<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="2.3" xml:lang="EN">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Psychiatry</journal-id>
<journal-title>Frontiers in Psychiatry</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Psychiatry</abbrev-journal-title>
<issn pub-type="epub">1664-0640</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpsyt.2025.1607367</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Psychiatry</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>The relationship between harsh parenting, shyness and cyber victimization: based on the cross-lagged panel model and the random intercept cross-lagged panel model</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>Zhao</surname>
<given-names>Xintong</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/3023260/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/investigation/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
<role content-type="https://credit.niso.org/contributor-roles/software/"/>
<role content-type="https://credit.niso.org/contributor-roles/formal-analysis/"/>
<role content-type="https://credit.niso.org/contributor-roles/data-curation/"/>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>Xin</surname>
<given-names>Tao</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<xref ref-type="aff" rid="aff2">
<sup>2</sup>
</xref>
<xref ref-type="author-notes" rid="fn001">
<sup>*</sup>
</xref>
<uri xlink:href="https://loop.frontiersin.org/people/497520/overview"/>
<role content-type="https://credit.niso.org/contributor-roles/methodology/"/>
<role content-type="https://credit.niso.org/contributor-roles/conceptualization/"/>
<role content-type="https://credit.niso.org/contributor-roles/supervision/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
<role content-type="https://credit.niso.org/contributor-roles/funding-acquisition/"/>
<role content-type="https://credit.niso.org/contributor-roles/project-administration/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-original-draft/"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Sang</surname>
<given-names>Qingsong</given-names>
</name>
<xref ref-type="aff" rid="aff1">
<sup>1</sup>
</xref>
<role content-type="https://credit.niso.org/contributor-roles/funding-acquisition/"/>
<role content-type="https://credit.niso.org/contributor-roles/data-curation/"/>
<role content-type="https://credit.niso.org/contributor-roles/writing-review-editing/"/>
</contrib>
</contrib-group>
<aff id="aff1">
<sup>1</sup>
<institution>School of Educational Science, Anhui Normal University</institution>, <addr-line>Wuhu, Anhui</addr-line>,&#xa0;<country>China</country>
</aff>
<aff id="aff2">
<sup>2</sup>
<institution>Collaborative Innovation Center of Assessment toward Basic Education Quality, Beijing Normal University</institution>, <addr-line>Beijing</addr-line>,&#xa0;<country>China</country>
</aff>
<author-notes>
<fn fn-type="edited-by">
<p>Edited by: Shen Liu, Anhui Agricultural University, China</p>
</fn>
<fn fn-type="edited-by">
<p>Reviewed by: Xuechen Ding, Shanghai Normal University, China</p>
<p>Fozia Fatima, National University of Medical Sciences (NUMS), Pakistan</p>
<p>Junxian Wang, Anhui Medical University, China</p>
</fn>
<fn fn-type="corresp" id="fn001">
<p>*Correspondence: Tao Xin, <email xlink:href="mailto:xintao@bnu.edu.cn">xintao@bnu.edu.cn</email>
</p>
</fn>
</author-notes>
<pub-date pub-type="epub">
<day>27</day>
<month>06</month>
<year>2025</year>
</pub-date>
<pub-date pub-type="collection">
<year>2025</year>
</pub-date>
<volume>16</volume>
<elocation-id>1607367</elocation-id>
<history>
<date date-type="received">
<day>07</day>
<month>04</month>
<year>2025</year>
</date>
<date date-type="accepted">
<day>12</day>
<month>06</month>
<year>2025</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#xa9; 2025 Zhao, Xin and Sang</copyright-statement>
<copyright-year>2025</copyright-year>
<copyright-holder>Zhao, Xin and Sang</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/">
<p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p>
</license>
</permissions>
<abstract>
<sec>
<title>Objective</title>
<p>To examine the longitudinal associations between harsh parenting, shyness, and cyber victimization. The present study hypothesized that shyness mediated harsh parenting and cyber victimization.</p>
</sec>
<sec>
<title>Methods</title>
<p>Eight hundred and twenty-eight first-year middle school students voluntarily completed three rounds of questionnaires investigating harsh parenting, shyness, and cyber victimization at eight-month intervals. CLPM and RI-CLPM were conducted using SPSS 26.0 and Mplus 8.3.</p>
</sec>
<sec>
<title>Results</title>
<p>Shyness was a significant predictor of cyber victimization and harsh parenting had a significant prospective effect on cyber victimization. Shyness mediated longitudinally between harsh parenting and cyber victimization.</p>
</sec>
<sec>
<title>Conclusions</title>
<p>In CLPM, T1 and T2 harsh parenting significantly and positively predicted T3 cyber victimization, with shyness serving as a mediator in the longitudinal relationship between harsh parenting and cyber victimization. In RI-CLPM, at the within-individual level, T1 harsh parenting significantly and positively predicted T2 cyber victimization, T2 shyness mediated the relationship between T1 harsh parenting and T3 cyber victimization. This study deepens our understanding of the dynamic relationship among harsh parenting, shyness, and cyber victimization, providing robust empirical evidence and meaningful insights for interventions in adolescent cyber victimization.</p>
</sec>
</abstract>
<kwd-group>
<kwd>harsh parenting</kwd>
<kwd>shyness</kwd>
<kwd>cyber victimization</kwd>
<kwd>CLPM</kwd>
<kwd>RI-CLPM</kwd>
</kwd-group>
<counts>
<fig-count count="4"/>
<table-count count="2"/>
<equation-count count="0"/>
<ref-count count="65"/>
<page-count count="12"/>
<word-count count="6693"/>
</counts>
<custom-meta-wrap>
<custom-meta>
<meta-name>section-in-acceptance</meta-name>
<meta-value>Public Mental Health</meta-value>
</custom-meta>
</custom-meta-wrap>
</article-meta>
</front>
<body>
<sec id="s1" sec-type="intro">
<label>1</label>
<title>Introduction</title>
<p>In the digital era, the Internet has become the &#x201c;second battlefield&#x201d; for psychological development. Along with the rapid growth in the number of Internet users, the combination of traditional victimization and the Internet has generated cyber victimization (<xref ref-type="bibr" rid="B1">1</xref>). Unlike traditional victimization, which relies on physical contact, cyber victimization has increasingly become the focus of researchers' attention due to its anonymity and lack of temporal and spatial constraints (<xref ref-type="bibr" rid="B2">2</xref>). Specifically, cyber victimization refers to individuals who are repeatedly subjected to malicious and aggressive behaviors from other individuals or groups during electronic information exchange (<xref ref-type="bibr" rid="B3">3</xref>), including forms of verbal intimidation, insults, verbal abuse, and malicious harassment (<xref ref-type="bibr" rid="B4">4</xref>). Individuals who are chronically victimized online often suffer from a range of internalizing and externalizing problems, such as anxiety and depression (<xref ref-type="bibr" rid="B5">5</xref>), which may even be severe enough to led to suicidal behavior (<xref ref-type="bibr" rid="B6">6</xref>). These problems can have a significant negative impact on the mental health of the victim. Some studies have pointed out that adolescents are being subconsciously shaped by the online environment, and the Internet is gradually becoming an important way for adolescents to address social developmental issues (<xref ref-type="bibr" rid="B7">7</xref>). Life course theory posits that if adolescents' developmental problems in one area (e.g., cyber victimization) are not effectively addressed during a critical transition period in their development (e.g., when they first enter middle school), it may trigger a chain reaction of events that could have serious consequences in many areas in the future (<xref ref-type="bibr" rid="B8">8</xref>). Middle school, as a critical developmental transition for adolescents, coincides with heightened susceptibility to the overwhelming volume of online information. According to Tokunaga (<xref ref-type="bibr" rid="B9">9</xref>), adolescence is a period of high prevalence of cyber victimization, and the trend of cyber victimization follows a curvilinear pattern as the age of the adolescent increases, with the highest prevalence rates occurring among middle school students in the seventh and eighth grades (approximately 13&#x2013;15 years of age). In a study of middle school students in the United States, it was found that about 11 percent of students reported experiencing cyber victimization at least once in the past few months (<xref ref-type="bibr" rid="B10">10</xref>). In addition, a keyword clustering study found a significant association between &#x201c;cyber victimization&#x201d; and &#x201c;adolescents&#x201d; (<xref ref-type="bibr" rid="B11">11</xref>). Furthermore, Zhang et&#xa0;al. (<xref ref-type="bibr" rid="B12">12</xref>) found that 53.5% of middle school students in China reported having experienced cyber victimization. This data reveals the severity of cyber victimization among adolescents in China. Therefore, it is of great theoretical and practical significance to study in depth the role mechanisms of cyber victimization among middle school students.</p>
<p>From the integrated child development model, it can be seen that both external factors (e.g., parental phubbing) and internal factors (e.g., anxiety) can have an impact on adolescents' cyber victimization (<xref ref-type="bibr" rid="B13">13</xref>&#x2013;<xref ref-type="bibr" rid="B15">15</xref>). Current research on factors influencing adolescent cyber victimization focuses on adolescents' own mobile phone use behaviors and lacks attention to parenting styles (<xref ref-type="bibr" rid="B16">16</xref>). Among many types of parenting styles, harsh parenting covers a wide range of manifestations and is not identical to other parenting behaviors, although there is some overlap. Researchers have argued that there is a need to examine harsh parenting as a distinct style of parenting, which would not only reveal its negative impact on child development, but also allow for a broader examination of the consequences of harsh parenting (<xref ref-type="bibr" rid="B17">17</xref>). Harsh parenting is a negative and neglectful parenting style that includes three aspects of harsh behaviors, harsh emotions, and harsh attitudes, mainly including physical aggression, verbal aggression, psychological aggression, and controlling behaviors (<xref ref-type="bibr" rid="B18">18</xref>). It is not only manifested in outwardly violent behaviors such as yelling and beating at children (<xref ref-type="bibr" rid="B19">19</xref>), but also in internal emotional attitudes such as neglecting, opposing, rejecting, and threatening children (<xref ref-type="bibr" rid="B20">20</xref>). On the one hand, according to social learning theory, adolescents who receive violent treatment from their parents are more tolerant of violent behavior (<xref ref-type="bibr" rid="B21">21</xref>). Research has found that harsh parenting can result in adolescents feeling neglect and rejection from their parents when they are cyber victimized (<xref ref-type="bibr" rid="B22">22</xref>), this may make adolescents reluctant to turn to their parents even when they are cyber victimized, leading to more cyber victimization among adolescents. Additionally, Lereya et&#xa0;al. (<xref ref-type="bibr" rid="B23">23</xref>) implemented a meta-analysis of 70 studies, demonstrating that negative parenting styles positively correlate with cyber victimization. Drawing on these studies, it can be inferred that harsh parenting may serve as a significant positive predictor of adolescents' cyber victimization.</p>
<p>However, this relationship is bidirectional, cyber victimization may also be reactive to harsh parenting. Parental acceptance and rejection theory emphasizes that the family is a dynamic and interactive system in which parents and children's behaviors interact and influence each other's (<xref ref-type="bibr" rid="B18">18</xref>). This relationship is reflected not only in the interactions between parenting behaviors and the child's growth, but also in the fact that the child's developmental characteristics trigger different parental responses over time, which may in turn be counterproductive to the child's subsequent development (<xref ref-type="bibr" rid="B24">24</xref>). In addition, developmental contextualism posits that there is a dynamic interplay between the individual and the multiple environments in which they exist (<xref ref-type="bibr" rid="B25">25</xref>). Empirical studies have found that parenting style is a significant predictor of cyber victimization (<xref ref-type="bibr" rid="B26">26</xref>). Harsh parenting is strongly associated with adolescent victimization (<xref ref-type="bibr" rid="B27">27</xref>). Adolescents who suffer from cyber victimization can suffer from a range of problematic behaviors such as depression and anxiety (<xref ref-type="bibr" rid="B5">5</xref>). When parents recognize these adverse effects, they may exert psychological control over their children and limit their behaviors (<xref ref-type="bibr" rid="B28">28</xref>). Furthermore, given that Chinese parents tend to have high academic expectations for their children (<xref ref-type="bibr" rid="B29">29</xref>). When they perceive the negative impacts of adolescents experiencing cyber victimization, they may engage in some controlling behaviors towards their adolescents for the purpose of promoting their academic development (<xref ref-type="bibr" rid="B30">30</xref>), which may exacerbate the likelihood of harsh parenting occurring. Consequently, there may be an interaction mechanism between harsh parenting and cyber victimization among middle school students.</p>
