SlideShare a Scribd company logo
1 of 35
Download to read offline
Palacký University Olomouc, Faculty of Education
Centre for Prevention of Risky Virtual Communication

RISKS OF INTERNET COMMUNICATION IV
(research report)
Olomouc, Czech Republic, 2013
Authors:
Kamil Kopecký, PhD
René Szotkowski, PhD
Krejčí Veronika
Palacký University Olomouc, Faculty of Education
Centre for Prevention of Risky Virtual Communication
www.prvok.upol.cz
Olomouc, Czech Republic, 2013
Version of document: 1.0 (brief)
Introduction
Introduction
Research Risks of electronic/internet communication IV represents the fourth nationwide research,
which was conducted by the E-Bezpečí project (guaranteed by professional workplace of Centre for the
Prevention of risky virtual communication Palacký University in Olomouc) in cooperation with Seznam.cz.
The research was traditionally focused on the area of risky behaviour associated with information and
communication technologies, especially the Internet, in a population of Czech children.
In the research the following phenomena were monitored:
A. Cyberbullying (various forms of cyberbulling in relation to selected means of communication).
B. Establishing of virtual contacts (communication with strangers and personal meetings with them;
basis for cybergrooming).
C. Sexting (in the form of public sharing of intimate materials on the Internet and providing intimate
material on request of another person).
D. Sharing of personal data on the Internet (with a focus on sharing face photos).
E. Other related phenomena.
In the following part we will therefore briefly describe the theoretical background, which was the basis of
our investigation.
First, we will focus on the issue of cyberbullying, which is based on existing definitions of bullying (in Czech
environment, M. Kolář is primarily engaged in bullying), which is perceived as aggressive, intentional,
repeated action or behavior against any individual or group that cannot defend (Whitney & Smith 1993,
Olweus 1999). Other authors understand cyberbullying as a form of harassment based on power
imbalance and the systematic abuse of power (Smith & Sharp 1995, Rigby 2002).
A more specific definition of cyberbullying is by Hinduja and Patchin (2009) and Dehue, Bolman, Völlink,
Introduction
Pouwels (2008). Hinduja and Patchin (2009) defines cyberbullying as intentional, repeated, hurtful
activity using a computer, mobile phone and other electronic devices. Dehue, Bolman, Völlink, Pouwels
(2008) describe cyberbullying as torture, threats, humiliation, embarassing or other attacks among
adolescents using the Internet, interactive and digital technologies or mobile phones.
For our needs we have defined cyberbullying as a form of aggression that is carried out against individuals
or groups by using information and communication technologies, which occurs repeatedly (Belsey 2004,
Smith & Slonje 2007), whether by the original aggressor or the so-called secondary invaders. Kowalski,
Limber and others add (2007–2008) that it is the bullying that occurs through e-mail, ICQ, mobile
phones (SMS, MMS, phone calls), chat, website, and other ICT.
In the Czech environment, mainly Michal Kolář, David Šmahel, Veronika Krejčí and Kamil Kopecký are
engaged in cyberbullying; they do not deviate from the foreign approach.
In the process of cyberbullying and other hazardous communication practices like sexting and
cybergrooming, sharing of personal information by children on the Internet plays an important role. Many
foreign studies deal with it and indicate a high percentage of children publishing their personal data on
the Internet. For example, according to the research site eMarketer (2007), 75 % of American children
are willing to share their personal data and information about the family with other Internet users in
exchange for access to services and products offered on the Internet, which can be especially dangerous
for example in relation to cybergrooming. Statistics of Zoomsphere (2013), which monitors the user's
largest social network Facebook, indicate that 23 % of registered Czechs users are aged 0–19 years.
According to Zoomsphere (2013), to 19th May 2013 the total number of Facebook users in the Czech
Republic is 3 943 240, the estimated number of child users sharing their personal data on the network
Introduction
is about 1 800 000 (957 460 aged 0-15). However, the real number will be lower due to the different
age structure of defined users in demographic surveys of Zoomsphere (2013) (0–19 years).
There are, of course, several qualitatively oriented researches observing the factors influencing the
sharing of personal data (by children, adults) on the Internet and from this point of view, there is an
interesting research called Australian Research ACMA (2009) – Attitudes towards use of personal
information online.
There are not many researches implemented on representative samples in the Czech Republic aimed at
sharing of personal information by children through information and communication technologies. We
can name research Risks of electronic communication II (Kopecký, Krejčí 2011) and Risks of Internet
communication III (Kopecký, Szotkowski, Krejčí 2012). Both researches were conducted on
representative samples. Research Risks of electronic communications II was carried out on a sample of
12 533 respondents under 18 years of age. Its final report released the data on which children can be
traced in real life – name, along with surname, was published by 72,97 % of respondents and 60,22 %
of the respondents say it to others; according to this study, 63,19 % of Czech children share the e-mail
address, 22,8 % of children share mobile phone number. Research Risks of electronic communication IV
was implemented on a much larger sample which consisted of 21 372 respondents under 18 years of
age. The measured data (as in the previous research) showed that 75,64 % of respondents publish their
name along with surname and 51,96 % of the respondents say it to others; 58,68 % of Czech children
share the e-mail address and 16,78 % of children share their phone number.
Within our research, we again looked into the phenomenon called sexting. Sexting refers to sending
electronic text messages, own photos or videos with sexual content (Kopecký 2010). It occurs in the
virtual environment of electronic media, especially the Internet.
Introduction
Introduction
One of the first widely used definitions defines sexting as sending nude photographs depicting nudity
among mobile phones or other electronic media such as the Internet (Streichman 2009), and now,
according to some authors, sexting is primarily associated with younger generation, who takes its
sexually suggestive materials (so-called youth-produced sexual images), send it and distribute it (Wolak,
Finkelhor, Mitchell 2011–2012).
Sullivan (2011) adds the definiton of sexting; he includes suggestive text messages and images depicting
naked or partially naked children and adults, which are then spread by mobile phones or the Internet.
Number of platforms and tools for spreading such materials has been complemented by Streichman
(2009–2011) by social networks, especially Facebook and MySpace.
In the Czech environment, sexting is distributed primarily through social networks Facebook, Líbímseti.cz
or digital storage of photos Rajče.net (Kopecký 2011).
The researches focused on the issue of sexting have been taking place since 2009 in many countries
around the world, for example in the U.S., UK, Australia, Canada, China (Jolicoeur 2010) and the Czech
Republic (Kopecký, Krejčí, 2011), (Kopecký, Szotkowski, Krejčí 2012). It is worth mentioning the
research within The National Campaign to Prevent Teen and Unplanned Pregnancy (USA 2009), which
presents remarkable results on the prevalence of sexting among young Internet and mobile phone users.
The first more extensive researches monitoring the current status of sharing and sending sexually tuned
content to other Internet users in the Czech Republic were researches Risks of electronic
communication II (Kopecký, Krejčí 2011) and Risks of electronic communication III (Kopecký, Szotkowski,
Krejčí 2012). Research on Risks of electronic communication II (Kopecký, Krejčí 2011) worked with a
sample of 10 414 respondents and revealed that 9,70 % of children (11–17 years old) share their
Introduction
sexual material on the Internet and 10,44 % then send it to other people. Research on Risk of electronic
communication III (Kopecký, Szotkowski, Krejčí 2012) worked with a sample of 10,700 respondents
revealed that 8,25 % of children (11–17 years old) share their sexual materials on the Internet and 9,15
% of them send it to others. The data showed that sexting is not so expanded in the Czech environment
as it is in the U.S. and other countries.
Methods
Methods
In the description of the research procedure we will present the objectives of the research, which will be
followed by a description of the research sample and research methodology. We will also mention the
timetable and method of data processing.
The main objective of the research was to determine the incidence of risky behaviour among Czech
children associated with information and communication technologies, particularly the Internet and
mobile phones. In the descriptive level the aim of the research was to determine the number of victims
and attackers involved in the various manifestations of cyberbullying. Simultaneously, it monitored from
whom the victim would seek help if needed (teacher, parent, sibling or friend).
Another objective was to determine whether children communicate with strangers on the Internet, if they
have been asked for a personal meeting and if they are willing to meet virtual friends or acquaintances in
the real world, which is closely related to the phenomenon called cybergrooming.
The aim was also to find forms of public sharing of intimate materials on the Internet and reveal the
motivation of pubescents and adolescent for this behaviour, for example, sexting. We also wondered how
many of the respondents considered sexting to be risky.
In this context we focused on children sharing personal data on the Internet (especially the facial image)
and their knowledge of social networks. Social networks represent a place of numerous cyber attacks,
which are implemented with the use of personal information shared by particular users, and data that
attackers will get if these networks security fails.
Due to the limited scope of the paper, we will present only partial results of the descriptive research; the
relational level is not mentioned in the paper, as we have already published its results in other periodicals.
Methods
In the descriptive level we pay attention to the issue of cyberbullying among Czech children,
cybergrooming (personal meetings with people with unverified identity, risk communication with unverified
Internet users) and sexting.
As in the previous years (2009–2012), when we performed similar studies, the research sample
consisted of users of the Internet and mobile phones among pupils in primary and secondary schools in
the Czech Republic. Considering the research issue, the age of respondents was limited from 11 to 17
years, and than we divided this period into two age categories: 11–14 years, 15–17 years.
The total number of respondents in the research Risks of electronic communication IV was 21 372. The
following Table 1 shows the selected sample of respondents in detail.
Table 1: Structure of the sample of responds by sex
Sex

