.42<xref rid="TFN21" ref-type="table-fn">*</xref></td><td align="center" valign="top" rowspan="1" colspan="1">0.27</td><td align="center" valign="top" rowspan="1" colspan="1">&#x02212;0.45<xref rid="TFN23" ref-type="table-fn">***</xref></td><td align="center" valign="top" rowspan="1" colspan="1">0.10</td></tr></tbody></table><table-wrap-foot><fn id="TFN20"><p id="P74">Note. <italic>N</italic> = 3,216 observations from 1,263 participants.</p></fn><fn id="TFN21"><label>*</label><p id="P75"><italic>p</italic> &#x0003c; .05.</p></fn><fn id="TFN22"><label>**</label><p id="P76"><italic>p</italic> &#x0003c; .01.</p></fn><fn id="TFN23"><label>***</label><p id="P77"><italic>p</italic> &#x0003c; .001.</p></fn></table-wrap-foot></table-wrap><table-wrap id="T6" position="float" orientation="portrait"><label>Table 6</label><caption><p id="P78">Standardized Loadings in Final Seven-Factor Confirmatory Factor Model</p></caption><table frame="hsides" rules="groups"><colgroup span="1"><col align="left" valign="middle" span="1"/><col align="left" valign="middle" span="1"/></colgroup><thead><tr><th align="left" valign="middle" rowspan="1" colspan="1">Item</th><th align="left" valign="middle" rowspan="1" colspan="1">Factor Loading</th></tr></thead><tbody><tr><td colspan="2" align="center" valign="middle" rowspan="1">In-Person Physical Aggression factor</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">10. Hit or slapped someone</td><td align="right" valign="middle" rowspan="1" colspan="1">.79</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">11. Thrown something at someone to hurt them</td><td align="right" valign="middle" rowspan="1" colspan="1">.78</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">15. Threatened to hit or physically harm someone</td><td align="right" valign="middle" rowspan="1" colspan="1">.88</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">18. Shoved or pushed someone</td><td align="right" valign="middle" rowspan="1" colspan="1">.81</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">30. Threatened someone with a weapon (gun, knife, club, etc.)</td><td align="right" valign="middle" rowspan="1" colspan="1">.85</td></tr><tr><td colspan="2" align="center" valign="middle" style="border-top: solid 1px" rowspan="1">In-Person Relational Aggression</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">1. Told someone you wouldn&#x02019;t like them unless they did what you wanted</td><td align="right" valign="middle" rowspan="1" colspan="1">.75</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">2. Spread a false rumor about someone</td><td align="right" valign="middle" rowspan="1" colspan="1">.75</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">5. Tried to keep others from liking another kid by saying mean things about him or her</td><td align="right" valign="middle" rowspan="1" colspan="1">.80</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">14. Left someone out on purpose when it was time to do an activity</td><td align="right" valign="middle" rowspan="1" colspan="1">.74</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">24. Not let someone be in your group anymore because you were mad at them</td><td align="right" valign="middle" rowspan="1" colspan="1">.81</td></tr><tr><td colspan="2" align="center" valign="middle" style="border-top: solid 1px" rowspan="1">Cyber Aggression factor</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">9. Used text-messaging to threaten to hurt someone physically</td><td align="right" valign="middle" rowspan="1" colspan="1">.90</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">19. Used cell phone pictures to threaten to hurt someone physically</td><td align="right" valign="middle" rowspan="1" colspan="1">.92</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">4. Used cell phone pictures to make fun of someone</td><td align="right" valign="middle" rowspan="1" colspan="1">.79</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">13. Used a chat room or Internet website to make fun of someone<sup><xref rid="TFN25" ref-type="table-fn">a</xref></sup></td><td align="right" valign="middle" rowspan="1" colspan="1">.88</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">21. Used text-messaging to make fun of someone</td><td align="right" valign="middle" rowspan="1" colspan="1">.86</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">62. Called someone you know mean names online like on Facebook or SnapChat or through texting.</td><td align="right" valign="middle" rowspan="1" colspan="1">.81</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">63. Pretended to be someone else online or through texting.</td><td align="right" valign="middle" rowspan="1" colspan="1">.77</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">64. Left someone out of an online group or unfriended them on Facebook.