1. Bandura, A. (1977). Social learning theory. New York: General Learning Press.
2. Barter, C., McCarry, M., Berridge, D., & Evans, K. (2009). Partner exploitation and violence in teenage intimate relationships. London: NSPCC.
http://www.nspcc.org.uk/clobalassets/documents/research-reorts/partner-explotation-violence-teenage-intimate-relationships-report.pdf
.
3. Brener, N. D., Kann, L., Shanklin, S., Kinchen, S., Eaton, D. K., Hawkins, J., & Flint, K. H. (2013). Methodology of the youth risk behavior surveillance system-2013. MMWR, 62(1), 1–20.
4. Collins, L. M., Schafer, J. L., & Kam, C.-M. (2001). A comparison of inclusive and restrictive strategies in modern missing data procedures. Psychological Methods,
6(4), 330–351. doi:
10.1037/1082-989X.6.4.330
.
5. Cutbush, S., Ashley, O. S., Kan, M. L., Hamptom, J., & Hall, D. M. (2010). Electronic aggression among adolescent dating partners: Demographic correlates and associations with other types of violence. Poster presented at the American Public Health Association, annual meeting; November 6–10; Denver, CO.
http://www.rti.org/pubs/apha10_cutbush_poster.pdf
.