Age
Girls

Boys

Overall

21372 children
as a research sample

11-14

7 923

6 731

14 654

15-17

3 920

2 798

6 718

Overall

11 843

9 529

21 372

(11-17 years old)
Methods
The research sample consisted of 55,42 % of cases of girls and 44,58 % of the cases of boys. 68,57 %
of respondents were aged 11–14 years and 31,43 % was 15–17 years old. All regions of the Czech
Republic were included.
To increase the representativeness of the research sample, we tried to get proportional numbers of
respondents to match the demographic distribution of the individual regions.
To select elements in the research sample, we chose a controlled selection (proportional stratified
selection), in which the number of respondents is collected into notional subgroups (in our case regions)
proportional to the number of respondents in the population.
With regard to the intended number of respondents the actual research was oriented quantitatively and
as a starting research method the questionnaire was chosen. The research tool with verified properities
(validity, reliability) contained a total of 71 items (40 dichotomous, 2 polytomous, 22 of multiple choice
and 7 open), which were based on theoretical knowledge and were arranged in such a way to reflect the
objectives and problems.
The questionnaire was distributed electronically (on-line) through a questionnaire system of the E-Bezpečí
project, which has e-mail addresses of 8 641 schools, educational institutions, associations aimed at
children and young people and other institutions in the Czech Republic.
Team members of the E-Bezpečí project made the list of addresses in 2009–2012 from publicly available
sources, due to the realization of previous researchs.
Anonymous questionnaire automatically verified where it was sent from (IP address, regional affiliation,
monitored the behavior of respondents by use of Google Analytics, etc.), it offered the possibility of
Methods
stating the e-mail address of school, through which the school could be in contact with the research
team - some schools involved in the research asked the isolation of their data and their subsequent
processing.
The preparation of the research was launched on 1st May 2012; the data were collected from 1st
November 2012 to 31st January 2013. The evaluation of the data was carried out in February 2013.
The measured data were mostly at nominal and ordinal level, which corresponded to a subsequent
processing, numerical operations and statistics.
The advantage of the electronic version of the research instrument (questionnaire) was the
automatization of the data collection to the appropriate tables. Subsequently, the sorting, processing and
evaluation was made.
On the descriptive problems we were looking for answers through the fundamentals of descriptive
statistics (calculation of the characteristics of the area – central tendency measures, the calculation of
standard deviation, percent calculation, etc.) including the graphical representation.
To verify the hypothesis, we used inductive statistics, namely the test of independence chi-square for
foursquare table. As mentioned above, with regard to the length of the paper we have not showed the
details here.
Results
Results
Czech children and cyberbullying
A substantial part of our research was focused on cyberbullying.
21 372 respondents took part in the research and it consisted of the following topics:
A) Victims of cyberbullying (the number of victims in relation to individual acts of cyberbullying and
platforms on which cyberbullying takes place).
B) The originator of cyberbullying (number of attackers in relation to individual acts of cyberbullying and
platforms on which cyberbullying takes place).
C) Persons involved in addressing cyberbullying (who the victim would contact in the situation of
cyberbullying).
D) Other related phenomena (specific forms of cyberbullying realized, for example, by breaking account
and subsequent identity theft, etc.).
Within the research we observed these forms of cyberbullying:
a) Verbal attacks in cyberspace – harm through humiliation, insulting and embarassing of the child.
b) Bothering by drop-calls.
c) Threats and intimidation of the child.
d) Identity theft.
e) Blackmailing of the child.
f) Humiliation, embarassing realized by spreading photographs.
g) Humiliation, embarassing realized by spreading video.
h) Humiliation, embarassing realized by spreading audio.
In the following text we will focus on selected results of descriptive part of the research based on the
above-mentioned topics.
Results
A) Victims of cyberbullying
(the number of victims in relation to individual acts of cyberbullying and platforms on which cyberbullying
takes place).
40,00%
35,00%

33,44%

30,00%
25,00%
20,00%

24,08%

17,38%

15,00%
10,85%

10,09%
10,00%

7,33%
5,58%
3,69%

5,00%
0,00%
Verbal a acks Bothering by Threats and Iden ty the
drop-calls in mida on of
the child

Blackmailing

Humilia on, Humilia on, Humilia on,
embarrassing embarrassing embarrassing
realized by
realized by
realized by
spreading
spreading
spreading
photographs
video
audio

Graph 1: The most common forms of cyberbullying from the perspective of victims

n=21 372
Results
The most common forms of cyberbullying that children experience include harm in the form of
humiliation, insulting and embarassing (verbal aggression). These forms of aggression
experienced over 33,44 % of respondents as a victim.
An important indicator of the observed phenomenon is a communication platform on which
cyberbullying takes place most often.
50,00%
45,00%

44,47%

40,00%
35,00%
30,00%
25,36%
25,00%

23,26%

23,10%

20,00%
15,00%
9,63%

10,00%

7,89%
3,96%

5,00%
0,00%
Social network

SMS

Private chat, IM

Public chat

Other service

E-mail

Graph 2: Cyberbullying according to communication platforms

Blog, web

n=7 809
Results
B) The originator of cyberbullying
(number of attackers in relation to individual acts of cyberbullying and platforms on which cyberbullying
takes place).
12,00%
10,68%
10,00%

8,00%

6,00%

5,65%

5,59%

5,35%

4,00%
2,41%

2,76%

2,47%

1,90%

2,00%

0,00%
Verbal a acks Bothering by Threats and Iden ty the
drop-calls in mida on of
the child

Blackmailing

Humilia on, Humilia on, Humilia on,
embarrassing embarrassing embarrassing
realized by
realized by
realized by
spreading
spreading
spreading
photographs
video
audio

Graph 3: Cyberbullying from the attackers’ perspective

n=19 360
Results
Attacks associated with humiliation, insulting and embarassing of the victim are mostly conducted in an
environment of social networks to attack another person, the social networks were used by 37,17 %
attackers, also private chats or instant messengers (21,02 %) and SMS (18,49 %) are used for the
attacks.
12,00%
10,68%
10,00%

8,00%

6,00%

5,65%

5,59%

5,35%

4,00%
2,41%

2,47%

2,76%
1,90%

2,00%

0,00%
Verbal a acks Bothering by Threats and Iden ty the
drop-calls in mida on of
the child

Blackmailing

Humilia on, Humilia on, Humilia on,
embarrassing embarrassing embarrassing
realized by
realized by
realized by
spreading
spreading
spreading
photographs
video
audio

Graph 4: Communication platform misused by attackers to cyberbullying

n=2 131
Results
C) Persons involved in dealing with cyberbullying
(who the victim would contact in the situation when experiencing cyberbullying)
70,00%
62,81%
60,00%
50,96%
48,27%

50,00%

40,00%

37,94%

39,16%

38,65%

37,35%

36,81%
34,51%

34,34%
29,05%

30,00%

25,86%

Parents

24,38%

Teachers

20,19%
17,92%

20,00%

18,08%

10,00%

0,00%
Humilia on,
insul ng,
ridiculing, other
verbal
embarrassing verbal a acks

Humilia on,
insul ng and
embarrassing by
photos

Humilia on,
insul ng and
embarrassing by
videos

Humilia on,
insul ng and
embarrassing by
sound recording

Threats or
in mida on

Abusing of
Bothering by drop electronic account calls or by sending
large amound of
SMS repeatedly

Blackmailing

Graph 5: Who the victim would contact in the situation when experiencing cyberbulling

n=19 201
Results
Within this range we asked children about whom to confide in if they are victims of cyberbullying.
Our attention was focused mainly on humiliation, insulting or verbal embarassing – verbal assaults,
humiliation, insulting, embarassing by using photographs; humiliation, insulting, embarassing by using
video, humiliation, insulting, embarassing by using sound, threats or intimidation, abuse of the
electronic account, bothering by drop-calls or by sending large numbers of messages; blackmailing.

D) Other related phenomena
(specific forms of cyberbullying realized as breaking account and subsequent identity theft, etc.).
A surprising finding compared to previous years is still continuing trend associated with the attackers
within cyberbullying and their "pleasure" to break other people´s electronic account. Approximately one
quarter of respondents (22,48 %) enrolled into electronic account without the owner's permission and
10,36 % of them abused this account to get the owner into trouble.
Results
Personal meetings of children with strangers
The research has also monitored the willingness of respondents to communicate with strangers with an
unverified identity on the Internet and respondents' reactions to the invitation for a personal meeting.
More than half of the respondents (53,16 %) communicate with strangers on the Internet. It should be
pointed out that not every communication with strangers on the Internet is dangerous for the child and
lead to the sexual abuse of a child. As shown by case histories, sexual attackers use ICT platform not only
to establish contact with the child, but also for obtaining personal, intimate or otherwise discrediting
materials which can then force the victim to a personal meeting (called cybergrooming).
If you were invited by your internet friend to personal meeting, would you go?
70,00%
64,02%
60,00%

50,00%

40,00%

35,98%

30,00%

20,00%

10,00%

0,00%
YES

NO

Graph 6: The willingness of respondents to go for a personal meeting

n=9 132
Results
Have you ever been invited by your internet friend to a personal meeting?
60,00%

56,18%

50,00%
43,82%
40,00%

30,00%

20,00%

10,00%

0,00%
YES

NO

Graph 7: Invitation of respondents by unknown person for a personal appointment.

n=9 203

From the above Table 7 it is clear that 43,82 % of respondents received an ivitiation to a personal
meeting by unverified Internet user (the child has never met the person in the real world, thier contact is
virtual).
Results
Have you ever gone to a personal meeting with a stranger that you know only from the internet?
51,00%

50,81%

50,50%

50,00%

49,50%
49,19%
49,00%

48,50%

48,00%
YES

NO

Graph 8: Respondents who had gone with an unknown person on a personal meeting.

n=4 072

Very alarming finding is the high percentage of children (49,19 %), which attended a personal
meeting with an unknown person. Children knew this person only from the Internet and they had never
met him/her in the real world before.
In relation to children's personal meetings with strangers from the Internet they do not know personally, it
was also observed if children consider such behavior to be risky or dangerous. 57,99 % of respondents
Results
considered communication with people on the Internet who do not know personally risky. 76,07 % of
respondents considered personal meeting with people from the Internet they do not know personally to
be dangerous. Despite this fact, 54,95 % of them would attend a personal meeting. 25,67 % of
respondents were also asked by unverified Internet users not to tell anyone about their communication
and what they talked about.
Interesting facts who the victim would contact if the Internet user requested a personal meeting were
also revealed. 58,70 % of children would confide in friends or siblings who are younger than 18 years,
41,06 % of children would tell the parents about the meeting. The worrying thing is that teachers whould
be entrusted only by 3% of respondents, and even 15,01 % would not tell anyone about the meeting!
Results
Sexting
As mentioned above, the research Risks of internet communication IV also dealt with sexting. We
followed two basic forms of dissemination of sexting – the location of sexually oriented material on
the Internet (eg the social network profile or digital storage databases of photos) and direct sending of
sexual material to others (eg, boyfriend, girlfriend, friends, partners, etc.).
Personal sexually suggestive materials (photos, videos) were placed in 2012 on the Internet by 7,23 %
of Czech children. 8,99 % of the respondents sent the materials to another person (65,93 % of
girls, 34,07 % of boys).
The most common motives for children trying sexting include boredom, trying to establish intimate
contact with a person of the opposite sex; sexting is seen as a form of self-presentation and selfpromotion. In some cases, sexting has been produced under the influence of other people (eg a group of
girls shot sexualy oriented materials, they got over the shame and sent the photos to other people).
Although 75,32 % of the respondents perceive sexting to be risky and dangerous, 6,24 % of
respondents share In spite of the relatively high percentage of children that share or send sexually
oriented materials (photos, videos), within our research we noted slightly declining trend in sexting, which
is evident from the Graph 9 below.
Results
12,00%
10,44%
10,00%