<p>Shyness refers to an individual's discomfort or behavioral inhibition in social situations, usually stemming from a fear of negative evaluations, which is often accompanied by emotional frustration or inhibition and can significantly affect individuals' willingness to engage in activities as well as their personal pursuits (<xref ref-type="bibr" rid="B31">31</xref>). Attachment theory posits that individuals experiencing harsh parenting tend to develop maladaptive affective-cognitive associations and negative self-schemas, leading to withdrawal behaviors that foster shyness development (<xref ref-type="bibr" rid="B32">32</xref>). Empirical research has demonstrated that children who are frequently reprimanded and physically punished tend to exhibit increased negative evaluations of their emotions and higher levels of shyness (<xref ref-type="bibr" rid="B33">33</xref>). Harsh parenting can intensify children's shyness, resulting in more frequent negative emotional experiences and a tendency toward negative interpretations of social situations (<xref ref-type="bibr" rid="B34">34</xref>). Shy individuals can exhibit introverted and neurotic traits that are highly similar to the victim's personality traits (<xref ref-type="bibr" rid="B35">35</xref>, <xref ref-type="bibr" rid="B36">36</xref>). In addition, according to the social adaptation model, shy individuals have negative perceptions of the environment and others, and will negatively interpret behaviors from others (<xref ref-type="bibr" rid="B37">37</xref>). Therefore, in online environments, shy individuals may view the behavior of others as rejection or harm to themselves and consider themselves as experiencing cyber victimization. Secondly, shy individuals may choose to avoid and allocate fewer attentional resources after they have noticed threats (<xref ref-type="bibr" rid="B38">38</xref>), which may lead them to choose avoidance when they face threats in the network, exacerbating the threats posed to them by others. And finally, shy individuals lack sufficient social support, and they tend to seek less help from others when experiencing cyber victimization (<xref ref-type="bibr" rid="B39">39</xref>), which also increases their risk of experiencing cyber victimization to a certain extent.</p>
<p>However, upon a comprehensive review of the existing literature, we have identified certain deficiencies. Firstly, the majority of studies have utilized a cross-sectional design (<xref ref-type="bibr" rid="B40">40</xref>&#x2013;<xref ref-type="bibr" rid="B43">43</xref>). This design approach poses challenges in effectively capturing the dynamic process of change among variables and often lacks a thorough exploration of the longitudinal relationships among these variables. Secondly, previous research has insufficiently differentiated between &#x201c;between-individual&#x201d; and &#x201c;within-individual&#x201d; effects, potentially resulting in biased estimations of between-variable relationships (<xref ref-type="bibr" rid="B44">44</xref>). Furthermore, while prior studies have explored the relationship between harsh parenting and adolescent psychological issues, few have specifically investigated its direct relationship with cyber victimization using longitudinal approaches. In light of the above, the current study adopted a longitudinal tracking design. Through the integration of the cross-lagged panel model (CLPM) and the random intercept cross-lagged panel model (RI-CLPM), we seeks to uncover the underlying mechanisms between harsh parenting and adolescent cyber victimization, offering a stronger basis for understanding its pathways.</p>
<p>In previous studies, interactions between variables have usually been analyzed through the CLPM model, a method that mainly reveals the relationships between the trait-based components of variables. However, the crux of developmental theory is to explore the relationships between the stateful components of variables at the within-individual level (<xref ref-type="bibr" rid="B45">45</xref>). Therefore, the use of traditional CLPM models may result in a degree of mismatch between developmental theory and the statistical analysis models used to test the theoretical hypotheses (<xref ref-type="bibr" rid="B46">46</xref>). The traditional CLPM model has limitations, which are mainly reflected in the inability to effectively separate between-individual differences from within-individual changes, and its analytical results mainly focus on the decomposed between-person effects (<xref ref-type="bibr" rid="B47">47</xref>). As time passes, individual characteristics fluctuate compared to their initial levels, and this within-individual variation is more conducive to inferring causality of variables over time. In light of this, the researchers proposed the RI-CLPM model. RI-CLPM distinguishes between-individual differences through random intercepts and captures within-individual dynamics via time-varying residuals, thereby more accurately revealing the temporal associations between variables (<xref ref-type="bibr" rid="B44">44</xref>). By separating the between-individual variance from the within-individual variance, RI-CLPM can present a clearer picture of the dynamic process of individual change in a time series (<xref ref-type="bibr" rid="B44">44</xref>), this improvement significantly enhances the explanatory power of the model for the within-individual effects and provides a more robust framework for longitudinal data analysis (<xref ref-type="bibr" rid="B47">47</xref>).</p>
<p>Despite the fact that CLPM and RI-CLPM possess distinct analytical strengths, they are complementary rather than mutually exclusive in examining temporal dynamics between variables. Methodological research suggests that integrating both models offers a comprehensive analytical framework, enabling simultaneous examination of group-level associations and within-individual change mechanisms, thereby providing a more complete understanding of variable interactions (<xref ref-type="bibr" rid="B47">47</xref>, <xref ref-type="bibr" rid="B48">48</xref>). Based on this, the present study used both CLPM and RI-CLPM methods to comprehensively examine the interaction between harsh parenting and cyber victimization so as to gain a deeper understanding of the longitudinal relationship.</p>
</sec>
<sec id="s2" sec-type="materials|methods">
<label>2</label>
<title>Materials and methods</title>
<sec id="s2_1">
<label>2.1</label>
<title>Participants</title>
<p>A cluster sampling method was utilized to select first-year middle school students from four middle schools in Anhui Province. The study conducted three survey waves, with questionnaires administered in classroom settings under teacher supervision. All participants provided written informed consent and voluntarily participated in this anonymous study.</p>
<p>Three measurements were taken in January 2023 (T1), September 2023 (T2), and May 2024 (T3), with an interval of eight months each time. The criteria for valid questionnaires were no regularity of responses and repetitions, no missing information, reasonable response time, and no logical conflict before or after the questionnaire was done. A total of 903 valid questionnaires were collected in the first time, 853 valid questionnaires were obtained in the second time, and by the end of the third time, a total of 75 participants had been lost due to class transfer or other reasons. A total of 828 valid questionnaires were obtained and the loss rate of questionnaires was 8.3%. Among them, 403 (48.7%) were boys and 425 (51.3%) were girls, 518 (62.6%) were urban and 310 (37.4%) were rural. The mean age of the subjects at the first time was 12.13 &#xb1; 1.21.</p>
<p>The results of the independent samples <italic>t</italic>-test showed that there were no significant differences between the 75 participants and the 828 valid participants on harsh parenting [<italic>t</italic> (828) = 0.65, <italic>p</italic>&gt;0.05], shyness [<italic>t</italic>(828) = -0.47, <italic>p</italic>&gt;0.05], and cyber victimization [<italic>t</italic>(828) = 0.82, <italic>p</italic>&gt;0.05 ], suggesting that there was no structured attrition of the participants.</p>
</sec>
<sec id="s2_2">
<label>2.2</label>
<title>Methods</title>
<sec id="s2_2_1">
<label>2.2.1</label>
<title>Harsh parenting scale</title>
<p>The Harsh Parenting Scale originally developed by Simon et&#xa0;al. (<xref ref-type="bibr" rid="B49">49</xref>) and subsequently revised by Wang (<xref ref-type="bibr" rid="B50">50</xref>) was employed in this study. This scale comprises four items and is scored using a 5-point Likert scale ranging from 1 (not at all compliant) to 5 (fully compliant). Higher scores on this scale indicate greater exposure to harsh parenting behaviors. The Cronbach's alpha coefficients for the three measurements of the scale were 0.918, 0.925, and 0.923, respectively.</p>
</sec>
<sec id="s2_2_2">
<label>2.2.2</label>
<title>Shyness scale</title>
<p>The Shyness Scale, developed by Cheek and Buss (<xref ref-type="bibr" rid="B51">51</xref>), was utilized in this study to evaluate middle school students' behavioral inhibitions in social situations and their self-assessment of social behavior. The questionnaire is one-dimensional, with 13 items, and is scored on a 5-point scale from 1 (not at all compliant) to 5 (fully compliant), with higher scores indicating higher levels of shyness. The scale has been tested by Chinese scholars with good reliability and validity (<xref ref-type="bibr" rid="B52">52</xref>), and has been widely used in the measurement of Chinese student groups (<xref ref-type="bibr" rid="B53">53</xref>, <xref ref-type="bibr" rid="B54">54</xref>). Across the three measurement waves, the scale exhibited high internal consistency, with Cronbach's alpha coefficients of 0.977, 0.978, and 0.974, respectively.</p>
</sec>
<sec id="s2_2_3">
<label>2.2.3</label>
<title>Cyber victimization scale</title>
<p>It was a subscale of the Cyberbullying Scale, which was originally developed by Topcu and Erdur-Baker (<xref ref-type="bibr" rid="B55">55</xref>) and then subsequently translated by Chinese scholars Chu and Fan (<xref ref-type="bibr" rid="B56">56</xref>). This subscale consists of 14 items, each rated on a 4-point Likert scale ranging from 1 (never perpetrated) to 4 (more than 3 times). The scale demonstrated high internal consistency across the three measurement waves, with Cronbach's alpha coefficients of 0.976, 0.978, and 0.980, respectively.</p>
</sec>
</sec>
<sec id="s2_3">
<label>2.3</label>
<title>Data analysis</title>
<p>This study used SPSS 26.0 and Mplus 8.3 for data analysis. SPSS 26.0 was utilized to conduct descriptive statistics and correlation analysis. Longitudinal measurement invariance was tested using Mplus 8.3, followed by analyses of CLPM and RI-CLPM. Additionally, the mediating role of shyness in the relationship between harsh parenting and cyber victimization was examined, the mediating effect was tested using the Bootstrap method.</p>
</sec>
</sec>
<sec id="s3" sec-type="results">
<label>3</label>
<title>Results</title>
<sec id="s3_1">
<label>3.1</label>
<title>Common method bias test</title>
<p>Given that the data were derived from self-reports, Harman single-factor test was conducted for all variables. All items related to harsh parenting (T1, T2, T3), shyness (T1, T2, T3), and cyber victimization (T1, T2, T3) were included in Harman single-factor test (<xref ref-type="bibr" rid="B53">53</xref>). The results indicated that nine factors with eigenvalues greater than 1 were extracted, with the first factor accounting for 24.221% of the variance, which is below the critical threshold of 40%, this suggests that common method bias is not a significant concern in this study (<xref ref-type="bibr" rid="B54">54</xref>).</p>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Descriptive statistics and correlation analysis</title>
<p>Descriptive statistics and correlation coefficients for the variables are presented in <xref ref-type="table" rid="T1">
<bold>Table&#xa0;1</bold>
</xref>. At all time pints, harsh parenting was significantly and positively correlated with shyness(range of <italic>r</italic> = 0.099 to 0.468, all <italic>p</italic>&lt;0.01), harsh parenting was significantly and positively correlated with cyber victimization(range of <italic>r</italic> = 0.099 to 0.468, all <italic>p</italic>&lt;0.01), shyness was positively correlated with cyber victimization(range of <italic>r</italic> = 0.025 to 0.284). In addition, there were significant correlations among harsh parenting at each time point (range of <italic>r</italic> = 0.300 to 0.468, all <italic>p</italic>&lt;0.001) and among shyness at each time point (range of <italic>r</italic> = 0.185 to 0.382, all <italic>p</italic>&lt;0.001) as well as among cyber victimization at each time point(range of <italic>r</italic> = 0.072 to 0.342, all <italic>p</italic>&lt;0.05). Gender was significantly and negatively correlated with T2 harsh parenting(<italic>r</italic> = -0.087, <italic>p</italic> &lt; 0.05) and T2 shyness (<italic>r</italic> = -0.190, <italic>p</italic> &lt; 0.05). Therefore, in subsequent analyses of CLPM and RI-CLPM conducted using Mplus 8.3, we incorporated gender as a control variable in the models.</p>