</td><td align="right" valign="middle" rowspan="1" colspan="1">.78</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">65. Sent or posted embarrassing pictures of someone without their permission.</td><td align="right" valign="middle" rowspan="1" colspan="1">.82</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">66. Posted rude comments about someone you know online.</td><td align="right" valign="middle" rowspan="1" colspan="1">.85</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">67. Spread rumors about someone you know online or through texting<sup><xref rid="TFN25" ref-type="table-fn">a</xref></sup>.</td><td align="right" valign="middle" rowspan="1" colspan="1">.92</td></tr><tr><td colspan="2" align="center" valign="middle" style="border-top: solid 1px" rowspan="1">In-Person Victimization factor</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">42. Someone threatened to hit or physically harm you<sup><xref rid="TFN25" ref-type="table-fn">a</xref></sup></td><td align="right" valign="middle" rowspan="1" colspan="1">.74</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">46. Someone pushed or shoved you</td><td align="right" valign="middle" rowspan="1" colspan="1">.74</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">49. Someone threatened or injured you with a weapon (gun, knife, club, etc.)<sup><xref rid="TFN25" ref-type="table-fn">a</xref></sup></td><td align="right" valign="middle" rowspan="1" colspan="1">.82</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">59. Someone hit you hard enough to hurt</td><td align="right" valign="middle" rowspan="1" colspan="1">.79</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">51. Someone threw something at you to hurt you</td><td align="right" valign="middle" rowspan="1" colspan="1">.81</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">55. Someone yelled at you or called you mean names</td><td align="right" valign="middle" rowspan="1" colspan="1">.81</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">44. Someone put you down to your face<sup><xref rid="TFN25" ref-type="table-fn">a</xref></sup></td><td align="right" valign="middle" rowspan="1" colspan="1">.77</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">47. Someone said something disrespectful to you about your family</td><td align="right" valign="middle" rowspan="1" colspan="1">.79</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">52. Someone teased you to make you mad</td><td align="right" valign="middle" rowspan="1" colspan="1">.81</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">53. Someone made fun of you to make others laugh</td><td align="right" valign="middle" rowspan="1" colspan="1">.83</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">43. Someone who was mad at you tried to get back at you by not letting you be in their group<sup><xref rid="TFN25" ref-type="table-fn">a</xref></sup></td><td align="right" valign="middle" rowspan="1" colspan="1">.82</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">50. Someone said they wouldn&#x02019;t like you unless you did what he or she wanted</td><td align="right" valign="middle" rowspan="1" colspan="1">.83</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">56. Someone left you out on purpose when it was time to do an activity<sup><xref rid="TFN25" ref-type="table-fn">a</xref></sup></td><td align="right" valign="middle" rowspan="1" colspan="1">.81</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">57. Someone spread a false rumor about you</td><td align="right" valign="middle" rowspan="1" colspan="1">.81</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">58. Someone tried to keep others from liking you by saying mean things about you</td><td align="right" valign="middle" rowspan="1" colspan="1">.87</td></tr><tr><td colspan="2" align="center" valign="middle" style="border-top: solid 1px" rowspan="1">Cyber Victimization factor</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">48. Someone used text-messaging to threaten to hurt you physically</td><td align="right" valign="middle" rowspan="1" colspan="1">.90</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">54. Someone used cell phone pictures to threaten to hurt you physically</td><td align="right" valign="middle" rowspan="1" colspan="1">.93</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">45. Someone used cell phone pictures to make fun of you</td><td align="right" valign="middle" rowspan="1" colspan="1">.85</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">60. Someone used text-messaging to make fun of you</td><td align="right" valign="middle" rowspan="1" colspan="1">.89</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">61. Someone used a chat room or Internet website to make fun of you<sup><xref rid="TFN25" ref-type="table-fn">a</xref></sup></td><td align="right" valign="middle" rowspan="1" colspan="1">.88</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">69. Someone called you mean names online or using a cell phone.