9,70%
9,15%

8,99%

8,25%
8,00%

7,23%
Sharing

6,00%

Sending
4,00%

2,00%

0,00%
2010

2011

2012

Graph 9: Sharing and sending sexually oriented materials (photos, video) by Czech children.
References
Barak, A., & King, S. A. (2000). The two faces of the internet: Introduction to the special issue on the
internet and sexuality. Cyberpsychology & Behavior, 3, 517–520.
Browker, A., & Sullivan, J. D. (2010). Sexting: Risky Actions and Overreactions. FBI Law Enforcement
Bulletin, 2010 (5). Online: http://www.fbi.gov/stats-services/publications/law-enforcementbulletin/july-2010/sexting
Catalano, R., & Junger-Tas, J. et al. (1998). The nature of school bullying: A cross-national perspective
(1st ed.). London: Routledge.
Dehue, F., Bolman, C., Völlink, T., & Pouwelse, M. (2008). Pesten op het werk: de relatie met gezondheid
en verzuim en de rol van coping. Gedrag & Organisatie, volume 20, nr. 2, 97–117.
Dowty, T. (2009). Sharing children's personal data. In D. Korff, & T. Dowty (Ed.) Protecting the virtual
child. London: ARCH. On-line: http://www.nuffieldfoundation.org/sharing-childrens-personal-data
Douglas, N., Lilley, S.J., Kooper, L., & Diamond, A. (2004) Safety and justice: sharing personal
information in the context of domestic violence. On-line:
http://www.eurowrc.org/01.eurowrc/04.eurowrc_en/GB_UNITED KINGDOM/Sharing personal
information - domestic violence.pdf
Englander, E. K. (2007). Is bullying a junior hate crime? Implications for interventions. American
Behavioral Scientist, 51, 205–212. ISSN 00027642.
Ferguson, C. J. (2011). Sexting behaviors among young hispanic women: Incidence and association with
References
other high-risk sexual behaviors. Psychiatric Quarterly, 82, 10.1007/s11126-010-9165-8.
Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to
offending and victimization. Deviant Behavior, 29, 129–56. ISSN 01639625.
Hinduja, S., & Patchin, J. W. (2009). Bullying Beyond the Schoolyard: Preventing and Responding to
Cyberbullying. Thousand Oaks California: Corwin Press.
Chráska, M. (2007). Metody pedagogického výzkumu: základy kvantitativního výzkumu (1st ed.). Praha:
GRADA.
Information Commissioner's Office. (2006). Protecting Children's Personal Information: ICO Issues
Paper. On-line:
http://www.ico.gov.uk/upload/documents/library/data_protection/detailed_specialist_guides/issues
_paper_protecting_chidrens_personal_information.pdf
Jolicoeur, M., & Zedlewski, M. (2010). Much Ado about Sexting. On-line:
https://www.ncjrs.gov/pdffiles1/nij/ 230795.pdf
Kopecký, K. (2011). České děti o sextingu. E-Bezpečí. On-line: http://www.e-bezpeci.cz/index.php
/temata/sexting/237-eske-dti-o-sextingu
Kowalski, R., Limber, S., & Agatston, P (2007). Cyber Bullying: Bullying in the Digital Age (1st ed.).
.
Malden: Blackwell Publishers.
References
Kopecký, K., Szotkowski, R., & Krejčí, V. (2012). Nebezpečí elektronické komunikace III. On-line:
http://www.e-bezpeci.cz/index.php/ke-stazeni/cat_view/27-vyzkumne-zpravy
Krejčí, V., & Kopecký, K. (2011). Nebezpečí elektronické komunikace 2: zpráva z výzkumného šetření
realizovaného v rámci projektu E-Bezpečí. On-line: http://www.prvok.upol.cz/index.php/kestaeni/doc_download/ 13-nebezpei-elektronicke-komunikace-2-centrum-prvok-2011
Lenhart, A. (2009). Teens and Sexting. On-line: http://pewresearch.org/assets/pdf/teens-andsexting.pdf
Lumby, C., & Funnell, N. (2011). Between heat and light: The opportunity in moral panics. Crime. Media,
Cultuire, 7, 277–291.
Meacham, A. (2009). Sexting-related bullying cited in Hillsborough teen's suicide. St. Petersburg Times.
Online: http://www.tampabay.com/news/humaninterest/article1054895.ece
National Campaign to Prevent Teen and Unplanned Pregnancy. (2009). Sex and Tech: Results from a
Survey of Teens and Young Adults. On-line:
http://www.thenationalcampaign.org/sextech/pdf/sextech_summary.pdf
North Yorkshire Children's Trust. (2009). A General Framework for Information Sharing in North
Yorkshire and York. On.line: http://www.northyorks.gov.uk/CHttpHandler.ashx?id=2700&p=0
Olweus, D. (2006). An analysis of the Revised Olweus Bully: Victim Questionnaire using the Rasch
measurement model. British Journal of Educational Psycholog, 76, 781–801.
References
Qing Li. (2006). Cyberbullying in Schools: A Research of Gender Differences. School Psychology
International, 27, 157–170.
Rigby, K. (1997). Bullying in schools, and what to do about it (1st ed.). London: Jessica Kingsley.
Stone, N. (2011). The „sexting“ quagmire: Criminal justice responses to adolescents' electronic
transmission of indecent images in the UK and the USA. Youth Justice, 11, 266–281.
Streichman, J. (2009). What is sexting? Examiner.com. On-line: http://www.examiner.com/mentalhealth-education-in-phoenix/what-is-sexting
Shariff, S., & Churchill, A. H. (2010). Truths and Myths of Cyber-bullying: International Perspectives on
Stakeholder Responsibility and Children's Safety (1st ed.). New York: Peter Lang.
Smith, P K., Mahdavi, J., & Carvalho, M. (2010). Cyberbullying: It´s nature and impact in secondary
.
school pupils. The Journal of Child Psychology and Psychiatry, 49, 376–385.
Smith, P K., & Sharp, S. (1994). School Bullying: Insights and Perspectives (1st ed.). London:
.
Routledge.
Sourander, A., Klomek, A. B., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., Ristkari, T., &
Helenius, H. (2010). Psychosocial Risk Factors Associated With Cyberbullying Among Adolescents: A
Population-Based Study. Arch Gen Psychiatry, 67, 720–728.
Weisskirch, R. S., & Delevi, R. (2011). „Sexting“ and adult romantic attachment. Computers in Human
References
Behavior, 27, 1697–1701.
Whitney, I., & Smith, P K. (1993). A survey of the nature and extent of bullying in junior/middle and
.
secondary schools. Educational Research, 35, 3–25.
Wolak, J., Finkelhor, D., & Mitchell, K. J. (2011). How Often Are Teens Arrested for Sexting? Pediatrics,
10.1542/peds. 2011–2242.
Worcestershire Children´s Trust. (2010). Protocol for Sharing Information between Children's Trust
agencies working for Children and Young People in Worcestershire. On-line:
http://www.worcestershire.gov.uk/cms/pdf/ childrens trust information sharing protocol.pdf
Wysocki, D. K., & Childers, C.D. (2011). „Let My Fingers Do the Talking”: Sexting and Infidelity in
Cyberspace. Sexuality and Culture, 15, 217–239.
Ybarra, M., Espelage D. L., Mitchell, & K. J. (2007). The Co-occurrence of Internet Harassment and
Unwanted Sexual Solicitation Victimization and Perpetration: Associations with Psychosocial Indicators.
Journal of Adolescent Health, 4, 31–41.
Youth Justice Board for England and Wales. (2005). Sharing Personal and Sensitive Personal
Information on Children and Young People at Risk of Offending. On-line: http://www.yjb.gov.uk/
publications/Resources/Downloads/Sharing Personal and Sensitive Personal Information on Children
and Young People at Risk of Offending.pdf
ZoomSphere (2013). On-line: http://www.zoomsphere.com
About Centre
About Centre
Centre for the Prevention of risky virtual communication (the Centre) focuses mainly on prevention of risk
behaviours associated with the use of information and communication technologies (ICT) by children. It
aims especially at cyber bullying, cyber grooming, cyber stalking, hoax and spam, sexting, methods of
social engineering, the issue of sharing personal information through social networks and other
hazardous communication techniques.
The Centre builds on the activities of the E-Bezpečí project (www.e-bezpeci.cz), which will continue to
develop its activities as a central project of the Centre. The Centre implements the primary victim and
situational prevention.
The Centre provides a complex system of continuous primary prevention at several levels:
A. Education
- Education for schools - series of preventive educational activities aimed at the above mentioned topics
organized in cooperation with the Police of the Czech Republic.
- Lectures for the public.
- Lectures for students of pedagogic and non-pedagogic courses at PdF (+ selective seminars).
- Educational events for PIS (Police of the Czech Republic).
- Educational events for the social institutions and legal protection workers.
- Certified training under the Further Education of Pedagogical Workers (DVPP; PdF UP).
B. Preventive programs for school
- The comprehensive prevention programmes in the area of risk behaviour.
- Competitions for elementary and high school students focused on hazardous communication practices.
About Centre
C. Intervention
- Online counselling cooperating with organizations specializing in the issue (BKB, Police, PP counselling,
etc.), which participates in the direct solution of individual cases. The Centre provides 5layer counselling
(primary, legal, psychological, socio-legal and police)
- In the area of intervention the Centre cooperates with specialized departments of Pedagogical Faculty of
Palacký University (more here) and with other expert and intervention institutions from the entire country.
D. Research
- Local research programmes for schools - researches aimed at analyzing the existence of dangerous
phenomena in a particular school (victims, aggressors, prevention, and intervention).
- Area-wide surveys in the Czech Republic (regions, provinces, entire Czech Republic).
All activities of the Centre further develop E-Bezpečí Partner Programme for schools in practice. More
than 80 schools from the entire country, who wish to pursue actively the issue of hazardous
communication practices and integrate this system of prevention in their prevention plans, are involved in
this programme. The purpose of the partnership program is a mutual sharing of experience, information
on issues and creating and sharing educational materials.
Contacts
Address
Centrum prevence rizikové virtuální komunikace
Faculty of Education, Palacký University Olomouc
Žižkovo nám. 5, Olomouc, Czech Republic
771 40
Website
www.prvok.upol.cz
www.e-bezpeci.cz
Head of Centre:
Mgr. Kamil Kopecký, Ph.D.
E-mail: kamil.kopecky@upol.cz
Telefon: +420 585 635 601
Mobil: +420 773 470 997
Pedagogická fakulta UP Žižkovo nám. 5, Olomouc
,
facebook.com/kamil.kopecky
skype: axe-work
google+ : kamil.kopecky