<table-wrap id="T1" position="float">
<label>Table&#xa0;1</label>
<caption>
<p>Descriptive statistics and correlation analysis (N = 828).</p>
</caption>
<table frame="hsides">
<thead>
<tr>
<th valign="middle" align="center">
</th>
<th valign="middle" align="center">1</th>
<th valign="middle" align="center">2</th>
<th valign="middle" align="center">3</th>
<th valign="middle" align="center">4</th>
<th valign="middle" align="center">5</th>
<th valign="middle" align="center">6</th>
<th valign="middle" align="center">7</th>
<th valign="middle" align="center">8</th>
<th valign="middle" align="center">9</th>
<th valign="middle" align="center">10</th>
</tr>
</thead>
<tbody>
<tr>
<td valign="middle" align="center">1 T1 Gender</td>
<td valign="middle" align="center">1</td>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
</tr>
<tr>
<td valign="middle" align="center">2 T1HP</td>
<td valign="middle" align="center">-0.052</td>
<td valign="middle" align="center">1</td>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
</tr>
<tr>
<td valign="middle" align="center">3 T2HP</td>
<td valign="middle" align="center">-0.087<sup>*</sup>
</td>
<td valign="middle" align="center">0.426<sup>***</sup>
</td>
<td valign="middle" align="center">1</td>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
</tr>
<tr>
<td valign="middle" align="center">4 T3HP</td>
<td valign="middle" align="center">0.008</td>
<td valign="middle" align="center">0.300<sup>***</sup>
</td>
<td valign="middle" align="center">0.468<sup>***</sup>
</td>
<td valign="middle" align="center">1</td>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
</tr>
<tr>
<td valign="middle" align="center">5 T1S</td>
<td valign="middle" align="center">-0.026</td>
<td valign="middle" align="center">0.268<sup>***</sup>
</td>
<td valign="middle" align="center">0.123<sup>***</sup>
</td>
<td valign="middle" align="center">0.099<sup>**</sup>
</td>
<td valign="middle" align="center">1</td>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
</tr>
<tr>
<td valign="middle" align="center">6 T2S</td>
<td valign="middle" align="center">-0.190<sup>*</sup>
</td>
<td valign="middle" align="center">0.268<sup>***</sup>
</td>
<td valign="middle" align="center">0.359<sup>***</sup>
</td>
<td valign="middle" align="center">0.185<sup>***</sup>
</td>
<td valign="middle" align="center">0.382<sup>***</sup>
</td>
<td valign="middle" align="center">1</td>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
</tr>
<tr>
<td valign="middle" align="center">7 T3S</td>
<td valign="middle" align="center">0.005</td>
<td valign="middle" align="center">0.118<sup>***</sup>
</td>
<td valign="middle" align="center">0.106<sup>**</sup>
</td>
<td valign="middle" align="center">0.200<sup>***</sup>
</td>
<td valign="middle" align="center">0.206<sup>***</sup>
</td>
<td valign="middle" align="center">0.185<sup>***</sup>
</td>
<td valign="middle" align="center">1</td>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
</tr>
<tr>
<td valign="middle" align="center">8 T1CV</td>
<td valign="middle" align="center">-0.007</td>
<td valign="middle" align="center">0.310<sup>***</sup>
</td>
<td valign="middle" align="center">0.232<sup>***</sup>
</td>
<td valign="middle" align="center">0.167<sup>***</sup>
</td>
<td valign="middle" align="center">0.124<sup>***</sup>
</td>
<td valign="middle" align="center">0.172<sup>***</sup>
</td>
<td valign="middle" align="center">0.042<sup>*</sup>
</td>
<td valign="middle" align="center">1</td>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
</tr>
<tr>
<td valign="middle" align="center">9 T2CV</td>
<td valign="middle" align="center">-0.047</td>
<td valign="middle" align="center">0.324<sup>***</sup>
</td>
<td valign="middle" align="center">0.486<sup>***</sup>
</td>
<td valign="middle" align="center">0.180<sup>***</sup>
</td>
<td valign="middle" align="center">0.087<sup>*</sup>
</td>
<td valign="middle" align="center">0.284<sup>***</sup>
</td>
<td valign="middle" align="center">0.103<sup>**</sup>
</td>
<td valign="middle" align="center">0.342<sup>***</sup>
</td>
<td valign="middle" align="center">1</td>
<td valign="middle" align="center"/>
</tr>
<tr>
<td valign="middle" align="center">10 T3CV</td>
<td valign="middle" align="center">-0.030</td>
<td valign="middle" align="center">0.099<sup>**</sup>
</td>
<td valign="middle" align="center">0.187<sup>***</sup>
</td>
<td valign="middle" align="center">0.097<sup>**</sup>
</td>
<td valign="middle" align="center">0.025</td>
<td valign="middle" align="center">0.202<sup>***</sup>
</td>
<td valign="middle" align="center">0.185<sup>***</sup>
</td>
<td valign="middle" align="center">0.072<sup>*</sup>
</td>
<td valign="middle" align="center">0.223<sup>***</sup>
</td>
<td valign="middle" align="center">1</td>
</tr>
<tr>
<td valign="middle" align="center">M</td>
<td valign="middle" align="center">1.51</td>
<td valign="middle" align="center">3.740</td>
<td valign="middle" align="center">3.708</td>
<td valign="middle" align="center">3.540</td>
<td valign="middle" align="center">3.553</td>
<td valign="middle" align="center">3.438</td>
<td valign="middle" align="center">3.140</td>
<td valign="middle" align="center">3.267</td>
<td valign="middle" align="center">3.181</td>
<td valign="middle" align="center">3.188</td>
</tr>
<tr>
<td valign="middle" align="center">SD</td>
<td valign="middle" align="center">0.5</td>
<td valign="middle" align="center">0.757</td>
<td valign="middle" align="center">0.784</td>
<td valign="middle" align="center">0.766</td>
<td valign="middle" align="center">0.748</td>
<td valign="middle" align="center">0.766</td>
<td valign="middle" align="center">0.702</td>
<td valign="middle" align="center">0.652</td>
<td valign="middle" align="center">0.700</td>
<td valign="middle" align="center">0.860</td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<fn>
<p>HP, Harsh Parenting; S, Shyness; CV, Cyber Victimization; T1, Time 1; T2, Time 2; T3, Time 3. Gender is a dummy variable (male = 0, female = 1). <sup>***</sup>
<italic>p</italic>&lt;0.001;<sup>**</sup>
<italic>p</italic>&lt;0.01;<sup>*</sup>
<italic>p</italic>&lt;0.05.</p>
</fn>
</table-wrap-foot>
</table-wrap>
</sec>
<sec id="s3_3">
<label>3.3</label>
<title>Longitudinal measurement invariance test</title>
<p>Following established recommendations, the criteria for model fit evaluation include: Tucker-Lewis Index(TLI) &gt; 0.95, Comparative Fit Index(CFI) &gt; 0.9, Standardized Root Mean Square Residual (SRMR) &lt; 0.08, and Root Mean Square Error of Approximation(RMSEA) &lt; 0.06 (<xref ref-type="bibr" rid="B57">57</xref>).</p>
<p>Given the longitudinal nature of the data, analyses of longitudinal measurement invariance were conducted. In this study, three levels of measurement invariance were tested across time points: configural invariance, metric invariance (factor loading invariance) and scalar invariance (item intercept invariance). A particular test of equivalence is considered to have been passed if the differences between the individual model fit indicators are less than a set threshold(&#x394;CFI &lt; 0.01 and &#x394;RMSEA &lt; 0.015) (<xref ref-type="bibr" rid="B58">58</xref>). As presented in <xref ref-type="table" rid="T2">
<bold>Table&#xa0;2</bold>
</xref>, all variables met the criteria for scalar invariance, confirming the robustness of the measurement model across time points.</p>
<table-wrap id="T2" position="float">
<label>Table&#xa0;2</label>
<caption>
<p>Model fit indices for longitudinal measurement invariance analysis.</p>
</caption>
<table frame="hsides">
<thead>
<tr>
<th valign="middle" rowspan="2" align="center">Model</th>
<th valign="middle" rowspan="2" align="center">
<italic>&#x3c7;&#xb2;</italic>
</th>
<th valign="middle" rowspan="2" align="center">
<italic>df</italic>
</th>
<th valign="middle" rowspan="2" align="center">CFI</th>
<th valign="middle" rowspan="2" align="center">RMSEA (90% CI)</th>
<th valign="middle" rowspan="2" align="center">SRMR</th>
<th valign="middle" rowspan="2" align="center">Model Comparison</th>
<th valign="middle" rowspan="2" align="center">&#x394;CFI</th>
<th valign="middle" rowspan="2" align="center">&#x394;RMSEA</th>
</tr>
</thead>
<tbody>
<tr>
<th valign="middle" colspan="9" align="center">Harsh Parenting</th>
</tr>
<tr>
<td valign="middle" align="center">M1:Configural Invariance</td>
<td valign="middle" align="center">7.245</td>
<td valign="middle" align="center">6</td>
<td valign="middle" align="center">1</td>
<td valign="middle" align="center">0.016(0.000,0.050)</td>
<td valign="middle" align="center">0.004</td>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
</tr>
<tr>
<td valign="middle" align="center">M2:Metric Invariance</td>
<td valign="middle" align="center">17.908</td>
<td valign="middle" align="center">12</td>
<td valign="middle" align="center">0.999</td>
<td valign="middle" align="center">0.024(0.000,0.046)</td>
<td valign="middle" align="center">0.019</td>
<td valign="middle" align="center">M2-M1</td>
<td valign="middle" align="center">0.001</td>
<td valign="middle" align="center">0.008</td>
</tr>
<tr>
<td valign="middle" align="center">M3:Scalar Invariance</td>
<td valign="middle" align="center">29.916</td>
<td valign="middle" align="center">18</td>
<td valign="middle" align="center">0.998</td>
<td valign="middle" align="center">0.028(0.007,0.046)</td>
<td valign="middle" align="center">0.021</td>
<td valign="middle" align="center">M3-M2</td>
<td valign="middle" align="center">0.001</td>
<td valign="middle" align="center">0.004</td>
</tr>
<tr>
<th valign="middle" colspan="9" align="center">Shyness</th>
</tr>
<tr>
<td valign="middle" align="center">M1:Configural Invariance</td>
<td valign="middle" align="center">174.053</td>
<td valign="middle" align="center">195</td>
<td valign="middle" align="center">1</td>
<td valign="middle" align="center">0.000(0.000,0.009)</td>
<td valign="middle" align="center">0.007</td>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
</tr>
<tr>
<td valign="middle" align="center">M2:Metric Invariance</td>
<td valign="middle" align="center">196.769</td>
<td valign="middle" align="center">219</td>
<td valign="middle" align="center">1</td>
<td valign="middle" align="center">0.000(0.000,0.008)</td>
<td valign="middle" align="center">0.016</td>
<td valign="middle" align="center">M2-M1</td>
<td valign="middle" align="center">0</td>
<td valign="middle" align="center">0</td>
</tr>
<tr>
<td valign="middle" align="center">M3:Scalar Invariance</td>
<td valign="middle" align="center">234.112</td>
<td valign="middle" align="center">243</td>
<td valign="middle" align="center">1</td>
<td valign="middle" align="center">0.000(0.000,0.012)</td>
<td valign="middle" align="center">0.017</td>
<td valign="middle" align="center">M3-M2</td>
<td valign="middle" align="center">0</td>
<td valign="middle" align="center">0</td>
</tr>
<tr>
<th valign="middle" colspan="9" align="center">Cyber Victimization</th>
</tr>
<tr>
<td valign="middle" align="center">M1:Configural Invariance</td>
<td valign="middle" align="center">279.715</td>
<td valign="middle" align="center">231</td>
<td valign="middle" align="center">0.999</td>
<td valign="middle" align="center">0.011(0.006,0.015)</td>
<td valign="middle" align="center">0.008</td>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
<td valign="middle" align="center"/>
</tr>
<tr>
<td valign="middle" align="center">M2:Metric Invariance</td>
<td valign="middle" align="center">316.058</td>
<td valign="middle" align="center">257</td>
<td valign="middle" align="center">0.998</td>
<td valign="middle" align="center">0.012(0.007,0.015)</td>
<td valign="middle" align="center">0.019</td>
<td valign="middle" align="center">M2-M1</td>
<td valign="middle" align="center">0</td>
<td valign="middle" align="center">0.001</td>
</tr>
<tr>
<td valign="middle" align="center">M3:Scalar Invariance</td>
<td valign="middle" align="center">346.590</td>
<td valign="middle" align="center">283</td>
<td valign="middle" align="center">0.998</td>
<td valign="middle" align="center">0.011(0.006,0.015)</td>
<td valign="middle" align="center">0.020</td>
<td valign="middle" align="center">M3-M2</td>
<td valign="middle" align="center">0</td>
<td valign="middle" align="center">0.001</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s3_4">
<label>3.4</label>
<title>Cross-lagged analysis of harsh parenting, shyness, and cyber victimization</title>
<p>Structural Equation Modeling (SEM) was employed to construct CLPM examining the relationship between harsh parenting and cyber victimization. The model fit indices were as follows: &#x3c7;&#xb2;/<italic>df</italic> = 4.373, RMSEA = 0.064, SRMR = 0.025, CFI = 0.974, TLI = 0.907, indicating an acceptable fit to the data. As can be seen in <xref ref-type="fig" rid="f1">
<bold>Figure&#xa0;1</bold>
</xref>, T1 harsh parenting positively predicted T2 harsh parenting (<italic>&#x3b2;</italic> = 0.392, <italic>p</italic> &lt; 0.001), and T2 harsh parenting positively predicted T3 harsh parenting (<italic>&#x3b2;</italic> = 0.498, <italic>p</italic> &lt; 0.001). T1 cyber victimization positively predicted T2 cyber victimization (<italic>&#x3b2;</italic> = 0.267, <italic>p</italic> &lt; 0.001), and T2 cyber victimization positively predict T3 cyber victimization(<italic>&#x3b2;</italic> = 0.173, <italic>p</italic> &lt; 0.001). T1 harsh parenting positively predicted T2 cyber victimization (<italic>&#x3b2;</italic> = 0.241, <italic>p</italic> &lt; 0.001), T2 harsh parenting positively predicted T3 cyber victimization (<italic>&#x3b2;</italic> = 0.103, <italic>p</italic> &lt; 0.05), and T1 cyber victimization positively predicted T2 harsh parenting (<italic>&#x3b2;</italic> = 0.110, <italic>p</italic> &lt; 0.001).</p>