</td><td align="right" valign="middle" rowspan="1" colspan="1">.84</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">68. Someone sent or posted embarrassing pictures of you without your permission.</td><td align="right" valign="middle" rowspan="1" colspan="1">.84</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">70. Someone pretended to be someone else online or using a cell phone to trick you.</td><td align="right" valign="middle" rowspan="1" colspan="1">.79</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">71. Someone left you out of an online group or unfriended you on Facebook<sup><xref rid="TFN25" ref-type="table-fn">a</xref></sup>.</td><td align="right" valign="middle" rowspan="1" colspan="1">.86</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">72. Someone posted rude comments about you online.</td><td align="right" valign="middle" rowspan="1" colspan="1">.87</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">73. Someone spread rumors about you online or by texting.<sup><xref rid="TFN25" ref-type="table-fn">a</xref></sup></td><td align="right" valign="middle" rowspan="1" colspan="1">.82</td></tr><tr><td colspan="2" align="center" valign="middle" style="border-top: solid 1px" rowspan="1">Delinquent Behavior factor</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">8. Stolen something</td><td align="right" valign="middle" rowspan="1" colspan="1">.78</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">25. Written things or sprayed paint on (tagged) walls or sidewalks or cars where you were not supposed to</td><td align="right" valign="middle" rowspan="1" colspan="1">.85</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">27. Taken something from a store without paying for it (shoplifted)</td><td align="right" valign="middle" rowspan="1" colspan="1">.83</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">32. Purposely damaged property that did not belong to you</td><td align="right" valign="middle" rowspan="1" colspan="1">.87</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">23. Snuck into someplace without paying, such as a movie, or onto a bus or subway</td><td align="right" valign="middle" rowspan="1" colspan="1">.80</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">26. Taken someone&#x02019;s car or motorcycle for a ride without their permission (gone &#x0201c;joyriding&#x0201d;)</td><td align="right" valign="middle" rowspan="1" colspan="1">.86</td></tr><tr><td colspan="2" align="center" valign="middle" style="border-top: solid 1px" rowspan="1">Substance Use factor</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">33. Drunk liquor (like whiskey or vodka)</td><td align="right" valign="middle" rowspan="1" colspan="1">.90</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">34. Drunk beer (more than a sip or taste)</td><td align="right" valign="middle" rowspan="1" colspan="1">.81</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">35. Been drunk</td><td align="right" valign="middle" rowspan="1" colspan="1">.91</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">36. Drunk wine or wine coolers (more than a sip or taste)</td><td align="right" valign="middle" rowspan="1" colspan="1">.89</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">37. Used marijuana (pot, hash, reefer, K2)</td><td align="right" valign="middle" rowspan="1" colspan="1">.88</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">41. Smoked cigarettes</td><td align="right" valign="middle" rowspan="1" colspan="1">.87</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">38. Sniffed glue, breathed the contents of aerosol spray cans, or inhaled any paints or prays to get high</td><td align="right" valign="middle" rowspan="1" colspan="1">.87</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">39. Used drugs (besides marijuana or inhalants), such as heroin, cocaine, LSD, or ecstasy</td><td align="right" valign="middle" rowspan="1" colspan="1">.90</td></tr><tr><td align="left" valign="middle" rowspan="1" colspan="1">40. Smoked cigars (like Black &#x00026;Milds)</td><td align="right" valign="middle" rowspan="1" colspan="1">.82</td></tr></tbody></table><table-wrap-foot><fn id="TFN24"><p id="P79"><italic>Note</italic>. <italic>N</italic> = 3,216 observations from 1,263 participants. All loadings are significant at <italic>p</italic> &#x0003c; .001.</p></fn><fn id="TFN25"><label>a</label><p id="P80">Item that could be deleted to create a shorter form based on reliability analyses.</p></fn></table-wrap-foot></table-wrap></floats-group></article>