www.prvok.upol.cz

More Related Content

Viewers also liked

The Use of a Mobile Application to Enhance Communication Within Initial Teach...
The Use of a Mobile Application to Enhance Communication Within Initial Teach...The Use of a Mobile Application to Enhance Communication Within Initial Teach...
The Use of a Mobile Application to Enhance Communication Within Initial Teach...myknowledgemap
 
SEO Agency for Enterprise
SEO Agency for EnterpriseSEO Agency for Enterprise
SEO Agency for EnterprisePratham Vision
 
Use of Internet Forums for Communication
Use of Internet Forums for CommunicationUse of Internet Forums for Communication
Use of Internet Forums for Communicationpxprajsharma
 
internate/social marketing
internate/social marketing internate/social marketing
internate/social marketing Ronak Modi
 
Internet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam ShahInternet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam ShahSoham
 
Mobile Communication for Information Technology Application & Management (ITAM)
Mobile Communication for Information Technology Application & Management (ITAM)Mobile Communication for Information Technology Application & Management (ITAM)
Mobile Communication for Information Technology Application & Management (ITAM)Nitesh Singh Patel
 
Distributed Database Management Systems (Distributed DBMS)
Distributed Database Management Systems (Distributed DBMS)Distributed Database Management Systems (Distributed DBMS)
Distributed Database Management Systems (Distributed DBMS)Rushdi Shams
 
мэдээллийн системийн үндэс
мэдээллийн системийн үндэсмэдээллийн системийн үндэс
мэдээллийн системийн үндэсTsetsenkhuu Otgonbayar
 
Manufacturing Process of Plastic Bags
Manufacturing Process of Plastic BagsManufacturing Process of Plastic Bags
Manufacturing Process of Plastic BagsKingsun Machinery
 
Mobile Communications Sajay K R
Mobile Communications Sajay K RMobile Communications Sajay K R
Mobile Communications Sajay K RPlusOrMinusZero
 
Mobile communication
Mobile communicationMobile communication
Mobile communicationsourabh kant
 
Mobile communication
Mobile communicationMobile communication
Mobile communicationAditya Sharat
 
Generation of mobile communication systems
Generation of mobile communication systemsGeneration of mobile communication systems
Generation of mobile communication systemsjincy-a
 
Powerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usesPowerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usessumitsc
 

Viewers also liked (18)

Internate
InternateInternate
Internate
 
The Use of a Mobile Application to Enhance Communication Within Initial Teach...
The Use of a Mobile Application to Enhance Communication Within Initial Teach...The Use of a Mobile Application to Enhance Communication Within Initial Teach...
The Use of a Mobile Application to Enhance Communication Within Initial Teach...
 
SEO Agency for Enterprise
SEO Agency for EnterpriseSEO Agency for Enterprise
SEO Agency for Enterprise
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
Use of Internet Forums for Communication
Use of Internet Forums for CommunicationUse of Internet Forums for Communication
Use of Internet Forums for Communication
 
internate/social marketing
internate/social marketing internate/social marketing
internate/social marketing
 
Internet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam ShahInternet as a communication tool - By Jnanam Shah
Internet as a communication tool - By Jnanam Shah
 
Mobile Communication for Information Technology Application & Management (ITAM)
Mobile Communication for Information Technology Application & Management (ITAM)Mobile Communication for Information Technology Application & Management (ITAM)
Mobile Communication for Information Technology Application & Management (ITAM)
 
Distributed Database Management Systems (Distributed DBMS)
Distributed Database Management Systems (Distributed DBMS)Distributed Database Management Systems (Distributed DBMS)
Distributed Database Management Systems (Distributed DBMS)
 
мэдээллийн системийн үндэс
мэдээллийн системийн үндэсмэдээллийн системийн үндэс
мэдээллийн системийн үндэс
 
Manufacturing Process of Plastic Bags
Manufacturing Process of Plastic BagsManufacturing Process of Plastic Bags
Manufacturing Process of Plastic Bags
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
Modern trends in mobile communication
Modern trends in mobile communicationModern trends in mobile communication
Modern trends in mobile communication
 
Mobile Communications Sajay K R
Mobile Communications Sajay K RMobile Communications Sajay K R
Mobile Communications Sajay K R
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
Mobile communication
Mobile communicationMobile communication
Mobile communication
 
Generation of mobile communication systems
Generation of mobile communication systemsGeneration of mobile communication systems
Generation of mobile communication systems
 
Powerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usesPowerpoint presentation on internet and its uses
Powerpoint presentation on internet and its uses
 

Similar to Risks of internet communication IV - research report (brief version)

A Review Of Research On Cyber-Bullying In Greece
A Review Of Research On Cyber-Bullying In GreeceA Review Of Research On Cyber-Bullying In Greece
A Review Of Research On Cyber-Bullying In GreeceSarah Adams
 
An Empirical Study on Online Social Networks Sites Usage Online Dating Sites...
An Empirical Study on Online Social Networks Sites Usage  Online Dating Sites...An Empirical Study on Online Social Networks Sites Usage  Online Dating Sites...
An Empirical Study on Online Social Networks Sites Usage Online Dating Sites...Jessica Henderson
 
Decline of interpersonal communication
Decline of interpersonal communicationDecline of interpersonal communication
Decline of interpersonal communicationNaeemMushtaq4
 
Projektfuzet angol-web
Projektfuzet angol-webProjektfuzet angol-web
Projektfuzet angol-webOmbodi Gábor
 
Conceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskConceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskMarcelo Pesallaccia
 
International Journal ofEnvironmental Researchand Pu.docx
International  Journal  ofEnvironmental Researchand Pu.docxInternational  Journal  ofEnvironmental Researchand Pu.docx
International Journal ofEnvironmental Researchand Pu.docxvrickens
 
Human Communication Research ISSN 0360-3989O R I G I N A L.docx
Human Communication Research ISSN 0360-3989O R I G I N A L.docxHuman Communication Research ISSN 0360-3989O R I G I N A L.docx
Human Communication Research ISSN 0360-3989O R I G I N A L.docxwellesleyterresa
 
International Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxInternational Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxLaticiaGrissomzz
 
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16VannaSchrader3
 
Influence of cyberbullying behaviour on
Influence of cyberbullying behaviour onInfluence of cyberbullying behaviour on
Influence of cyberbullying behaviour onMohinderSingh78
 
Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Alexander Decker
 
research methodology Reviews
research methodology  Reviewsresearch methodology  Reviews
research methodology ReviewsAshutosh Singh
 
© 2018 Hogrefe PublishingCrisis (2019), 40(2), 100–114https.docx
© 2018 Hogrefe PublishingCrisis (2019), 40(2), 100–114https.docx© 2018 Hogrefe PublishingCrisis (2019), 40(2), 100–114https.docx
© 2018 Hogrefe PublishingCrisis (2019), 40(2), 100–114https.docxgerardkortney
 
Impact of Social Media among Students’ Behaviors in Tertiary Institution of A...
Impact of Social Media among Students’ Behaviors in Tertiary Institution of A...Impact of Social Media among Students’ Behaviors in Tertiary Institution of A...
Impact of Social Media among Students’ Behaviors in Tertiary Institution of A...IJSRP Journal
 

Similar to Risks of internet communication IV - research report (brief version) (20)

A Review Of Research On Cyber-Bullying In Greece
A Review Of Research On Cyber-Bullying In GreeceA Review Of Research On Cyber-Bullying In Greece
A Review Of Research On Cyber-Bullying In Greece
 
An Empirical Study on Online Social Networks Sites Usage Online Dating Sites...
An Empirical Study on Online Social Networks Sites Usage  Online Dating Sites...An Empirical Study on Online Social Networks Sites Usage  Online Dating Sites...
An Empirical Study on Online Social Networks Sites Usage Online Dating Sites...
 