<fig id="f1" position="float">
<label>Figure&#xa0;1</label>
<caption>
<p>Cross-lagged model of harsh parenting and cyber victimization. Solid lines represent standardized path coefficients that are statistically significant, while dashed lines indicate non-significant coefficients; non-significant paths are omitted from the figure. ***p&lt;0.001; *p&lt;0.05. The same notation convention applies the subsequent figures.</p>
</caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fpsyt-16-1607367-g001.tif">
<alt-text content-type="machine-generated">Flowchart depicting the relationship between harsh parenting and cyber victimization over three time periods: T1, T2, and T3. Arrows indicate the direction and strength of relationships, with coefficients marked alongside, some denoted with asterisks indicating significance. Solid lines represent significant paths, while dashed lines denote less significant paths.</alt-text>
</graphic>
</fig>
<p>Second, CLPM was employed to examine the relationships among harsh parenting, shyness and cyber victimization. <xref ref-type="fig" rid="f2">
<bold>Figure&#xa0;2</bold>
</xref> presents the structural model with standardized path coefficients. The model demonstrated an acceptable fit to the data, as indicated by the following fit indices: &#x3c7;&#xb2;/<italic>df</italic> = 3.146, RMSEA = 0.051, SRMR = 0.018, CFI = 0.985, TLI = 0.905. After controlling for gender, T1 harsh parenting positively predicted T2 shyness (<italic>&#x3b2;</italic> = 0.153, <italic>p</italic> &lt; 0.001) and T2 cyber victimization (<italic>&#x3b2;</italic> = 0.244, <italic>p</italic> &lt; 0.01). Additionally, T2 shyness positively predicted T3 cyber victimization (<italic>&#x3b2;</italic> = 0.138, <italic>p</italic> &lt; 0.001). Furthermore, T1 cyber victimization positively predicted T2 harsh parenting (<italic>&#x3b2;</italic> = 0.109, <italic>p</italic> &lt; 0.01) and T2 shyness (<italic>&#x3b2;</italic> = 0.084, <italic>p</italic> &lt; 0.05). Mediation analyses using deviation correction percentile bootstrap method revealed that T2 shyness mediated the relationship between T1 harsh parenting and T3 cyber victimization, with a mediation effect value of 0.021, 95% <italic>CI</italic> [0.011, 0.038].</p>
<fig id="f2" position="float">
<label>Figure&#xa0;2</label>
<caption>
<p>Cross-lagged model of harsh parenting, shyness, and cyber victimization. ***p&lt;0.001;**p&lt;0.01;*p&lt;0.05.</p>
</caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fpsyt-16-1607367-g002.tif">
<alt-text content-type="machine-generated">Structural equation model diagram showing relationships between Harsh Parenting, Shyness, and Cyber Victimization across three time points (T1, T2, T3). Solid arrows depict significant paths with coefficients, while dashed arrows show less significant paths. Positive coefficients indicate relationships between variables: Harsh Parenting to Shyness (0.391 to 0.491), Shyness to Cyber Victimization (0.130 to 0.266). Reciprocal relationships exist between Shyness and Cyber Victimization. Significance is marked by asterisks, with three indicating high significance.</alt-text>
</graphic>
</fig>
</sec>
<sec id="s3_5">
<label>3.5</label>
<title>Random intercept cross-lagged analysis of harsh parenting, shyness, and cyber victimization</title>
<p>The relationship between harsh parenting and cyber victimization was analyzed using the random intercept cross-lagged analysis. The model fit indices were as follows: &#x3c7;&#xb2;/<italic>df</italic> = 2.739, RMSEA = 0.046, SRMR = 0.014, CFI = 0.998, TLI = 0.930, indicating an acceptable fit to the data. As illustrated in <xref ref-type="fig" rid="f3">
<bold>Figure&#xa0;3</bold>
</xref>, the analysis revealed distinct patterns at different levels. At the between-person level, harsh parenting showed no significant association with the random intercept of cyber victimization(<italic>&#x3b2;</italic> = 1.283, <italic>p</italic> &gt; 0.05). At the within-individual level, T1 harsh parenting positively predicted T2 harsh parenting (<italic>&#x3b2;</italic> = 0.215, <italic>p</italic> &lt; 0.001), T2 harsh parenting positively predicted T3 harsh parenting (<italic>&#x3b2;</italic> = 0.331, <italic>p</italic> &lt; 0.001), T1 cyber victimization positively predicted T2 cyber victimization (<italic>&#x3b2;</italic> = 0.227, <italic>p</italic> &lt; 0.001), T2 cyber victimization positively predicted T3 cyber victimization (<italic>&#x3b2;</italic> = 0.188, <italic>p</italic> &lt; 0.001), and T1 harsh parenting positively predicted T2 cyber victimization (<italic>&#x3b2;</italic> = 0.189, <italic>p</italic> &lt; 0.001).</p>
<fig id="f3" position="float">
<label>Figure&#xa0;3</label>
<caption>
<p>Random intercept cross-lagged panel model of harsh parenting and cyber victimization. RI denotes random intercept. The same notation convention applies to subsequent figures. ***p&lt;0.001.</p>
</caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fpsyt-16-1607367-g003.tif">
<alt-text content-type="machine-generated">Diagram showing relationships between &#x201c;Harsh Parenting&#x201d; and &#x201c;Cyber Victimization&#x201d; at between-person and within-person levels across three time points (T1, T2, T3). Arrows depict significant paths with coefficients, indicating relationships between the variables.</alt-text>
</graphic>
</fig>
<p>
<xref ref-type="fig" rid="f4">
<bold>Figure&#xa0;4</bold>
</xref> presents the random intercept cross-lagged analysis examining the relationships among harsh parenting, shyness, and cyber victimization. The model fit indices were as follows: &#x3c7;&#xb2;/<italic>df</italic> =1.510, RMSEA = 0.025, CFI = 0.999, TLI = 0.976, SRMR = 0.009, indicating an acceptable fit to the data. At the between-individual level, the random intercepts of harsh parenting, shyness, and cyber victimization were not significantly related. At the within-individual level, T1 harsh parenting positively predicted T2 harsh parenting (<italic>&#x3b2;</italic> = 0.227, <italic>p</italic> &lt; 0.01), T2 harsh parenting positively predicted T3 harsh parenting (<italic>&#x3b2;</italic> = 0.323, <italic>p</italic> &lt; 0.001). T1 shyness positively predicted T2 shyness (<italic>&#x3b2;</italic> = 0.219, <italic>p</italic> &lt; 0.001), T2 shyness positively predicted T3 shyness (<italic>&#x3b2;</italic> = 0.231, <italic>p</italic> &lt; 0.01). T1 cyber victimization positively predicted T2 cyber victimization (<italic>&#x3b2;</italic> = 0.295, <italic>p</italic> &lt; 0.001) and T2 cyber victimization positively predicted T3 cyber victimization (<italic>&#x3b2;</italic> = 0.165, <italic>p</italic> &lt; 0.05). T1 harsh parenting positively predicted T2 shyness (<italic>&#x3b2;</italic> = 0.137, <italic>p</italic> &lt; 0.05) and T2 cyber victimization (<italic>&#x3b2;</italic> = 0.193, <italic>p</italic> &lt; 0.01). T2 shyness positively predicted T3 cyber victimization (<italic>&#x3b2;</italic> = 0.187, <italic>p</italic> &lt; 0.001), and T1 cyber victimization positively predicted T2 shyness (<italic>&#x3b2;</italic> = 0.141, <italic>p</italic> &lt; 0.01). Furthermore, mediation analysis revealed that T2 shyness mediated the relationship between T1 harsh parenting and T3 cyber victimization. The standardized indirect effect from T1 harsh parenting to T3 cyber victimization was significant, with an estimate of 0.026, 95% <italic>CI</italic> [0.007, 0.058]. This suggests that harsh parenting has a positive and statistically significant indirect effect on cyber victimization.</p>
<fig id="f4" position="float">
<label>Figure&#xa0;4</label>
<caption>
<p>Random intercept cross-lagged panel model of harsh parenting, shyness, and cyber victimization. ***p&lt;0.001;**p&lt;0.01;*p&lt;0.05.</p>
</caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fpsyt-16-1607367-g004.tif">
<alt-text content-type="machine-generated">Diagram showing relationships between variables at the between-person and within-person levels. Between-person level includes RI_Harsh parenting, RI_Shyness, and RI_Cyber victimization with arrows indicating correlations. Within-person level involves T1, T2, and T3 stages for Harsh parenting, Shyness, and Cyber victimization, displaying paths with numerical coefficients. Solid lines indicate significant paths, while dashed lines indicate less significant paths.</alt-text>
</graphic>
</fig>
</sec>
</sec>
<sec id="s4" sec-type="discussion">
<label>4</label>
<title>Discussion</title>
<p>The current study employed both CLPM and RI-CLPM to examine the underlying mechanisms between harsh parenting and cyber victimization, while investigating the mediating role of shyness in this relationship. The results revealed notable differences in the relationships between variables as demonstrated by the two models. The primary reason for the discrepancy in results between these two statistical models lies in their differing interpretations of variable relationships. The CLPM captures an overall association between variables, integrating within-individual and between-individual effects. However, its inability to disentangle these effects can lead to confounding by individual characteristics and measurement errors, thereby obscuring precise insights into variable relationships. In contrast, RI-CLPM explicitly differentiates between within-individual and between-individual effects.</p>
<p>Given the limitations of the CLPM, this study prioritizes the RI-CLPM as the primary analytical framework to separately examine between-individual and within-individual effects. By employing this differentiated approach, we can more precisely analyze the complex relationships between variables. Furthermore, the discrepancy between the results of the CLPM and RI-CLPM offers valuable insights for researchers. This phenomenon underscores the importance of fully considering the inherent limitations of the CLPM when interpreting its findings. Such caution is essential to ensure the accuracy and reliability of research conclusions and to avoid misinterpreting phenomena due to the model's intrinsic flaws.</p>
<sec id="s4_1">
<label>4.1</label>
<title>Inconsistency between CLPM and RI-CLPM results</title>
<p>In this study, we employed the CLPM and RI-CLPM to examine the bidirectional associations between harsh parenting and cyber victimization, as well as the mediating role of shyness. The inconsistency of the results presented by these two statistical analysis models is primarily attributed to the distinct meanings and assumptions inherent to each model.</p>
<p>First, this study examined the bivariate relationship between harsh parenting and cyber victimization. In CLPM, harsh parenting at the previous time point significantly and positively predicted cyber victimization at the later time point. In contrast, in RI-CLPM, harsh parenting was not significantly related to cyber victimization in terms of between-individual effects. Regarding within-individual effects, harsh parenting was only able to significantly and positively predict cyber victimization in the earlier part of the study, and this relationship did not hold in the later part of the study. Second, this study examined the bidirectional mediating role of shyness between harsh parenting and cyber victimization. In CLPM, shyness mediated longitudinally between T1 harsh parenting and T3 cyber victimization. However, in the RI-CLPM, there was no significant correlation among the three at the between-individual effect. At the within-individual level, shyness mediated longitudinally between T1 harsh parenting and T3 cyber victimization. The inconsistency between the CLPM and RI-CLPM results suggests a within-individual effect as the critical pathway for harsh parenting to influence cyber victimization, a result that reflects developmental theories in which the relationship between the stateful components of variables at the within-individual level is at the heart of the research (<xref ref-type="bibr" rid="B45">45</xref>).</p>
<p>As the CLPM is recognized as a powerful method for exploring dynamic relationships between variables, the RI-CLPM is generated by adding one or more random intercepts to the CLPM (<xref ref-type="bibr" rid="B59">59</xref>). Utilizing these two models can provide a more comprehensive analytical perspective, and thus reveal the interactions between variables more fully (<xref ref-type="bibr" rid="B47">47</xref>, <xref ref-type="bibr" rid="B48">48</xref>). Some researchers have found that for the same tracking data, different models will provide different types of parameter information, CLPM and RI-CLPM may differ in their approach to exploring the role between variables (<xref ref-type="bibr" rid="B59">59</xref>). Therefore, despite the limitations of the CLPM, we likewise constructed the CLPM model in our study. This approach allows us to more thoroughly explore the research results and better grasp the essence of the relationships between variables. Moreover, by comparing the results of the study, it can provide some insights into how researchers understand and view the two methods.</p>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Harsh parenting and cyber victimization</title>
<p>The relationship between harsh parenting and cyber victimization was differentially reflected at the between-individual level and the within-individual level.</p>