مثال 6.pdf
مثال 6.pdfمثال 6.pdf
مثال 6.pdf
 
P36132142
P36132142P36132142
P36132142
 
Decline of interpersonal communication
Decline of interpersonal communicationDecline of interpersonal communication
Decline of interpersonal communication
 
Projektfuzet angol-web
Projektfuzet angol-webProjektfuzet angol-web
Projektfuzet angol-web
 
Youth Victimization
Youth VictimizationYouth Victimization
Youth Victimization
 
Meet the e strangers
Meet the e strangersMeet the e strangers
Meet the e strangers
 
Conceptual approaches to adolescent online risk
Conceptual approaches to adolescent online riskConceptual approaches to adolescent online risk
Conceptual approaches to adolescent online risk
 
International Journal ofEnvironmental Researchand Pu.docx
International  Journal  ofEnvironmental Researchand Pu.docxInternational  Journal  ofEnvironmental Researchand Pu.docx
International Journal ofEnvironmental Researchand Pu.docx
 
Human Communication Research ISSN 0360-3989O R I G I N A L.docx
Human Communication Research ISSN 0360-3989O R I G I N A L.docxHuman Communication Research ISSN 0360-3989O R I G I N A L.docx
Human Communication Research ISSN 0360-3989O R I G I N A L.docx
 
International Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docxInternational Forum of Educational Technology & SocietyMid.docx
International Forum of Educational Technology & SocietyMid.docx
 
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
BULLYING ORIGINS, PREVENTION, EVOLUTION IN THE LAST DECADE16
 
Influence of cyberbullying behaviour on
Influence of cyberbullying behaviour onInfluence of cyberbullying behaviour on
Influence of cyberbullying behaviour on
 
Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...
 
research methodology Reviews
research methodology  Reviewsresearch methodology  Reviews
research methodology Reviews
 
© 2018 Hogrefe PublishingCrisis (2019), 40(2), 100–114https.docx
© 2018 Hogrefe PublishingCrisis (2019), 40(2), 100–114https.docx© 2018 Hogrefe PublishingCrisis (2019), 40(2), 100–114https.docx
© 2018 Hogrefe PublishingCrisis (2019), 40(2), 100–114https.docx
 
Virtual environment and lying
Virtual environment and lyingVirtual environment and lying
Virtual environment and lying
 
Teens and Sexting
Teens and SextingTeens and Sexting
Teens and Sexting
 
Impact of Social Media among Students’ Behaviors in Tertiary Institution of A...
Impact of Social Media among Students’ Behaviors in Tertiary Institution of A...Impact of Social Media among Students’ Behaviors in Tertiary Institution of A...
Impact of Social Media among Students’ Behaviors in Tertiary Institution of A...
 

More from Kamil Kopecky

Online bezpečnost v době postpandemické
Online bezpečnost v době postpandemickéOnline bezpečnost v době postpandemické
Online bezpečnost v době postpandemickéKamil Kopecky
 
Stručný úvod do vědecké práce pro doktorandy (1.0)
Stručný úvod do vědecké práce pro doktorandy (1.0)Stručný úvod do vědecké práce pro doktorandy (1.0)
Stručný úvod do vědecké práce pro doktorandy (1.0)Kamil Kopecky
 
Specifika jazyka elektronické komunikace
Specifika jazyka elektronické komunikaceSpecifika jazyka elektronické komunikace
Specifika jazyka elektronické komunikaceKamil Kopecky
 
Základy české fonetiky a fonologie (U1ST)
Základy české fonetiky a fonologie (U1ST)Základy české fonetiky a fonologie (U1ST)
Základy české fonetiky a fonologie (U1ST)Kamil Kopecky
 
E-Bezpečí - úvodní prezentace pro studenty UPOL
E-Bezpečí - úvodní prezentace pro studenty UPOLE-Bezpečí - úvodní prezentace pro studenty UPOL
E-Bezpečí - úvodní prezentace pro studenty UPOLKamil Kopecky
 
Základy pravopisu (pro studenty)
Základy pravopisu (pro studenty)Základy pravopisu (pro studenty)
Základy pravopisu (pro studenty)Kamil Kopecky
 
Rodina v kyberprostoru
Rodina v kyberprostoruRodina v kyberprostoru
Rodina v kyberprostoruKamil Kopecky
 
PIGŽU projekt (verze 2)
PIGŽU projekt (verze 2)PIGŽU projekt (verze 2)
PIGŽU projekt (verze 2)Kamil Kopecky
 
Projekt Pigžu (úvod)
Projekt Pigžu (úvod)Projekt Pigžu (úvod)
Projekt Pigžu (úvod)Kamil Kopecky
 
K možnostem zařazení témat online bezpečnosti do výuky na základní škole
K možnostem zařazení témat online bezpečnosti do výuky na základní školeK možnostem zařazení témat online bezpečnosti do výuky na základní škole
K možnostem zařazení témat online bezpečnosti do výuky na základní školeKamil Kopecky
 
Struktura národního jazyka
Struktura národního jazykaStruktura národního jazyka
Struktura národního jazykaKamil Kopecky
 
Starci na netu (2018)
Starci na netu (2018)Starci na netu (2018)
Starci na netu (2018)Kamil Kopecky
 
Vybrané formy kybernetické kriminality
Vybrané formy kybernetické kriminalityVybrané formy kybernetické kriminality
Vybrané formy kybernetické kriminalityKamil Kopecky
 
Nové směry ve vývoji e-learningu
Nové směry ve vývoji e-learninguNové směry ve vývoji e-learningu
Nové směry ve vývoji e-learninguKamil Kopecky
 
Fenomén Minecraft v českém prostředí (výzkumná zpráva) CZECH VERSION
Fenomén Minecraft v českém prostředí (výzkumná zpráva) CZECH VERSIONFenomén Minecraft v českém prostředí (výzkumná zpráva) CZECH VERSION
Fenomén Minecraft v českém prostředí (výzkumná zpráva) CZECH VERSIONKamil Kopecky
 
The Minecraft Phenomenon in the Czech Environment (Research Report) ENGLISH V...
The Minecraft Phenomenon in the Czech Environment (Research Report) ENGLISH V...The Minecraft Phenomenon in the Czech Environment (Research Report) ENGLISH V...
The Minecraft Phenomenon in the Czech Environment (Research Report) ENGLISH V...Kamil Kopecky
 
Rizikové chování českých a slovenských dětí v prostředí internetu
Rizikové chování českých a slovenských dětí v prostředí internetuRizikové chování českých a slovenských dětí v prostředí internetu
Rizikové chování českých a slovenských dětí v prostředí internetuKamil Kopecky
 
Nauka o slovní zásobě
Nauka o slovní zásoběNauka o slovní zásobě
Nauka o slovní zásoběKamil Kopecky
 

More from Kamil Kopecky (20)

Online bezpečnost v době postpandemické
Online bezpečnost v době postpandemickéOnline bezpečnost v době postpandemické
Online bezpečnost v době postpandemické
 
Stručný úvod do vědecké práce pro doktorandy (1.0)
Stručný úvod do vědecké práce pro doktorandy (1.0)Stručný úvod do vědecké práce pro doktorandy (1.0)
Stručný úvod do vědecké práce pro doktorandy (1.0)
 
Specifika jazyka elektronické komunikace
Specifika jazyka elektronické komunikaceSpecifika jazyka elektronické komunikace
Specifika jazyka elektronické komunikace
 
Základy české fonetiky a fonologie (U1ST)
Základy české fonetiky a fonologie (U1ST)Základy české fonetiky a fonologie (U1ST)
Základy české fonetiky a fonologie (U1ST)
 
E-Bezpečí - úvodní prezentace pro studenty UPOL
E-Bezpečí - úvodní prezentace pro studenty UPOLE-Bezpečí - úvodní prezentace pro studenty UPOL
E-Bezpečí - úvodní prezentace pro studenty UPOL
 
Základy pravopisu (pro studenty)
Základy pravopisu (pro studenty)Základy pravopisu (pro studenty)
Základy pravopisu (pro studenty)
 
Rodina v kyberprostoru
Rodina v kyberprostoruRodina v kyberprostoru
Rodina v kyberprostoru
 
PIGŽU projekt (verze 2)
PIGŽU projekt (verze 2)PIGŽU projekt (verze 2)
PIGŽU projekt (verze 2)
 
Projekt Pigžu (úvod)
Projekt Pigžu (úvod)Projekt Pigžu (úvod)
Projekt Pigžu (úvod)
 
Ipady ve výuce
Ipady ve výuceIpady ve výuce
Ipady ve výuce
 
K možnostem zařazení témat online bezpečnosti do výuky na základní škole
K možnostem zařazení témat online bezpečnosti do výuky na základní školeK možnostem zařazení témat online bezpečnosti do výuky na základní škole
K možnostem zařazení témat online bezpečnosti do výuky na základní škole
 
Struktura národního jazyka
Struktura národního jazykaStruktura národního jazyka
Struktura národního jazyka
 
Digidoupě
DigidoupěDigidoupě
Digidoupě
 
Starci na netu (2018)
Starci na netu (2018)Starci na netu (2018)
Starci na netu (2018)
 
Vybrané formy kybernetické kriminality
Vybrané formy kybernetické kriminalityVybrané formy kybernetické kriminality
Vybrané formy kybernetické kriminality
 
Nové směry ve vývoji e-learningu
Nové směry ve vývoji e-learninguNové směry ve vývoji e-learningu
Nové směry ve vývoji e-learningu
 
Fenomén Minecraft v českém prostředí (výzkumná zpráva) CZECH VERSION
Fenomén Minecraft v českém prostředí (výzkumná zpráva) CZECH VERSIONFenomén Minecraft v českém prostředí (výzkumná zpráva) CZECH VERSION
Fenomén Minecraft v českém prostředí (výzkumná zpráva) CZECH VERSION
 
The Minecraft Phenomenon in the Czech Environment (Research Report) ENGLISH V...
The Minecraft Phenomenon in the Czech Environment (Research Report) ENGLISH V...The Minecraft Phenomenon in the Czech Environment (Research Report) ENGLISH V...
The Minecraft Phenomenon in the Czech Environment (Research Report) ENGLISH V...
 
Rizikové chování českých a slovenských dětí v prostředí internetu
Rizikové chování českých a slovenských dětí v prostředí internetuRizikové chování českých a slovenských dětí v prostředí internetu
Rizikové chování českých a slovenských dětí v prostředí internetu
 
Nauka o slovní zásobě
Nauka o slovní zásoběNauka o slovní zásobě
Nauka o slovní zásobě
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 

Risks of internet communication IV - research report (brief version)

  • 1. Palacký University Olomouc, Faculty of Education Centre for Prevention of Risky Virtual Communication RISKS OF INTERNET COMMUNICATION IV (research report) Olomouc, Czech Republic, 2013
  • 2. Authors: Kamil Kopecký, PhD René Szotkowski, PhD Krejčí Veronika Palacký University Olomouc, Faculty of Education Centre for Prevention of Risky Virtual Communication www.prvok.upol.cz Olomouc, Czech Republic, 2013 Version of document: 1.0 (brief)
  • 3. Introduction Introduction Research Risks of electronic/internet communication IV represents the fourth nationwide research, which was conducted by the E-Bezpečí project (guaranteed by professional workplace of Centre for the Prevention of risky virtual communication Palacký University in Olomouc) in cooperation with Seznam.cz. The research was traditionally focused on the area of risky behaviour associated with information and communication technologies, especially the Internet, in a population of Czech children. In the research the following phenomena were monitored: A. Cyberbullying (various forms of cyberbulling in relation to selected means of communication). B. Establishing of virtual contacts (communication with strangers and personal meetings with them; basis for cybergrooming). C. Sexting (in the form of public sharing of intimate materials on the Internet and providing intimate material on request of another person). D. Sharing of personal data on the Internet (with a focus on sharing face photos). E. Other related phenomena. In the following part we will therefore briefly describe the theoretical background, which was the basis of our investigation. First, we will focus on the issue of cyberbullying, which is based on existing definitions of bullying (in Czech environment, M. Kolář is primarily engaged in bullying), which is perceived as aggressive, intentional, repeated action or behavior against any individual or group that cannot defend (Whitney & Smith 1993, Olweus 1999). Other authors understand cyberbullying as a form of harassment based on power imbalance and the systematic abuse of power (Smith & Sharp 1995, Rigby 2002). A more specific definition of cyberbullying is by Hinduja and Patchin (2009) and Dehue, Bolman, Völlink,
  • 4. Introduction Pouwels (2008). Hinduja and Patchin (2009) defines cyberbullying as intentional, repeated, hurtful activity using a computer, mobile phone and other electronic devices. Dehue, Bolman, Völlink, Pouwels (2008) describe cyberbullying as torture, threats, humiliation, embarassing or other attacks among adolescents using the Internet, interactive and digital technologies or mobile phones. For our needs we have defined cyberbullying as a form of aggression that is carried out against individuals or groups by using information and communication technologies, which occurs repeatedly (Belsey 2004, Smith & Slonje 2007), whether by the original aggressor or the so-called secondary invaders. Kowalski, Limber and others add (2007–2008) that it is the bullying that occurs through e-mail, ICQ, mobile phones (SMS, MMS, phone calls), chat, website, and other ICT. In the Czech environment, mainly Michal Kolář, David Šmahel, Veronika Krejčí and Kamil Kopecký are engaged in cyberbullying; they do not deviate from the foreign approach. In the process of cyberbullying and other hazardous communication practices like sexting and cybergrooming, sharing of personal information by children on the Internet plays an important role. Many foreign studies deal with it and indicate a high percentage of children publishing their personal data on the Internet. For example, according to the research site eMarketer (2007), 75 % of American children are willing to share their personal data and information about the family with other Internet users in exchange for access to services and products offered on the Internet, which can be especially dangerous for example in relation to cybergrooming. Statistics of Zoomsphere (2013), which monitors the user's largest social network Facebook, indicate that 23 % of registered Czechs users are aged 0–19 years. According to Zoomsphere (2013), to 19th May 2013 the total number of Facebook users in the Czech Republic is 3 943 240, the estimated number of child users sharing their personal data on the network
  • 5. Introduction is about 1 800 000 (957 460 aged 0-15). However, the real number will be lower due to the different age structure of defined users in demographic surveys of Zoomsphere (2013) (0–19 years). There are, of course, several qualitatively oriented researches observing the factors influencing the sharing of personal data (by children, adults) on the Internet and from this point of view, there is an interesting research called Australian Research ACMA (2009) – Attitudes towards use of personal information online. There are not many researches implemented on representative samples in the Czech Republic aimed at sharing of personal information by children through information and communication technologies. We can name research Risks of electronic communication II (Kopecký, Krejčí 2011) and Risks of Internet communication III (Kopecký, Szotkowski, Krejčí 2012). Both researches were conducted on representative samples. Research Risks of electronic communications II was carried out on a sample of 12 533 respondents under 18 years of age. Its final report released the data on which children can be traced in real life – name, along with surname, was published by 72,97 % of respondents and 60,22 % of the respondents say it to others; according to this study, 63,19 % of Czech children share the e-mail address, 22,8 % of children share mobile phone number. Research Risks of electronic communication IV was implemented on a much larger sample which consisted of 21 372 respondents under 18 years of age. The measured data (as in the previous research) showed that 75,64 % of respondents publish their name along with surname and 51,96 % of the respondents say it to others; 58,68 % of Czech children share the e-mail address and 16,78 % of children share their phone number. Within our research, we again looked into the phenomenon called sexting. Sexting refers to sending electronic text messages, own photos or videos with sexual content (Kopecký 2010). It occurs in the virtual environment of electronic media, especially the Internet.
  • 6. Introduction Introduction One of the first widely used definitions defines sexting as sending nude photographs depicting nudity among mobile phones or other electronic media such as the Internet (Streichman 2009), and now, according to some authors, sexting is primarily associated with younger generation, who takes its sexually suggestive materials (so-called youth-produced sexual images), send it and distribute it (Wolak, Finkelhor, Mitchell 2011–2012). Sullivan (2011) adds the definiton of sexting; he includes suggestive text messages and images depicting naked or partially naked children and adults, which are then spread by mobile phones or the Internet. Number of platforms and tools for spreading such materials has been complemented by Streichman (2009–2011) by social networks, especially Facebook and MySpace. In the Czech environment, sexting is distributed primarily through social networks Facebook, Líbímseti.cz or digital storage of photos Rajče.net (Kopecký 2011). The researches focused on the issue of sexting have been taking place since 2009 in many countries around the world, for example in the U.S., UK, Australia, Canada, China (Jolicoeur 2010) and the Czech Republic (Kopecký, Krejčí, 2011), (Kopecký, Szotkowski, Krejčí 2012). It is worth mentioning the research within The National Campaign to Prevent Teen and Unplanned Pregnancy (USA 2009), which presents remarkable results on the prevalence of sexting among young Internet and mobile phone users. The first more extensive researches monitoring the current status of sharing and sending sexually tuned content to other Internet users in the Czech Republic were researches Risks of electronic communication II (Kopecký, Krejčí 2011) and Risks of electronic communication III (Kopecký, Szotkowski, Krejčí 2012). Research on Risks of electronic communication II (Kopecký, Krejčí 2011) worked with a sample of 10 414 respondents and revealed that 9,70 % of children (11–17 years old) share their
  • 7. Introduction sexual material on the Internet and 10,44 % then send it to other people. Research on Risk of electronic communication III (Kopecký, Szotkowski, Krejčí 2012) worked with a sample of 10,700 respondents revealed that 8,25 % of children (11–17 years old) share their sexual materials on the Internet and 9,15 % of them send it to others. The data showed that sexting is not so expanded in the Czech environment as it is in the U.S. and other countries.
  • 9. Methods In the description of the research procedure we will present the objectives of the research, which will be followed by a description of the research sample and research methodology. We will also mention the timetable and method of data processing. The main objective of the research was to determine the incidence of risky behaviour among Czech children associated with information and communication technologies, particularly the Internet and mobile phones. In the descriptive level the aim of the research was to determine the number of victims and attackers involved in the various manifestations of cyberbullying. Simultaneously, it monitored from whom the victim would seek help if needed (teacher, parent, sibling or friend). Another objective was to determine whether children communicate with strangers on the Internet, if they have been asked for a personal meeting and if they are willing to meet virtual friends or acquaintances in the real world, which is closely related to the phenomenon called cybergrooming. The aim was also to find forms of public sharing of intimate materials on the Internet and reveal the motivation of pubescents and adolescent for this behaviour, for example, sexting. We also wondered how many of the respondents considered sexting to be risky. In this context we focused on children sharing personal data on the Internet (especially the facial image) and their knowledge of social networks. Social networks represent a place of numerous cyber attacks, which are implemented with the use of personal information shared by particular users, and data that attackers will get if these networks security fails. Due to the limited scope of the paper, we will present only partial results of the descriptive research; the relational level is not mentioned in the paper, as we have already published its results in other periodicals.
  • 10. Methods In the descriptive level we pay attention to the issue of cyberbullying among Czech children, cybergrooming (personal meetings with people with unverified identity, risk communication with unverified Internet users) and sexting. As in the previous years (2009–2012), when we performed similar studies, the research sample consisted of users of the Internet and mobile phones among pupils in primary and secondary schools in the Czech Republic. Considering the research issue, the age of respondents was limited from 11 to 17 years, and than we divided this period into two age categories: 11–14 years, 15–17 years. The total number of respondents in the research Risks of electronic communication IV was 21 372. The following Table 1 shows the selected sample of respondents in detail. Table 1: Structure of the sample of responds by sex Sex Age Girls Boys Overall 21372 children as a research sample 11-14 7 923 6 731 14 654 15-17 3 920 2 798 6 718 Overall 11 843 9 529 21 372 (11-17 years old)