<p>According to the CLPM results, harsh parenting and cyber victimization were mutually predictive in the pre-study period (T1-T2). This result is consistent with the parental acceptance and rejection theory that adolescents who experience harsh parenting will lack protection and support from their parents and are more likely to experience cyber victimization (<xref ref-type="bibr" rid="B18">18</xref>, <xref ref-type="bibr" rid="B60">60</xref>). After adolescents experience cyber victimization, there may be negative consequences that force parents to perpetuate harsh parenting (<xref ref-type="bibr" rid="B61">61</xref>). In the later part of the study (T2-T3), only harsh parenting significantly and positively predicted cyber victimization, which may be due to the fact that in the later part of the study, when adolescents spend more time in school and less time with their parents, the parents may have lacked awareness of their adolescents' cyber victimization behaviors, which led to a weakening of the effect of cyber victimization on harsh parenting.</p>
<p>Based on RI-CLPM results. First, at the within-individual level, harsh parenting significantly predicted cyber victimization at the T1-T2 stage, but not at the T2-T3 stage. These findings align with social learning theory, demonstrating that adolescents who are victims of harsh parenting acquire this pattern of &#x201c;victimization&#x201d; and are able to accept and internalize the violence, resulting in greater acceptance of cyber victimization (<xref ref-type="bibr" rid="B21">21</xref>). This result can be explained by the life history theory, in which individuals develop certain adaptive strategies in the face of adversity (e.g., harsh parenting), and these adaptive strategies promote the development of the individual in unfavorable conditions (<xref ref-type="bibr" rid="B62">62</xref>). From this perspective, adolescents who are exposed to harsh parenting early in life are susceptible to its effects due to a lack of coping styles. Over time, some adolescents may acquire coping strategies, and in the later stages of the study, when adolescents are entering the stage of school entrance exams, schools tighten their control over adolescents' online behaviors, which reduces the incidence of cyber victimization to a certain extent. Adolescents who suffer from harsh parenting in the early stages are vulnerable to its effects due to a lack of coping styles. Over time, some adolescents may acquire coping strategies, and in the later stages of the study, when adolescents enter the stage of college entrance exams, schools will strengthen the control of adolescents' online behaviors, which will reduce the occurrence of cyber victimization to a certain extent. It is worth noting that the role of cyber victimization on harsh parenting was not significant. This may be related to the hidden nature of cyber victimization behavior (<xref ref-type="bibr" rid="B63">63</xref>). And compared to the visible physical scars or emotional damage in traditional victimization, cyber victimization may be difficult for parents to perceive (<xref ref-type="bibr" rid="B9">9</xref>).</p>
<p>Finally, the study found that at the between-individual level, harsh parenting was not significantly associated with cyber victimization. Since the between-individual level responds to an individual's trait component that is stable on the variable (<xref ref-type="bibr" rid="B59">59</xref>), this finding suggests that harsh parenting is not associated with the stable trait of cyber victimization. That is, the group of adolescents with high levels of harsh parenting also did not necessarily have higher levels of cyber victimization throughout the study period. According to ecosystem theory, individuals' development is influenced by multiple levels of environmental systems, and harsh parenting belongs to the family factors in the microsystem (<xref ref-type="bibr" rid="B64">64</xref>). During the study period, adolescents were in the school environment, and their cyber victimization was also influenced by multiple factors such as school and peer relationships in the microsystem (<xref ref-type="bibr" rid="B64">64</xref>). These factors interacted with each other and may have led to the inability to show a significant correlation between harsh parenting and cyber victimization at the between-individual level.</p>
</sec>
<sec id="s4_3">
<label>4.3</label>
<title>Longitudinal mediation of shyness</title>
<p>The study revealed relative stability in adolescents' experiences of harsh parenting, shyness, and cyber victimization across the three time points at the within-individual level. Harsh parenting, shyness, and cyber victimization in the previous period all significantly predicted the corresponding variables in the later period.</p>
<p>Furthermore, both the CLPM and RI-CLPM results found that T2 shyness mediated the relationship between T1 harsh parenting and T3 cyber victimization. Parental acceptance-rejection theory can effectively explain the relationship between harsh parenting and shyness. When individuals experience lower levels of parental support and parental warmth, it makes adolescents feel that their emotions and needs are not sufficiently valued and satisfied, which makes them prone to feelings of shame and inferiority, and increases the probability of their shyness behaviors (<xref ref-type="bibr" rid="B33">33</xref>, <xref ref-type="bibr" rid="B60">60</xref>). Such behavioral patterns manifest not only in face-to-face interactions but also extend to online environments, negatively impacting adolescents' digital social experiences. On the one hand, in online social contexts, shy individuals typically exhibit reduced self-disclosure tendencies and greater reluctance to share personal information, emotions, and thoughts. This behavioral pattern may result in social misinterpretation or neglect from peers, thereby elevating their vulnerability to cyber victimization (<xref ref-type="bibr" rid="B65">65</xref>). This shy behavior not only affects real-world socialization, but also extends to the online environment, negatively impacting adolescents' online socialization. On the other hand, shy individuals' lack of social support makes it difficult for them to get timely help when experiencing cyber victimization, thus increasing their vulnerability (<xref ref-type="bibr" rid="B37">37</xref>). Moreover, the anonymity and wide reach of online platforms lower the threshold for bullying behaviors, increasing shy adolescents' risk of victimization (<xref ref-type="bibr" rid="B2">2</xref>). When facing negative online interactions, these individuals often demonstrate limited coping efficacy due to insufficient social support. This phenomenon not only reveals the special dilemma of shy individuals in online environments, but also illustrates the mechanism of interaction between online and real socialization in bullying behavior.</p>
</sec>
<sec id="s4_4">
<label>4.4</label>
<title>Research significance</title>
<p>In terms of theoretical implications, this study systematically examined the relationship between harsh parenting, shyness, and cyber victimization by constructing the CLPM and RI-CLPM. From the perspective of developmental contextualism, the study suggests that cyber victimization of adolescents does not result from steady inter-individual trait differences, but is closely related to real-time fluctuations. Short-term changes in harsh parenting (e.g., a spike in parent-child conflict within a given period) may trigger immediate shyness emotional responses (e.g., heightened tendency to socially withdraw) in adolescents, which in turn increases their risk of experiencing cyber victimization within the same period. The findings provide a new theoretical perspective for understanding the dynamic mechanisms of adolescent psychological adjustment, which challenges the static assumptions of traditional cross-sectional studies that attribute variable associations to group stability traits (<xref ref-type="bibr" rid="B44">44</xref>). In addition, the findings highlight the importance of distinguishing between within-and between-individual effects in theory construction, whereas traditional CLPM analyses may overestimate the long-term predictive role of variables (e.g., harsh parenting) by confounding different levels of effects, the RI-CLPM analyses suggest that the effects of harsh parenting on cyber victimization are more reflective of short-term paths of action. The results from this study using the RI-CLPM emphasize the importance of considering both within-and between-individual effects when addressing the direct or indirect bi-directional associations between harsh parenting and cyber victimization among adolescents in the future.</p>
<p>The findings provide important implications for addressing adolescent cyber victimization. At the family level, parents should adopt constructive parenting practices that emphasize open communication and promote positive self-evaluation in adolescents. Schools can support this by offering parent education programs to reduce harsh parenting and encourage positive alternatives. Additionally, schools and communities should collaborate to develop digital literacy initiatives, incorporating diverse activities to enhance adolescents' awareness of online risks. Ultimately, a coordinated approach involving families, schools, and communities, supported by early intervention and long-term monitoring, is essential for effective prevention and intervention.</p>
</sec>
<sec id="s4_5">
<label>4.5</label>
<title>Limitations</title>
<p>This study has several limitations that warrant consideration. First, the reliance on self-reported data may introduce recall bias and social desirability effects, potentially leading to discrepancies between adolescents' perceptions of harsh parenting and actual parenting behaviors. Future research could enhance data reliability by incorporating multiple methodologies, such as experimental designs and in-depth interviews. Second, the sample was limited to students from four middle schools in Anhui Province, and the 16-month longitudinal design may not fully capture long-term dynamics between variables. Expanding the sample across regions and school types, along with a longer study duration, would strengthen the findings' applicability and provide deeper insights into longitudinal relationships. Finally, there may be other mediating or moderating mechanisms in the relationship between harsh parenting and cyber victimization, and this study only explored the mediating role of shyness between the two. Therefore, other possible variables can be explored in future studies to enrich the research between the two.</p>
</sec>
</sec>
<sec id="s5" sec-type="conclusions">
<label>5</label>
<title>Conclusions</title>
<p>The findings of this study are as follows: (a) In CLPM, T1 and T2 harsh parenting significantly and positively predicted cyber victimization at the latter time point, harsh parenting and cyber victimization at T1 and T2 had reciprocal predictive effects. (b) In RI-CLPM, at the between-individual level, harsh parenting was not significantly positively correlated with cyber victimization; at the within-individual level, T1 harsh parenting significantly positively predicted T2 cyber victimization. (c) In CLPM and RI-CLPM, T2 shyness mediated longitudinally between T1 harsh parenting and T3 cyber victimization. The stability of harsh parenting, shyness and cyber victimization was high during the 16 months of the study.</p>
<p>The present study uses both CLPM and RI-CLPM models to explore the relationship among harsh parenting, shyness and cyber victimization, which is beneficial to enriching the relevant theories and deepening the understanding of the dynamic relationship among the variables. Also, it is conducive to providing important practical guidance for the intervention of cyber victimization among adolescents and drawing the attention of families and schools to related issues.</p>
</sec>
</body>
<back>
<sec id="s6" sec-type="data-availability">
<title>Data availability statement</title>
<p>The raw data supporting the conclusions of this article will be made available by the authors, without undue reservation.</p>
</sec>
<sec id="s7" sec-type="ethics-statement">
<title>Ethics statement</title>
<p>The studies involving humans were approved by The Research Ethics Committee of Anhui Normal University. The studies were conducted in accordance with the local legislation and institutional requirements. Written informed consent for participation in this study was provided by the participants' legal guardians/next of kin.</p>
</sec>
<sec id="s8" sec-type="author-contributions">
<title>Author contributions</title>
<p>XZ: Investigation, Writing &#x2013; original draft, Software, Formal Analysis, Data curation, Conceptualization, Writing &#x2013; review &amp; editing, Methodology. TX: Methodology, Conceptualization, Supervision, Writing &#x2013; review &amp; editing, Funding acquisition, Project administration, Writing &#x2013; original draft. QS: Funding acquisition, Data curation, Writing &#x2013; review &amp; editing.</p>
</sec>
<sec id="s9" sec-type="funding-information">
<title>Funding</title>
<p>The author(s) declare that financial support was received for the research and/or publication of this article. This work was supported by the authors' research projects (2021YFC3340801) and (24VSZ016).</p>
</sec>
<sec id="s10" sec-type="COI-statement">
<title>Conflict of interest</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec id="s11" sec-type="ai-statement">
<title>Generative AI statement</title>
<p>The author(s) declare that no Generative AI was used in the creation of this manuscript.</p>
</sec>
<sec id="s12" sec-type="disclaimer">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<label>1</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wu</surname> <given-names>Q</given-names>
</name>
<name>
<surname>Zhang</surname> <given-names>Q</given-names>
</name>
<name>
<surname>Wang</surname> <given-names>Y</given-names>
</name>
</person-group>. <article-title>The relationship between parental style and cyber victimization of junior high school students: A longitudinal study</article-title>. <source>Psychol Dev Educ</source>. (<year>2021</year>) <volume>37</volume>:<page-range>719&#x2013;26</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.16187/j.cnki.issn1001-4918.2021.05.13</pub-id>
</citation>
</ref>
<ref id="B2">
<label>2</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Slonje</surname> <given-names>R</given-names>
</name>
<name>
<surname>Smith</surname> <given-names>PK</given-names>
</name>
<name>
<surname>Fris&#xe9;n</surname> <given-names>A</given-names>
</name>
</person-group>. <article-title>The nature of cyberbullying, and strategies for prevention</article-title>. <source>Comput Hum Behav</source>. (<year>2013</year>) <volume>29</volume>:<fpage>26</fpage>&#x2013;<lpage>32</lpage>. doi:&#xa0;<pub-id pub-id-type="doi">10.1016/j.chb.2012.05.024</pub-id>
</citation>
</ref>
<ref id="B3">
<label>3</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hu</surname> <given-names>Y</given-names>
</name>
<name>
<surname>Fan</surname> <given-names>C</given-names>
</name>
<name>
<surname>Zhang</surname> <given-names>F</given-names>
</name>
<name>
<surname>Xie</surname> <given-names>X</given-names>
</name>
<name>
<surname>Hao</surname> <given-names>E</given-names>
</name>
</person-group>. <article-title>The effect of perceived stress and online social support on the relationship between cyber-victimization and depression among adolescents</article-title>. <source>Psychol Dev Educ</source>. (<year>2014</year>) <volume>30</volume>:<page-range>177&#x2013;84</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.16187/j.cnki.issn1001-4918.2014.02.002</pub-id>
</citation>
</ref>
<ref id="B4">
<label>4</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Deuster</surname> <given-names>PA</given-names>
</name>
<name>
<surname>Adera</surname> <given-names>T</given-names>
</name>
<name>
<surname>South-Paul</surname> <given-names>J</given-names>
</name>
</person-group>. <article-title>Biological, social, and behavioral factors associated with premenstrual syndrome</article-title>. <source>Arch Fam Med</source>. (<year>1999</year>) <volume>8</volume>:<page-range>122&#x2013;8</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1001/archfami.8.2.122</pub-id>
</citation>
</ref>
<ref id="B5">
<label>5</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Giumetti</surname> <given-names>GW</given-names>
</name>
<name>
<surname>Kowalski</surname> <given-names>RM</given-names>
</name>
<name>
<surname>Feinn</surname> <given-names>RS</given-names>
</name>
</person-group>. <article-title>Predictors and outcomes of cyberbullying among college students: A two wave study. Advance online publication</article-title>. <source>Aggress Behav</source>. (<year>2022</year>) <volume>48</volume>:<fpage>40</fpage>&#x2013;<lpage>54</lpage>. doi:&#xa0;<pub-id pub-id-type="doi">10.1002/ab.21992</pub-id>
</citation>
</ref>
<ref id="B6">
<label>6</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bonanno</surname> <given-names>RA</given-names>
</name>
<name>
<surname>Hymel</surname> <given-names>S</given-names>
</name>
</person-group>. <article-title>Cyber bullying and internalizing difficulties: above and beyond the impact of traditional forms of bullying</article-title>. <source>J Youth Adolesc.</source> (<year>2013</year>) <volume>42</volume>:<page-range>685&#x2013;97</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1007/s10964-013-9937-1</pub-id>
</citation>
</ref>
<ref id="B7">
<label>7</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xie</surname> <given-names>Z</given-names>
</name>
<name>
<surname>Jiang</surname> <given-names>H</given-names>
</name>
<name>
<surname>Wu</surname> <given-names>J</given-names>
</name>
<name>
<surname>Ren</surname> <given-names>Y</given-names>
</name>
<name>
<surname>Zhang</surname> <given-names>M</given-names>
</name>
</person-group>. <article-title>The relationship between cyber victimization and traditional victimization in junior high school students: A moderated mediation model</article-title>. <source>Chin J Clin Psychol</source>. (<year>2022</year>) <volume>30</volume>:<page-range>1091&#x2013;6</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.16128/j.cnki.1005-3611.2022.05.016</pub-id>
</citation>
</ref>
<ref id="B8">
<label>8</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Elder</surname> <given-names>GH</given-names>
<suffix>Jr</suffix>
</name>
</person-group> <article-title>The life course as developmental theory</article-title>. <source>Child Dev</source>. (<year>1998</year>) <volume>69</volume>:<fpage>1</fpage>&#x2013;<lpage>12</lpage>. doi:&#xa0;<pub-id pub-id-type="doi">10.1111/j.1467-8624.1998.tb06128.x</pub-id>
</citation>
</ref>
<ref id="B9">
<label>9</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Tokunaga</surname> <given-names>RS</given-names>
</name>
</person-group>. <article-title>Following you home from school: A critical review and synthesis of research on cyberbullying victimization</article-title>. <source>Comput Hum Behav</source>. (<year>2010</year>) <volume>26</volume>:<page-range>277&#x2013;87</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1016/j.chb.2009.11.014</pub-id>
</citation>
</ref>
<ref id="B10">
<label>10</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Kowalski</surname> <given-names>RM</given-names>
</name>
<name>
<surname>Limber</surname> <given-names>SP</given-names>
</name>
</person-group>. <article-title>Electronic bullying among middle school students</article-title>. <source>J Adolesc Health</source>. (<year>2007</year>) <volume>41</volume>:<page-range>S22&#x2013;30</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1016/j.jadohealth.2007.08.017</pub-id>
</citation>
</ref>
<ref id="B11">
<label>11</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Vo&#x161;ner</surname> <given-names>HB</given-names>
</name>
<name>
<surname>Kokol</surname> <given-names>P</given-names>
</name>
<name>
<surname>Bobek</surname> <given-names>S</given-names>
</name>
<name>
<surname>&#x17d;eleznik</surname> <given-names>D</given-names>
</name>
<name>
<surname>Zavr&#x161;nik</surname> <given-names>J</given-names>
</name>
</person-group>. <article-title>A bibliometric retrospective of the Journal Computers in Human Behavior (1991-2015)</article-title>. <source>Comput Hum Behav</source>. (<year>2016</year>) <volume>65</volume>:<fpage>46</fpage>&#x2013;<lpage>58</lpage>. doi:&#xa0;<pub-id pub-id-type="doi">10.1016/j.chb.2016.08.026</pub-id>
</citation>
</ref>
<ref id="B12">
<label>12</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname> <given-names>X</given-names>
</name>
<name>
<surname>Fan</surname> <given-names>C</given-names>
</name>
<name>
<surname>Chu</surname> <given-names>X</given-names>
</name>
<name>
<surname>Chu</surname> <given-names>Y</given-names>
</name>
</person-group>. <article-title>Effect of cyberbullying victimization on adolescents&#x2019; Sleeping problem: the chain mediating role of perceived stress and depression</article-title>. <source>J Psychol Sci</source>. (<year>2020</year>) <volume>43</volume>:<page-range>378&#x2013;85</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.16719/j.cnki.1671-6981.20200217</pub-id>
</citation>
</ref>
<ref id="B13">
<label>13</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Stockdale</surname> <given-names>LA</given-names>
</name>
<name>
<surname>Coyne</surname> <given-names>SM</given-names>
</name>
<name>
<surname>Padilla-Walker</surname> <given-names>LM</given-names>
</name>
</person-group>. <article-title>Parent and child technoference and socio emotional behavioral outcomes: nationally representative study of 10-to 20-year-old adolescents</article-title>. <source>Comput Hum Behav</source>. (<year>2018</year>) <volume>88</volume>:<page-range>219&#x2013;26</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1016/j.chb.2018.06.034</pub-id>
</citation>
</ref>
<ref id="B14">
<label>14</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Landoll</surname> <given-names>RR</given-names>
</name>
<name>
<surname>La Greca</surname> <given-names>AM</given-names>
</name>
<name>
<surname>Lai</surname> <given-names>BS</given-names>
</name>
<name>
<surname>Chan</surname> <given-names>SF</given-names>
</name>
<name>
<surname>Herge</surname> <given-names>WM</given-names>
</name>
</person-group>. <article-title>Cyber victimization by peers: Prospective associations with adolescent social anxiety and depressive symptoms</article-title>. <source>J Adolesc.</source> (<year>2015</year>) <volume>42</volume>:<fpage>77</fpage>&#x2013;<lpage>86</lpage>. doi:&#xa0;<pub-id pub-id-type="doi">10.1016/j.adolescence.2015.04.002</pub-id>
</citation>
</ref>
<ref id="B15">
<label>15</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Navarro</surname> <given-names>R</given-names>
</name>
<name>
<surname>Serna</surname> <given-names>C</given-names>
</name>
<name>
<surname>Mart&#xed;nez</surname> <given-names>V</given-names>
</name>
<name>
<surname>Ruiz-Oliva</surname> <given-names>R</given-names>
</name>
</person-group>. <article-title>The role of Internet use and parental mediation on cyberbullying victimization among Spanish children from rural public schools</article-title>. <source>Eur J Psychol Educ</source>. (<year>2013</year>) <volume>28</volume>:<page-range>725&#x2013;45</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1007/s10212-012-0137-2</pub-id>
</citation>
</ref>
<ref id="B16">
<label>16</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Qudah</surname> <given-names>MFA</given-names>
</name>
<name>
<surname>Albursan</surname> <given-names>IS</given-names>
</name>
<name>
<surname>Bakhiet</surname> <given-names>SFA</given-names>
</name>
<name>
<surname>Hassan</surname> <given-names>EMAH</given-names>
</name>
<name>
<surname>Alfnan</surname> <given-names>AA</given-names>
</name>
<name>
<surname>Aljomaa</surname> <given-names>SS</given-names>
</name>
<etal/>
</person-group>. <article-title>Smartphone addiction and its relationship with cyberbullying among university students</article-title>. <source>Int J Ment Health Ad.</source> (<year>2019</year>) <volume>17</volume>:<page-range>628&#x2013;43</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1007/s11469-018-0013-7</pub-id>
</citation>
</ref>
<ref id="B17">
<label>17</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname> <given-names>M</given-names>
</name>
<name>
<surname>Du</surname> <given-names>X</given-names>
</name>
<name>
<surname>Zhou</surname> <given-names>Z</given-names>
</name>
</person-group>. <article-title>Harsh parenting: Meaning, influential factors and mechanisms</article-title>. <source>Adv Psychol Sci</source>. (<year>2016</year>) <volume>24</volume>:<page-range>379&#x2013;91</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.3724/SP.J.1042.2016.00379</pub-id>
</citation>
</ref>
<ref id="B18">
<label>18</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Rohner</surname> <given-names>RP</given-names>
</name>
<name>
<surname>Khaleque</surname> <given-names>A</given-names>
</name>
<name>
<surname>Cournoyer</surname> <given-names>DE</given-names>
</name>
</person-group>. <article-title>Parental acceptance-rejection: theory, methods, cross-cultural evidence, and implications</article-title>. <source>Ethos.</source> (<year>2005</year>) <volume>33</volume>:<fpage>299</fpage>&#x2013;<lpage>334</lpage>. doi:&#xa0;<pub-id pub-id-type="doi">10.1525/eth.2005.33.3.299</pub-id>
</citation>
</ref>
<ref id="B19">
<label>19</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bian</surname> <given-names>Y</given-names>
</name>
<name>
<surname>Liang</surname> <given-names>L</given-names>
</name>
<name>
<surname>Zhang</surname> <given-names>Y</given-names>
</name>
</person-group>. <article-title>Effects of family on children&#x2019;s mental development</article-title>. <source>J Beijing Norm Univ (Soc. Sci).</source> (<year>2016</year>) <volume>05</volume>:<fpage>46</fpage>&#x2013;<lpage>54</lpage>.</citation>
</ref>
<ref id="B20">
<label>20</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Barajas-Gonzalez</surname> <given-names>RG</given-names>
</name>
<name>
<surname>Brooks-Gunn</surname> <given-names>J</given-names>
</name>
</person-group>. <article-title>Income, neighborhood stressors, and harsh parenting: Test of moderation by ethnicity, age, and gender</article-title>. <source>J Fam Psychol</source>. (<year>2014</year>) <volume>28</volume>:<page-range>855&#x2013;66</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1037/a0038242</pub-id>
</citation>
</ref>
<ref id="B21">
<label>21</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Bandura</surname> <given-names>A</given-names>
</name>
</person-group>. <article-title>Human agency in social cognitive theory</article-title>. <source>Am Psychol</source>. (<year>1989</year>) <volume>44</volume>:<page-range>1175&#x2013;84</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1037/0003-066x.44.9.1175</pub-id>
</citation>
</ref>
<ref id="B22">
<label>22</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Roberts</surname> <given-names>JA</given-names>