  • 11. Methods The research sample consisted of 55,42 % of cases of girls and 44,58 % of the cases of boys. 68,57 % of respondents were aged 11–14 years and 31,43 % was 15–17 years old. All regions of the Czech Republic were included. To increase the representativeness of the research sample, we tried to get proportional numbers of respondents to match the demographic distribution of the individual regions. To select elements in the research sample, we chose a controlled selection (proportional stratified selection), in which the number of respondents is collected into notional subgroups (in our case regions) proportional to the number of respondents in the population. With regard to the intended number of respondents the actual research was oriented quantitatively and as a starting research method the questionnaire was chosen. The research tool with verified properities (validity, reliability) contained a total of 71 items (40 dichotomous, 2 polytomous, 22 of multiple choice and 7 open), which were based on theoretical knowledge and were arranged in such a way to reflect the objectives and problems. The questionnaire was distributed electronically (on-line) through a questionnaire system of the E-Bezpečí project, which has e-mail addresses of 8 641 schools, educational institutions, associations aimed at children and young people and other institutions in the Czech Republic. Team members of the E-Bezpečí project made the list of addresses in 2009–2012 from publicly available sources, due to the realization of previous researchs. Anonymous questionnaire automatically verified where it was sent from (IP address, regional affiliation, monitored the behavior of respondents by use of Google Analytics, etc.), it offered the possibility of
  • 12. Methods stating the e-mail address of school, through which the school could be in contact with the research team - some schools involved in the research asked the isolation of their data and their subsequent processing. The preparation of the research was launched on 1st May 2012; the data were collected from 1st November 2012 to 31st January 2013. The evaluation of the data was carried out in February 2013. The measured data were mostly at nominal and ordinal level, which corresponded to a subsequent processing, numerical operations and statistics. The advantage of the electronic version of the research instrument (questionnaire) was the automatization of the data collection to the appropriate tables. Subsequently, the sorting, processing and evaluation was made. On the descriptive problems we were looking for answers through the fundamentals of descriptive statistics (calculation of the characteristics of the area – central tendency measures, the calculation of standard deviation, percent calculation, etc.) including the graphical representation. To verify the hypothesis, we used inductive statistics, namely the test of independence chi-square for foursquare table. As mentioned above, with regard to the length of the paper we have not showed the details here.
  • 14. Results Czech children and cyberbullying A substantial part of our research was focused on cyberbullying. 21 372 respondents took part in the research and it consisted of the following topics: A) Victims of cyberbullying (the number of victims in relation to individual acts of cyberbullying and platforms on which cyberbullying takes place). B) The originator of cyberbullying (number of attackers in relation to individual acts of cyberbullying and platforms on which cyberbullying takes place). C) Persons involved in addressing cyberbullying (who the victim would contact in the situation of cyberbullying). D) Other related phenomena (specific forms of cyberbullying realized, for example, by breaking account and subsequent identity theft, etc.). Within the research we observed these forms of cyberbullying: a) Verbal attacks in cyberspace – harm through humiliation, insulting and embarassing of the child. b) Bothering by drop-calls. c) Threats and intimidation of the child. d) Identity theft. e) Blackmailing of the child. f) Humiliation, embarassing realized by spreading photographs. g) Humiliation, embarassing realized by spreading video. h) Humiliation, embarassing realized by spreading audio. In the following text we will focus on selected results of descriptive part of the research based on the above-mentioned topics.
  • 15. Results A) Victims of cyberbullying (the number of victims in relation to individual acts of cyberbullying and platforms on which cyberbullying takes place). 40,00% 35,00% 33,44% 30,00% 25,00% 20,00% 24,08% 17,38% 15,00% 10,85% 10,09% 10,00% 7,33% 5,58% 3,69% 5,00% 0,00% Verbal a acks Bothering by Threats and Iden ty the drop-calls in mida on of the child Blackmailing Humilia on, Humilia on, Humilia on, embarrassing embarrassing embarrassing realized by realized by realized by spreading spreading spreading photographs video audio Graph 1: The most common forms of cyberbullying from the perspective of victims n=21 372
  • 16. Results The most common forms of cyberbullying that children experience include harm in the form of humiliation, insulting and embarassing (verbal aggression). These forms of aggression experienced over 33,44 % of respondents as a victim. An important indicator of the observed phenomenon is a communication platform on which cyberbullying takes place most often. 50,00% 45,00% 44,47% 40,00% 35,00% 30,00% 25,36% 25,00% 23,26% 23,10% 20,00% 15,00% 9,63% 10,00% 7,89% 3,96% 5,00% 0,00% Social network SMS Private chat, IM Public chat Other service E-mail Graph 2: Cyberbullying according to communication platforms Blog, web n=7 809
  • 17. Results B) The originator of cyberbullying (number of attackers in relation to individual acts of cyberbullying and platforms on which cyberbullying takes place). 12,00% 10,68% 10,00% 8,00% 6,00% 5,65% 5,59% 5,35% 4,00% 2,41% 2,76% 2,47% 1,90% 2,00% 0,00% Verbal a acks Bothering by Threats and Iden ty the drop-calls in mida on of the child Blackmailing Humilia on, Humilia on, Humilia on, embarrassing embarrassing embarrassing realized by realized by realized by spreading spreading spreading photographs video audio Graph 3: Cyberbullying from the attackers’ perspective n=19 360
  • 18. Results Attacks associated with humiliation, insulting and embarassing of the victim are mostly conducted in an environment of social networks to attack another person, the social networks were used by 37,17 % attackers, also private chats or instant messengers (21,02 %) and SMS (18,49 %) are used for the attacks. 12,00% 10,68% 10,00% 8,00% 6,00% 5,65% 5,59% 5,35% 4,00% 2,41% 2,47% 2,76% 1,90% 2,00% 0,00% Verbal a acks Bothering by Threats and Iden ty the drop-calls in mida on of the child Blackmailing Humilia on, Humilia on, Humilia on, embarrassing embarrassing embarrassing realized by realized by realized by spreading spreading spreading photographs video audio Graph 4: Communication platform misused by attackers to cyberbullying n=2 131
  • 19. Results C) Persons involved in dealing with cyberbullying (who the victim would contact in the situation when experiencing cyberbullying) 70,00% 62,81% 60,00% 50,96% 48,27% 50,00% 40,00% 37,94% 39,16% 38,65% 37,35% 36,81% 34,51% 34,34% 29,05% 30,00% 25,86% Parents 24,38% Teachers 20,19% 17,92% 20,00% 18,08% 10,00% 0,00% Humilia on, insul ng, ridiculing, other verbal embarrassing verbal a acks Humilia on, insul ng and embarrassing by photos Humilia on, insul ng and embarrassing by videos Humilia on, insul ng and embarrassing by sound recording Threats or in mida on Abusing of Bothering by drop electronic account calls or by sending large amound of SMS repeatedly Blackmailing Graph 5: Who the victim would contact in the situation when experiencing cyberbulling n=19 201
  • 20. Results Within this range we asked children about whom to confide in if they are victims of cyberbullying. Our attention was focused mainly on humiliation, insulting or verbal embarassing – verbal assaults, humiliation, insulting, embarassing by using photographs; humiliation, insulting, embarassing by using video, humiliation, insulting, embarassing by using sound, threats or intimidation, abuse of the electronic account, bothering by drop-calls or by sending large numbers of messages; blackmailing. D) Other related phenomena (specific forms of cyberbullying realized as breaking account and subsequent identity theft, etc.). A surprising finding compared to previous years is still continuing trend associated with the attackers within cyberbullying and their "pleasure" to break other people´s electronic account. Approximately one quarter of respondents (22,48 %) enrolled into electronic account without the owner's permission and 10,36 % of them abused this account to get the owner into trouble.
  • 21. Results Personal meetings of children with strangers The research has also monitored the willingness of respondents to communicate with strangers with an unverified identity on the Internet and respondents' reactions to the invitation for a personal meeting. More than half of the respondents (53,16 %) communicate with strangers on the Internet. It should be pointed out that not every communication with strangers on the Internet is dangerous for the child and lead to the sexual abuse of a child. As shown by case histories, sexual attackers use ICT platform not only to establish contact with the child, but also for obtaining personal, intimate or otherwise discrediting materials which can then force the victim to a personal meeting (called cybergrooming). If you were invited by your internet friend to personal meeting, would you go? 70,00% 64,02% 60,00% 50,00% 40,00% 35,98% 30,00% 20,00% 10,00% 0,00% YES NO Graph 6: The willingness of respondents to go for a personal meeting n=9 132
  • 22. Results Have you ever been invited by your internet friend to a personal meeting? 60,00% 56,18% 50,00% 43,82% 40,00% 30,00% 20,00% 10,00% 0,00% YES NO Graph 7: Invitation of respondents by unknown person for a personal appointment. n=9 203 From the above Table 7 it is clear that 43,82 % of respondents received an ivitiation to a personal meeting by unverified Internet user (the child has never met the person in the real world, thier contact is virtual).
  • 23. Results Have you ever gone to a personal meeting with a stranger that you know only from the internet? 51,00% 50,81% 50,50% 50,00% 49,50% 49,19% 49,00% 48,50% 48,00% YES NO Graph 8: Respondents who had gone with an unknown person on a personal meeting. n=4 072 Very alarming finding is the high percentage of children (49,19 %), which attended a personal meeting with an unknown person. Children knew this person only from the Internet and they had never met him/her in the real world before. In relation to children's personal meetings with strangers from the Internet they do not know personally, it was also observed if children consider such behavior to be risky or dangerous. 57,99 % of respondents
  • 24. Results considered communication with people on the Internet who do not know personally risky. 76,07 % of respondents considered personal meeting with people from the Internet they do not know personally to be dangerous. Despite this fact, 54,95 % of them would attend a personal meeting. 25,67 % of respondents were also asked by unverified Internet users not to tell anyone about their communication and what they talked about. Interesting facts who the victim would contact if the Internet user requested a personal meeting were also revealed. 58,70 % of children would confide in friends or siblings who are younger than 18 years, 41,06 % of children would tell the parents about the meeting. The worrying thing is that teachers whould be entrusted only by 3% of respondents, and even 15,01 % would not tell anyone about the meeting!