</name>
<name>
<surname>David</surname> <given-names>ME</given-names>
</name>
</person-group>. <article-title>My life has become a major distraction from my cell phone: Partner phubbing and relationship satisfaction among romantic partners</article-title>. <source>Comput Hum Behav</source>. (<year>2016</year>) <volume>54</volume>:<page-range>134&#x2013;41</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1016/j.chb.2015.07.058</pub-id>
</citation>
</ref>
<ref id="B23">
<label>23</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lereya</surname> <given-names>ST</given-names>
</name>
<name>
<surname>Samara</surname> <given-names>M</given-names>
</name>
<name>
<surname>Wolke</surname> <given-names>D</given-names>
</name>
</person-group>. <article-title>Parenting behavior and the risk of becoming a victim and a bully/victim: A meta-analysis study</article-title>. <source>Child Abuse Negl</source>. (<year>2013</year>) <volume>37</volume>:<page-range>1091&#x2013;108</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1016/j.chiabu.2013.03.001</pub-id>
</citation>
</ref>
<ref id="B24">
<label>24</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Pinquart</surname> <given-names>M</given-names>
</name>
</person-group>. <article-title>Associations of parenting dimensions and styles with externalizing problems of children and adolescents:An updated meta-analysis</article-title>. <source>Dev Psychol</source>. (<year>2017</year>) <volume>53</volume>:<fpage>873</fpage>&#x2013;<lpage>932</lpage>. doi:&#xa0;<pub-id pub-id-type="doi">10.1037/dev0000295</pub-id>
</citation>
</ref>
<ref id="B25">
<label>25</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhang</surname> <given-names>W</given-names>
</name>
<name>
<surname>Chen</surname> <given-names>G</given-names>
</name>
</person-group>. <article-title>Developmental contextualism: an instance of development system theories</article-title>. <source>Adv Psychol Sci</source>. (<year>2009</year>) <volume>17</volume>:<page-range>736&#x2013;44</page-range>.</citation>
</ref>
<ref id="B26">
<label>26</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Charalampous</surname> <given-names>K</given-names>
</name>
<name>
<surname>Demetriou</surname> <given-names>C</given-names>
</name>
<name>
<surname>Tricha</surname> <given-names>L</given-names>
</name>
<name>
<surname>Ioannou</surname> <given-names>M</given-names>
</name>
<name>
<surname>Georgiou</surname> <given-names>S</given-names>
</name>
<name>
<surname>Nikiforou</surname> <given-names>M</given-names>
</name>
<etal/>
</person-group>. <article-title>The effect of parental style on bullying and cyber bullying behaviors and the mediating role of peer attachment relationships: A longitudinal study</article-title>. <source>J Adolesc.</source> (<year>2018</year>) <volume>64</volume>:<page-range>109&#x2013;23</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1016/j.adolescence.2018.02.003</pub-id>
</citation>
</ref>
<ref id="B27">
<label>27</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Barker</surname> <given-names>ED</given-names>
</name>
<name>
<surname>Boivin</surname> <given-names>M</given-names>
</name>
<name>
<surname>Brendgen</surname> <given-names>M</given-names>
</name>
<name>
<surname>Fontaine</surname> <given-names>N</given-names>
</name>
<name>
<surname>Arseneault</surname> <given-names>L</given-names>
</name>
<name>
<surname>Vitaro</surname> <given-names>F</given-names>
</name>
<etal/>
</person-group>. <article-title>Predictive validity and early predictors of peer-victimization trajectories in preschool</article-title>. <source>Arch Gen Psychiatry</source>. (<year>2008</year>) <volume>65</volume>:<page-range>1185&#x2013;92</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1001/archpsyc.65.10.1185</pub-id>
</citation>
</ref>
<ref id="B28">
<label>28</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Werner</surname> <given-names>LL</given-names>
</name>
<name>
<surname>der Graaff</surname> <given-names>JV</given-names>
</name>
<name>
<surname>Meeus</surname> <given-names>WH</given-names>
</name>
<name>
<surname>Branje</surname> <given-names>SJ</given-names>
</name>
</person-group>. <article-title>Depressive symptoms in adolescence: Longitudinal links with maternal empathy and psychological control</article-title>. <source>J Abnorm Child Psychol</source>. (<year>2016</year>) <volume>44</volume>:<page-range>1121&#x2013;32</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1007/s10802-015-0106-8</pub-id>
</citation>
</ref>
<ref id="B29">
<label>29</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fang</surname> <given-names>S</given-names>
</name>
<name>
<surname>Huang</surname> <given-names>J</given-names>
</name>
<name>
<surname>Curley</surname> <given-names>J</given-names>
</name>
<name>
<surname>Birkenmaier</surname> <given-names>J</given-names>
</name>
</person-group>. <article-title>Family assets, parental expectations, and children educational performanee:An empirical examination from China</article-title>. <source>Child Youth Serv.</source> (<year>2018</year>) <volume>87</volume>:<page-range>60&#x2013;8</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1016/j.childyouth.2018.02.018</pub-id>
</citation>
</ref>
<ref id="B30">
<label>30</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ren</surname> <given-names>L</given-names>
</name>
<name>
<surname>Ma</surname> <given-names>Y</given-names>
</name>
<name>
<surname>Zhang</surname> <given-names>Q</given-names>
</name>
<name>
<surname>Zhang</surname> <given-names>L</given-names>
</name>
<name>
<surname>Xu</surname> <given-names>F</given-names>
</name>
</person-group>. <article-title>Reciprocal relations between parental psychological control and children&#x2019;s school adjustment: A cross-lagged analysis</article-title>. <source>Psychol Dev Educ</source>. (<year>2023</year>) <volume>39</volume>:<page-range>635&#x2013;44</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.16187/j.cnki.issn1001-4918.2023.05.04</pub-id>
</citation>
</ref>
<ref id="B31">
<label>31</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Henderson</surname> <given-names>L</given-names>
</name>
<name>
<surname>Zimbardo</surname> <given-names>PG</given-names>
</name>
</person-group>. <source>Commentary: Developmental outcomes and clinical perspectives</source>. <publisher-loc>Oxford</publisher-loc>: <publisher-name>Oxford University Press</publisher-name> (<year>1999</year>).</citation>
</ref>
<ref id="B32">
<label>32</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ingram</surname> <given-names>RE</given-names>
</name>
<name>
<surname>Ritter</surname> <given-names>J</given-names>
</name>
</person-group>. <article-title>Vulnerability to depression:Cognitive reactivity and parental bonding in high-risk individuals</article-title>. <source>J Abnorm Psychol</source>. (<year>2000</year>) <volume>109</volume>:<page-range>588&#x2013;96</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1037//0021-843X.109.4.588</pub-id>
</citation>
</ref>
<ref id="B33">
<label>33</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Han</surname> <given-names>L</given-names>
</name>
<name>
<surname>Gao</surname> <given-names>F</given-names>
</name>
<name>
<surname>Ping</surname> <given-names>F</given-names>
</name>
<name>
<surname>Pan</surname> <given-names>Q</given-names>
</name>
</person-group>. <article-title>The mechanism of parenting style effect on shyness</article-title>. <source>Stud Psychol Behav</source>. (<year>2012</year>) <volume>10</volume>:<page-range>464&#x2013;7</page-range>.</citation>
</ref>
<ref id="B34">
<label>34</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Banks</surname> <given-names>DM</given-names>
</name>
<name>
<surname>Scott</surname> <given-names>BG</given-names>
</name>
<name>
<surname>Weems</surname> <given-names>CF</given-names>
</name>
</person-group>. <article-title>Anxiety,hostile attributions,and differences in heart rate response to ambiguous situational vignettes in adolescents</article-title>. <source>Emotion.</source> (<year>2017</year>) <volume>18</volume>:<page-range>248&#x2013;59</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1037/emo0000352</pub-id>
</citation>
</ref>
<ref id="B35">
<label>35</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Han</surname> <given-names>L</given-names>
</name>
<name>
<surname>Gao</surname> <given-names>F</given-names>
</name>
<name>
<surname>He</surname> <given-names>J</given-names>
</name>
</person-group>. <article-title>The relationships between personality and shyness: mediation and moderation effects</article-title>. <source>J Psychol Sci</source>. (<year>2011</year>) <volume>34</volume>:<page-range>889&#x2013;93</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.16719/j.cnki.1671-6981.2011.04.026</pub-id>
</citation>
</ref>
<ref id="B36">
<label>36</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Byrne</surname> <given-names>BJ</given-names>
</name>
</person-group>. <article-title>Bullies and victims in a school setting with reference to some Dublin schools</article-title>. <source>Iri J Psychol</source>. (<year>1994</year>) <volume>15</volume>:<page-range>574&#x2013;86</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1080/03033910.1994.10558031</pub-id>
</citation>
</ref>
<ref id="B37">
<label>37</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Luo</surname> <given-names>Q</given-names>
</name>
<name>
<surname>Zhou</surname> <given-names>Z</given-names>
</name>
<name>
<surname>Wei</surname> <given-names>H</given-names>
</name>
<name>
<surname>Tian</surname> <given-names>Y</given-names>
</name>
<name>
<surname>Kong</surname> <given-names>F</given-names>
</name>
</person-group>. <article-title>Shyness and internet use</article-title>. <source>Adv Psychol Sci</source>. (<year>2013</year>) <volume>21</volume>:<page-range>1651&#x2013;9</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.3724/SP.J.1042.2013.01651</pub-id>
</citation>
</ref>
<ref id="B38">
<label>38</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Beaton</surname> <given-names>EA</given-names>
</name>
<name>
<surname>Schmidt</surname> <given-names>LA</given-names>
</name>
<name>
<surname>Schulkin</surname> <given-names>J</given-names>
</name>
<name>
<surname>Antony</surname> <given-names>MM</given-names>
</name>
<name>
<surname>Swinson</surname> <given-names>PP</given-names>
</name>
<name>
<surname>Hall</surname> <given-names>GB</given-names>
</name>
</person-group>. <article-title>Different fusiform activity to stranger and personally familiar faces in shy and social adults</article-title>. <source>Soc Neurosci</source>. (<year>2009</year>) <volume>4</volume>:<page-range>308&#x2013;16</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1080/17470910902801021</pub-id>
</citation>
</ref>
<ref id="B39">
<label>39</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhao</surname> <given-names>J</given-names>
</name>
<name>
<surname>Tan</surname> <given-names>M</given-names>
</name>
<name>
<surname>Gao</surname> <given-names>L</given-names>
</name>
<name>
<surname>Wang</surname> <given-names>Y</given-names>
</name>
</person-group>. <article-title>Shyness and loneliness: Contributions of emotional intelligence and social support</article-title>. <source>Curr Psychol</source>. (<year>2019</year>) <volume>38</volume>:<page-range>556&#x2013;62</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1007/s12144-017-9640-6</pub-id>
</citation>
</ref>
<ref id="B40">
<label>40</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ma</surname> <given-names>C</given-names>
</name>
<name>
<surname>Song</surname> <given-names>J</given-names>
</name>
</person-group>. <article-title>Negative association between harsh parenting and life satisfaction: negative coping style as mediator and peer support as moderator</article-title>. <source>BMC Psychol</source>. (<year>2023</year>) <volume>11</volume>:<fpage>16</fpage>. doi:&#xa0;<pub-id pub-id-type="doi">10.1186/s40359-023-01046-0</pub-id>
</citation>
</ref>
<ref id="B41">
<label>41</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Sun</surname> <given-names>H</given-names>
</name>
<name>
<surname>Yu</surname> <given-names>Y</given-names>
</name>
<name>
<surname>Peng</surname> <given-names>C</given-names>
</name>
</person-group>. <article-title>Shyness and academic procrastination among Chinese adolescents: a moderated mediation model of self-regulation and self-focused attention</article-title>. <source>Front Psychol</source>. (<year>2024</year>) <volume>15</volume>:<elocation-id>1352342</elocation-id>. doi:&#xa0;<pub-id pub-id-type="doi">10.3389/fpsyg.2024.1352342</pub-id>
</citation>
</ref>
<ref id="B42">
<label>42</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Luo</surname> <given-names>Q</given-names>
</name>
<name>
<surname>Wu</surname> <given-names>N</given-names>
</name>
<name>
<surname>Huang</surname> <given-names>L</given-names>
</name>
</person-group>. <article-title>Cybervictimization and cyberbullying among college students: the chain mediating effects of stress and rumination</article-title>. <source>Front Psychol</source>. (<year>2023</year>) <volume>14</volume>:<elocation-id>2023.1067165</elocation-id>. doi:&#xa0;<pub-id pub-id-type="doi">10.3389/fpsyg.2023.1067165</pub-id>
</citation>
</ref>
<ref id="B43">
<label>43</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Luo</surname> <given-names>X</given-names>
</name>
<name>
<surname>He</surname> <given-names>H</given-names>
</name>
<name>
<surname>Pan</surname> <given-names>Y</given-names>
</name>
</person-group>. <article-title>Influence of rough parenting on fear of negative evaluation of vocational collegestudents in Guizhou and its mediating factors</article-title>. <source>Chin Heal Psychol</source>. (<year>2022</year>) <volume>30</volume>:<page-range>266&#x2013;71</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.13342/j.cnki.cjhp.2022.02.022</pub-id>
</citation>
</ref>
<ref id="B44">
<label>44</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hamaker</surname> <given-names>EL</given-names>
</name>
<name>
<surname>Kuiper</surname> <given-names>RM</given-names>
</name>
<name>
<surname>Grasman</surname> <given-names>RPPP</given-names>
</name>
</person-group>. <article-title>A critique of the cross-lagged panel model</article-title>. <source>Psychol Methods</source>. (<year>2015</year>) <volume>20</volume>:<page-range>102&#x2013;16</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1037/a0038889</pub-id>
</citation>
</ref>
<ref id="B45">
<label>45</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xing</surname> <given-names>X</given-names>
</name>
<name>
<surname>Zhao</surname> <given-names>X</given-names>
</name>
<name>
<surname>Hu</surname> <given-names>X</given-names>
</name>
</person-group>. <article-title>Reciprocal relation between executive function and emotion regulation in preschoolers: A cross-lagged and random intercept cross-lagged analysis</article-title>. <source>Psychol Sci</source>. (<year>2024</year>) <volume>47</volume>:<page-range>80&#x2013;8</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.16719/j.cnki.1671-6981.20240110</pub-id>
</citation>
</ref>
<ref id="B46">
<label>46</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Curran</surname> <given-names>P</given-names>
</name>
<name>
<surname>Bauer</surname> <given-names>D</given-names>
</name>
</person-group>. <article-title>The disaggregation of within-person and between-person effects in longitudinal models of change</article-title>. <source>Annu Revi Psychol</source>. (<year>2011</year>) <volume>62</volume>:<fpage>583</fpage>&#x2013;<lpage>619</lpage>. doi:&#xa0;<pub-id pub-id-type="doi">10.1146/annurev.psych.093008.100356</pub-id>
</citation>
</ref>
<ref id="B47">
<label>47</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Marsh</surname> <given-names>HW</given-names>
</name>
<name>
<surname>Pekrun</surname> <given-names>R</given-names>
</name>
<name>
<surname>Ludtke</surname> <given-names>O</given-names>
</name>
</person-group>. <article-title>Directional ordering of self-concept, school grades, and standardized tests over five years: New tripartite models juxtaposing within-and between-person perspectives</article-title>. <source>Educ Psvchol Rev</source>. (<year>2022</year>) <volume>34</volume>:<page-range>2697&#x2013;744</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1007/s10648-022-09662-9</pub-id>
</citation>
</ref>
<ref id="B48">
<label>48</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Lavner</surname> <given-names>JA</given-names>
</name>
<name>
<surname>Hart</surname> <given-names>AR</given-names>
</name>
<name>
<surname>Carter</surname> <given-names>SE</given-names>
</name>
<name>
<surname>Beach</surname> <given-names>SR</given-names>
</name>
</person-group>. <article-title>Longitudinal effects of racial discrimination on depressive symptoms among Black youth: Between-and within-person effects</article-title>. <source>J Am Acad Child Adolesc Psychiatry</source>. (<year>2022</year>) <volume>61</volume>:<fpage>56</fpage>&#x2013;<lpage>65</lpage>. doi:&#xa0;<pub-id pub-id-type="doi">10.1016/j.jaac.2021.04.020</pub-id>
</citation>
</ref>
<ref id="B49">
<label>49</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Simons</surname> <given-names>RL</given-names>
</name>
<name>
<surname>Whitbeck</surname> <given-names>LB</given-names>
</name>
<name>
<surname>Conger</surname> <given-names>RD</given-names>
</name>
<name>
<surname>Wu</surname> <given-names>C</given-names>
</name>
</person-group>. <article-title>Intergenerational transmission of harsh parenting</article-title>. <source>Dev Psychol</source>. (<year>1991</year>) <volume>27</volume>:<page-range>159&#x2013;71</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1037/0012-1649.27.1.159</pub-id>
</citation>
</ref>
<ref id="B50">
<label>50</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Wang</surname> <given-names>M</given-names>
</name>
<name>
<surname>Wang</surname> <given-names>J</given-names>
</name>
<name>
<surname>Wang</surname> <given-names>B</given-names>
</name>
<name>
<surname>Qu</surname> <given-names>Q</given-names>
</name>
<name>
<surname>Xin</surname> <given-names>F</given-names>
</name>
</person-group>. <article-title>Harsh parenting and adolescents&#x2019; Academic achievement: A moderated mediation mode</article-title>. <source>Psvchol Dev Educ</source>. (<year>2020</year>) <volume>36</volume>:<fpage>67</fpage>&#x2013;<lpage>76</lpage>. doi:&#xa0;<pub-id pub-id-type="doi">10.16187/j.cnki.issn1001-4918.2020.01.08</pub-id>
</citation>
</ref>
<ref id="B51">
<label>51</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Cheek</surname> <given-names>JM</given-names>
</name>
<name>
<surname>Buss</surname> <given-names>AH</given-names>
</name>
</person-group>. <article-title>Shyness and sociability</article-title>. <source>J Pers Soc Psychol</source>. (<year>1981</year>) <volume>41</volume>:<page-range>330&#x2013;9</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1037/0022-3514.41.2.330</pub-id>
</citation>
</ref>
<ref id="B52">
<label>52</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Xiang</surname> <given-names>B</given-names>
</name>
<name>
<surname>Ren</surname> <given-names>L</given-names>
</name>
<name>
<surname>Zhou</surname> <given-names>Y</given-names>
</name>
<name>
<surname>Liu</surname> <given-names>J</given-names>
</name>
</person-group>. <article-title>Psychometric properties of cheek and buss shyness scale in chinese college students</article-title>. <source>Chin J Clin Psychol</source>. (<year>2018</year>) <volume>26</volume>:<page-range>268&#x2013;71</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.16128/j.cnki.1005-3611.2018.02.013</pub-id>
</citation>
</ref>
<ref id="B53">
<label>53</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Yu</surname> <given-names>Y</given-names>
</name>
<name>
<surname>Sun</surname> <given-names>H</given-names>
</name>
<name>
<surname>Gao</surname> <given-names>F</given-names>
</name>
</person-group>. <article-title>Susceptibility of shy students to internet addiction: A multiple mediation model involving chinese middle-school students</article-title>. <source>Front Psychol</source>. (<year>2019</year>) <volume>10</volume>:<elocation-id>1275</elocation-id>. doi:&#xa0;<pub-id pub-id-type="doi">10.3389/fpsyg.2019.01275</pub-id>
</citation>
</ref>
<ref id="B54">
<label>54</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Li</surname> <given-names>S</given-names>
</name>
<name>
<surname>Chen</surname> <given-names>X</given-names>
</name>
<name>
<surname>Ran</surname> <given-names>G</given-names>
</name>
<name>
<surname>Zhang</surname> <given-names>Q</given-names>
</name>
<name>
<surname>Li</surname> <given-names>R</given-names>
</name>
</person-group>. <article-title>Shyness and internalizing problems among Chinese adolescents: The roles of independent interpersonal stress and rumination</article-title>. <source>Child Youth Serv Rev</source>. (<year>2021</year>) <volume>128</volume>:<elocation-id>106151</elocation-id>. doi:&#xa0;<pub-id pub-id-type="doi">10.1016/j.childyouth.2021.106151</pub-id>
</citation>
</ref>
<ref id="B55">
<label>55</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Topcu</surname> <given-names>C</given-names>
</name>
<name>
<surname>Erdur-Baker</surname>
</name>
</person-group>. <article-title>The Revised Cyber Bullying Inventory (RCBl): validity and reliability studies</article-title>. <source>Proc Soc Behav Sci</source>. (<year>2010</year>) <volume>5</volume>:<page-range>660&#x2013;4</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1016/j.sbspro.2010.07.161</pub-id>
</citation>
</ref>
<ref id="B56">
<label>56</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chu</surname> <given-names>X</given-names>
</name>
<name>
<surname>Fan</surname> <given-names>C</given-names>
</name>
</person-group>. <article-title>Revision of the revised cyber bullying inventory among junior high school student</article-title>. <source>Chin J Clin Psychol</source>. (<year>2017</year>) <volume>25</volume>:<page-range>1031&#x2013;4</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.16128/j.cnki.1005-3611.2017.06.008</pub-id>
</citation>
</ref>
<ref id="B57">
<label>57</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Hu</surname> <given-names>L</given-names>
</name>
<name>
<surname>Bentler</surname> <given-names>PM</given-names>
</name>
</person-group>. <article-title>Cutoff criteria for fit indexes in covariance structure analysis: conventional criteria versus new alternatives</article-title>. <source>Struct Equ Modeling.</source> (<year>1999</year>) <volume>6</volume>:<fpage>1</fpage>&#x2013;<lpage>55</lpage>. doi:&#xa0;<pub-id pub-id-type="doi">10.1080/10705519909540118</pub-id>
</citation>
</ref>
<ref id="B58">
<label>58</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Chen</surname> <given-names>F</given-names>
</name>
</person-group>. <article-title>Sensitivity of goodness of fit indexes to lack of measurement invariance</article-title>. <source>Struct Equ Modeling.</source> (<year>2007</year>) <volume>14</volume>:<fpage>464</fpage>&#x2013;<lpage>504</lpage>. doi:&#xa0;<pub-id pub-id-type="doi">10.1080/10705510701301834</pub-id>
</citation>
</ref>
<ref id="B59">
<label>59</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Fang</surname> <given-names>J</given-names>
</name>
<name>
<surname>Wen</surname> <given-names>Z</given-names>
</name>
<name>
<surname>Huang</surname> <given-names>G</given-names>
</name>
</person-group>. <article-title>Exploring the longitudinal relations: based on longitudinal models with cross-lagged structure</article-title>. <source>J Psychol Sci</source>. (<year>2023</year>) <volume>46</volume>:<page-range>734&#x2013;41</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.16719/j.cnki.1671-6981.20230328</pub-id>
</citation>
</ref>
<ref id="B60">
<label>60</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Rohner</surname> <given-names>RP</given-names>
</name>
</person-group>. <article-title>The parental &#x201c;Acceptance&#x2013;rejection syndrome&#x201d;: universal correlates of perceived rejection</article-title>. <source>Am Psychol</source>. (<year>2004</year>) <volume>59</volume>:<page-range>830&#x2013;40</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1037/0003-066X.59.8.830</pub-id>
</citation>
</ref>
<ref id="B61">
<label>61</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Damon</surname> <given-names>W</given-names>
</name>
<name>
<surname>Lerner</surname> <given-names>RM</given-names>
</name>
</person-group>. <article-title>Developmental science, developmental systems, and contemporary theories of human development</article-title>. In: <source>Handbook of child psychology</source>. <publisher-name>Wiley (</publisher-name>, <publisher-loc>NJ</publisher-loc> (<year>2006</year>).</citation>
</ref>
<ref id="B62">
<label>62</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Ellis</surname> <given-names>BJ</given-names>
</name>
<name>
<surname>Del Giudice</surname> <given-names>M</given-names>
</name>
</person-group>. <article-title>Developmental adaptation to stress: an evolutionary perspective</article-title>. <source>Annu Rev Psychol</source>. (<year>2019</year>) <volume>70</volume>:<page-range>111&#x2013;39</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1146/annurev-psych-122216-011732</pub-id>
</citation>
</ref>
<ref id="B63">
<label>63</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Barlett</surname> <given-names>CP</given-names>
</name>
<name>
<surname>Gentile</surname> <given-names>DA</given-names>
</name>
<name>
<surname>Chew</surname> <given-names>C</given-names>
</name>
</person-group>. <article-title>Predicting cyberbullying from anonymity</article-title>. <source>J Pop Media Psychol</source>. (<year>2016</year>) <volume>5</volume>:<page-range>171&#x2013;80</page-range>. doi:&#xa0;<pub-id pub-id-type="doi">10.1037/ppm0000055</pub-id>
</citation>
</ref>
<ref id="B64">
<label>64</label>
<citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname>Bronfenbrenner</surname> <given-names>U</given-names>
</name>
</person-group>. <source>The ecology of human development: Experiments by nature and design</source>. <publisher-loc>Cambridge, MA</publisher-loc>: <publisher-name>Harvard University Press</publisher-name> (<year>1979</year>).</citation>
</ref>
<ref id="B65">
<label>65</label>
<citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname>Zhao</surname> <given-names>J</given-names>
</name>
<name>
<surname>Gao</surname> <given-names>F</given-names>
</name>
<name>
<surname>Xu</surname> <given-names>Y</given-names>
</name>
<name>
<surname>Sun</surname> <given-names>Y</given-names>
</name>
<name>
<surname>Han</surname> <given-names>L</given-names>
</name>
</person-group>. <article-title>The relationship between shyness and aggression: The multiple mediation of peer victimization and security and the moderation of parent-child attachment</article-title>. <source>Pers Individ Differences.</source> (<year>2020</year>) <volume>156</volume>:<elocation-id>109733</elocation-id>. doi:&#xa0;<pub-id pub-id-type="doi">10.1016/j.paid.2019.109733</pub-id>
</citation>
</ref>
</ref-list>
</back>
</article>