  • 25. Results Sexting As mentioned above, the research Risks of internet communication IV also dealt with sexting. We followed two basic forms of dissemination of sexting – the location of sexually oriented material on the Internet (eg the social network profile or digital storage databases of photos) and direct sending of sexual material to others (eg, boyfriend, girlfriend, friends, partners, etc.). Personal sexually suggestive materials (photos, videos) were placed in 2012 on the Internet by 7,23 % of Czech children. 8,99 % of the respondents sent the materials to another person (65,93 % of girls, 34,07 % of boys). The most common motives for children trying sexting include boredom, trying to establish intimate contact with a person of the opposite sex; sexting is seen as a form of self-presentation and selfpromotion. In some cases, sexting has been produced under the influence of other people (eg a group of girls shot sexualy oriented materials, they got over the shame and sent the photos to other people). Although 75,32 % of the respondents perceive sexting to be risky and dangerous, 6,24 % of respondents share In spite of the relatively high percentage of children that share or send sexually oriented materials (photos, videos), within our research we noted slightly declining trend in sexting, which is evident from the Graph 9 below.
  • 27. References Barak, A., & King, S. A. (2000). The two faces of the internet: Introduction to the special issue on the internet and sexuality. Cyberpsychology & Behavior, 3, 517–520. Browker, A., & Sullivan, J. D. (2010). Sexting: Risky Actions and Overreactions. FBI Law Enforcement Bulletin, 2010 (5). Online: http://www.fbi.gov/stats-services/publications/law-enforcementbulletin/july-2010/sexting Catalano, R., & Junger-Tas, J. et al. (1998). The nature of school bullying: A cross-national perspective (1st ed.). London: Routledge. Dehue, F., Bolman, C., Völlink, T., & Pouwelse, M. (2008). Pesten op het werk: de relatie met gezondheid en verzuim en de rol van coping. Gedrag & Organisatie, volume 20, nr. 2, 97–117. Dowty, T. (2009). Sharing children's personal data. In D. Korff, & T. Dowty (Ed.) Protecting the virtual child. London: ARCH. On-line: http://www.nuffieldfoundation.org/sharing-childrens-personal-data Douglas, N., Lilley, S.J., Kooper, L., & Diamond, A. (2004) Safety and justice: sharing personal information in the context of domestic violence. On-line: http://www.eurowrc.org/01.eurowrc/04.eurowrc_en/GB_UNITED KINGDOM/Sharing personal information - domestic violence.pdf Englander, E. K. (2007). Is bullying a junior hate crime? Implications for interventions. American Behavioral Scientist, 51, 205–212. ISSN 00027642. Ferguson, C. J. (2011). Sexting behaviors among young hispanic women: Incidence and association with
  • 28. References other high-risk sexual behaviors. Psychiatric Quarterly, 82, 10.1007/s11126-010-9165-8. Hinduja, S., & Patchin, J. W. (2008). Cyberbullying: An exploratory analysis of factors related to offending and victimization. Deviant Behavior, 29, 129–56. ISSN 01639625. Hinduja, S., & Patchin, J. W. (2009). Bullying Beyond the Schoolyard: Preventing and Responding to Cyberbullying. Thousand Oaks California: Corwin Press. Chráska, M. (2007). Metody pedagogického výzkumu: základy kvantitativního výzkumu (1st ed.). Praha: GRADA. Information Commissioner's Office. (2006). Protecting Children's Personal Information: ICO Issues Paper. On-line: http://www.ico.gov.uk/upload/documents/library/data_protection/detailed_specialist_guides/issues _paper_protecting_chidrens_personal_information.pdf Jolicoeur, M., & Zedlewski, M. (2010). Much Ado about Sexting. On-line: https://www.ncjrs.gov/pdffiles1/nij/ 230795.pdf Kopecký, K. (2011). České děti o sextingu. E-Bezpečí. On-line: http://www.e-bezpeci.cz/index.php /temata/sexting/237-eske-dti-o-sextingu Kowalski, R., Limber, S., & Agatston, P (2007). Cyber Bullying: Bullying in the Digital Age (1st ed.). . Malden: Blackwell Publishers.
  • 29. References Kopecký, K., Szotkowski, R., & Krejčí, V. (2012). Nebezpečí elektronické komunikace III. On-line: http://www.e-bezpeci.cz/index.php/ke-stazeni/cat_view/27-vyzkumne-zpravy Krejčí, V., & Kopecký, K. (2011). Nebezpečí elektronické komunikace 2: zpráva z výzkumného šetření realizovaného v rámci projektu E-Bezpečí. On-line: http://www.prvok.upol.cz/index.php/kestaeni/doc_download/ 13-nebezpei-elektronicke-komunikace-2-centrum-prvok-2011 Lenhart, A. (2009). Teens and Sexting. On-line: http://pewresearch.org/assets/pdf/teens-andsexting.pdf Lumby, C., & Funnell, N. (2011). Between heat and light: The opportunity in moral panics. Crime. Media, Cultuire, 7, 277–291. Meacham, A. (2009). Sexting-related bullying cited in Hillsborough teen's suicide. St. Petersburg Times. Online: http://www.tampabay.com/news/humaninterest/article1054895.ece National Campaign to Prevent Teen and Unplanned Pregnancy. (2009). Sex and Tech: Results from a Survey of Teens and Young Adults. On-line: http://www.thenationalcampaign.org/sextech/pdf/sextech_summary.pdf North Yorkshire Children's Trust. (2009). A General Framework for Information Sharing in North Yorkshire and York. On.line: http://www.northyorks.gov.uk/CHttpHandler.ashx?id=2700&p=0 Olweus, D. (2006). An analysis of the Revised Olweus Bully: Victim Questionnaire using the Rasch measurement model. British Journal of Educational Psycholog, 76, 781–801.
  • 30. References Qing Li. (2006). Cyberbullying in Schools: A Research of Gender Differences. School Psychology International, 27, 157–170. Rigby, K. (1997). Bullying in schools, and what to do about it (1st ed.). London: Jessica Kingsley. Stone, N. (2011). The „sexting“ quagmire: Criminal justice responses to adolescents' electronic transmission of indecent images in the UK and the USA. Youth Justice, 11, 266–281. Streichman, J. (2009). What is sexting? Examiner.com. On-line: http://www.examiner.com/mentalhealth-education-in-phoenix/what-is-sexting Shariff, S., & Churchill, A. H. (2010). Truths and Myths of Cyber-bullying: International Perspectives on Stakeholder Responsibility and Children's Safety (1st ed.). New York: Peter Lang. Smith, P K., Mahdavi, J., & Carvalho, M. (2010). Cyberbullying: It´s nature and impact in secondary . school pupils. The Journal of Child Psychology and Psychiatry, 49, 376–385. Smith, P K., & Sharp, S. (1994). School Bullying: Insights and Perspectives (1st ed.). London: . Routledge. Sourander, A., Klomek, A. B., Ikonen, M., Lindroos, J., Luntamo, T., Koskelainen, M., Ristkari, T., & Helenius, H. (2010). Psychosocial Risk Factors Associated With Cyberbullying Among Adolescents: A Population-Based Study. Arch Gen Psychiatry, 67, 720–728. Weisskirch, R. S., & Delevi, R. (2011). „Sexting“ and adult romantic attachment. Computers in Human
  • 31. References Behavior, 27, 1697–1701. Whitney, I., & Smith, P K. (1993). A survey of the nature and extent of bullying in junior/middle and . secondary schools. Educational Research, 35, 3–25. Wolak, J., Finkelhor, D., & Mitchell, K. J. (2011). How Often Are Teens Arrested for Sexting? Pediatrics, 10.1542/peds. 2011–2242. Worcestershire Children´s Trust. (2010). Protocol for Sharing Information between Children's Trust agencies working for Children and Young People in Worcestershire. On-line: http://www.worcestershire.gov.uk/cms/pdf/ childrens trust information sharing protocol.pdf Wysocki, D. K., & Childers, C.D. (2011). „Let My Fingers Do the Talking”: Sexting and Infidelity in Cyberspace. Sexuality and Culture, 15, 217–239. Ybarra, M., Espelage D. L., Mitchell, & K. J. (2007). The Co-occurrence of Internet Harassment and Unwanted Sexual Solicitation Victimization and Perpetration: Associations with Psychosocial Indicators. Journal of Adolescent Health, 4, 31–41. Youth Justice Board for England and Wales. (2005). Sharing Personal and Sensitive Personal Information on Children and Young People at Risk of Offending. On-line: http://www.yjb.gov.uk/ publications/Resources/Downloads/Sharing Personal and Sensitive Personal Information on Children and Young People at Risk of Offending.pdf ZoomSphere (2013). On-line: http://www.zoomsphere.com
  • 33. About Centre Centre for the Prevention of risky virtual communication (the Centre) focuses mainly on prevention of risk behaviours associated with the use of information and communication technologies (ICT) by children. It aims especially at cyber bullying, cyber grooming, cyber stalking, hoax and spam, sexting, methods of social engineering, the issue of sharing personal information through social networks and other hazardous communication techniques. The Centre builds on the activities of the E-Bezpečí project (www.e-bezpeci.cz), which will continue to develop its activities as a central project of the Centre. The Centre implements the primary victim and situational prevention. The Centre provides a complex system of continuous primary prevention at several levels: A. Education - Education for schools - series of preventive educational activities aimed at the above mentioned topics organized in cooperation with the Police of the Czech Republic. - Lectures for the public. - Lectures for students of pedagogic and non-pedagogic courses at PdF (+ selective seminars). - Educational events for PIS (Police of the Czech Republic). - Educational events for the social institutions and legal protection workers. - Certified training under the Further Education of Pedagogical Workers (DVPP; PdF UP). B. Preventive programs for school - The comprehensive prevention programmes in the area of risk behaviour. - Competitions for elementary and high school students focused on hazardous communication practices.
  • 34. About Centre C. Intervention - Online counselling cooperating with organizations specializing in the issue (BKB, Police, PP counselling, etc.), which participates in the direct solution of individual cases. The Centre provides 5layer counselling (primary, legal, psychological, socio-legal and police) - In the area of intervention the Centre cooperates with specialized departments of Pedagogical Faculty of Palacký University (more here) and with other expert and intervention institutions from the entire country. D. Research - Local research programmes for schools - researches aimed at analyzing the existence of dangerous phenomena in a particular school (victims, aggressors, prevention, and intervention). - Area-wide surveys in the Czech Republic (regions, provinces, entire Czech Republic). All activities of the Centre further develop E-Bezpečí Partner Programme for schools in practice. More than 80 schools from the entire country, who wish to pursue actively the issue of hazardous communication practices and integrate this system of prevention in their prevention plans, are involved in this programme. The purpose of the partnership program is a mutual sharing of experience, information on issues and creating and sharing educational materials.
  • 35. Contacts Address Centrum prevence rizikové virtuální komunikace Faculty of Education, Palacký University Olomouc Žižkovo nám. 5, Olomouc, Czech Republic 771 40 Website www.prvok.upol.cz www.e-bezpeci.cz Head of Centre: Mgr. Kamil Kopecký, Ph.D. E-mail: kamil.kopecky@upol.cz Telefon: +420 585 635 601 Mobil: +420 773 470 997 Pedagogická fakulta UP Žižkovo nám. 5, Olomouc , facebook.com/kamil.kopecky skype: axe-work google+ : kamil.kopecky www.prvok.upol.cz